-
41
Communication Network Design of the Control System for Central Distributed PV System Based on CAN Bus
Published 2020-01-01“…In order to improve communication real-time performance and configuration flexibility of control system of D&C(central distributed) PV system, this paper adopted CAN bus with multi-master communication mode to replace RS485 bus with master-slave communication mode, and proposed a method of setting initial priority by memory balance based on CAN dynamic priority assignment algorithm. …”
Get full text
Article -
42
Research on Underwater Sensor Network Adaptive Clustering Algorithm for Marine Environment Monitoring
Published 2024-11-01“…Thus, the mobile monitoring nodes within UWSNs are typically powered by batteries with limited energy, and replacement on the seabed is challenging. …”
Get full text
Article -
43
Biocatalytic reductive amination with CRISPR-Cas9 engineered yeast
Published 2025-05-01“…To reduce native alanine utilization, the endogenous alanine aminotransferase (ALT1) was knocked out and replaced with cv-ATA. To rapidly employ this strategy in other strains, a simple CRISPR/cas9 method for universal gene replacement was developed. …”
Get full text
Article -
44
Scaling of hardware-compatible perturbative training algorithms
Published 2025-06-01“…Previous research has suggested that perturbative training methods do not scale well to large problems since in these methods, the time to estimate the gradient scales linearly with the number of network parameters. …”
Get full text
Article -
45
Feature recommendation strategy for graph convolutional network
Published 2022-12-01“…Graph Convolutional Network (GCN) is a new method for extracting, learning, and inferencing graph data that builds an embedded representation of the target node by aggregating information from neighbouring nodes. …”
Get full text
Article -
46
Improved Artificial Bee Colony Optimization Underwater Localization Algorithm by Logistic Chaos Mapping and Differential Evolution
Published 2025-01-01“…Objective Localization algorithms for underwater acoustic sensor networks typically depend on distance estimation methods, such as point-to-point distance estimation or angle estimation, to achieve node localization between nodes. …”
Get full text
Article -
47
Multiscale Modeling of Mechanical Response of Carbon Nanotube Yarn with Orthotropic Properties Across Hierarchies
Published 2025-05-01“…By doing so, rigidity and mass equivalent principles are adopted to introduce a replacement of the model by converting the truss structure containing two-node beam elements representing (vdW) van der Waals forces in a nanoscale bundle and inclined narrower bundles in mesoscale fibrillar used in previous works to the equivalent shell model. …”
Get full text
Article -
48
Group Authentication Key Agreement Protocol Based on Certificateless Cryptography in UAV Network
Published 2025-01-01“…The central node with high computing power in the group functions as the hub node, undertaking most computing and communication tasks. …”
Get full text
Article -
49
Research on postural behavior and structural response prediction of scraper conveyor based on digital twin
Published 2025-06-01“…A hierarchical clustering method is employed to cluster nodes with similar numerical values. …”
Get full text
Article -
50
Ideal Navitor Implant Depth for Redo-TAVR Feasibility and Coronary Access
Published 2025-09-01“…Results: Redo-TAVR was deemed the least unfeasible in 2.3% of patients with initial Navitor implant depth at 3 mm and redo-S3 implanted lower at Node 2 vs 40.5% of patients with initial Navitor depth at 3 mm and redo-S3 implanted higher at Node 3 (P < 0.0001). …”
Get full text
Article -
51
-
52
Source-Aware Redundant Packet Forwarding Scheme for Emergency Information Delivery in Chain-Typed Multihop Wireless Sensor Networks
Published 2015-03-01“…The results show that (1) non-ACK scheme is highly suitable for the condition of large network size and hazardous wireless communication environment; (2) the non-source-aware solution is easy to use and is suitable for the occasion where the node could be replaced on demand expediently; (3) the source-aware solution has the better performance in energy efficiency and is suitable for the occasion where the network lifetime needs to be determined before deployment, and the node could not be replaced easily.…”
Get full text
Article -
53
Discomfort during instillation of antihypertensives and ocular surface condition in glaucoma patients
Published 2022-12-01Get full text
Article -
54
An energy-balanced multi-sensor scheduling scheme for collaborative target tracking in wireless sensor networks
Published 2017-03-01“…In addition, we also design an efficient multi-sensor node collaborative method to track a single target and to timely report its state to the remote end. …”
Get full text
Article -
55
RMDS: Ranging and multidimensional scaling–based anchor-free localization in large-scale wireless sensor networks with coverage holes
Published 2017-08-01“…Moreover, we replace the singular value decomposition with an iterative maximum gradient descent method to reduce the computational complexity. …”
Get full text
Article -
56
Mandibular reconstruction with anterolateral thigh free flap and bridging plate: a retrospective study of 34 oncological cases
Published 2025-06-01“…Seven patients who experienced serious postoperative complications received additional surgery involving the replacement of titanium plates [three with custom-made plates using computer-aided design (CAD)/computer-aided manufacturing (CAM) methods]. …”
Get full text
Article -
57
Self-Loosening Failure Analysis of Bolt Joints under Vibration considering the Tightening Process
Published 2017-01-01“…The results show that the tightening process cannot be replaced by a simplified method because its fastening state is different from the real process. …”
Get full text
Article -
58
Voltage Stability Assessment Through Modal Analysis Using a Smooth Formulation of the Power Flow Problem Based on Sigmoid Functions
Published 2025-01-01“…A key advantage of this formulation is its ability to convert limit-induced bifurcations into saddle-node bifurcations. This conversion allows the voltage security studies to focus solely on identifying saddle-node bifurcations, leading to significant computational efficiency. …”
Get full text
Article -
59
Bayesian weighted random forest for classification of high-dimensional genomics data
Published 2023-10-01“…Firstly, the tree terminal node estimation procedure is replaced with a Bayesian estimation approach. …”
Get full text
Article -
60
Multiple Feature Vectors Based Fault Classification for WSN Integrated Bearing of Rolling Mill
Published 2018-01-01“…From the above analysis, the energy index and the singular value matrix are used for fault classification modeling based on the enhanced extreme learning machine (ELM), which is optimized by the bat algorithm to adjust the input weights and threshold of hidden layer node. In comparison with the fault classification methods based on SVM and ELM, the experimental results show that the proposed method has higher classification accuracy and better generalization ability.…”
Get full text
Article