Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (494)
  • Open Access

    ARTICLE

    Comprehensive Network Analysis of Different Subtypes of Molecular Disorders in Lung Cancer

    Haoliang Zhang1,*, Xiaowei Xing2, Yang Liu1, Shuangli Li1, Weiyuan Li3

    Oncologie, Vol.22, No.2, pp. 107-116, 2020, DOI:10.32604/oncologie.2020.012494

    Abstract Lung cancer is the leading cause of death in cancer patients. Based on a modular and comprehensive analysis method, it is intended to identify their common pathogenesis. We downloaded data and analyzed differences in lung adenocarcinoma samples, lung squamous cell carcinoma samples, and normal samples. Co-expression analysis, enrichment analysis, and hypergeometric testing were used to predict transcription factors, ncRNAs, and retrospective target genes. We get 4596 differentially expressed genes in common differences in high multiples and clustered into 14 modules dysfunction. The 14 genes (including DOK2, COL5A1, and TSPAN8) have the highest connectivity in the dysfunction module and are identified… More >

  • Open Access

    ARTICLE

    Proportional Fairness-Based Power Allocation Algorithm for Downlink NOMA 5G Wireless Networks

    Jianzhong Li1, DexiangMei1, Dong Deng1, Imran Khan2, Peerapong Uthansakul3, *

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1571-1590, 2020, DOI:10.32604/cmc.2020.011822

    Abstract Non-orthogonal multiple access (NOMA) is one of the key 5G technology which can improve spectrum efficiency and increase the number of user connections by utilizing the resources in a non-orthogonal manner. NOMA allows multiple terminals to share the same resource unit at the same time. The receiver usually needs to configure successive interference cancellation (SIC). The receiver eliminates co-channel interference (CCI) between users and it can significantly improve the system throughput. In order to meet the demands of users and improve fairness among them, this paper proposes a new power allocation scheme. The objective is to maximize user fairness by… More >

  • Open Access

    ARTICLE

    The Design and Implementation of a Multidimensional and Hierarchical Web Anomaly Detection System

    Jianfeng Guan*, Jiawei Li, Zhongbai Jiang

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 131-141, 2019, DOI:10.31209/2018.100000050

    Abstract The traditional web anomaly detection systems face the challenges derived from the constantly evolving of the web malicious attacks, which therefore result in high false positive rate, poor adaptability, easy over-fitting, and high time complexity. Due to these limitations, we need a new anomaly detection system to satisfy the requirements of enterprise-level anomaly detection. There are lots of anomaly detection systems designed for different application domains. However, as for web anomaly detection, it has to describe the network accessing behaviours characters from as many dimensions as possible to improve the performance. In this paper we design and implement a Multidimensional… More >

  • Open Access

    ARTICLE

    Diagnostic Performance of Serum miR-586 and miR-493 in Patients with Osteosarcoma

    Hao Dang*

    Oncologie, Vol.22, No.1, pp. 35-42, 2020, DOI:10.32604/oncologie.2020.012485

    Abstract This study aimed to explore the expression and diagnostic performance of miR-586 and miR-493 in patients with osteosarcoma. We enrolled 63 patients with osteosarcoma treated between May 2016 and May 2019 as the experimental group and 55 healthy volunteers who underwent physical examination during the same period as the control group. We detected miR-586 and miR-493 expression in serum, normal bone tissue, and tumor samples. We also evaluated the relationship between clinical indicators and the miR-586 and miR-493 expression levels. The correlation between the serum and osteosarcoma tissue expression of miR-586 and miR-493 was examined by Pearson analysis. Furthermore, the… More >

  • Open Access

    ARTICLE

    Sinomenium Inhibits the Viability of Hepatoma Carcinoma Cells through Activating IFNA2

    Jingjing He1,2, Lingyi Zhang2, Dan Guo3, Xingwen Han4, Hui Zhang5, Liang Wang2, Youcheng Zhang1,*

    Oncologie, Vol.22, No.1, pp. 1-12, 2020, DOI:10.32604/oncologie.2020.012436

    Abstract Hepatocellular carcinoma (HCC) ranks the sixth place of most common cancers. Meanwhile, it is the tertiary mortality cause of cancer. There is no effective therapeutic method to prevent and treat the liver cancer. Sinomenine is a kind of Chinese traditional medicine herbal, it is reported that it can inhibit the viability of several cancer cells. The study is to explore whether sinomenine is also able to inhibit the cell viability of HCC and its potential mechanism. The IC50 of sinomenine in BEL-7402 cells was 5.351 mmol/L, and the IC50 of sinomenine in SMMC-7721 cells was 6.204 mmol/L. The gene expression… More >

