Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,410)
  • Open Access

    ARTICLE

    Diversity Assessment of an Endemic Carpinus oblongifolia (Betulaceae) Using Specific-Locus Amplified Fragment Sequencing and Implications for Conservation

    Sumei Li, Qing Wang, Peng Wang, Shuan Wang, Rutong Yang, Ya Li*

    Phyton-International Journal of Experimental Botany, Vol.91, No.3, pp. 617-632, 2022, DOI:10.32604/phyton.2022.017741 - 26 October 2021

    Abstract Carpinus oblongifolia is an endemic species and the extant wild populations show a fragmentation distribution in the Baohua Mountain of Jiangsu Province in eastern China. Understanding of genetic diversity plays an important role in C. oblongifolia survival and sustainable development. The wild C. oblongifolia population was artificially divided into four subpopulations according to the microhabitats, and another two subpopulations were constructed by progeny seedlings cultivated with the mature seeds. Then, the leaf buds of 80 individuals from six subpopulations were sampled to develop single nucleotide polymorphisms (SNPs) using specific-locus amplified fragment sequencing (SLAF-seq). Based on these SNPs, we… More >

  • Open Access

    ARTICLE

    Global Lysine Acetylome Analysis of Flower Bud Development in Catalpa bungei

    Danlong Jing1,2, Nan Wang1, Nan Lu1, Guanzheng Qu3, Guolu Liang2, Wenjun Ma1, Shougong Zhang1,*, Junhui Wang1,*

    Phyton-International Journal of Experimental Botany, Vol.91, No.3, pp. 507-524, 2022, DOI:10.32604/phyton.2022.017644 - 26 October 2021

    Abstract Lysine acetylation, a reversible and dynamic post-translational modification, plays pivotal roles in regulating many biological processes in plants. However, the information of lysine acetylation during flower development of woody angiosperm remains unclear. Herein, we identified a total of 667 lysine acetylation sites in 467 proteins in flower buds of Catalpa Bungei. The acetylated proteins were mainly involved in the pathways of carbon metabolism, glycometabolism and oxidative phosphorylation. Using functional enrichment analysis, 61 and 13 acetylated proteins were involved in the glycometabolism and oxidative phosphorylation pathways, respectively. This suggests that lysine acetylated proteins play critical roles in… More >

  • Open Access

    ARTICLE

    A Design Framework for Smart Ration Shop Using Blockchain and IoT Technologies

    D. Malathi1, Vijayakumar Ponnusamy2,*, S. Saravanan3, D. Deepa4, Tariq Ahamed Ahanger5

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 605-619, 2022, DOI:10.32604/iasc.2022.022083 - 26 October 2021

    Abstract The Public Distribution System (PDS) distributes the subsidized food and non-food items to poor populations through fair price shops (FPS). The PDS has been criticized for its urban bias and its failure to serve the underprivileged sections of the community effectively. The Current system manual-based data management and ledger management gives rise to much corruption in the process of extricating the poor from those who are less needy. There are chances for the block market because of the current methodology of data management. This article proposes a blockchain technology-based smart ration shop system that uses More >

  • Open Access

    ARTICLE

    Strengthening Software Make vs. Buy Decision: A Mixed-Method Approach

    Farooq Javeed1, Basit Shahzad2, Asadullah Shaikh3, Mana Saleh Al Reshan3,*, Saba Ahmad1, Hani Alshahrani3, Khairan Rajab3

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 193-205, 2022, DOI:10.32604/iasc.2022.021769 - 26 October 2021

    Abstract Over the past few decades, multiple software development process models, tools, and techniques have been used by practitioners. Despite using these techniques, most software development organizations still fail to meet customer’s needs within time and budget. Time overrun is one of the major reasons for project failure. There is a need to come up with a comprehensive solution that would increase the chances of project success. However, the “make vs. buy” decision can be helpful for “in time” software development. Social media have become a popular platform for discussion of all sorts of topics, so software… More >

  • Open Access

    ARTICLE

    Heart Failure Patient Survival Analysis with Multi Kernel Support Vector Machine

    R. Sujatha1, Jyotir Moy Chatterjee2, NZ Jhanjhi3, Thamer A. Tabbakh4, Zahrah A. Almusaylim5,*

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 115-129, 2022, DOI:10.32604/iasc.2022.019133 - 26 October 2021

    Abstract Heart failure (HF) is an intercontinental pandemic influencing in any event 26 million individuals globally and is expanding in commonness. HF healthiness consumptions are extensive and will increment significantly with a maturing populace. As per the World Health Organization (WHO), Cardiovascular diseases (CVDs) are the major reason for all-inclusive death, taking an expected 17.9 million lives per year. CVDs are a class of issues of the heart, blood vessels and include coronary heart sickness, cerebrovascular illness, rheumatic heart malady, and various other conditions. In the medical care industry, a lot of information is as often… More >

