-
2461
An Improved Physarum polycephalum Algorithm for the Shortest Path Problem
Published 2014-01-01“…We undertook a series of computational experiments on approximating shortest paths in networks with different topologies, and number of nodes varying from 15 to 2000. …”
Get full text
Article -
2462
Electronic structure of mesoionic compounds. The classification problem
Published 2024-06-01“…The electronic properties of the molecules were studied within the frameworks of quantum theory of atoms in molecules (QTAIM) and the Nuclear Independent Chemical Shift (NICS). To comprehend the topological distinctions among representatives of the two types, we describe a set of indices designed to characterize the spatial distribution of electronic parameters within the molecular frameworks. …”
Get full text
Article -
2463
Superstrength permanent magnets with iron-based superconductors by data- and researcher-driven process design
Published 2024-06-01“…Abstract Iron-based high-temperature (high-T c) superconductors have good potential to serve as materials in next-generation superstrength quasipermanent magnets owing to their distinctive topological and superconducting properties. However, their unconventional high-T c superconductivity paradoxically associates with anisotropic pairing and short coherence lengths, causing challenges by inhibiting supercurrent transport at grain boundaries in polycrystalline materials. …”
Get full text
Article -
2464
Biofunctionalized patterned platform as microarray biochip to supervise delivery and expression of pDNA nanolipoplexes in stem cells via mechanotransduction
Published 2025-01-01“…Therefore, the engineered microarray biochips were conceptualized and prepared by the synthesized photointelligent biopolymer to precisely manage geometric topological structures (cell size and antenna-like protrusion) of stem cells on biochips. …”
Get full text
Article -
2465
Artificial molecular communication network based on DNA nanostructures recognition
Published 2025-01-01“…After the implementation of DR-AMCN with various communication mechanisms including serial, parallel, orthogonal, and multiplexing, it is applied to construct various communication network topologies with bus, ring, star, tree, and hybrid structures. …”
Get full text
Article -
2466
Statistical and Reliability Analysis of the Iran Railway System as a Complex Network
Published 2022-01-01“…In this regard, the topological characteristics of the Iran railway network have been studied and compared to two well-studied railway networks, China and Spain. …”
Get full text
Article -
2467
Comparative mitogenome analysis of two ectomycorrhizal fungi (Paxillus) reveals gene rearrangement, intron dynamics, and phylogeny of basidiomycetes
Published 2020-07-01“…Phylogenetic analysis of the combined mitochondrial gene set gave identical and well-supported tree topologies, indicating that mitochondrial genes were reliable molecular markers for analyzing the phylogenetic relationships of Basidiomycota. …”
Get full text
Article -
2468
Graph attention convolution network for power flow calculation considering grid uncertainty
Published 2025-04-01“…The results show that, compared to the state-of-the-art methods, the proposed model not only achieves higher accuracy in predicting bus voltages and branch power but also demonstrates good robustness against uncertain topologies.…”
Get full text
Article -
2469
Modulation of surface phonon polaritons in MoO3 via dynamic doping of SiC substrate
Published 2024-12-01“…Polar biaxial crystals with extreme anisotropy hold promise for the spatial control and the manipulation of polaritons, as they can undergo topological transitions. However, taking advantage of these unique properties for nanophotonic devices requires to find mechanisms to modulate dynamically the material response. …”
Get full text
Article -
2470
Enhancing unsupervised learning in medical image registration through scale-aware context aggregation
Published 2025-02-01“…We also present diffeomorphic variants of ScaMorph to maintain topological deformations. Extensive experiments on 3D medical images across five applications—atlas-to-patient and inter-patient brain magnetic resonance imaging (MRI) registration, inter-modal brain MRI registration, inter-patient liver computed tomography (CT) registration as well as inter-modal abdomen MRI-CT registration—demonstrate that our model significantly outperforms existing methods, highlighting its effectiveness and broader implications for enhancing medical image registration techniques.…”
Get full text
Article -
2471
Intelligent On/Off Dynamic Link Management for On-Chip Networks
Published 2012-01-01“…Simulation results with various synthetic traffic models over various network topologies show that the proposed work can reach up to 13% power savings when compared to a trivial threshold computation, at very low (<4%) hardware overheads.…”
Get full text
Article -
2472
RETRACTED: Robot Path Planning Method Based on Indoor Spacetime Grid Model
