Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,889)
  • Open Access

    ARTICLE

    Detection of new antibiotic resistance gene profile in Escherichia coli associated with avian leukosis virus infection from broiler chickens

    HAIFENG WANG1,2,*, JUAN GUO1, LIJING ZHENG1, SHUYING LIU1, ZHERONG WANG1, HONGXUAN HE2

    BIOCELL, Vol.44, No.2, pp. 217-224, 2020, DOI:10.32604/biocell.2020.09051

    Abstract The Escherichia coli (E. coli) is prevailing worldwide, but the epidemiology of E. coli infections feature regional distribution characteristics to some extent. E. coli, as a zoonotic pathogen, can be transferred from animals to humans through food chain or via contact with wounds, causing a public health risk. We reported the swelling of proventriculus and tracheal bleeding following the death in two broiler chickens (Gallus gallus domesticus) from Beijing, China. To investigate whether a virus was involved in the infection, Madin Darby Bovine Kidney (MDCK) cells were co-cultured with supernatants of proventriculus, trachea and spleen homogenates. The avian leucosis virus… More >

  • Open Access

    ARTICLE

    Stenting the vertical ductus arteriosus via axillary artery access using “wire-target” technique

    Tugcin Bora Polat

    Congenital Heart Disease, Vol.12, No.6, pp. 800-807, 2017, DOI:10.1111/chd.12512

    Abstract Objectives: To retrospectively review the outcome of stent placement in neonates with a vertical ductus, present a technique of ductal stenting via the axillary artery and compare it to ductal stening via the femoral venous access.
    Design: Nineteen patients with duct-dependent pulmonary circulations through a vertical ductus arteriosus were treated with stent implantation. Those patients were retrospectively included in the study. In the first nine of these cases, stent delivery was done transvenously. In the latter ten cases, we favored the axillary artery access to the transvenous approach for stenting the vertical ductus arteriosus. Wire-target technique was used to attain… More >

  • Open Access

    ARTICLE

    Angiographically detectable Thebesian veins are a dynamic and reversible finding in the setting of congenital heart disease

    Paul Tannous1,2, Sunil J Ghelani1,2, Audrey C Marshall1,2, Diego Porras1,2

    Congenital Heart Disease, Vol.12, No.4, pp. 467-474, 2017, DOI:10.1111/chd.12457

    Abstract Objective: Angiographically detectable Thebesian veins (ThVs) are a rare finding sometimes associated with coronary steal and myocardial ischemia in adults, but there are limited data regarding prominent ThVs in the setting of complex congenital heart disease (CHD). This study represents the largest series to date describing the presence and temporal changes of angiographically detectable ThVs in children with CHD.
    Methods: This is a single center case series describing the clinical characteristics and coronary anatomy in children with CHD and angiographicall detectable ThVs. After identification of the index case, additional patients were identified in a prospective manner during the course of… More >

  • Open Access

    ARTICLE

    Single Failure Routing Protection Algorithm in the Hybrid SDN Network

    Haijun Geng1, Jiangyuan Yao2, *, Yangyang Zhang3

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 665-679, 2020, DOI:10.32604/cmc.2020.09912

    Abstract Loop free alternate (LFA) is a routing protection scheme that is currently deployed in commercial routers. However, LFA cannot handle all single network component failure scenarios in traditional networks. As Internet service providers have begun to deploy software defined network (SDN) technology, the Internet will be in a hybrid SDN network where traditional and SDN devices coexist for a long time. Therefore, this study aims to deploy the LFA scheme in hybrid SDN network architecture to handle all possible single network component failure scenarios. First, the deployment of LFA scheme in a hybrid SDN network is described as a 0-1… More >

  • Open Access

    ARTICLE

    Fine-Grained Binary Analysis Method for Privacy Leakage Detection on the Cloud Platform

    Jiaye Pan1, Yi Zhuang1, *, Xinwen Hu1, 2, Wenbing Zhao3

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 607-622, 2020, DOI:10.32604/cmc.2020.09853

    Abstract Nowadays cloud architecture is widely applied on the internet. New malware aiming at the privacy data stealing or crypto currency mining is threatening the security of cloud platforms. In view of the problems with existing application behavior monitoring methods such as coarse-grained analysis, high performance overhead and lack of applicability, this paper proposes a new fine-grained binary program monitoring and analysis method based on multiple system level components, which is used to detect the possible privacy leakage of applications installed on cloud platforms. It can be used online in cloud platform environments for fine-grained automated analysis of target programs, ensuring… More >

