Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (165)
  • Open Access

    ARTICLE

    A Novel Image Categorization Strategy Based on Salp Swarm Algorithm to Enhance Efficiency of MRI Images

    Mohammad Behrouzian Nejad1, Mohammad Ebrahim Shiri Ahmadabadi1, 2, *

    CMES-Computer Modeling in Engineering & Sciences, Vol.119, No.1, pp. 185-205, 2019, DOI:10.32604/cmes.2019.01838

    Abstract The main target of this paper is presentation of an efficient method for MRI images classification so that it can be used to diagnose patients and non-patients. Image classification is one of the prominent subset topics of machine learning and data mining that the most important image technique is the auto-categorization of images. MRI images with high resolution and appropriate accuracy allow physicians to decide on the diagnosis of various diseases and treat them. The auto categorization of MRI images toward diagnosing brain diseases has been being used to accurately diagnose hospitals, clinics, physicians and… More >

  • Open Access

    ARTICLE

    Online Burst Events Detection Oriented Real-Time Microblog Message Stream

    Guozhong Dong1,2,*, Jun Gao3, Liang Huang4, Chunlei Shi1

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 213-225, 2019, DOI:10.32604/cmc.2019.05601

    Abstract The rapid spread of microblog messages and sensitivity of unexpected events make microblog become the public opinion center of burst events. Online burst events detection oriented real-time microblog message stream has become an important research problem in the field of microblog public opinion. Because of the large amount of real-time microblog message stream and irregular language of microblog message, it is important to process real-time microblog message stream and detect burst events accurately. In this paper, an online burst events detection framework is proposed. In this framework, abnormal messages are detected based on sliding time More >

  • Open Access

    ARTICLE

    Message Authentication with a New Quantum Hash Function

    Yalan Wang1,2, Yuling Chen1,*, Haseeb Ahmad3, Zhanhong Wei4

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 635-648, 2019, DOI:10.32604/cmc.2019.05251

    Abstract To ensure the security during the communication, we often adopt different ways to encrypt the messages to resist various attacks. However, with the computing power improving, the existing encryption and authentication schemes are being faced with big challenges. We take the message authentication as an example into a careful consideration. Then, we proposed a new message authentication scheme with the Advanced Encryption Standard as the encryption function and the new quantum Hash function as the authentication function. Firstly, the Advanced Encryption Standard algorithm is used to encrypt the result of the initial message cascading the… More >

  • Open Access

    ARTICLE

    Smart Security Framework for Educational Institutions Using Internet of Things (IoT)

    Afzal Badshah1, Anwar Ghani1, Muhammad Ahsan Qureshi2, Shahaboddin Shamshirband,3,4,*

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 81-101, 2019, DOI:10.32604/cmc.2019.06288

    Abstract Educational institutions are soft targets for the terrorist with massive and defenseless people. In the recent past, numbers of such attacks have been executed around the world. Conducting research, in order to provide a secure environment to the educational institutions is a challenging task. This effort is motivated by recent assaults, made at Army Public School Peshawar, following another attack at Charsada University, Khyber Pukhtun Khwa, Pakistan and also the Santa Fe High School Texas, USA massacre. This study uses the basic technologies of edge computing, cloud computing and IoT to design a smart emergency… More >

  • Open Access

    ORIGINAL ARTICLE

    Assessment of an ultra-sensitive IFNγ immunoassay prototype for latent tuberculosis diagnosis

    Elyes Ben Salah1, Karim Dorgham1, Mylène Lesénéchal2, Camille Pease2, Laure Allard2, Céline Dragonetti2, Guy Gorochov1, Amélie Guihot1, Delphine Sterlin1

    European Cytokine Network, Vol.29, No.4, pp. 136-145, 2018, DOI:10.1684/ecn.2018.0417

    Abstract Worldwide there are about 1.7 billion individuals with latent tuberculosis infection (LTBI) and only 5% to 15% will develop active tuberculosis (TB). It is recommended to treat only those most at risk of develop ing active TB to avoid problems of drug resistance. LTBI diagnosis involves reviewing the individual’s medical history, physical examination, and biological tests. Interferon gamma release assays (IGRA) can yield “undetermi nate” or “uncertain” results, which makes clinical management decisions difficult. We assessed an ultra-sensitive immunoassay prototype based on single molecule array (SiMoA) technology to evaluate its overall performance, and in particular,… More >