  • Open Access

    ARTICLE

    Generalized Model of Blood Flow in a Vertical Tube with Suspension of Gold Nanomaterials: Applications in the Cancer Therapy

    Anees Imtiaz1, Oi-Mean Foong2, Aamina Aamina1, Nabeel Khan1, Farhad Ali3, 4, *, Ilyas Khan5

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 171-192, 2020, DOI:10.32604/cmc.2020.011397

    Abstract Gold metallic nanoparticles are generally used within a lab as a tracer, to uncover on the presence of specific proteins or DNA in a sample, as well as for the recognition of various antibiotics. They are bio companionable and have properties to carry thermal energy to tumor cells by utilizing different clinical approaches. As the cancer cells are very smaller so for the infiltration, the properly sized nanoparticles have been injected in the blood. For this reason, gold nanoparticles are very effective. Keeping in mind the above applications, in the present work a generalized model of blood flow containing gold… More >

  • Open Access

    ARTICLE

    Long Term Follow-Up of Ebstein’s Anomaly—What to Expect in Adult Life?

    Tânia Branco Mano1,*, João Ferreira Reis1, Ana Figueiredo Agapito1, André Monteiro1, Mário Oliveira1, Luísa Moura Branco1, José Fragata2, Fátima Pinto3, Rui Cruz Ferreira1, Lídia de Sousa1

    Congenital Heart Disease, Vol.15, No.3, pp. 153-162, 2020, DOI:10.32604/CHD.2020.011500

    Abstract Introduction: Due to the low prevalence and wide variation of severity of Ebstein’s Anomaly (EA), long-term follow-up data are scarce. The aim was to evaluate the long-term outcome of an adult population with EA. Methods: Retrospective analysis of EA adults followed in the past 42 years in a tertiary congenital heart disease outpatient clinic. Predictors of complications and mortality were assessed. Results: We studied 53 patients: 53% females, mean age 46 ± 19 years, 36% cyanotic, 55% diagnosed at adult age. Tricuspid regurgitation was moderate or severe in 33% and 46%, respectively, and during follow-up (mean 12 ± 10… More >

  • Open Access

    ARTICLE

    Anomaly IoT Node Detection Based on Local Outlier Factor and Time Series

    Fang Wang1, *, Zhe Wei1, Xu Zuo2

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1063-1073, 2020, DOI:10.32604/cmc.2020.09774

    Abstract The heterogeneous nodes in the Internet of Things (IoT) are relatively weak in the computing power and storage capacity. Therefore, traditional algorithms of network security are not suitable for the IoT. Once these nodes alternate between normal behavior and anomaly behavior, it is difficult to identify and isolate them by the network system in a short time, thus the data transmission accuracy and the integrity of the network function will be affected negatively. Based on the characteristics of IoT, a lightweight local outlier factor detection method is used for node detection. In order to further determine whether the nodes are… More >

  • Open Access

    ARTICLE

    Performance Anomaly Detection in Web Services: An RNN- Based Approach Using Dynamic Quality of Service Features

    Muhammad Hasnain1, Seung Ryul Jeong2, *, Muhammad Fermi Pasha3, Imran Ghani4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 729-752, 2020, DOI:10.32604/cmc.2020.010394

    Abstract Performance anomaly detection is the process of identifying occurrences that do not conform to expected behavior or correlate with other incidents or events in time series data. Anomaly detection has been applied to areas such as fraud detection, intrusion detection systems, and network systems. In this paper, we propose an anomaly detection framework that uses dynamic features of quality of service that are collected in a simulated setup. Three variants of recurrent neural networks-SimpleRNN, long short term memory, and gated recurrent unit are evaluated. The results reveal that the proposed method effectively detects anomalies in web services with high accuracy.… More >

  • Open Access

    ARTICLE

    Surgical treatment of anomalous left main coronary artery with an intraconal course

    Richard D. Mainwaring, Frank L. Hanley

    Congenital Heart Disease, Vol.14, No.4, pp. 504-510, 2019, DOI:10.1111/chd.12826

    Abstract Objective: Anomalous left main coronary artery (LMCA) with an intraconal course is a relatively rare form of anomalous aortic origin of a coronary artery (AAOCA) from the wrong sinus of Valsalva. There is currently a paucity of information regarding this entity. The purpose of this article is to review our surgical experience with repair of anomalous LMCA with an intraconal course.
    Methods: This was a retrospective review of 12 patients with an anomalous LMCA and an intraconal course who underwent surgical repair. The median age at surgery was 15 years (range 2‐47). The seven oldest patients all had preoperative symptoms… More >

Displaying 421-430 on page 43 of 494. Per Page