Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (911)
  • Open Access

    ARTICLE

    The Impact of a Prior Norwood Procedure on Cardiac Transplantation in Failed Fontan Physiology

    Ryan G. McQueen1, Nikki M. Singh2, Ronald K. Woods3,*

    Congenital Heart Disease, Vol.19, No.3, pp. 257-266, 2024, DOI:10.32604/chd.2024.052108

    Abstract Objective: The objective of this study was to compare cardiac transplant operative and postoperative courses of patients with failed Fontan physiology who were initially palliated with a Norwood (FFN) to those without a prior Norwood (FF). Methods: A single-institution retrospective review of all patients with Fontan failure who underwent cardiac transplantation from 2003–2021 was completed—22 underwent prior Norwood (FFN) and 11 did not (FF). Descriptive and inferential statistics were calculated for operative course and patient outcomes. Results: The operative course of the FFN cohort appeared to be more complex (not statistically significant, but clinically relevant)—this group… More >

  • Open Access

    ARTICLE

    Numerical Simulation-Based Analysis of the Impact of Overloading on Segmentally Assembled Bridges

    Donghui Ma1, Wenqi Wu2, Yuan Li1, Lun Zhao1, Yingchun Cai2,*, Pan Guo2,*, Shaolin Yang2

    Structural Durability & Health Monitoring, Vol.18, No.5, pp. 663-681, 2024, DOI:10.32604/sdhm.2024.052677

    Abstract Segmentally assembled bridges are increasingly finding engineering applications in recent years due to their unique advantages, especially as urban viaducts. Vehicle loads are one of the most important variable loads acting on bridge structures. Accordingly, the influence of overloaded vehicles on existing assembled bridge structures is an urgent concern at present. This paper establishes the finite element model of the segmentally assembled bridge based on ABAQUS software and analyzes the influence of vehicle overload on an assembled girder bridge structure. First, a finite element model corresponding to the target bridge is established based on ABAQUS… More >

  • Open Access

    ARTICLE

    Coupled CFD-DEM Numerical Simulation of the Interaction of a Flow-Transported Rag with a Solid Cylinder

    Yun Ren1,*, Lianzheng Zhao2, Xiaofan Mo2, Shuihua Zheng2, Youdong Yang1

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.7, pp. 1593-1609, 2024, DOI:10.32604/fdmp.2024.046274

    Abstract A coupled Computational Fluid Dynamics-Discrete Element Method (CFD-DEM) approach is used to calculate the interaction of a flexible rag transported by a fluid current with a fixed solid cylinder. More specifically a hybrid Eulerian-Lagrangian approach is used with the rag being modeled as a set of interconnected particles. The influence of various parameters is considered, namely the inlet velocity (1.5, 2.0, and 2.5 m/s, respectively), the angle formed by the initially straight rag with the flow direction (45°, 60° and 90°, respectively), and the inlet position (90, 100, and 110 mm, respectively). The results show More > Graphic Abstract

    Coupled CFD-DEM Numerical Simulation of the Interaction of a Flow-Transported Rag with a Solid Cylinder

  • Open Access

    ARTICLE

    KGTLIR: An Air Target Intention Recognition Model Based on Knowledge Graph and Deep Learning

    Bo Cao1,*, Qinghua Xing2, Longyue Li2, Huaixi Xing1, Zhanfu Song1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1251-1275, 2024, DOI:10.32604/cmc.2024.052842

    Abstract As a core part of battlefield situational awareness, air target intention recognition plays an important role in modern air operations. Aiming at the problems of insufficient feature extraction and misclassification in intention recognition, this paper designs an air target intention recognition method (KGTLIR) based on Knowledge Graph and Deep Learning. Firstly, the intention recognition model based on Deep Learning is constructed to mine the temporal relationship of intention features using dilated causal convolution and the spatial relationship of intention features using a graph attention mechanism. Meanwhile, the accuracy, recall, and F1-score after iteration are introduced More >

  • Open Access

    ARTICLE

    A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles

    Feng Zhao1, Hongtao Ding2, Chunhai Li1,*, Zhaoyu Su2, Guoling Liang2, Changsong Yang3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 567-585, 2024, DOI:10.32604/cmc.2024.052233

    Abstract The Internet of Vehicles (IoV) is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network. However, due to the open and variable nature of its network topology, vehicles frequently engage in cross-domain interactions. During such processes, directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers, thus compromising the security of the cross-domain authentication process. Additionally, IoV imposes high real-time requirements, and existing cross-domain authentication schemes for IoV often encounter efficiency issues. To mitigate More >

  • Open Access

    ARTICLE

    Knowledge Reasoning Method Based on Deep Transfer Reinforcement Learning: DTRLpath

    Shiming Lin1,2,3, Ling Ye2, Yijie Zhuang1, Lingyun Lu2,*, Shaoqiu Zheng2,*, Chenxi Huang1, Ng Yin Kwee4

