Добірка наукової літератури з теми "NODE DETECTION"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "NODE DETECTION".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "NODE DETECTION"

1

Lee, S., J. Yang, S. Nam, J. Lee, W. Kim, J. Choi, G. Kim, and G. Kim. "Triple detection method for sentinel lymph node detection." Journal of Clinical Oncology 27, no. 15_suppl (May 20, 2009): e11605-e11605. http://dx.doi.org/10.1200/jco.2009.27.15_suppl.e11605.

Повний текст джерела
Анотація:
e11605 Background: Sentinel lymph node biopsy is widely accepted method to determine nodal stage of breast cancer. There are several reported method for detecting sentinel lymph node. The aim of this study was to show the new detection method of sentinel lymph node and show the effectiveness of this method. Methods: We did prospective study and enrolled 25 patients who underwent partial mastectomy and sentinel lymph node biopsy. We injected indigocyanine green (green dye) at peritumoral lesion, indigocarmine dye (blue dye) in subareolar area and radioisotope (Tc-99m) injection. Sentinel lymph nodes are identified by color change or radioisotope uptake, and classified by each color (blue or green) and radioisotope uptake. We compared the detection rate from our study with that from the previous studies. Results: Sentinel lymph nodes were detected in all patients (25/25). Green color stained sentinel lymph nodes were identified in 18 patients (18/25), blue color stained sentinel lymph nodes were identified in 15 patients (15/25) and radioactive lymph nodes were identified in 19 patients (19/25). Conclusions: The triple mapping method showed higher detection rate than the previous studies and this method is recommendable to detect sentinel lymph node. No significant financial relationships to disclose.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Imam Rahmani, Mohammad Khalid, Moizuddin Mohammed, Reyazur Rashid Irshad, Sadaf Yasmin, Swati Mishra, Pooja Asopa, Asharul Islam, Sultan Ahmad, and Aleem Ali. "Design a Secure Routing and Monitoring Framework Based on Hybrid Optimization for IoT-Based Wireless Sensor Networks." Journal of Nanoelectronics and Optoelectronics 18, no. 3 (March 1, 2023): 338–46. http://dx.doi.org/10.1166/jno.2023.3397.

Повний текст джерела
Анотація:
Wireless Sensor Networks (WSNs) have employed in recent years for many different applications and functions. But, it has the critical task to detect the malicious node because node malicious attacks are dangerous attacks, and the concept of a malicious attack is opponents enter the network, search accidentally, and capture one or more normal nodes. A lot of research developed to overcome this problem, but no precise results are found. In this paper, design a Hybrid Vulture and African Buffalo with Node Identity Verification (HVAB-NIV) model to predict the malicious nodes in the WSN. The fitness functions of the HVAB-NIV have operated to recognize the energy level of each node and improve the performance of node detection. The developed replica includes three stages that monitor each node, calculate the energy level and detect the malicious node. More than 100 node inputs were initialized in the proposed technique and implemented in the MATLAB tool. The suggested mechanism enhances the performance of malicious node detection and gains good accuracy for detecting nodes also, it saves running time and power consumption. The experimental results of the developed model has validated with other existing replicas to running time, False Prediction Rate (FPR), detection accuracy, True Prediction Rate (TPR), and power consumption. The developed methods achieve better results by gaining a high rate of accuracy detection, less running time, and false rate detection.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Lei, Yang, and Ying Jiang. "Anomaly Detection for Nodes Under the Cloud Computing Environment." International Journal of Distributed Systems and Technologies 12, no. 1 (January 2021): 30–48. http://dx.doi.org/10.4018/ijdst.2021010103.

Повний текст джерела
Анотація:
Due to the services diversity and dynamic deployment, the anomalies will occur on nodes under cloud computing environment. If a single node generates an anomaly, the associated nodes are affected by the abnormal node, which will result in anomaly propagation and nodes failure. In this paper, a method of anomaly detection for nodes under the cloud computing environment is proposed. Firstly, the node monitoring model is established by the agents deployed on each node. Secondly, the comprehensive score is used to identify abnormal data. The anomaly of the single node is judged by the time window-based method. Then, the status of directly associated nodes is detected through normalized mutual information and the status of indirectly associated nodes is detected through the node attributes in the case of a single node anomaly. Finally, other associated nodes affected by the abnormal node are detected. The experimental results showed that the method in this paper can detect the anomalies of single node and associated node under the cloud computing environment effectively.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Masoud, Mohammad Z., Yousef Jaradat, Ismael Jannoud, and Mustafa A. Al Sibahee. "A hybrid clustering routing protocol based on machine learning and graph theory for energy conservation and hole detection in wireless sensor network." International Journal of Distributed Sensor Networks 15, no. 6 (June 2019): 155014771985823. http://dx.doi.org/10.1177/1550147719858231.

