نتایج جستجو برای: node capture
تعداد نتایج: 287175 فیلتر نتایج به سال:
background: toxoplasma gondii is an apicomplexan parasite which infects a broad range of hosts. the classical diagnosis of toxoplasmosis relies on serological methods. detection of parasite or its components could be useful tool for early diagnosis of the infection. methods: fifty mice were infected by the intraperitoneal route with 5000 tachyzoites of t. gondii rh strain. five of them sacrifi...
Graph Convolutional Network (GCN) is a new method for extracting, learning, and inferencing graph data that builds an embedded representation of the target node by aggregating information from neighbouring nodes. GCN decisive classification link prediction tasks in recent research. Although existing performs well, we argue current design ignores potential features node. In addition, presence wi...
background: in this study we evaluated the prognostic impact of metastatic lymph node ratio (mlr) in patients with gastric cancer undergoing curative surgical resection. methods: a total of 121 patients with gastric adenocarcinoma undergoing curative r0 surgical resection in our institutions between 2003 and 2010 were included in this study. mlr was classified into 3 groups as follows: mlr0; 0...
:فعالیت قلب وابسته به ایمپالس های الکتریکی است که توسط سیستم ریتمیسیته تخصص عمل یافته ی تحریکی وهدایتی آن تولید وهدایت می شود. این سیستم نسبت به آسیب ناشی از بیماری های قلبی وداروهاومواد خاص حساس است.نتیجه ی اختلال در کار این سیستم غالبا پیدایش یک ریتم غیر عادی در الکتروکاردیوگرام می باشد. مطالعات در جانوران پیشنهاد میکند که کافئین در دوزهای بالاسیستم هدایتی قلب را متاثر میکند و بسیاری از پزشکا...
Secured communications in the presence of eavesdropper node is grave for the successful operations in the wireless relay networks. In the proposed work, choose two hop wireless relay networks to enhance security against the eavesdropper node. This paper considers four node networks, they are one source, and three decode and forward relay, one destination and one eavesdropper node. To transmit t...
Through measurements, researchers continue to produce large social graphs that capture relationships, transactions, and social interactions between users. Efficient analysis of these graphs requires algorithms that scale well with graph size. We examine node distance computation, a critical primitive in graph problems such as computing node separation, centrality computation, mutual friend dete...
It is well known that real-world networks from many domains exhibit a large number of structural similarities, such as the form of the distributions of node degrees, the spectrum of the adjacency matrix, and the degree of interconnectedness. Some of these network statistics, such as the clustering coefficient, capture local behavior, while others, like the diameter, capture more global structur...
In this paper, a key management and security multi-hop routing scheme based on cross layer (SMRCL) was proposed for wireless sensor networks. The core of SMRCL has two parts as following. Firstly, a key management based on polynomial and time deployment for wireless sensor networks is proposed. In this scheme, the sensor nodes are divided into several deployment groups and deployed the network ...
Security is an essential service for wired and wireless network communications. The success of mobile ad hoc networks (MANET) strongly depends on people’s confidence in its security. However, the characteristics of MANET pose both challenges and opportunities in achieving security goals, such as confidentiality, authentication, integrity, availability, access control, and non-repudiation. The w...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید