Node of network has lots of information, such as topology, text and label information. Therefore, node classification is an open issue. Recently, one vector of node is directly connected at the end of another vector. ...Node of network has lots of information, such as topology, text and label information. Therefore, node classification is an open issue. Recently, one vector of node is directly connected at the end of another vector. However, this method actually obtains the performance by extending dimensions and considering that the text and structural information are one-to-one, which is obviously unreasonable. Regarding this issue, a method by weighting vectors is proposed in this paper. Three methods, negative logarithm, modulus and sigmoid function are used to weight-trained vectors, then recombine the weighted vectors and put them into the SVM classifier for evaluation output. By comparing three different weighting methods, the results showed that using negative logarithm weighting achieved better results than the other two using modulus and sigmoid function weighting, and was superior to directly concatenating vectors in the same dimension.展开更多
Present work was designed to quantitatively evaluate the performance of diffusion-weighted magnetic resonance imaging(DWI) in the diagnosis of the presence of metastasis in lymph nodes(LNs). Eligible studies were ...Present work was designed to quantitatively evaluate the performance of diffusion-weighted magnetic resonance imaging(DWI) in the diagnosis of the presence of metastasis in lymph nodes(LNs). Eligible studies were identified from systematical Pub Med and EMBASE searches. Data were extracted. Meta-analyses were performed to generate pooled sensitivity and specificity on the basis of per-node, per-lesion and per-patient, respectively. Fourteen publications(2458 LNs, 404 lesions and 334 patients) were eligible. Per-node basis demonstrated the pooled sensitivity and specificity was 0.82(P〈0.0001) and 0.90(P〈0.0001), respectively. Per-lesion basis illustrated the pooled sensitivity and specificity was 0.73(P=0.0036) and 0.85(P〈0.0001), respectively. Per-patient basis indicated the pooled sensitivity and specificity was 0.67(P=0.0909) and 0.86(P〈0.0001), respectively. In conclusion, DWI has rather a negative predictive value for the diagnosis of LN metastasis presence. The difference of the mean apparent diffusion coefficients between benign and malignant LNs is not yet stable. Therefore, the DWI technique has to be further improved.展开更多
Malignant melanoma is a malignancy of pigmentproducing cells(melanocytes) located predominantly in the skin. Nodal metastases are an adverse prognostic factor compromising long term patient survival. Therefore, accura...Malignant melanoma is a malignancy of pigmentproducing cells(melanocytes) located predominantly in the skin. Nodal metastases are an adverse prognostic factor compromising long term patient survival. Therefore, accurate detection of regional nodal metastases is required for optimization of treatment. Computed tomography(CT) and magnetic resonance imaging(MRI) remain the primary imaging modalities for regional staging of malignant melanoma. However, both modalities rely on size-related and morphological criteria to differentiate between benign and malignant lymph nodes, decreasing the sensitivity for detection of small metastases. Surgery is the primary mode of therapy for localized cutaneous melanoma. Patients should be followed up for metastases after surgical removal. We report here a case of inguinal lymph node enlargement with a genital vesicular lesion with a history of surgery for malignant melanoma on her thigh two years ago. CT and diffusion weighted-MRI(DW-MRI) were applied for the lymph node identification. DW-MRI revealed malignant lymph nodes due to malignant melanoma metastases correlation with pathological findings.展开更多
A Dark Network is a network that cannot be accessed through tradition means. Once uncovered, to any degree, dark network analysis can be accomplished using the SNA software. The output of SNA software includes many me...A Dark Network is a network that cannot be accessed through tradition means. Once uncovered, to any degree, dark network analysis can be accomplished using the SNA software. The output of SNA software includes many measures and metrics. For each of these measures and metric, the output in ORA additionally provides the ability to obtain a rank ordering of the nodes in terms of these measures. We might use this information in decision making concerning best methods to disrupt or deceive a given dark network. In the Noordin Dark network, different nodes were identified as key nodes based upon the metric used. Our goal in this paper is to use methodologies to identify the key players or nodes in a Dark Network in a similar manner as we previously proposed in social networks. We apply two multi-attribute decision making methods, a hybrid AHP & TOPSIS and an average weighted ranks scheme, to analyze these outputs to find the most influential nodes as a function of the decision makers’ inputs. We compare these methods by illustration using the Noordin Dark Network with seventy-nine nodes. We discuss sensitivity analysis that is applied to the criteria weights in order to measure the change in the ranking of the nodes.展开更多