Повний текст джерела
Анотація:
In this work, a new hybrid clustering routing protocol is proposed to prolong network life time through detecting holes and edges nodes. The detection process attempts to generate a connected graph without any isolated nodes or clusters that have no connection with the sink node. To this end, soft clustering/estimation maximization with graph metrics, PageRank, node degree, and local cluster coefficient, has been utilized. Holes and edges detection process is performed by the sink node to reduce energy consumption of wireless sensor network nodes. The clustering process is dynamic among sensor nodes. Hybrid clustering routing protocol–hole detection converts the network into a number of rings to overcome transmission distances. We compared hybrid clustering routing protocol–hole detection with four different protocols. The accuracy of detection reached 98%. Moreover, network life time has prolonged 10%. Finally, hybrid clustering routing protocol–hole detection has eliminated the disconnectivity in the network for more than 80% of network life time.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Ezeh, Chinenye, Ren Tao, Li Zhe, Wang Yiqun, and Qu Ying. "Multi-Type Node Detection in Network Communities." Entropy 21, no. 12 (December 17, 2019): 1237. http://dx.doi.org/10.3390/e21121237.

Повний текст джерела
Анотація:
Patterns of connectivity among nodes on networks can be revealed by community detection algorithms. The great significance of communities in the study of clustering patterns of nodes in different systems has led to the development of various methods for identifying different node types on diverse complex systems. However, most of the existing methods identify only either disjoint nodes or overlapping nodes. Many of these methods rarely identify disjunct nodes, even though they could play significant roles on networks. In this paper, a new method, which distinctly identifies disjoint nodes (node clusters), disjunct nodes (single node partitions) and overlapping nodes (nodes binding overlapping communities), is proposed. The approach, which differs from existing methods, involves iterative computation of bridging centrality to determine nodes with the highest bridging centrality value. Additionally, node similarity is computed between the bridge-node and its neighbours, and the neighbours with the least node similarity values are disconnected. This process is sustained until a stoppage criterion condition is met. Bridging centrality metric and Jaccard similarity coefficient are employed to identify bridge-nodes (nodes at cut points) and the level of similarity between the bridge-nodes and their direct neighbours respectively. Properties that characterise disjunct nodes are equally highlighted. Extensive experiments are conducted with artificial networks and real-world datasets and the results obtained demonstrate efficiency of the proposed method in distinctly detecting and classifying multi-type nodes in network communities. This method can be applied to vast areas such as examination of cell interactions and drug designs, disease control in epidemics, dislodging organised crime gangs and drug courier networks, etc.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Feng, You Bing, and Rong Biao Zhang. "Fault Detection of WSN Based on Spatial Correlation." Applied Mechanics and Materials 58-60 (June 2011): 1504–10. http://dx.doi.org/10.4028/www.scientific.net/amm.58-60.1504.

Повний текст джерела
Анотація:
Regarding application with smooth variation of detection, spatial correlation of sensors’ data within a small field was applied to sensor nodes’ fault diagnosis. The data were sorted into several continuous sequences by sink node. Sequence with minimum variance was regarded as normal data to determine normal nodes. For undetermined nodes, it can be determined via calculation on deviation to normal nodes’ data of vicinity area. If deviation does not exceed the threshold, the node is normal; otherwise, it is regarded as a fault node. The research on WSN in a greenhouse shows that fault node can be effectively detected in time by this method.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Li, Feng, Yali Si, Ning Lu, Zhen Chen, and Limin Shen. "A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/2761486.

Повний текст джерела
Анотація:
Due to the unique network characteristics, the security and efficient routing in DTNs are considered as two great challenges. In this paper, we design a security and efficient routing scheme, called SER, which integrates the routing decision and the attacks detection mechanisms. In SER scheme, each DTNs node locally maintains a one-dimensional vector table to record the summary information about the contact with other nodes and the trust degree of other nodes. To obtain the global status and the contact relationship among all nodes, the trusted routing table consisting of vectors of all nodes is built in each DTNs node. The method for detecting malicious nodes and selfish nodes is proposed, which exploits the global summary information to analyze the history forwarding behavior of node and judge whether it is a malicious node or selfish node. The routing decision method is proposed based on trust degree of forwarding messages between nodes, which adopts trust degree as relay node selection strategy. Simulation results show that compared with existing schemes SER scheme could detect the attacks behavior of malicious nodes and selfish nodes, at the same time, with higher delivery rate and lower average delivery delay.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

M, Sajitha, D. Kavitha, and P. Chenna Reddy. "Clone Node Detection in Heterogeneous WSN with Low Memory Overhead." International Journal of Recent Technology and Engineering (IJRTE) 11, no. 3 (September 30, 2022): 21–26. http://dx.doi.org/10.35940/ijrte.c7206.0911322.

