Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (87)
  • Open Access

    ARTICLE

    The Effect of Posterior Pedicle Screws Biomechanical Fixation for Thoracolumbar Burst Fracture

    Baogang Tian1, Yang Shao1, Zhijiong Wang1, Jian Li2,*

    Molecular & Cellular Biomechanics, Vol.14, No.3, pp. 187-194, 2017, DOI:10.3970/mcb.2017.014.187

    Abstract The purpose of this study was to explore the clinical efficacy and safety of posterior pedicle screw fixation in the treatment of thoracolumbar burst fracture. A total of 120 patients with thoracolumbar burst fractures were selected from January 2014 to December 2016. 60 patients were divided into the study group, and 60 patients were as the control group. The patients in the study group were treated with posterior pedicle screw fixation. The control group was treated with posterior non-traumatic pedicle screw fixation. After treatment, there were six months follow up. The clinical indexes, complications, and the anterior aspect height ratio,… More >

  • Open Access

    ARTICLE

    Ambarzumyan Type Theorem For a Matrix Valued Quadratic Sturm-Liouville Problem

    Emrah Yilmaz1, Hikmet Koyunbakan2

    CMES-Computer Modeling in Engineering & Sciences, Vol.99, No.6, pp. 463-471, 2014, DOI:10.3970/cmes.2014.099.463

    Abstract In this study, Ambarzumyan’s theorem for quadratic Sturm-Liouville problem is extended to second order differential systems of dimension d ≥ 2. It is shown that if the spectrum is the same as the spectrum belonging to the zero potential, then the matrix valued functions both P(x) and Q(x) are zero by imposing a condition on P(x). In scaler case, this problem was solved in [Koyunbakan, Lesnic and Panakhov (2013)]. More >

  • Open Access

    ARTICLE

    Design Evaluation of a Particle Bombardment System Used to Deliver Substances into Cells

    Eduardo M. B. Campello1,2, Tarek I. Zohdi3

    CMES-Computer Modeling in Engineering & Sciences, Vol.98, No.2, pp. 221-245, 2014, DOI:10.3970/cmes.2014.098.221

    Abstract This work deals with the bombardment of a stream of particles possessing varying mean particle size, velocity and aspect ratio into a cell that has fixed (known) compliance characteristics. The particles are intended to penetrate the cell membrane causing zero or minimum damage and deliver foreign substances (which are attached to their surfaces) to the interior of the cell. We adopt a particle-based (discrete element method) computational model that has been recently developed by the authors to describe both the incoming stream of particles and the cell membrane. By means of parametric numerical simulations, treating the stream’s mean particle size,… More >

  • Open Access

    ARTICLE

    Kinematic Analysis of Lumbar Spine Undergoing Extension and Dynamic Neural Foramina Cross Section Measurement

    Yongjie Zhang1, Boyle C. Cheng2, Changho Oh1, Jessica L. Spehar2, James Burgess3

    CMES-Computer Modeling in Engineering & Sciences, Vol.29, No.2, pp. 55-62, 2008, DOI:10.3970/cmes.2008.029.055

    Abstract The spinal column plays a vital biomechanical role in the human body by providing structural support and facilitating motion. As degenerative changes occur in the spine, surgical treatment may be necessary in certain instances. Such treatments seek to address pain, frequently through the restriction of spinal motion. Traditional spinal implant devices are designed to restrict the motion of a functional spinal unit (FSU) but newer device designs allow for semi-constrained motion such as spinal arthroplasty devices. In this study, a sequence of fluoroscopic imaging data was recorded during the flexibility protocol with an interspinous process spacer device placed at L2-L3.… More >

  • Open Access

    ARTICLE

    Credit Card Fraud Detection Based on Machine Learning

    Yong Fang1, Yunyun Zhang2, Cheng Huang1,*

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 185-195, 2019, DOI:10.32604/cmc.2019.06144

    Abstract In recent years, the rapid development of e-commerce exposes great vulnerabilities in online transactions for fraudsters to exploit. Credit card transactions take a salient role in nowadays’ online transactions for its obvious advantages including discounts and earning credit card points. So credit card fraudulence has become a target of concern. In order to deal with the situation, credit card fraud detection based on machine learning is been studied recently. Yet, it is difficult to detect fraudulent transactions due to data imbalance (normal and fraudulent transactions), for which Smote algorithm is proposed in order to resolve data imbalance. The assessment of… More >

  • Open Access

    ARTICLE

    Distant Supervised Relation Extraction with Cost-Sensitive Loss

    Daojian Zeng1,2, Yao Xiao1,2, Jin Wang2,*, Yuan Dai1,2, Arun Kumar Sangaiah3

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1251-1261, 2019, DOI:10.32604/cmc.2019.06100

    Abstract Recently, many researchers have concentrated on distant supervision relation extraction (DSRE). DSRE has solved the problem of the lack of data for supervised learning, however, the data automatically labeled by DSRE has a serious problem, which is class imbalance. The data from the majority class obviously dominates the dataset, in this case, most neural network classifiers will have a strong bias towards the majority class, so they cannot correctly classify the minority class. Studies have shown that the degree of separability between classes greatly determines the performance of imbalanced data. Therefore, in this paper we propose a novel model, which… More >

  • Open Access

    ARTICLE

    Using Imbalanced Triangle Synthetic Data for Machine Learning Anomaly Detection

    Menghua Luo1,2, Ke Wang1, Zhiping Cai1,*, Anfeng Liu3, Yangyang Li4, Chak Fong Cheang5

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 15-26, 2019, DOI:10.32604/cmc.2019.03708

    Abstract The extreme imbalanced data problem is the core issue in anomaly detection. The amount of abnormal data is so small that we cannot get adequate information to analyze it. The mainstream methods focus on taking fully advantages of the normal data, of which the discrimination method is that the data not belonging to normal data distribution is the anomaly. From the view of data science, we concentrate on the abnormal data and generate artificial abnormal samples by machine learning method. In this kind of technologies, Synthetic Minority Over-sampling Technique and its improved algorithms are representative milestones, which generate synthetic examples… More >

Displaying 81-90 on page 9 of 87. Per Page