  • Open Access

    ARTICLE

    Generalized Array Architecture with Multiple Sub-Arrays and Hole-Repair Algorithm for DOA Estimation

    Sheng Liu1, *, Hailin Cao2, Decheng Wu2, Xiyuan Chen3

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 589-605, 2020, DOI:10.32604/cmc.2020.09964

    Abstract Arranging multiple identical sub-arrays in a special way can enhance degrees of freedom (DOFs) and obtain a hole-free difference co-array (DCA). In this paper, by adjusting the interval of adjacent sub-arrays, a kind of generalized array architecture with larger aperture is proposed. Although some holes may exist in the DCA of the proposed array, they are distributed uniformly. Utilizing the partial continuity of the DCA, an extended covariance matrix can be constructed. Singular value decomposition (SVD) is used to obtain an extended signal sub-space, by which the direction-of-arrival (DOA) estimation algorithm for quasi-stationary signals is given. In order to eliminating… More >

  • Open Access

    ARTICLE

    Outlier Detection for Water Supply Data Based on Joint Auto-Encoder

    Shu Fang1, Lei Huang1, Yi Wan2, Weize Sun1, *, Jingxin Xu3

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 541-555, 2020, DOI:10.32604/cmc.2020.010066

    Abstract With the development of science and technology, the status of the water environment has received more and more attention. In this paper, we propose a deep learning model, named a Joint Auto-Encoder network, to solve the problem of outlier detection in water supply data. The Joint Auto-Encoder network first expands the size of training data and extracts the useful features from the input data, and then reconstructs the input data effectively into an output. The outliers are detected based on the network’s reconstruction errors, with a larger reconstruction error indicating a higher rate to be an outlier. For water supply… More >

  • Open Access

    ARTICLE

    Software-Defined Space-Air-Ground Integrated Network Architecture with the Multi-Layer Satellite Backbone Network

    Chao Guo1, Cheng Gong2, Juan Guo3, Zhanzhen Wei1, *, Yanyan Han1, Sher Zaman Khan4

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 527-540, 2020, DOI:10.32604/cmc.2020.09788

    Abstract Under the background of the rapid development of ground mobile communication, the advantages of high coverage, survivability, and flexibility of satellite communication provide air support to the construction of space information network. According to the requirements of the future space information communication, a software-defined Space-Air-Ground Integrated network architecture was proposed. It consisted of layered structure satellite backbone network, deep space communication network, the stratosphere communication network and the ground network. The SpaceAir-Ground Integrated network was supported by the satellite backbone network. It provided data relay for the missions such as deep space exploration and controlled the deep-space spacecraft when needed.… More >

  • Open Access

    ARTICLE

    Acoustic Emission Recognition Based on a Two-Streams Convolutional Neural Network

    Weibo Yang1, Weidong Liu2, *, Jinming Liu3, Mingyang Zhang4

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 515-525, 2020, DOI:10.32604/cmc.2020.09801

    Abstract The Convolutional Neural Network (CNN) is a widely used deep neural network. Compared with the shallow neural network, the CNN network has better performance and faster computing in some image recognition tasks. It can effectively avoid the problem that network training falls into local extremes. At present, CNN has been applied in many different fields, including fault diagnosis, and it has improved the level and efficiency of fault diagnosis. In this paper, a two-streams convolutional neural network (TCNN) model is proposed. Based on the short-time Fourier transform (STFT) spectral and Mel Frequency Cepstrum Coefficient (MFCC) input characteristics of two-streams acoustic… More >

  • Open Access

    ARTICLE

    An Effective Steganalysis Algorithm for Histogram-Shifting Based Reversible Data Hiding

    Junxiang Wang1, *, Lin Huang1, Ying Zhang1, Yonghong Zhu1, Jiangqun Ni2, Yunqing Shi3

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 325-344, 2020, DOI:10.32604/cmc.2020.09784

    Abstract To measure the security for hot searched reversible data hiding (RDH) technique, especially for the common-used histogram-shifting based RDH (denoted as HS-RDH), several steganalysis schemes are designed to detect whether some secret data has been hidden in a normal-looking image. However, conventional steganalysis schemes focused on the previous RDH algorithms, i.e., some early spatial/pixel domain-based histogram-shifting (HS) schemes, which might cause great changes in statistical characteristics and thus be easy to be detected. For recent improved methods, such as some adaptive prediction error (PE) based embedding schemes, those conventional schemes might be invalid, since those adaptive embedding mechanism would effectively… More >

Displaying 2451-2460 on page 246 of 2889. Per Page