Повний текст джерела
Анотація:
In unattended areas, the wireless sensor network is deployed and the nodes are always open to attacks. An adversary can capture a node and can deploy many nodes, which are clone of the captured, in the network called clone node or replicated node by using the credential information retrieved from captured node. These clone nodes can damage the network directly or indirectly. This attack is called node replication o attack or clone node attack. In this area, so many works are introduced and all of these methods use a random key or code, or location information, to detect clone nodes. This paper presents a method that does not use any of this information. The simulation results show that it performs better than previous methods.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Ganesh, P., G. B. S. R. Naidu, Korla Swaroopa, R. Rahul, Ahmad Almadhor, C. Senthilkumar, Durgaprasad Gangodkar, A. Rajaram, and Alazar Yeshitla. "Implementation of Hidden Node Detection Scheme for Self-Organization of Data Packet." Wireless Communications and Mobile Computing 2022 (March 26, 2022): 1–9. http://dx.doi.org/10.1155/2022/1332373.

Повний текст джерела
Анотація:
The mobile nodes are infrequent movement in nature; therefore, its packet transmission is also infrequent. Packet overload occurred for routing process, and data are lossed by receiver node, since hackers hide the normal routing node. Basically, the hidden node problem is created based on the malicious nodes that are planned to hide the vital relay node in the specific routing path. The packet transmission loss occurred for routing; so, it minimizes the packet delivery ratio and network lifetime. Then, proposed enhanced self-organization of data packet (EAOD) mechanism is planned to aggregate the data packet sequencially from network structure. The hacker node present in routing path is easy to separate from network with trusty nodes. In order to secure the regular characteristics of organizer node from being confirmed as misbehaving node, the hidden node detection technique is designed for abnormal routing node identification. This algorithm checks the neighboring nodes that are hacker node, which hide the trust node in the routing path. And that trust nodes are initially found based on strength value of every node and assign path immediately. It increases network lifetime and minimizes the packet loss rate.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Sindhuja, L. S., and G. Padmavathi. "Replica Node Detection Using Enhanced Single Hop Detection with Clonal Selection Algorithm in Mobile Wireless Sensor Networks." Journal of Computer Networks and Communications 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/1620343.

Повний текст джерела
Анотація:
Security of Mobile Wireless Sensor Networks is a vital challenge as the sensor nodes are deployed in unattended environment and they are prone to various attacks. One among them is the node replication attack. In this, the physically insecure nodes are acquired by the adversary to clone them by having the same identity of the captured node, and the adversary deploys an unpredictable number of replicas throughout the network. Hence replica node detection is an important challenge in Mobile Wireless Sensor Networks. Various replica node detection techniques have been proposed to detect these replica nodes. These methods incur control overheads and the detection accuracy is low when the replica is selected as a witness node. This paper proposes to solve these issues by enhancing the Single Hop Detection (SHD) method using the Clonal Selection algorithm to detect the clones by selecting the appropriate witness nodes. The advantages of the proposed method include (i) increase in the detection ratio, (ii) decrease in the control overhead, and (iii) increase in throughput. The performance of the proposed work is measured using detection ratio, false detection ratio, packet delivery ratio, average delay, control overheads, and throughput. The implementation is done using ns-2 to exhibit the actuality of the proposed work.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "NODE DETECTION"

1

Resul, Hulya. "Node replication detection in sensor networks." College Park, Md. : University of Maryland, 2005. http://hdl.handle.net/1903/3253.

Повний текст джерела
Анотація:
Thesis (M.S.) -- University of Maryland, College Park, 2005.
Thesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Chen, Wan Qing. "Predictors of Auxillary Lymph Node Involvement in Screen Detected Breast Cancer." Thesis, The University of Sydney, 2004. http://hdl.handle.net/2123/676.

Повний текст джерела
Анотація:
Background: Axillary lymph node dissection as routine part of breast cancer treatment has been questioned in relation to the balance between benefits and morbidity. The purpose of this study is to determine the association of tumor size, age and histological grade with axillary lymph node metastasis, to determine if some patients could be exempted from axillary dissection. Methods: The data are derived from BreastScreen NSW, the government sponsored population-based breast screening program. In New South Wales (NSW) Australia between 1995 and 2002, 7,221 patients with invasive breast carcinoma were diagnosed and 5,290 patients were eligible for this study. The relationship between incidence of positive axillary lymph nodes and three study factors (tumor size, age and histological grade) was investigated by univariate and multivariate analysis. Logistic regression models were used to predict probability of axillary metastases. Results: The incidence of axillary lymph node metastases was 28.6% (95% CI: 27.4%- 29.8%). Univariate analysis showed that age, tumor size and histological grade were significant predictors of axillary lymph node metastases (p<0.0001). Multivariate analysis identified age, tumor size and histological grade remained as independent predictors (p<0.0001). From multivariate analysis, patients with T1a (Less than or equal to 5mm) and grade I tumors regardless of age had 5.2% (95% CI: 1.2%- 9.3%) frequency of node metastases. Patients 70 years or older with grade I, T1a and T1b (6-10mm) tumors had 4.9% (95% CI: 3.2%- 7.5%) and 6.6% (95% CI: 5.3%-8.3%) predicted frequency of node metastases. Conclusions: Tumor size, age and histological grade are predictors of axillary lymph node metastases. Routine axillary lymph node dissection could be avoided in some patient groups with a low frequency of involved lymph nodes if the benefits are considered to exceed the risks.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Chen, Wan Qing. "Predictors of Auxillary Lymph Node Involvement in Screen Detected Breast Cancer." University of Sydney. Public Health, 2004. http://hdl.handle.net/2123/676.