  • Open Access

    ARTICLE

    Modernization Framework to Enhance the Security of Legacy Information Systems

    Musawwer Khan1, Islam Ali1, Wasif Nisar1, Muhammad Qaiser Saleem2, Ali S. Ahmed2, Haysam E. Elamin3, Waqar Mehmood4, Muhammad Shafiq5,*

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 543-555, 2022, DOI:10.32604/iasc.2022.016120 - 26 October 2021

    Abstract Due to various issues such as lack of agility, low performance, security issues, and high maintenance costs, the organization replaces its legacy information system (LIS). However, with the expansion of information technology, the security of the old system has received great attention. The protection of legacy data and information is critical to the organization. However, achieving safety through modernization, redevelopment, or redesign of LIS is a time-consuming and costly solution, especially in small and medium enterprises (SMEs). In addition, newly developed systems often lose inherent business rules, data integrity, and user trust. In this paper,… More >

  • Open Access

    ARTICLE

    Assessment of Reversibility in Pulmonary Hypertension Related to Congenital Heart Disease by Using Biomarkers and Clinical Features

    Liping Wang, Mingjie Zhang, Xi Chen, Yachang Pang, Jiaqi Liu, Zhuoming Xu*

    Congenital Heart Disease, Vol.17, No.1, pp. 87-97, 2022, DOI:10.32604/CHD.2022.018452 - 26 October 2021

    Abstract Background: Reversibility of pulmonary hypertension (PH) is closely related to the treatment options for and prognosis of children with congenital heart disease. Objective: We combined patient-specific clinical features including diagnosis, age and echocardiographic results, and biomarkers of pulmonary vascular dysfunction to explore the noninvasive methods that can be used to accurately evaluate the reversibility of pulmonary hypertension in congenital heart disease (PH-CHD). Methods: Based on the preoperative systolic pulmonary arterial pressure (sPAP), 70 CHD patients were divided into normal, PH-CHD suspected, and confirmed groups. Additionally, biomarkers of circulating endothelial cells (CECs), endothelin-1 (ET-1), and endothelial nitric oxide… More >

  • Open Access

    ARTICLE

    Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol

    S. Gladson Oliver1,*, T. Purusothaman2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 767-780, 2022, DOI:10.32604/csse.2022.020888 - 25 October 2021

    Abstract Internet of things enables every real world objects to be seamlessly integrated with traditional internet. Heterogeneous objects of real world are enhanced with capability to communicate, computing capabilities and standards to interoperate with existing network and these entities are resource constrained and vulnerable to various security attacks. Huge number of research works are being carried out to analyze various possible attacks and to propose standards for securing communication between devices in internet of things (IoT). In this article, a robust and lightweight authentication scheme for mutual authentication between client and server using constrained application protocol… More >

  • Open Access

    ARTICLE

    Healthcare Device Security Assessment through Computational Methodology

    Masood Ahmad1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Sabita Khatri2, Adil Hussain Seh1, Mohd Nadeem1, Alka Agrawal1,*

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 811-828, 2022, DOI:10.32604/csse.2022.020097 - 25 October 2021

    Abstract The current study discusses the different methods used to secure healthcare devices and proposes a quantitative framework to list them in order of significances. The study uses the Hesitant Fuzzy (HF), Analytic Hierarchy Process (AHP) integrated with Fuzzy Technical for Order Preference by Similarities to Ideal Solution (TOPSIS) to classify the best alternatives to security techniques for healthcare devices to securing the devices. The technique is enlisted to rate the alternatives based on the degree of satisfaction of their weights. The ranks of the alternatives consequently decide the order of priority for the techniques. A1… More >

  • Open Access

    ARTICLE

    A Smart Deep Convolutional Neural Network for Real-Time Surface Inspection

    Adriano G. Passos, Tiago Cousseau, Marco A. Luersen*

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 583-593, 2022, DOI:10.32604/csse.2022.020020 - 25 October 2021

    Abstract A proper detection and classification of defects in steel sheets in real time have become a requirement for manufacturing these products, largely used in many industrial sectors. However, computers used in the production line of small to medium size companies, in general, lack performance to attend real-time inspection with high processing demands. In this paper, a smart deep convolutional neural network for using in real-time surface inspection of steel rolling sheets is proposed. The architecture is based on the state-of-the-art SqueezeNet approach, which was originally developed for usage with autonomous vehicles. The main features of More >

Displaying 2011-2020 on page 202 of 3410. Per Page