Search alternatives:
method » methods (Expand Search)
Showing 41 - 60 results of 126 for search 'Node replacement method', query time: 0.07s Refine Results
  1. 41

    Communication Network Design of the Control System for Central Distributed PV System Based on CAN Bus by REN Yi, WANG Nan, CHEN Yifeng, ZHU Qiliang

    Published 2020-01-01
    “…In order to improve communication real-time performance and configuration flexibility of control system of D&C(central distributed) PV system, this paper adopted CAN bus with multi-master communication mode to replace RS485 bus with master-slave communication mode, and proposed a method of setting initial priority by memory balance based on CAN dynamic priority assignment algorithm. …”
    Get full text
    Article
  2. 42

    Research on Underwater Sensor Network Adaptive Clustering Algorithm for Marine Environment Monitoring by Libin Xue, Chunjie Cao, Rongxin Zhu

    Published 2024-11-01
    “…Thus, the mobile monitoring nodes within UWSNs are typically powered by batteries with limited energy, and replacement on the seabed is challenging. …”
    Get full text
    Article
  3. 43

    Biocatalytic reductive amination with CRISPR-Cas9 engineered yeast by Arne Hagman, Olof Stenström, Göran Carlström, Mikael Akke, Carl Grey, Magnus Carlquist

    Published 2025-05-01
    “…To reduce native alanine utilization, the endogenous alanine aminotransferase (ALT1) was knocked out and replaced with cv-ATA. To rapidly employ this strategy in other strains, a simple CRISPR/cas9 method for universal gene replacement was developed. …”
    Get full text
    Article
  4. 44

    Scaling of hardware-compatible perturbative training algorithms by B. G. Oripov, A. Dienstfrey, A. N. McCaughan, S. M. Buckley

    Published 2025-06-01
    “…Previous research has suggested that perturbative training methods do not scale well to large problems since in these methods, the time to estimate the gradient scales linearly with the number of network parameters. …”
    Get full text
    Article
  5. 45

    Feature recommendation strategy for graph convolutional network by Jisheng Qin, Xiaoqin Zeng, Shengli Wu, Yang Zou

    Published 2022-12-01
    “…Graph Convolutional Network (GCN) is a new method for extracting, learning, and inferencing graph data that builds an embedded representation of the target node by aggregating information from neighbouring nodes. …”
    Get full text
    Article
  6. 46

    Improved Artificial Bee Colony Optimization Underwater Localization Algorithm by Logistic Chaos Mapping and Differential Evolution by Jiaxing CHEN, Yang LIU, Xiaoqian LIU, Zhihua LIU

    Published 2025-01-01
    “…Objective Localization algorithms for underwater acoustic sensor networks typically depend on distance estimation methods, such as point-to-point distance estimation or angle estimation, to achieve node localization between nodes. …”
    Get full text
    Article
  7. 47

    Multiscale Modeling of Mechanical Response of Carbon Nanotube Yarn with Orthotropic Properties Across Hierarchies by Aref Mehditabar, Hossein Esfandian, Seyed Sadegh Motallebi Hasankola

    Published 2025-05-01
    “…By doing so, rigidity and mass equivalent principles are adopted to introduce a replacement of the model by converting the truss structure containing two-node beam elements representing (vdW) van der Waals forces in a nanoscale bundle and inclined narrower bundles in mesoscale fibrillar used in previous works to the equivalent shell model. …”
    Get full text
    Article
  8. 48

    Group Authentication Key Agreement Protocol Based on Certificateless Cryptography in UAV Network by Yuecheng WANG, Youwen ZHU, Zhiqiang ZHANG

    Published 2025-01-01
    “…The central node with high computing power in the group functions as the hub node, undertaking most computing and communication tasks. …”
    Get full text
    Article
  9. 49

    Research on postural behavior and structural response prediction of scraper conveyor based on digital twin by Qiang ZHANG, Wei LIU, Yang WANG, Shouxiang MA, Jinpeng SU, Runxin ZHANG

    Published 2025-06-01
    “…A hierarchical clustering method is employed to cluster nodes with similar numerical values. …”
    Get full text
    Article
  10. 50

    Ideal Navitor Implant Depth for Redo-TAVR Feasibility and Coronary Access by Sahil Khera, MD, MPH, Syed Zaid, MD, Parasuram Krishnamoorthy, MD, Anoop N. Koshy, MBBS, PhD, Sneha Gudibendi, HS, Megan Berdan, HS, Lucy M. Safi, DO, Stamatios Lerakis, MD, PhD, George D. Dangas, MD, PhD, Samin K. Sharma, MD, Annapoorna S. Kini, MD, Gilbert H.L. Tang, MD, MSc, MBA

