Showing 301 - 320 results of 397 for search 'node’s influence', query time: 0.05s Refine Results
  1. 301

    Low Systemic Inflammation Response Index Predicts Good Prognosis in Locally Advanced Pancreatic Carcinoma Patients Treated with Concurrent Chemoradiotherapy by Erkan Topkan, Huseyin Mertsoylu, Ahmet Kucuk, Ali Ayberk Besen, Ahmet Sezer, Duygu Sezen, Yasemin Bolukbasi, Ugur Selek, Berrin Pehlivan

    Published 2020-01-01
    “…Ideal SIRI cutoff(s) influencing overall survival (OS) and progression-free survival (PFS) results were sought by using receiver operating characteristic (ROC) curve analysis. …”
    Get full text
    Article
  2. 302

    Predictors of survival rates among breast cancer patients in Ethiopia: a systematic review and meta-analysis 2024 by Chalie Mulugeta, Tadele Emagneneh, Getinet Kumie, Assefa Sisay, Nigusie Abebaw, Mulat Ayele, Abebaw Alamrew

    Published 2025-02-01
    “…In Ethiopia, the survival rate of breast cancer patients is influenced by various socio-demographic, clinical, and health system factors. …”
    Get full text
    Article
  3. 303

    The significance of risk stratification through nomogram-based assessment in determining postmastectomy radiotherapy for patients diagnosed with pT1 − 2N1M0 breast cancer by Chao Wei, Jie Kong, Huina Han, Xue Wang, Zimeng Gao, Danyang Wang, Andu Zhang, Jun Zhang, Zhikun Liu

    Published 2024-09-01
    “…Multivariate analysis revealed that age, primary tumor site, positive lymph node, stage, and Ki-67 level independently influenced OS, while age, primary tumor site, and stage independently affected DFS. …”
    Get full text
    Article
  4. 304

    Multiple topics evolution model based on similarity of interference by Yefei CHEN, Xuejun ZHANG, Weidong HUANG

    Published 2017-09-01
    “…The current researches of evolution model mainly focus on the spread of the individual topics,rarely considering the influential factors between multiple topics.A new topic evolution model was proposed by considering the interference among topics based on SIR model,which characterized by the influence of the similarity of the topic on the probability of propagation.The experimental results show that within the critical value,the similarity degree of positive and negative trends enhance or hinder the process of topic evolution,and the degree of action varies with the degree of interference nodes,which is expressed as evolutionary consistency under positive similarity and the evolutionary separability under negative similarity.When the critical value is exceeded,the effect of strengthening or hindering tends to saturation.…”
    Get full text
    Article
  5. 305

    Research and implementation of one-hop transmission framework in wireless network based on network coding by LU Yi-fei1, TAO Jun1, SHEN Cheng1, XIA Qin1

    Published 2010-01-01
    “…Moreover,under the condition of nodes’ burst error,the influence of the unicast strategy and retransmission based FTCG was proposed and analyzed. …”
    Get full text
    Article
  6. 306

    Modeling and Analysis of New Products Diffusion on Heterogeneous Networks by Shuping Li, Zhen Jin

    Published 2014-01-01
    “…For networks with the power-law degree distribution, numerical simulations confirm analytical results, and also at the same time, by numerical analysis of the influence of the network structure and persuasive advertisements on the density of adopters, we give two different products propagation strategies for two classes of nodes in scale-free networks.…”
    Get full text
    Article
  7. 307

    Analysis of Interaction of Multiple Cracks Based on Tip Stress Field Using Extended Finite Element Method by Yuxiao Wang, Akbar A. Javadi, Corrado Fidelibus

    Published 2022-01-01
    “…This allows to accurately determine enriched elements and nodes and calculate enrichment values. A method is proposed for constructing a multicrack matrix, which involves numbering enriched nodes of multiple cracks and solving the global stiffness matrix. …”
    Get full text
    Article
  8. 308

    Research on intrusion response strategy based on static Bayesian game in mobile edge computing network by Wei FAN, Cheng PENG, Dali ZHU, Yuqing WANG

