نتایج جستجو برای: node capture
تعداد نتایج: 287175 فیلتر نتایج به سال:
Graph embedding techniques, which learn low-dimensional representations of a graph, are achieving state-of-the-art performance in many graph mining tasks. Most existing algorithms assign single vector to each node, implicitly assuming that representation is enough capture all characteristics the node. However, across domains, it common observe pervasively overlapping community structure, where ...
Network embedding leverages the node proximity manifested to learn a low-dimensional node vector representation for each node in the network. e learned embeddings could advance various learning tasks such as node classication, network clustering, and link prediction. Most, if not all, of the existing works, are overwhelmingly performed in the context of plain and static networks. Nonetheless,...
capture elisa system was developed for diagnosis of visceral leishmaniasis (vl) using a monoclonal antibody raised against an antigen previously detected in the urine of vl patients. urine samples from confirmed vl cases from yemen, nepal, spain, sudan and brazil were tested in the capture elisa in comparison with urine samples from endemic and non-endemic areas along with urine samples from pa...
Abstract We present network embedding algorithms that capture information about a node from the local distribution over attributes around it, as observed random walks following an approach similar to Skip-gram. Observations neighbourhoods of different sizes are either pooled (AE) or encoded distinctly in multi-scale (MUSAE). Capturing attribute-neighbourhood relationships multiple scales is use...
background: to reduce traffic injuries in the country, health professionals should have accurate estimates of road traffic deaths. multiple and sometimes inconsistent statistics presented by organizations in charge create high degree of uncertainty for planners and decision makers. to achieve an accurate estimate, several methods are available. of them, capture-recapture method seems to be an a...
direct regenerations by using mature cotyledonary node as a explants has been shown to be time-saving and convenient strategy for micropropagation of soybean. so we have evaluated regeneration protocol through single shoot using cotyledonary node as a rapid and efficient protocol for two soybean cultivars and one mutant line. cotyledonary nodes explants obtained from 7-days-old in vitro seedlin...
Problem statement: Medium Access Control (MAC) protocols are one of most important research issues in communication and networking. There have been proposed several MAC protocols in wireless as well in wired networks. Approach: ALOHA-based protocol is the simplest one, being able to provide prompt access, reliable channels and support for quality of service. However its limited capacity, low th...
In pervasive computing, adaptation is essential to applications. However, adaptation requires an up-to-the-minute understanding of the state of the environment, which often comes with a significant added cost in terms of computation and communication. In this paper, we explore possibilities for measuring the degree of mobility in dynamic ubiquitous networks. Existing measures of mobility degree...
Grids being concerned with sharing of diverse resources in a distributed environment induce security concerns. An event that occurs locally on a grid node may actually be part of a larger set of events that are collectively harzadous to the grid. Since a node only sees the local footprint of an event, it cannot know the contribution of this event at a global scale. As a result, several events t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید