Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,863)
  • Open Access

    ARTICLE

    A Comparative Analysis of RAD and Agile Technique for Management of Computing Graduation Projects

    Fazal Qudus Khan1, Saim Rasheed1, Maged Alsheshtawi1, Tarig Mohamed Ahmed1, 2, Sadeeq Jan3, *

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 777-796, 2020, DOI:10.32604/cmc.2020.010959

    Abstract Computing students face the problem with time and quality of the work while managing their graduation/senior projects. Rapid Application Development (RAD) model is based on continual user involvement for the process of requirement gathering via prototyping. After each iteration, the developers can validate the requirements that are completed in the iteration. Managing a project with RAD is easier but not flexible. On the other hand, Agile project management techniques focus on flexibility, agility, teamwork and quality based on user stories. Continual user involvement is avoided, which requires extensive maintenance time for fixing iteration and release of the story points. This… More >

  • Open Access

    ARTICLE

    Performance Anomaly Detection in Web Services: An RNN- Based Approach Using Dynamic Quality of Service Features

    Muhammad Hasnain1, Seung Ryul Jeong2, *, Muhammad Fermi Pasha3, Imran Ghani4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 729-752, 2020, DOI:10.32604/cmc.2020.010394

    Abstract Performance anomaly detection is the process of identifying occurrences that do not conform to expected behavior or correlate with other incidents or events in time series data. Anomaly detection has been applied to areas such as fraud detection, intrusion detection systems, and network systems. In this paper, we propose an anomaly detection framework that uses dynamic features of quality of service that are collected in a simulated setup. Three variants of recurrent neural networks-SimpleRNN, long short term memory, and gated recurrent unit are evaluated. The results reveal that the proposed method effectively detects anomalies in web services with high accuracy.… More >

  • Open Access

    ARTICLE

    Intelligent Detection Model Based on a Fully Convolutional Neural Network for Pavement Cracks

    Duo Ma1, 2, 3, Hongyuan Fang1, 2, 3, *, Binghan Xue1, 2, 3, Fuming Wang1, 2, 3, Mohammed A. Msekh4, Chiu Ling Chan5

    CMES-Computer Modeling in Engineering & Sciences, Vol.123, No.3, pp. 1267-1291, 2020, DOI:10.32604/cmes.2020.09122

    Abstract The crack is a common pavement failure problem. A lack of periodic maintenance will result in extending the cracks and damage the pavement, which will affect the normal use of the road. Therefore, it is significant to establish an efficient intelligent identification model for pavement cracks. The neural network is a method of simulating animal nervous systems using gradient descent to predict results by learning a weight matrix. It has been widely used in geotechnical engineering, computer vision, medicine, and other fields. However, there are three major problems in the application of neural networks to crack identification. There are too… More >

  • Open Access

    ARTICLE

    Combined molecular docking, homology modeling and DFT method for the modification of bovine serum albumin (BSA) to improve fluorescence spectroscopy for phthalate acid esters chelated with BSA

    MINGHAO LI1, YOULI QIU2, WENHUI ZHANG1, RUIHAO SUN1, MEIJIN DU1, LUZE YANG3, YU LI1,*

    BIOCELL, Vol.44, No.2, pp. 247-255, 2020, DOI:10.32604/biocell.2020.08835

    Abstract While phthalate acid esters (PAEs) cannot fluoresce alone, they can be detected by fluorescence spectroscopy after chelation with bovine serum albumin (BSA). In this study, the types of amino acid residues at the active site of PAEs chelated with BSA were determined using molecular docking technology. A modification scheme of BSA with higher detection sensitivity fluorescence spectroscopy for PAEs was proposed based on the docking results and constructed for a novel BSA structure with a higher detection sensitivity of fluorescence spectroscopy using a homologous modeling method. Density functional theory (DFT) was employed to explore the influence before and after BSA… More >

  • Open Access

    ARTICLE

    Detection of new antibiotic resistance gene profile in Escherichia coli associated with avian leukosis virus infection from broiler chickens

    HAIFENG WANG1,2,*, JUAN GUO1, LIJING ZHENG1, SHUYING LIU1, ZHERONG WANG1, HONGXUAN HE2

    BIOCELL, Vol.44, No.2, pp. 217-224, 2020, DOI:10.32604/biocell.2020.09051

    Abstract The Escherichia coli (E. coli) is prevailing worldwide, but the epidemiology of E. coli infections feature regional distribution characteristics to some extent. E. coli, as a zoonotic pathogen, can be transferred from animals to humans through food chain or via contact with wounds, causing a public health risk. We reported the swelling of proventriculus and tracheal bleeding following the death in two broiler chickens (Gallus gallus domesticus) from Beijing, China. To investigate whether a virus was involved in the infection, Madin Darby Bovine Kidney (MDCK) cells were co-cultured with supernatants of proventriculus, trachea and spleen homogenates. The avian leucosis virus… More >