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 299-317, 2024, DOI:10.32604/cmc.2024.051379

    Abstract In recent years, with the continuous development of deep learning and knowledge graph reasoning methods, more and more researchers have shown great interest in improving knowledge graph reasoning methods by inferring missing facts through reasoning. By searching paths on the knowledge graph and making fact and link predictions based on these paths, deep learning-based Reinforcement Learning (RL) agents can demonstrate good performance and interpretability. Therefore, deep reinforcement learning-based knowledge reasoning methods have rapidly emerged in recent years and have become a hot research topic. However, even in a small and fixed knowledge graph reasoning action… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Information Fusion Technique for Device to Server-Enabled Communication in the Internet of Things: A Hybrid Approach

    Amal Al-Rasheed1, Rahim Khan2,3,*, Tahani Alsaed4, Mahwish Kundi2,5, Mohamad Hanif Md. Saad6, Mahidur R. Sarker7,8

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1305-1323, 2024, DOI:10.32604/cmc.2024.049215

    Abstract Due to the overwhelming characteristics of the Internet of Things (IoT) and its adoption in approximately every aspect of our lives, the concept of individual devices’ privacy has gained prominent attention from both customers, i.e., people, and industries as wearable devices collect sensitive information about patients (both admitted and outdoor) in smart healthcare infrastructures. In addition to privacy, outliers or noise are among the crucial issues, which are directly correlated with IoT infrastructures, as most member devices are resource-limited and could generate or transmit false data that is required to be refined before processing, i.e.,… More >

  • Open Access

    ARTICLE

    MADDPG-D2: An Intelligent Dynamic Task Allocation Algorithm Based on Multi-Agent Architecture Driven by Prior Knowledge

    Tengda Li, Gang Wang, Qiang Fu*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2559-2586, 2024, DOI:10.32604/cmes.2024.052039

    Abstract Aiming at the problems of low solution accuracy and high decision pressure when facing large-scale dynamic task allocation (DTA) and high-dimensional decision space with single agent, this paper combines the deep reinforcement learning (DRL) theory and an improved Multi-Agent Deep Deterministic Policy Gradient (MADDPG-D2) algorithm with a dual experience replay pool and a dual noise based on multi-agent architecture is proposed to improve the efficiency of DTA. The algorithm is based on the traditional Multi-Agent Deep Deterministic Policy Gradient (MADDPG) algorithm, and considers the introduction of a double noise mechanism to increase the action exploration… More >

  • Open Access

    ARTICLE

    Effect of Light Emitting Diodes (LEDs) on Growth, Mineral Composition, and Nutritional Value of Wheat & Lentil Sprouts

    Abdul Momin1, Amana Khatoon1,*, Wajahat Khan1, Dilsat Bozdoğan Konuşkan2, Muhammad Mudasar Aslam3, Muhammad Jamil4, Shafiq Ur Rehman5, Baber Ali6, Alevcan Kaplan7, Sana Wahab8, Muhammad Nauman Khan9,*, Sezai Ercisli10,11, Mohammad Khalid Al-Sadoon12

    Phyton-International Journal of Experimental Botany, Vol.93, No.6, pp. 1117-1128, 2024, DOI:10.32604/phyton.2024.048994

    Abstract Sprouts are ready-to-eat and are recognized worldwide as functional components of the human diet. Recent advances in innovative agricultural techniques could enable an increase in the production of healthy food. The use of light-emitting diode (LED) in indoor agricultural production could alter the biological feedback loop, increasing the functional benefits of plant foods such as wheat and lentil sprouts and promoting the bioavailability of nutrients. The effects of white (W), red (R), and blue (B) light were investigated on the growth parameters and nutritional value of wheat and lentil sprouts. In the laboratory, seeds were… More >

  • Open Access

    ARTICLE

    Frilled Lizard Optimization: A Novel Bio-Inspired Optimizer for Solving Engineering Applications

    Ibraheem Abu Falahah1, Osama Al-Baik2, Saleh Alomari3, Gulnara Bektemyssova4, Saikat Gochhait5,6, Irina Leonova7, Om Parkash Malik8, Frank Werner9,*, Mohammad Dehghani10

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3631-3678, 2024, DOI:10.32604/cmc.2024.053189

    Abstract This research presents a novel nature-inspired metaheuristic algorithm called Frilled Lizard Optimization (FLO), which emulates the unique hunting behavior of frilled lizards in their natural habitat. FLO draws its inspiration from the sit-and-wait hunting strategy of these lizards. The algorithm’s core principles are meticulously detailed and mathematically structured into two distinct phases: (i) an exploration phase, which mimics the lizard’s sudden attack on its prey, and (ii) an exploitation phase, which simulates the lizard’s retreat to the treetops after feeding. To assess FLO’s efficacy in addressing optimization problems, its performance is rigorously tested on fifty-two… More >

Displaying 1-10 on page 1 of 911. Per Page