    Published 2025-09-01
    “…Results: Redo-TAVR was deemed the least unfeasible in 2.3% of patients with initial Navitor implant depth at 3 mm and redo-S3 implanted lower at Node 2 vs 40.5% of patients with initial Navitor depth at 3 mm and redo-S3 implanted higher at Node 3 (P < 0.0001). …”
    Get full text
    Article
  11. 51
  12. 52

    Source-Aware Redundant Packet Forwarding Scheme for Emergency Information Delivery in Chain-Typed Multihop Wireless Sensor Networks by Gongbo Zhou, Zhencai Zhu, Peng Zhang, Wei Li

    Published 2015-03-01
    “…The results show that (1) non-ACK scheme is highly suitable for the condition of large network size and hazardous wireless communication environment; (2) the non-source-aware solution is easy to use and is suitable for the occasion where the node could be replaced on demand expediently; (3) the source-aware solution has the better performance in energy efficiency and is suitable for the occasion where the network lifetime needs to be determined before deployment, and the node could not be replaced easily.…”
    Get full text
    Article
  13. 53
  14. 54

    An energy-balanced multi-sensor scheduling scheme for collaborative target tracking in wireless sensor networks by Pengcheng Fu, Hongying Tang, Yongbo Cheng, Baoqing Li, Hanwang Qian, Xiaobing Yuan

    Published 2017-03-01
    “…In addition, we also design an efficient multi-sensor node collaborative method to track a single target and to timely report its state to the remote end. …”
    Get full text
    Article
  15. 55

    RMDS: Ranging and multidimensional scaling–based anchor-free localization in large-scale wireless sensor networks with coverage holes by Qiyue Li, Baoyu Chu, Zhong Wu, Wei Sun, Liangfeng Chen, Jie Li, Zhi Liu

    Published 2017-08-01
    “…Moreover, we replace the singular value decomposition with an iterative maximum gradient descent method to reduce the computational complexity. …”
    Get full text
    Article
  16. 56

    Mandibular reconstruction with anterolateral thigh free flap and bridging plate: a retrospective study of 34 oncological cases by Caterina Ottaviano, Caterina Ottaviano, Funda Goker, Funda Goker, Funda Goker, Marcello Cammalleri, Marcello Cammalleri, Andrea Fior, Andrea Fior, Vittorio Favero, Tommaso Rizzo, Tommaso Rizzo, Guido Lobbia, Guido Lobbia, Gianluca Colapinto, Gianluca Colapinto, Gianluca Colapinto, Massimo Albanese, Massimo Albanese, Massimo Del Fabbro, Massimo Del Fabbro, Giorgio Barbera, Giorgio Barbera

    Published 2025-06-01
    “…Seven patients who experienced serious postoperative complications received additional surgery involving the replacement of titanium plates [three with custom-made plates using computer-aided design (CAD)/computer-aided manufacturing (CAM) methods]. …”
    Get full text
    Article
  17. 57

    Self-Loosening Failure Analysis of Bolt Joints under Vibration considering the Tightening Process by Yan Chen, Qiang Gao, Zhenqun Guan

    Published 2017-01-01
    “…The results show that the tightening process cannot be replaced by a simplified method because its fastening state is different from the real process. …”
    Get full text
    Article
  18. 58

    Voltage Stability Assessment Through Modal Analysis Using a Smooth Formulation of the Power Flow Problem Based on Sigmoid Functions by Joao Pedro Peters Barbosa, Joao Alberto Passos Filho, Rodrigo Andrade Ramos, Luis Fernando Costa Alberto

    Published 2025-01-01
    “…A key advantage of this formulation is its ability to convert limit-induced bifurcations into saddle-node bifurcations. This conversion allows the voltage security studies to focus solely on identifying saddle-node bifurcations, leading to significant computational efficiency. …”
    Get full text
    Article
  19. 59

    Bayesian weighted random forest for classification of high-dimensional genomics data by Oyebayo Ridwan Olaniran, Mohd Asrul A. Abdullah

    Published 2023-10-01
    “…Firstly, the tree terminal node estimation procedure is replaced with a Bayesian estimation approach. …”
    Get full text
    Article
  20. 60

    Multiple Feature Vectors Based Fault Classification for WSN Integrated Bearing of Rolling Mill by Bo Qin, Luyang Zhang, Heng Yin, Yan Qin

    Published 2018-01-01
    “…From the above analysis, the energy index and the singular value matrix are used for fault classification modeling based on the enhanced extreme learning machine (ELM), which is optimized by the bat algorithm to adjust the input weights and threshold of hidden layer node. In comparison with the fault classification methods based on SVM and ELM, the experimental results show that the proposed method has higher classification accuracy and better generalization ability.…”
    Get full text
    Article