Повний текст джерела
Анотація:
Background: Axillary lymph node dissection as routine part of breast cancer treatment has been questioned in relation to the balance between benefits and morbidity. The purpose of this study is to determine the association of tumor size, age and histological grade with axillary lymph node metastasis, to determine if some patients could be exempted from axillary dissection. Methods: The data are derived from BreastScreen NSW, the government sponsored population-based breast screening program. In New South Wales (NSW) Australia between 1995 and 2002, 7,221 patients with invasive breast carcinoma were diagnosed and 5,290 patients were eligible for this study. The relationship between incidence of positive axillary lymph nodes and three study factors (tumor size, age and histological grade) was investigated by univariate and multivariate analysis. Logistic regression models were used to predict probability of axillary metastases. Results: The incidence of axillary lymph node metastases was 28.6% (95% CI: 27.4%- 29.8%). Univariate analysis showed that age, tumor size and histological grade were significant predictors of axillary lymph node metastases (p<0.0001). Multivariate analysis identified age, tumor size and histological grade remained as independent predictors (p<0.0001). From multivariate analysis, patients with T1a (Less than or equal to 5mm) and grade I tumors regardless of age had 5.2% (95% CI: 1.2%- 9.3%) frequency of node metastases. Patients 70 years or older with grade I, T1a and T1b (6-10mm) tumors had 4.9% (95% CI: 3.2%- 7.5%) and 6.6% (95% CI: 5.3%-8.3%) predicted frequency of node metastases. Conclusions: Tumor size, age and histological grade are predictors of axillary lymph node metastases. Routine axillary lymph node dissection could be avoided in some patient groups with a low frequency of involved lymph nodes if the benefits are considered to exceed the risks.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Schleip, Christoph. "Climate change detection in natural systems by Bayesian methods." kostenfrei, 2009. http://mediatum2.ub.tum.de/node?id=805580.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Kotari, Ravi Teja. "Node failure detection and data retrieval in wireless sensor networks." Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10108190.

Повний текст джерела
Анотація:

This project presents a method for detecting node failure in a wireless sensor network. The defective node is identified using round-trip delay measurements. Data transfer from the transmitter section to the receiver section is accomplished via the ZigBee protocol. As soon as a node has been identified as defective, the node is removed from the sensor network. Information about the failed node is provided to users with registered mobile device through the Global System for Mobile (GSM) module. The proposed method has been successfully implemented and tested experimentally on a small sensor network using the LPC2148 ARM7 microcontroller.

Стилі APA, Harvard, Vancouver, ISO та ін.
6

Pettersson, Christopher. "Automatic fault detection and localization in IPnetworks : Active probing from a single node perspective." Thesis, Linköpings universitet, Programvara och system, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120414.

Повний текст джерела
Анотація:
Fault management is a continuously demanded function in any kind of network management. Commonly it is carried out by a centralized entity on the network which correlates collected information into likely diagnoses of the current system states. We survey the use of active-on-demand-measurement, often called active probes, together with passive readings from the perspective of one single node. The solution is confined to the node and is isolated from the surrounding environment. The utility for this approach, to fault diagnosis, was found to depend on the environment in which the specific node was located within. Conclusively, the less environment knowledge, the more useful this solution presents. Consequently this approach to fault diagnosis offers limited opportunities in the test environment. However, greater prospects was found for this approach while located in a heterogeneous customer environment.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Al-Riyami, Ahmed. "Towards an adaptive solution to data privacy protection in hierarchical wireless sensor networks." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/towards-an-adaptive-solution-to-data-privacy-protection-in-hierarchical-wireless-sensor-networks(a096db2a-251c-4e9e-a4ff-8bfe4c6f1bf4).html.

