Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (869)
  • Open Access

    ARTICLE

    Coupled Numerical Simulation of Electromagnetic and Flow Fields in a Magnetohydrodynamic Induction Pump

    He Wang1,*, Ying He2

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.4, pp. 889-899, 2024, DOI:10.32604/fdmp.2023.042728

    Abstract Magnetohydrodynamic (MHD) induction pumps are contactless pumps able to withstand harsh environments. The rate of fluid flow through the pump directly affects the efficiency and stability of the device. To explore the influence of induction pump settings on the related delivery speed, in this study, a numerical model for coupled electromagnetic and flow field effects is introduced and used to simulate liquid metal lithium flow in the induction pump. The effects of current intensity, frequency, coil turns and coil winding size on the velocity of the working fluid are analyzed. It is shown that the first three parameters have a… More >

  • Open Access

    ARTICLE

    Differentially Private Support Vector Machines with Knowledge Aggregation

    Teng Wang, Yao Zhang, Jiangguo Liang, Shuai Wang, Shuanggen Liu*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3891-3907, 2024, DOI:10.32604/cmc.2024.048115

    Abstract With the widespread data collection and processing, privacy-preserving machine learning has become increasingly important in addressing privacy risks related to individuals. Support vector machine (SVM) is one of the most elementary learning models of machine learning. Privacy issues surrounding SVM classifier training have attracted increasing attention. In this paper, we investigate Differential Privacy-compliant Federated Machine Learning with Dimensionality Reduction, called FedDPDR-DPML, which greatly improves data utility while providing strong privacy guarantees. Considering in distributed learning scenarios, multiple participants usually hold unbalanced or small amounts of data. Therefore, FedDPDR-DPML enables multiple participants to collaboratively learn a global model based on weighted… More >

  • Open Access

    ARTICLE

    RoBGP: A Chinese Nested Biomedical Named Entity Recognition Model Based on RoBERTa and Global Pointer

    Xiaohui Cui1,2,#, Chao Song1,2,#, Dongmei Li1,2,*, Xiaolong Qu1,2, Jiao Long1,2, Yu Yang1,2, Hanchao Zhang3

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3603-3618, 2024, DOI:10.32604/cmc.2024.047321

    Abstract Named Entity Recognition (NER) stands as a fundamental task within the field of biomedical text mining, aiming to extract specific types of entities such as genes, proteins, and diseases from complex biomedical texts and categorize them into predefined entity types. This process can provide basic support for the automatic construction of knowledge bases. In contrast to general texts, biomedical texts frequently contain numerous nested entities and local dependencies among these entities, presenting significant challenges to prevailing NER models. To address these issues, we propose a novel Chinese nested biomedical NER model based on RoBERTa and Global Pointer (RoBGP). Our model… More >

  • Open Access

    ARTICLE

    A Framework for Enhancing Privacy and Anonymity in Blockchain-Enabled IoT Devices

    Muhammad Saad1, Muhammad Raheel Bhutta2, Jongik Kim3,*, Tae-Sun Chung1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4263-4282, 2024, DOI:10.32604/cmc.2024.047132

    Abstract With the increase in IoT (Internet of Things) devices comes an inherent challenge of security. In the world today, privacy is the prime concern of every individual. Preserving one’s privacy and keeping anonymity throughout the system is a desired functionality that does not come without inevitable trade-offs like scalability and increased complexity and is always exceedingly difficult to manage. The challenge is keeping confidentiality and continuing to make the person innominate throughout the system. To address this, we present our proposed architecture where we manage IoT devices using blockchain technology. Our proposed architecture works on and off blockchain integrated with… More >

  • Open Access

    REVIEW

    Survey and Prospect for Applying Knowledge Graph in Enterprise Risk Management

    Pengjun Li1, Qixin Zhao1, Yingmin Liu1, Chao Zhong1, Jinlong Wang1,*, Zhihan Lyu2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3825-3865, 2024, DOI:10.32604/cmc.2024.046851

    Abstract Enterprise risk management holds significant importance in fostering sustainable growth of businesses and in serving as a critical element for regulatory bodies to uphold market order. Amidst the challenges posed by intricate and unpredictable risk factors, knowledge graph technology is effectively driving risk management, leveraging its ability to associate and infer knowledge from diverse sources. This review aims to comprehensively summarize the construction techniques of enterprise risk knowledge graphs and their prominent applications across various business scenarios. Firstly, employing bibliometric methods, the aim is to uncover the developmental trends and current research hotspots within the domain of enterprise risk knowledge… More >

  • Open Access

    ARTICLE

    Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells

    Chanumolu Kiran Kumar, Nandhakumar Ramachandran*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3151-3176, 2024, DOI:10.32604/cmc.2023.043534