  • Open Access

    ARTICLE

    Stenting the vertical ductus arteriosus via axillary artery access using “wire-target” technique

    Tugcin Bora Polat

    Congenital Heart Disease, Vol.12, No.6, pp. 800-807, 2017, DOI:10.1111/chd.12512

    Abstract Objectives: To retrospectively review the outcome of stent placement in neonates with a vertical ductus, present a technique of ductal stenting via the axillary artery and compare it to ductal stening via the femoral venous access.
    Design: Nineteen patients with duct-dependent pulmonary circulations through a vertical ductus arteriosus were treated with stent implantation. Those patients were retrospectively included in the study. In the first nine of these cases, stent delivery was done transvenously. In the latter ten cases, we favored the axillary artery access to the transvenous approach for stenting the vertical ductus arteriosus. Wire-target technique was used to attain… More >

  • Open Access

    ARTICLE

    Angiographically detectable Thebesian veins are a dynamic and reversible finding in the setting of congenital heart disease

    Paul Tannous1,2, Sunil J Ghelani1,2, Audrey C Marshall1,2, Diego Porras1,2

    Congenital Heart Disease, Vol.12, No.4, pp. 467-474, 2017, DOI:10.1111/chd.12457

    Abstract Objective: Angiographically detectable Thebesian veins (ThVs) are a rare finding sometimes associated with coronary steal and myocardial ischemia in adults, but there are limited data regarding prominent ThVs in the setting of complex congenital heart disease (CHD). This study represents the largest series to date describing the presence and temporal changes of angiographically detectable ThVs in children with CHD.
    Methods: This is a single center case series describing the clinical characteristics and coronary anatomy in children with CHD and angiographicall detectable ThVs. After identification of the index case, additional patients were identified in a prospective manner during the course of… More >

  • Open Access

    ARTICLE

    Single Failure Routing Protection Algorithm in the Hybrid SDN Network

    Haijun Geng1, Jiangyuan Yao2, *, Yangyang Zhang3

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 665-679, 2020, DOI:10.32604/cmc.2020.09912

    Abstract Loop free alternate (LFA) is a routing protection scheme that is currently deployed in commercial routers. However, LFA cannot handle all single network component failure scenarios in traditional networks. As Internet service providers have begun to deploy software defined network (SDN) technology, the Internet will be in a hybrid SDN network where traditional and SDN devices coexist for a long time. Therefore, this study aims to deploy the LFA scheme in hybrid SDN network architecture to handle all possible single network component failure scenarios. First, the deployment of LFA scheme in a hybrid SDN network is described as a 0-1… More >

  • Open Access

    ARTICLE

    Fine-Grained Binary Analysis Method for Privacy Leakage Detection on the Cloud Platform

    Jiaye Pan1, Yi Zhuang1, *, Xinwen Hu1, 2, Wenbing Zhao3

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 607-622, 2020, DOI:10.32604/cmc.2020.09853

    Abstract Nowadays cloud architecture is widely applied on the internet. New malware aiming at the privacy data stealing or crypto currency mining is threatening the security of cloud platforms. In view of the problems with existing application behavior monitoring methods such as coarse-grained analysis, high performance overhead and lack of applicability, this paper proposes a new fine-grained binary program monitoring and analysis method based on multiple system level components, which is used to detect the possible privacy leakage of applications installed on cloud platforms. It can be used online in cloud platform environments for fine-grained automated analysis of target programs, ensuring… More >

  • Open Access

    ARTICLE

    Generalized Array Architecture with Multiple Sub-Arrays and Hole-Repair Algorithm for DOA Estimation

    Sheng Liu1, *, Hailin Cao2, Decheng Wu2, Xiyuan Chen3

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 589-605, 2020, DOI:10.32604/cmc.2020.09964

    Abstract Arranging multiple identical sub-arrays in a special way can enhance degrees of freedom (DOFs) and obtain a hole-free difference co-array (DCA). In this paper, by adjusting the interval of adjacent sub-arrays, a kind of generalized array architecture with larger aperture is proposed. Although some holes may exist in the DCA of the proposed array, they are distributed uniformly. Utilizing the partial continuity of the DCA, an extended covariance matrix can be constructed. Singular value decomposition (SVD) is used to obtain an extended signal sub-space, by which the direction-of-arrival (DOA) estimation algorithm for quasi-stationary signals is given. In order to eliminating… More >

Displaying 2421-2430 on page 243 of 2863. Per Page