Повний текст джерела
Анотація:
Hierarchical Wireless Sensor networks (WSNs) are becoming attractive to many applications due to their energy efficiency and scalability. However, if such networks are deployed in a privacy sensitive application context such as home utility consumption, protecting data privacy becomes an essential requirement. Our threat analysis in such networks has revealed that PPDA (Privacy Preserving Data Aggregation), NIDA (Node ID Anonymity) and ENCD (Early Node Compromise Detection) are three essential properties for protecting data privacy. The scope of this thesis is on protecting data privacy in hierarchical WSNs byaddressing issues in relation to two of the three properties identified, i.e., NIDA and ENCD, effectively and efficiently. The effectiveness property is achieved by considering NIDA and ENCD in an integrated manner, and the efficiency property is achieved by using an adaptive approach to security provisioning. To this end, the thesis has made the following four novel contributions. Firstly, this thesis presents a comprehensive analysis of the threats to data privacy and literature review of the countermeasures proposed to address these threats. The analysis and literature review have led to the identification of two main areas for improvements: (1) to reduce the resources consumed as the result of protecting data privacy, and (2) to address the compatibility issue between NIDA and ENCD.Secondly, a novel Adaptive Pseudonym Length Estimation (AdaptPLE) method has been proposed. The method allows the determination of a minimum acceptable length of the pseudonyms used in NIDA based on a given set of security and application related requirements and constraints. In this way, we can balance the trade-off between an ID anonymity protection level and the costs (i.e., transmission and energy) incurred in achieving the protection level. To demonstrate its effectiveness, we have evaluated the method by applying it to two existing NIDA schemes, the Efficient Anonymous Communication (EAC) scheme and theCryptographic Anonymous Scheme (CAS).Thirdly, a novel Adaptive Early Node Compromise Detection (AdaptENCD) scheme for cluster-based WSNs has been proposed. This scheme allows early detections of compromised nodes more effectively and efficiently than existing proposals. This is achieved by adjusting, at run-time, the transmission rate of heartbeat messages, used to detect nodes' aliveness, in response to the average message loss ratio in a cluster. This adaptive approach allows us to significantly reduce detection errors while keeping the number of transmitted heartbeat messages as low as possible, thus reducing transmission costs. Fourthly, a novel Node ID Anonymity Preserving Scheme (ID-APS) for clusterbased WSNs has been proposed. ID-APS protects nodes ID anonymity while, at the same time, also allowing the global identification of nodes. This later property supports the identification and removal of compromised nodes in the network, which is a significant improvement over the state-of-the-art solution, the CAS scheme. ID-APS supports both NIDA and ENCD by making a hybrid use of dynamic and global identification pseudonyms. More importantly, ID-APS achieves these properties with less overhead costs than CAS. All proposed solutions have been analysed and evaluated comprehensively to prove their effectiveness and efficiency.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Barrus, Joseph D. "Intrusion detection in real-time in a multi-node, multi-host environment." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA341406.

Повний текст джерела
Анотація:
Thesis (M.S. in Software Engineering) Naval Postgraduate School, September 1997.
"September 1997." Thesis advisor(s): Neil C. Rowe, Ronald Broersma. Includes bibliography references (p. 77). Also available online.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Khanapure, Vishal. "Memory efficient distributed detection of node replication attacks in wireless sensor networks." [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0025072.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Thekedar, Bhushan. "Investigations on the use of breath gas analysis with Proton Transfer Reaction Mass Spectrometry (PTR-MS) for a non-invasive method of early lung cancer detection." kostenfrei, 2009. https://mediatum2.ub.tum.de/node?id=821780.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "NODE DETECTION"

1

Barrus, Joseph D. Intrusion detection in real-time in a multi-node, multi-host environment. Monterey, Calif: Naval Postgraduate School, 1997.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

K, kokula Krishna Hari, ed. Detection of Replica Node Attack Based on Hybrid Artificial Immune System Technique: ICCS 2014. Bangkok, Thailand: Association of Scientists, Developers and Faculties, 2014.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Heritage, English, and Cathedrals Fabric Commission for England., eds. Smoke detection systems for cathedrals: An English Heritage advisory note. London: English Heritage, 1997.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Loecker, Jan de. A note on detecting learning by exporting. Cambridge, MA: National Bureau of Economic Research, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Annabel the detective: The case of the mystery note. Toronto: Harper Collins Publishers, 1992.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Andrew, Taylor. The private nose. Cambridge, Mass: Candlewick Press, 1993.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Funeral note. London: Headline, 2013.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Copyright Paperback Collection (Library of Congress), ed. Treasure under Finny's Nose: A Finny's Nose mystery. Uhrichsville, OH: Heartsong Presents, 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Mentink, Dana. Trouble up Finny's Nose: A Finny's Nose mystery. Uhrichsville, OH: Barbour Pub., 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Copyright Paperback Collection (Library of Congress), ed. Fog over Finny's Nose: A Finny's Nose mystery. Uhrichsville, OH: Barbour Pub., 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "NODE DETECTION"