    Abstract Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions, vulnerabilities, and assaults. Complex security systems, such as Intrusion Detection Systems (IDS), are essential due to the limitations of simpler security measures, such as cryptography and firewalls. Due to their compact nature and low energy reserves, wireless networks present a significant challenge for security procedures. The features of small cells can cause threats to the network. Network Coding (NC) enabled small cells are vulnerable to various types of attacks. Avoiding attacks and performing secure “peer” to “peer” data transmission is a challenging task in small… More >

  • Open Access

    ARTICLE

    A Health State Prediction Model Based on Belief Rule Base and LSTM for Complex Systems

    Yu Zhao, Zhijie Zhou*, Hongdong Fan, Xiaoxia Han, Jie Wang, Manlin Chen

    Intelligent Automation & Soft Computing, Vol.39, No.1, pp. 73-91, 2024, DOI:10.32604/iasc.2024.042285

    Abstract In industrial production and engineering operations, the health state of complex systems is critical, and predicting it can ensure normal operation. Complex systems have many monitoring indicators, complex coupling structures, non-linear and time-varying characteristics, so it is a challenge to establish a reliable prediction model. The belief rule base (BRB) can fuse observed data and expert knowledge to establish a nonlinear relationship between input and output and has well modeling capabilities. Since each indicator of the complex system can reflect the health state to some extent, the BRB is built based on the causal relationship between system indicators and the… More >

  • Open Access

    ARTICLE

    Moderating Effect of Perceived Threat of Breast Cancer on Relation between Knowledge and Breast Self Examination

    Effet modérateur de la perception de menace du cancer du sein sur la relation entre les connaissances et l’autopalpation

    Carolle Annie Njopvoui*, Armel Valdin Teague Tsopgny, Henri Rodrigue Njengoue Ngamaleu

    Psycho-Oncologie, Vol.18, No.1, pp. 59-68, 2024, DOI:10.32604/po.2023.047499

    Abstract Estimated at more than 2.2 million cases worldwide, most breast cancer cases and deaths from breast cancer occur in low and middle-income countries. In Cameroon, many studies have underlined the effect of knowledge of breast cancer on screening measures such as self-examination and, to a lesser extent, the perception of the threat of this disease. This research aims to assess according to the Health Belief Model (HBM), the moderating effect of perceived threat of breast cancer on the relation between knowledge and breast self-examination. A questionnaire survey was conducted among 517 Cameroonian women to assess their general knowledge about breast… More >

  • Open Access

    ARTICLE

    Health Democracy and Storytelling: A Synthesis of Knowledge

    Démocratie en santé et narration : une synthèse des connaissances

    Rossi Silvia1,2,*, Sandrine de Montgolfier1,3, Joëlle Kivits4

    Psycho-Oncologie, Vol.18, No.1, pp. 33-41, 2024, DOI:10.32604/po.2024.042709

    Abstract Aims: Health democracy requires tools and methodologies to involve non-scientific actors in the development and implementation of health policies. Storytelling could be one of the tools to make health democracy effective. Our aim is to describe how storytelling is used in relation to health democracy, the aims of its use, the methodology adopted and the results obtained. Procedure: We conducted a narrative review of the literature. Our search equation was composed by the keyword “narration” and its variations “récit de vie”, “histoire de vie” and “medécine narrative” and by the keyword “démocratie en santé” / “démocratie sanitaire”. Results: We obtained… More >

  • Open Access

    ARTICLE

    Numerical Analysis of Cold-Formed Thin-Walled Steel Short Columns with Pitting Corrosion during Bridge Construction

    Hongzhang Wang1, Jing Guo1, Shanjun Yang1, Chaoheng Cheng2, Jing Chen3,*, Zhihao Chen3

    Structural Durability & Health Monitoring, Vol.18, No.2, pp. 181-196, 2024, DOI:10.32604/sdhm.2024.044628

    Abstract Pitting corrosion is harmful during bridge construction, which will lead to uneven roughness of steel surfaces and reduce the thickness of steel. Hence, the effect of pitting corrosion on the mechanical properties of cold-formed thin-walled steel stub columns is studied, and the empirical formulas are established through regression fitting to predict the ultimate load of web and flange under pitting corrosion. In detail, the failure modes and load-displacement curves of specimens with different locations, area ratios, and depths are obtained through a large number of non-linear finite element analysis. As for the specimens with pitting corrosion on the web, all… More > Graphic Abstract

    Numerical Analysis of Cold-Formed Thin-Walled Steel Short Columns with Pitting Corrosion during Bridge Construction

Displaying 1-10 on page 1 of 869. Per Page