-
1
Proposed Method for Partial Node Replacement by Software Defined Network
Published 2020-09-01Get full text
Article -
2
A method of CCN centralized control cache decision based on SDN
Published 2017-05-01Get full text
Article -
3
A method of CCN centralized control cache decision based on SDN
Published 2017-05-01Get full text
Article -
4
Regional Frequency Measurement Point Selection and System Partitioning Method for High-Renewable-Energy-Penetration Power System
Published 2025-06-01“…Finally, the effectiveness of the proposed method is verified using a modified standard 39-node system. …”
Get full text
Article -
5
Maintaining Cyber Resilience in the Reconfigurable Networks with Immunization and Improved Network Game Methods
Published 2024-11-01“…This model allows quickly identifying nodes that require disconnection or replacement when a cyber attack occurs, and understanding which network sectors might be affected by an attack. …”
Get full text
Article -
6
Research on the Raft improved algorithm for anti-Byzantine nodes
Published 2025-03-01“…ObjectivesIn order to solve the problem of malicious election and log tampering caused by Byzantine nodes in original Raft algorithm, an AntiB-Raft (Anti-Byzantine Raft) algorithm was proposed to resist Byzantine nodes.MethodsWhen the candidate requested to replace the Leader, the heartbeat monitoring threshold mechanism was used to determine whether the candidate can successfully obtain enough votes to become the new Leader, which was agreed that only when more than half of the nodes detected that the current Leader was really down, the candidate can obtain more than half of the votes and become the new Leader, so as to prevent the Byzantine node from maliciously pulling votes when current Leader was not down, which would result in the replacement of the normal Leader. …”
Get full text
Article -
7
CRYPTO-RESISTANT METHODS AND RANDOM NUMBER GENERATORS IN INTERNET OF THINGS (IOT) DEVICES
Published 2022-06-01“…The analysis of technologies and circuit solutions allowed to draw the following conclusions: protection of IoT solutions includes: security of IoT network nodes and their connection to the cloud using secure protocols, ensuring confidentiality, authenticity and integrity of IoT data by cryptographic methods, attack analysis and network cryptographic stability; the initial basis for the protection of IoT solutions is the true randomness of the formed RNG sequences and used in algorithms for cryptographic transformation of information to protect it; feature of IoT devices is their heterogeneity and geographical distribution, limited computing resources and power supply, small size; The most effective (reduce power consumption and increase the generation rate) for use in IoT devices are RNG exclusively on a digital basis, which implements a three-stage process: the initial digital circuit, normalizer and random number flow generator; Autonomous Boolean networks (ABN) allow to create RNG with unique characteristics: the received numbers are really random, high speed – the number can be received in one measure, the minimum power consumption, miniature, high (up to 3 GHz) throughput of Boolean chaos; a promising area of ABN development is the use of optical logic valves for the construction of optical ABN with a bandwidth of up to 14 GHz; the classification of known classes of RNG attacks includes: direct cryptanalytic attacks, attacks based on input data, attacks based on the disclosure of the internal state of RNG, correlation attacks and special attacks; statistical test packages to evaluate RNG sequences have some limitations or shortcomings and do not replace cryptanalysis; Comparison of cryptoaccelerators with cryptographic transformation software shows their significant advantages: for AES block encryption algorithm, speeds increase by 10-20 times in 8/16-bit cryptoaccelerators and 150 times in 32-bit, growth hashing of SHA-256 in 32-bit cryptoaccelerators more than 100 times, and for the NMAS algorithm - up to 500 times. …”
Get full text
Article -
8
The actual approach of sentinel node biopsy in cutaneous melanoma
Published 2025-01-01“…As for now, there is no alternative to sentinel node biopsy. The gold standard for marking sentinel nodes in melanoma remains the dual radioisotope-dye method, using lymphoscintigraphyand SPECT-CT. …”
Get full text
Article -
9
Retrospective study on regional lymph node radiotherapy after axillary dissection exemption in breast cancer patients with sentinel lymph node positive status
Published 2025-02-01“…Background and purpose: With the progressive development of breast cancer surgery toward more individualized and minimally invasive approaches, sentinel lymph node biopsy (SLNB) has replaced axillary lymph node dissection (ALND) as the standard method for axillary management in certain early-stage breast cancer patients. …”
Get full text
Article -
10
Simplified method for estimating the first natural frequency of a symmetric arch truss
Published 2024-09-01“…The Dunkerley method and a variant of the Rayleigh method are proposed to be used to estimate the first natural frequency of the truss. …”
Get full text
Article -
11
Selection method for hybrid energy storage schemes for supply reliability improvement in distribution networks
Published 2025-03-01“…We propose an improved utility value calculation method based on enhanced utility combination rules. …”
Get full text
Article -
12
Methods of Current Limitation in Low Voltage (up to 1 kV) Electric Networks
Published 2021-12-01“…The variants of the implementation of these current limiting methods recommended for study at the design stage or when replacing equipment that has exhausted its resource, are considered. …”
Get full text
Article -
13
Utilization of lymph node elastography in the axillary staging of breast cancer
Published 2025-03-01“…Compared to USG, ultrasound elastography is a relatively novel non-invasive method to differentiate benign and malignant lesions based on the stiffness heterogeneity of the tissue. …”
Get full text
Article -
14
Power System Transient Stability Assessment Based on Intelligent Enhanced Transient Energy Function Method
Published 2024-11-01“…Based on the k-means clustering method, the IEEE-39 node system generator synchronization units are grouped according to the power angle change trend of each generator after the fault. …”
Get full text
Article -
15
Indocyanine green utility in sentinel node detection for cervical cancer patients
Published 2019-10-01“…In this respect, extended lymph node dissection, routinely associated so far with cervical cancer patients, has in the last decades been replaced with sentinel node detection and biopsy. …”
Get full text
Article -
16
Morphometric parameters of pelvic lymph nodes in experimental metastatic prostate cancer
Published 2023-06-01“…Identification of structural and functional changes in pelvic lymph nodes in experimental metastatic prostate cancer.Materials and methods. …”
Get full text
Article -
17
Optimization Design of Node Placement Manipulators Based on Working Area and Response Speed
Published 2024-01-01“…Based on the multi-objective particle swarm algorithm and the variable density method, the size optimization and lightweight design of the node-distributed manipulator arm are carried out. …”
Get full text
Article -
18
Topology-Aware Anchor Node Selection Optimization for Enhanced DV-Hop Localization in IoT
Published 2025-06-01“…Second, in the multilateration stage, the traditional least square method is replaced by a continuous GWO algorithm to solve the distance equations with higher precision. …”
Get full text
Article -
19
Application of thyroglobulin detection in fine-needle aspiration washout fluid from cervical lymph node
Published 2025-02-01“…Fine-needle aspiration (FNA) is an important method for evaluating the nature of thyroid nodules and lymph node metastasis. …”
Get full text
Article -
20
Investigating and Optimizing MINDWALC Node Classification to Extract Interpretable Decision Trees from Knowledge Graphs
Published 2025-02-01“…In summary, we were able to show that our proposed methods significantly optimize MINDWALC on tree-like structured graphs, and that MINDWALC is able to utilize background knowledge to replace missing instance knowledge in a human-comprehensible way. …”
Get full text
Article