1

Dumka, Ankur, Alaknanda Ashok, Parag Verma, Anuj Bhardwaj, and Navneet Kaur. "Malicious Node Detection Mechanisms." In Security Issues for Wireless Sensor Networks, 213–40. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003257608-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Keshtgar, Mohammad R. S., Wendy A. Waddington, Sunil R. Lakhani, and Peter J. Ell. "Sentinel Node Detection and Imaging." In The Sentinel Node in Surgical Oncology, 1–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-642-60038-8_1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Zhou, Yi. "Detection of Minimal Residual Disease." In Practical Lymph Node and Bone Marrow Pathology, 701–11. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-32189-5_31.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Zhang, Lingxiao, and Xuefeng Yan. "A Critical Node Detection Algorithm Based Node Interplay Model." In Security, Privacy, and Anonymity in Computation, Communication, and Storage, 467–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68884-4_39.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Chan, A. D., and D. L. Morton. "Sentinel Node Detection in Malignant Melanoma." In Recent Results in Cancer Research, 161–77. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-642-57151-0_14.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Arulselvan, Ashwin, Clayton W. Commander, Oleg Shylo, and Panos M. Pardalos. "Cardinality-Constrained Critical Node Detection Problem." In Performance Models and Risk Management in Communications Systems, 79–91. New York, NY: Springer New York, 2010. http://dx.doi.org/10.1007/978-1-4419-0534-5_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Ma, Huan, and Wei Wang. "A Label Propagation Based User Locations Prediction Algorithm in Social Network." In Communications in Computer and Information Science, 165–74. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_12.

Повний текст джерела
Анотація:
AbstractNetwork community detection is an important service provided by social networks, and social network user location can greatly improve the quality of community detection. Label propagation is one of the main methods to realize the user location prediction. The traditional label propagation algorithm has the problems including “location label countercurrent” and the update randomness of node location label, which seriously affects the accuracy of user location prediction. In this paper, a new location prediction algorithm for social networks based on improved label propagation algorithm is proposed. By computing the K-hop public neighbor of any two point in the social network graph, the nodes with the maximal similarity and their K-hopping neighbors are merged to constitute the initial label propagation set. The degree of nodes not in the initial set are calculated. The node location labels are updated asynchronously is adopted during the iterative process, and the node with the largest degree is selected to update the location label. The improvement proposed solves the “location label countercurrent” and reduces location label updating randomness. The experimental results show that the proposed algorithm improves the accuracy of position prediction and reduces the time cost compared with the traditional algorithms.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Pan, Hanxiao, Teng Guo, Hayat Dino Bedru, Qing Qing, Dongyu Zhang, and Feng Xia. "DEFINE: Friendship Detection Based on Node Enhancement." In Lecture Notes in Computer Science, 81–92. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39469-1_7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Yang, Huai. "Illegal Node Detection of Wireless Mesh Network Based on Node Reputation Value." In Advances in Intelligent and Soft Computing, 545–50. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25986-9_85.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Yu, Xinmin, Xingyun Chen, Xin Ye, Jingfeng Guo, and Bijian Chen. "Optimization of node structure of transmission tower." In Advances in Civil Engineering: Structural Seismic Resistance, Monitoring and Detection, 355–60. London: CRC Press, 2022. http://dx.doi.org/10.1201/9781003310884-46.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "NODE DETECTION"

1

Huang, Tiancheng, Donglin Wang, Yuan Fang, and Zhengyu Chen. "End-to-End Open-Set Semi-Supervised Node Classification with Out-of-Distribution Detection." In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/290.

Повний текст джерела
Анотація:
Out-Of-Distribution (OOD) samples are prevalent in real-world applications. The OOD issue becomes even more severe on graph data, as the effect of OOD nodes can be potentially amplified by propagation through the graph topology. Recent works have considered the OOD detection problem, which is critical for reducing the uncertainty in learning and improving the robustness. However, no prior work considers simultaneously OOD detection and node classification on graphs in an end-to-end manner. In this paper, we study a novel problem of end-to-end open-set semi-supervised node classification (OSSNC) on graphs, which deals with node classification in the presence of OOD nodes. Given the lack of supervision on OOD nodes, we introduce a latent variable to indicate in-distribution or OOD nodes in a variational inference framework, and further propose a novel algorithm named as Learning to Mix Neighbors (LMN) which learns to dampen the influence of OOD nodes through the messaging-passing in typical graph neural networks. Extensive experiments on various datasets show that the proposed method outperforms state-of-the-art baselines in terms of both node classification and OOD detection.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Song, Hui, Liang Xie, Sencun Zhu, and Guohong Cao. "Sensor node compromise detection." In the 2007 international conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1280940.1280993.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Rounds, Cody C., Veronica C. Torres, Chenguye Li, Floris Voskuil, T. S. Nijboer, Max J. H. Witjes, and Kenneth M. Tichauer. "Rapid detection of lymph node micro metastasis using widefield paired-agent fluorescent imaging techniques in the angular domain." In Optical Molecular Probes, Imaging and Drug Delivery. Washington, D.C.: Optica Publishing Group, 2023. http://dx.doi.org/10.1364/omp.2023.om3e.5.