Published 2022-05-01“…This paper presents an in-depth study on this issue and summarizes three major types of methods: geometric modeling, topological modeling, and raster modeling, and points out the advantages and disadvantages of these three types of methods. …”
Get full text
Article -
2473
An Easy-to-Understand Method to Construct Desired Distance-Like Measures
Published 2021-01-01“…A distance-like notion, called weak interval-valued pseudo-metrics (briefly, WIVP-metrics), is defined by using known notions of pseudo-semi-metrics, pseudo-metrics, and metrics; this notion is topologically good and shows precision, flexibility, and compatibility than single pseudo-semi-metrics, pseudo-metrics, or metrics. …”
Get full text
Article -
2474
Comparison Between Connection Based Modified Indices and Coindices for Product of Networks
Published 2022-01-01“…Topological indices (TIs) are functional tools which correlate with a computational value through a undirected, finite and simple networks. …”
Get full text
Article -
2475
Optimizing Hybrid Electric Vehicle Performance: A Detailed Overview of Energy Management Strategies
Published 2024-12-01“…This article reviews and analyzes energy management strategies for the principal powertrain topologies of hybrid electric vehicles, focusing on achieving solution optimality in real-time applications. …”
Get full text
Article -
2476
Reading-off the non-geometric scalar potentials with U-dual fluxes
Published 2025-01-01“…In this regard, we present a set of generic master formulae which not only formulate the scalar potential in a compact way but also enable one to read-off the various scalar potential pieces by simply knowing a set of topological data of the compactifying Calabi Yau and its mirror threefold. …”
Get full text
Article -
2477
FedEx and UPS Network Structure and Accessibility Analysis Based on Complex Network Theory
Published 2021-01-01“…In conjunction with the division of US regions from the United States Geological Survey (USGS), this paper refers to FedEx and UPS as FEPS and analyzes its topological structure, complexity properties, and air cargo accessibility by using social network analysis (SNA) and accessibility evaluation methods. …”
Get full text
Article -
2478
Automotive ethernet controller authentication method based on national cryptographic algorithms
Published 2022-12-01“…With the development of intelligent and connected cars, cyber security of automotive ethernet becomes the focus of automotive industry.Authentication is one of the key technologies for automotive ethernet security.The existing authentication methods have shortcomings to meet the requirements of both safety and electronic controllers’ performance.Besides, national cryptographic algorithms are becoming a trend for automotive network security, while the related research in automotive ethernet area is still in starting phase.In order to balance the limited computing performance of electronic controllers and high security requirements of automotive ethernet, a two-stage trust chain authentication method based on national cryptographic algorithms was proposed.The method can be used in different automotive ethernet topologies.A trust chain was built up based on authentication credentials, which linked the two authentication stages, namely the initial stage and the vehicle using stage.The initial stage was triggered by diagnosis instrument at end of line or controller replacement.It deployed complete authentication based on SM2 algorithm and certificates in the initial stage.The vehicle using stage was triggered by ethernet gateway at vehicle power-on or network wakeup.In this stage, the method deployed fast authentication based on SM4 algorithm and authentication credential trust chain.The authentication credentials for trust chain were generated by credential functions.In order to ensure security, each credential was generated based on last successful authentication parameters dynamically.The test results on automotive ethernet controllers show that the method has lower computing cost and higher security level, and it can guarantee both performance and security.…”
Get full text
Article -
2479
Vulnerability Analysis of China-Europe Railway Express Network Based on Improved Nonlinear Load-Capacity Model
Published 2024-01-01“…Firstly, a feature matrix is constructed for C-ER Express based on the topological measures, freight information, and external environment scores. …”
Get full text
Article -
2480
The Associations of Street Network and Urban Form with Walking Frequencies
Published 2025-01-01“…Street network configurations are described by topological centrality (integration). Results show significant positive associations of reach, attraction reach, and integration with walking frequency, with the best model fits achieved by accessible total floor area and reach within relatively high network radii (1000 – 2000 m and 6 axial steps), indicating that connectivity and access to a variety of attraction and functions, often beyond administrative borders, encourage walking. …”
Get full text
Article