    Published 2023-02-01
    “…In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion detection network structure suitable for mobile edge computing environment was proposed and an intrusion response decision model based on static Bayesian game was established to simulate the network interaction behavior between edge nodes and external intruders.The probability of attackers and defenders in the game process was predicted respectively.The influence of the system resource, the cost of intrusion response, the detection rate and false alarm rate were considered comprehensively by the intrusion response decision model.The response decision of the intrusion detection system was optimized on the basis of the considering both resource consumption of the intrusion detection and the privacy protection of the edge nodes.The factors that affected the decision-making of intrusion response were analyzed, and the experimental basis for the specific application was provided.…”
    Get full text
    Article
  9. 309

    Deletable blockchain based on threshold ring signature by Yanli REN, Danting XU, Xinpeng ZHANG, Dawu GU

    Published 2019-04-01
    “…With the development of blockchain,huge storage space is needed to store all of blockchain data.In addition,data can’t be changed once it is packaged into the chain,and it may be possible for overdue data to take up large storage space.Firstly,a threshold ring signature scheme was improved,and then a deletable blockchain scheme based on the mechanism of proof of space (PoSpace) consensus was constructed.Most of nodes could sign and delete a block together when block data was overdue,and the overall structure of the blockchain was unchanged.Several experiments in a simulated environment were executed,and the results show that the proposed blockchain scheme has high efficiency in generating and delegating a block.Meanwhile,the deletion of a block doesn’t influence the storage and use of other blocks.…”
    Get full text
    Article
  10. 310

    Wireless secure enhancement with cooperative jamming by Li-juan ZHANG, Zhi-hong LIU, Hong-bo ZHANG, Yong ZENG, Jian-feng MA

    Published 2017-02-01
    “…Secrecy capacity of intrinsically secure communication graph (iS-Graph) can be increased by reducing the signal quality of eavesdroppers with adding controlled interferences.The transmission of secret messages over wireless channels in which the legitimate nodes were aided by cooperative jamming was studied,and a secure communication graph with jamming,jS-Graph was proposed.First,the security properties of jS-Graph was characterized.Then,jamming strategies to confuse eavesdroppers were proposed.To tackle the nearby eavesdropper problem,a two-stage cooperative jamming strategy to jam the eavesdroppers near the source or the destination was applied.The results demonstrate that,with the aid of cooperative jamming the secure communication graph can lead to secrecy gains.These results help to clarify how the presence of eavesdroppers and the cooperative jamming can influence secure connectivity in wireless networks.…”
    Get full text
    Article
  11. 311

    Transmission characteristics of air-ground channel in aerial communication platform by Xiaobin FU, Baohui ZHENG

    Published 2018-01-01
    “…Satellite communication can solve the problem of global communication,at the same time,it follows the problems of difficult deploy and limited satellite resources.Aerial communication platform is consisted of aircraft with payload communication and not more than 10 km from ground.The platform communicating with ground nodes can solve the weakness of traditional satellite communication.The loss of air-to-ground channel was analyzed to model the air-to-ground wideband channel in Ku and Ka band.The consequence of theory and simulation demonstrates that the fading of the model has serious influence on transmission performance.In low elevation transmission,the value of K-factor is small because of multipath reception.Simulation results show that orthogonal frequency division multiplexing (OFDM) can be a good candidate for wideband communications to transmit payload data from aerial platform to ground station.…”
    Get full text
    Article
  12. 312

    Impact of user behavior on network performance reliability by Juan ZHAO, Ping GUO, Hong-zhong DENG, Jun WU, Yue-jin TAN, Min ZHANG

    Published 2013-01-01
    “…Based on a lattice network,a user access behavior model was established to describe the statistical characteristics of user behavior including the clustering characteristics and the power law distribution.The phase transition point was used to analysis the influence of the statistical characteristics of user behavior on the network performance reliability.It was shown that the network performance reliability almost independent on the degree distribution of the server-visited bipartite network;however the hot changing of the small subset with the high degree server nodes improved the network reliability.The strength,frequency and the duration of the clustering characteristics have certain impact on the phase transition of network performance reliability.The phase transition point of network performance reliability moved to the right with the increase of the difference between the number of active users when the clustering characteristics happened and don’t.…”
    Get full text
    Article
  13. 313