Повний текст джерела
Анотація:
In head and neck squamous cell carcinoma surgical cases, rapid detection of lymph node metastases is needed. Here we present a methodology for rapid lymph node assessment in 1 cm nodes with > 99% sensitivity.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Zhang, Dong, Liangqing Wu, Changlong Sun, Shoushan Li, Qiaoming Zhu, and Guodong Zhou. "Modeling both Context- and Speaker-Sensitive Dependence for Emotion Detection in Multi-speaker Conversations." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/752.

Повний текст джерела
Анотація:
Recently, emotion detection in conversations becomes a hot research topic in the Natural Language Processing community. In this paper, we focus on emotion detection in multi-speaker conversations instead of traditional two-speaker conversations in existing studies. Different from non-conversation text, emotion detection in conversation text has one specific challenge in modeling the context-sensitive dependence. Besides, emotion detection in multi-speaker conversations endorses another specific challenge in modeling the speaker-sensitive dependence. To address above two challenges, we propose a conversational graph-based convolutional neural network. On the one hand, our approach represents each utterance and each speaker as a node. On the other hand, the context-sensitive dependence is represented by an undirected edge between two utterances nodes from the same conversation and the speaker-sensitive dependence is represented by an undirected edge between an utterance node and its speaker node. In this way, the entire conversational corpus can be symbolized as a large heterogeneous graph and the emotion detection task can be recast as a classification problem of the utterance nodes in the graph. The experimental results on a multi-modal and multi-speaker conversation corpus demonstrate the great effectiveness of the proposed approach.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Cao, Song, Genquan Duan, and A. I. Haizhou. "Fast human detection using Node-Combined Part Detector." In 2011 18th IEEE International Conference on Image Processing (ICIP 2011). IEEE, 2011. http://dx.doi.org/10.1109/icip.2011.6116493.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Yang, Heming, Xinfang Zhang, Ji Zhou, and Jun Yu. "A Hierarchy of Oct-Sphere Model and its Application in Collision Detection." In ASME 1994 Design Technical Conferences collocated with the ASME 1994 International Computers in Engineering Conference and Exhibition and the ASME 1994 8th Annual Database Symposium. American Society of Mechanical Engineers, 1994. http://dx.doi.org/10.1115/detc1994-0042.

Повний текст джерела
Анотація:
Abstract Collision and interference detection among 3-D moving objects is an important issue in the simulation of their behavior. This paper presents a new model for representing 3-D objects and a corresponding effective algorithm for detecting collisions and interferences among moving objects. Objects can be represented for efficient collision and interference detection by a hierarchy of oct - sphere model (HOSM). Algorithms are given for building the HOSM and for detecting collisions and interferences between moving objects. On the basis of HOSM, the algorithm checks only intersections between the nodes of the models which are on the surfaces of the objects. Furthermore, because a node of HOSM represents a spherical region, the collision between the two nodes can be easily found just by calculating the distance between the centers of the two spheres corresponding to them no matter how the objects move. Finally, we discuss the efficiency of the algorithm through an example.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Sei, Yuichi, and Shinichi Honiden. "Reporter node determination of replicated node detection in wireless sensor networks." In the 3rd International Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1516241.1516340.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Veeraiah, Neenavath, and B. T. Krishna. "Selfish node detection IDSM based approach using individual master cluster node." In 2018 2nd International Conference on Inventive Systems and Control (ICISC). IEEE, 2018. http://dx.doi.org/10.1109/icisc.2018.8399109.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Tran, Thi Minh Chau, Bjorn Scheuermann, and Martin Mauve. "Node presence detection with reduced overhead." In 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services (WONS). IEEE, 2009. http://dx.doi.org/10.1109/wons.2009.4801831.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Taranum, Fahmina, Ayesha Sarvat, Nooria Ali, and Shamekh Siddiqui. "Detection and Prevention of Blackhole node." In 2020 4th International Conference on Electronics, Materials Engineering & Nano-Technology (IEMENTech). IEEE, 2020. http://dx.doi.org/10.1109/iementech51367.2020.9270072.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "NODE DETECTION"

1

Cavalli, Luciane R. Detection of Genetic Alterations in Breast Sentinel Lymph Node by Array-CGH. Fort Belvoir, VA: Defense Technical Information Center, October 2005. http://dx.doi.org/10.21236/ada444833.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Cavalli, Luciane R. Detection of Genetic Alterations in Breast Sentinel Lymph Node by Array-CGH. Fort Belvoir, VA: Defense Technical Information Center, October 2006. http://dx.doi.org/10.21236/ada460808.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Tzonev. PR-396-143702-R01 Feasibility of a Petroleum Leak Detection Cable Utilizing Polymer Absorption Sensor. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), September 2015. http://dx.doi.org/10.55274/r0010849.