To improve the performance of Ad hoc on-demand multipath distance vector (AOMDV) protocol, we proposed NS-AOMDV which is short for “AOMDV based on node state”. In NS-AOMDV, we introduce node state to improve AOMDV’...To improve the performance of Ad hoc on-demand multipath distance vector (AOMDV) protocol, we proposed NS-AOMDV which is short for “AOMDV based on node state”. In NS-AOMDV, we introduce node state to improve AOMDV’s performance in selecting main path. In route discovery process, the routing update rule calculates the node weight of each path and sorts the path weight by descending value in route list, and we choose the path which has the largest path weight for data transmission. NS-AOMDV also uses the technology of route request (RREQ) packet delay forwarding and energy threshold to ease network congestion, limit the RREQ broadcast storm, and avoid low energy nodes to participate in the establishment of the path. The results of simulation show that NS-AOMDV can effectively improve the networks’packets delivery rate, throughput and normalized routing overhead in the situation of dynamic network topology and heavy load.展开更多
Vehicular Ad hoc Networks (VANETs) which is a special form of Mobile Ad hoc Networks (MANETs) has promising application prospects in the future. Due to the rapid changing of topology structure, how to find a route whi...Vehicular Ad hoc Networks (VANETs) which is a special form of Mobile Ad hoc Networks (MANETs) has promising application prospects in the future. Due to the rapid changing of topology structure, how to find a route which can guarantee Quality of Service (QoS) is an important issue in VANETs. This paper presents an improved Greedy Perimeter Stateless Routing (GPSR) protocol based on our proposed next-hop node selection mechanism. Firstly, we define the link reliability in two cases which take the movement direction angle between two vehicles into consideration. Then we propose a next-hop node selection mechanism based on a weighted function which consists of link reliability between the sender node and next-hop candidate node, distance between next-hop candidate node and the destination, movement direction angle of next-hop candidate node. At last, an improved GPSR protocol is proposed based on the next-hop node selection mechanism. Simulation results are presented to evaluate the performance of the improved GPSR protocol, which shows that the performance including packet delivery ratio and average end-to-end delay of the proposed protocol is better in some situations.展开更多
在线社交网络中虚假信息传播蔓延成为当前网络空间安全治理面临的重要挑战。提出一种融合用户传播风险和节点影响力分析的虚假信息传播控制方法DDC-UPRNI(disinformation diffusion control method integrating user propagation risk a...在线社交网络中虚假信息传播蔓延成为当前网络空间安全治理面临的重要挑战。提出一种融合用户传播风险和节点影响力分析的虚假信息传播控制方法DDC-UPRNI(disinformation diffusion control method integrating user propagation risk and node influence analysis)。综合考虑虚假信息传播特征空间的多样性和复杂性,通过自注意力机制实现用户传播虚假信息行为维度、时间维度和内容维度特征的嵌入表示,运用改进的无监督聚类K-means++算法实现不同用户传播风险等级的自动划分;设计一种自适应加权策略实现对离散粒子群优化算法的改进,进而提出一种基于离散粒子群优化的虚假信息传播关键节点选取方法,用于从具有特定传播风险等级的用户节点集合中选取若干个具有影响力的控制驱动节点,从而实现精准、高效的虚假信息传播控制;基于现实在线社交网络平台上开展试验,结果表明,所提出的DDC-UPRNI方法与现有算法相比,在控制效果和时间复杂度等重要指标上具有明显优势。该方法为社会网络空间中的虚假信息管控治理提供重要参考。展开更多
文摘Node of network has lots of information, such as topology, text and label information. Therefore, node classification is an open issue. Recently, one vector of node is directly connected at the end of another vector. However, this method actually obtains the performance by extending dimensions and considering that the text and structural information are one-to-one, which is obviously unreasonable. Regarding this issue, a method by weighting vectors is proposed in this paper. Three methods, negative logarithm, modulus and sigmoid function are used to weight-trained vectors, then recombine the weighted vectors and put them into the SVM classifier for evaluation output. By comparing three different weighting methods, the results showed that using negative logarithm weighting achieved better results than the other two using modulus and sigmoid function weighting, and was superior to directly concatenating vectors in the same dimension.
文摘Present work was designed to quantitatively evaluate the performance of diffusion-weighted magnetic resonance imaging(DWI) in the diagnosis of the presence of metastasis in lymph nodes(LNs). Eligible studies were identified from systematical Pub Med and EMBASE searches. Data were extracted. Meta-analyses were performed to generate pooled sensitivity and specificity on the basis of per-node, per-lesion and per-patient, respectively. Fourteen publications(2458 LNs, 404 lesions and 334 patients) were eligible. Per-node basis demonstrated the pooled sensitivity and specificity was 0.82(P〈0.0001) and 0.90(P〈0.0001), respectively. Per-lesion basis illustrated the pooled sensitivity and specificity was 0.73(P=0.0036) and 0.85(P〈0.0001), respectively. Per-patient basis indicated the pooled sensitivity and specificity was 0.67(P=0.0909) and 0.86(P〈0.0001), respectively. In conclusion, DWI has rather a negative predictive value for the diagnosis of LN metastasis presence. The difference of the mean apparent diffusion coefficients between benign and malignant LNs is not yet stable. Therefore, the DWI technique has to be further improved.