    Discovery of conserved peptide-MHC epitopes for directly alloreactive CD8+ T cells by Alexandra E. Hill, Eric T. Son, Moumita Paul-Heng, Chuanmin Wang, Shivanjali Ratnaseelan, Martina Denkova, Pouya Faridi, Asolina Braun, Anthony W. Purcell, Nicole A. Mifsud, Alexandra F. Sharland

    Published 2025-01-01
    “…Moreover, the panel identified alloreactive CD8+ T cells within the graft infiltrate, spleen and draining lymph node during rejection of a Kd-bearing heart graft. …”
    Get full text
    Article
  14. 314

    Resilient Synchronization of Pulse-Coupled Oscillators Under Stealthy Attacks by Yugo Iori, Hideaki Ishii

    Published 2024-01-01
    “…This paper studies a clock synchronization problem for wireless sensor networks employing pulse-based communication when some of the nodes are faulty or even adversarial. The objective is to design resilient distributed algorithms for the nonfaulty nodes to keep the influence of the malicious nodes minimal and to arrive at synchronization in a safe manner. …”
    Get full text
    Article
  15. 315

    Ecological networks construction and optimization in the Longdong Loess Plateau: The advantages of self-organizing map and complex networks by Xueyu Huang, Lina Xiu, Zhixiang Lu, Jiahui Wang

    Published 2025-01-01
    “…Ecological networks (ENs) construction, which is the basis for sustainable regional development, is influenced by the accuracy of source identification. …”
    Get full text
    Article
  16. 316

    Integrating traditional biomarkers and emerging predictors to assess neoadjuvant chemotherapy efficacy in breast cancer: a multifactorial analysis of Ki-67, CDK4, EGFR, TILs and ct... by Tianzhao Du, Ye Yuan, Shulan Sun, Zhichao Gao, Xiaoshuai Li

    Published 2024-12-01
    “…Logistic regression models were used to analyse factors influencing NACT efficacy. The Cox risk regression model was used to analyse prognostic factors. …”
    Get full text
    Article
  17. 317

    Research on the Complexity Mechanism of Decoy Strategies Based on Multiagent Simulation by Zhen Li, Xiaoyu Bao, Qingfeng Meng, Pengqun Shen

    Published 2020-01-01
    “…This paper then analyzes the performance of strategies using different product competition and diffusion scenarios. The influences of neighbor nodes, reconnection probability, and herd mentality on decoy effects are explored. …”
    Get full text
    Article
  18. 318

    Research progress of trusted sensor-cloud based on fog computing by Tian WANG, Xuewei SHEN, Hao LUO, Baisheng CHEN, Guojun WANG, Weijia JIA

    Published 2019-03-01
    “…The sensor-cloud is combined with cloud computing and wireless sensor networks,which extends the service ability of WSN by the support of cloud computing.It is one of the hot topics among the current researches.After comparing and surveying the mainstream system adequately,the characteristics and development of sensor-Cloud were summed up.Then,the direct influence of existing trust issues in the system for data protection and application on upper layer were found.The announced reasons explained that existing schemes were difficult to provide trusted sensor-cloud services.This was because that the capabilities of the underlying WSN nodes were too weak,and cloud computing model lacked the direct management of underlying nodes and data and so on.The trusted structures based on fog computing were given,and the key technologies of trusted evaluation,trusted data collection,and trusted storage were designed.Finally,the discussion pointed out new views for the researches in trusted sensor-cloud.…”
    Get full text
    Article
  19. 319

    The role of impulsivity and emotional dysregulation in smartphone overdependence explored through network analysis by Jinwoo Cho, Hoyoung Kim

    Published 2025-01-01
    “…A sample of 687 adults in their twenties completed an online survey. Central nodes of the network were “Impulse-control difficulties,” “Positive Urgency,” “Salience” and “Relapse,” and bridge nodes included a “Lack of emotional awareness and understanding,” “Negative Urgency,” “Lack of Perseverance,” and “Impulse-control difficulties.” …”
    Get full text
    Article
  20. 320

    Dynamical Analysis of an SE2IR Information Propagation Model in Social Networks by Qian Zhang, Xianyong Li, Yajun Du, Jian Zhu

    Published 2021-01-01
    “…Due to the inequality of users’ (nodes’) status and the influence of external forces in the progress of the information propagation in a social network, the infected nodes hold different levels of propagation capacity. …”
    Get full text
    Article