  • Open Access

    ARTICLE

    Is pelvic lymph node dissection necessary in patients with biopsy proven Gleason 6 prostate cancer? – analysis of the SEER database

    Michael Daugherty, Dillon Sedaghatpour, Gennady Bratslavsky, Oleg Shapiro

    Canadian Journal of Urology, Vol.25, No.4, pp. 9414-9420, 2018

    Abstract Introduction: Since the advent of prostate-specific antigen (PSA) screening there has been a decreased incidence of lymph node positive disease (LND). Nevertheless, because of possible upgrading, LND is frequently performed with preoperative Gleason 6 prostate cancer. We utilized the Surveillance Epidemiology and End Results (SEER) database to evaluate the frequency of LND and preoperative variables for node positivity in contemporary patients with preoperative Gleason 6 disease.
    Materials and methods: SEER-18 registries database was queried for all patients diagnosed with prostate cancer between the years 2010 and 2014. Patients were excluded that had unknown histology or unknown preoperative… More >

  • Open Access

    ARTICLE

    Outcomes of a urethroplasty algorithm for fossa navicularis strictures

    Mark Broadwin1, Alex J. Vanni2

    Canadian Journal of Urology, Vol.25, No.6, pp. 9591-9595, 2018

    Abstract Introduction: There is no standardized treatment algorithm for isolated fossa navicularis strictures and treatment modality often falls to surgeon preference. We evaluated the outcomes of a standardized algorithm for fossa navicularis strictures based on stricture etiology, lumen size, and glans size to minimize the number of patients requiring a two-stage urethral reconstruction.
    Materials and methods: We retrospectively reviewed a prospectively maintained urethral reconstruction database by a single surgeon from 2011-2018. A treatment algorithm was applied and patients underwent one of three treatment modalities: a two-stage buccal mucosa graft (BMG), a single-stage dorsal inlay BMG, or a single-stage… More >

  • Open Access

    ARTICLE

    Automatic FIBEX Generation for Migration from CAN Message Description Format to Flexray Fibex Format

    Young Hun Songa, Suk Leea, Kyoung Nam Hab, Kyung Chang Leec

    Intelligent Automation & Soft Computing, Vol.24, No.4, pp. 683-691, 2018, DOI:10.1080/10798587.2017.1302712

    Abstract Recently, FlexRay was developed to replace the controller area network (CAN) protocol in the chassis network systems to provide high-speed data transmission as well as hardware redundancy for safety. However, FlexRay network design is more complicated than with CAN protocol, which has been an in-vehicle network (IVN) standard for car manufacturers for decades, because the FlexRay has many parameters such as the base cycle or slot lengths. To simplify the FlexRay network design and assist vehicle network designers in configuring a FlexRay network, this paper presents an automatic field bus exchange format (FIBEX) generation method More >

  • Open Access

    ARTICLE

    The Research of Address Message of an Unknown Single Protocol Data Frame

    Zheng Jiea,b, Li Jianpinga

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 139-144, 2018, DOI:10.1080/10798587.2016.1267445

    Abstract Network protocols are sets of standards for certain network communications. The identification and analysis of network protocol are of significance to network management and security. There are various technologies of protocol identification, but in the process of identification protocols, in order to simplify the identification process and improve the efficiency of protocol identification, unknown mixed multi-protocol needs to be separated into single protocol so as to make further identification. This paper presents an efficient method to determine the single protocol address message based on the previous research of separating unknown mixed data frame into single More >

  • Open Access

    ARTICLE

    Appropriateness of pediatric outpatient transthoracic echocardiogram orders following cessation of an active educational intervention

    Shae Anderson1,2, Courtney E. McCracken2, Ritu Sachdeva1,2

    Congenital Heart Disease, Vol.13, No.6, pp. 1050-1057, 2018, DOI:10.1111/chd.12679

    Abstract Objective: The educational intervention (EI) through the Pediatric Appropriate Use of Echocardiography (PAUSE) multicenter study resulted in improved appropriate‐ ness of transthoracic echocardiogram (TTE) orders at our center. The current study evaluated if this pattern persisted after cessation of EI and the potential physician characteristics influencing appropriateness.
    Design: Outpatients (≤18 years old) seen for initial evaluation during the EI (July to October, 2015) and 6‐month post‐EI (May to August, 2016) phases were included. Comparison was made between TTE rates and appropriateness ratings during EI and post‐EI phase. Association between TTE rate and appropriateness with physician characteristics (age,… More >

Displaying 121-130 on page 13 of 165. Per Page