文摘Malignant melanoma is a malignancy of pigmentproducing cells(melanocytes) located predominantly in the skin. Nodal metastases are an adverse prognostic factor compromising long term patient survival. Therefore, accurate detection of regional nodal metastases is required for optimization of treatment. Computed tomography(CT) and magnetic resonance imaging(MRI) remain the primary imaging modalities for regional staging of malignant melanoma. However, both modalities rely on size-related and morphological criteria to differentiate between benign and malignant lymph nodes, decreasing the sensitivity for detection of small metastases. Surgery is the primary mode of therapy for localized cutaneous melanoma. Patients should be followed up for metastases after surgical removal. We report here a case of inguinal lymph node enlargement with a genital vesicular lesion with a history of surgery for malignant melanoma on her thigh two years ago. CT and diffusion weighted-MRI(DW-MRI) were applied for the lymph node identification. DW-MRI revealed malignant lymph nodes due to malignant melanoma metastases correlation with pathological findings.
文摘A Dark Network is a network that cannot be accessed through tradition means. Once uncovered, to any degree, dark network analysis can be accomplished using the SNA software. The output of SNA software includes many measures and metrics. For each of these measures and metric, the output in ORA additionally provides the ability to obtain a rank ordering of the nodes in terms of these measures. We might use this information in decision making concerning best methods to disrupt or deceive a given dark network. In the Noordin Dark network, different nodes were identified as key nodes based upon the metric used. Our goal in this paper is to use methodologies to identify the key players or nodes in a Dark Network in a similar manner as we previously proposed in social networks. We apply two multi-attribute decision making methods, a hybrid AHP & TOPSIS and an average weighted ranks scheme, to analyze these outputs to find the most influential nodes as a function of the decision makers’ inputs. We compare these methods by illustration using the Noordin Dark Network with seventy-nine nodes. We discuss sensitivity analysis that is applied to the criteria weights in order to measure the change in the ranking of the nodes.
文摘To improve the performance of Ad hoc on-demand multipath distance vector (AOMDV) protocol, we proposed NS-AOMDV which is short for “AOMDV based on node state”. In NS-AOMDV, we introduce node state to improve AOMDV’s performance in selecting main path. In route discovery process, the routing update rule calculates the node weight of each path and sorts the path weight by descending value in route list, and we choose the path which has the largest path weight for data transmission. NS-AOMDV also uses the technology of route request (RREQ) packet delay forwarding and energy threshold to ease network congestion, limit the RREQ broadcast storm, and avoid low energy nodes to participate in the establishment of the path. The results of simulation show that NS-AOMDV can effectively improve the networks’packets delivery rate, throughput and normalized routing overhead in the situation of dynamic network topology and heavy load.
文摘Vehicular Ad hoc Networks (VANETs) which is a special form of Mobile Ad hoc Networks (MANETs) has promising application prospects in the future. Due to the rapid changing of topology structure, how to find a route which can guarantee Quality of Service (QoS) is an important issue in VANETs. This paper presents an improved Greedy Perimeter Stateless Routing (GPSR) protocol based on our proposed next-hop node selection mechanism. Firstly, we define the link reliability in two cases which take the movement direction angle between two vehicles into consideration. Then we propose a next-hop node selection mechanism based on a weighted function which consists of link reliability between the sender node and next-hop candidate node, distance between next-hop candidate node and the destination, movement direction angle of next-hop candidate node. At last, an improved GPSR protocol is proposed based on the next-hop node selection mechanism. Simulation results are presented to evaluate the performance of the improved GPSR protocol, which shows that the performance including packet delivery ratio and average end-to-end delay of the proposed protocol is better in some situations.
文摘在线社交网络中虚假信息传播蔓延成为当前网络空间安全治理面临的重要挑战。提出一种融合用户传播风险和节点影响力分析的虚假信息传播控制方法DDC-UPRNI(disinformation diffusion control method integrating user propagation risk and node influence analysis)。综合考虑虚假信息传播特征空间的多样性和复杂性,通过自注意力机制实现用户传播虚假信息行为维度、时间维度和内容维度特征的嵌入表示,运用改进的无监督聚类K-means++算法实现不同用户传播风险等级的自动划分;设计一种自适应加权策略实现对离散粒子群优化算法的改进,进而提出一种基于离散粒子群优化的虚假信息传播关键节点选取方法,用于从具有特定传播风险等级的用户节点集合中选取若干个具有影响力的控制驱动节点,从而实现精准、高效的虚假信息传播控制;基于现实在线社交网络平台上开展试验,结果表明,所提出的DDC-UPRNI方法与现有算法相比,在控制效果和时间复杂度等重要指标上具有明显优势。该方法为社会网络空间中的虚假信息管控治理提供重要参考。