Повний текст джерела
Анотація:
Several high-profile new pipeline projects in Canada and the USA have triggered investigation of auxiliary leak detection systems outside of the pipeline. Although external leak detection technologies have existed for decades, a comprehensive solution that is widely applicable for both new and existing pipeline deployment still does not exist. The goal of PRCI project PL-1H was to evaluate the feasibility of interconnecting multiple underground Polymer Absorption (PA) hydrocarbon sensor nodes through a single cable that provides both power and data communication inductively to each node. Installing the cable alongside a pipeline would create a continuous underground sensor network that could detect the migrating hydrocarbons from the leak and therefore would have excellent sensitivity for underground hydrocarbon releases. PL-1H developed a comprehensive theoretical model of the cable, created a system topology, established manufacturability, and constructed a proof of concept that was tested under a variety of conditions. The results indicate that the cable concept is technologically feasible and could be practical. It was concluded that if commercialized, the solution could help prepare the industry for the future by delivering a new leak detection tool with small leak detection capabilities.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Tzonev, Nick. PR-396-163702-R02 Petroleum Pipeline Polymer Absorption Sensor Leak Detection Cable Phase 2. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), October 2021. http://dx.doi.org/10.55274/r0012183.

Повний текст джерела
Анотація:
The goal of this Project is to validate and commercialize Syscor's External Leak Detection System (ELDS) cable and wireless sensor node. Syscor's ELDS cable system will be able to detect leaks smaller than 5 barrels (bbl) and will be suitable for deployment in new construction projects as well as existing underground pipelines. The capability of Syscor's ELDS to be plowed in place at a safe distance from the pipeline differentiates the solution from competing approaches as it is more economically viable for existing pipelines. The proposed leak detection cable will be able to recognize leaks that would previously remain unnoticed for long periods of time, reducing the release of chemicals into the environment and remediation costs to pipeline operators.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

ZHAO, JIE, LIANHUA YE, WEI WANG, YANTAO YANG, ZHENGHAI SHEN, and SUNYIN RAO. Surgical Prognostic Factors of Second Primary Lung Cancer: A Systematic Review and Meta-analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, November 2022. http://dx.doi.org/10.37766/inplasy2022.11.0047.

Повний текст джерела
Анотація:
Review question / Objective: The objective of this study was to explore the effects of different surgical strategies and potential prognostic factors on the prognosis of patients with SPLC through a systematic review and meta-analysis.Prognostic factors included surgical approach, type of SPLC(Synchronous and metachronous),histology,disease-free interval (DFI),tumor size,CT morphology, lymph node metastasis status, smoking status, gender. Condition being studied: With the development of imaging technology and better survival after primary lung cancer, the detection rate of second primary lung cancer (SPLC) has been increasing. At present, the staging and treatment of the second primary lung cancer are still controversial. Although surgery is widely accepted as the main treatment method, there is no unified diagnostic criteria and diagnosis and treatment strategy. The objective of this study was to explore the effects of different surgical strategies and potential prognostic factors on the prognosis of patients with SPLC through a systematic review and meta-analysis.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Lewis, Nathan S., Rodney M. Goodman, and Robert H. Grubbs. A Conducting Polymer-Based Electronic Nose for Landmine Detection. Fort Belvoir, VA: Defense Technical Information Center, October 2001. http://dx.doi.org/10.21236/ada396394.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

De Loecker, Jan. A Note on Detecting Learning by Exporting. Cambridge, MA: National Bureau of Economic Research, November 2010. http://dx.doi.org/10.3386/w16548.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Singh, Ishwar, Prabhjot Singh та Brajesh Choudhary. NOνA Far Detector νe Sideband Study Technical Note. Office of Scientific and Technical Information (OSTI), червень 2023. http://dx.doi.org/10.2172/1988491.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Koutcher, Jason. Non-Invasive Detection of Axillary Nodes by Contrast Enhanced Magnetic Resonance Imaging. Fort Belvoir, VA: Defense Technical Information Center, October 1999. http://dx.doi.org/10.21236/ada382736.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Sanseverino, Giuseppe, Dominik Krumm, Wolfgang Kilian, and Stephan Odenwald. Body-attached Sensor Nodes for Automatic Detection of Hike Events and Parameters. Purdue University, 2022. http://dx.doi.org/10.5703/1288284317538.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії