Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,379)
  • Open Access

    ARTICLE

    An Optimized Labeling Scheme for Reachability Queries

    Xian Tang1,*, Ziyang Chen2, Haiyan Zhang3, Xiang Liu1, Yunyu Shi1, Asad Shahzadi4

    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 267-283, 2018, DOI:10.3970/cmc.2018.01839

    Abstract Answering reachability queries is one of the fundamental graph operations. Existing approaches either accelerate index construction by constructing an index that covers only partial reachability relationship, which may result in performing cost traversing operation when answering a query; or accelerate query answering by constructing an index covering the complete reachability relationship, which may be inefficient due to comparing the complete node labels. We propose a novel labeling scheme, which covers the complete reachability relationship, to accelerate reachability queries processing. The idea is to decompose the given directed acyclic graph (DAG) G into two subgraphs, G1… More >

  • Open Access

    ARTICLE

    An Abnormal Network Flow Feature Sequence Prediction Approach for DDoS Attacks Detection in Big Data Environment

    Jieren Cheng1,2, Ruomeng Xu1,*, Xiangyan Tang1, Victor S. Sheng3, Canting Cai1

    CMC-Computers, Materials & Continua, Vol.55, No.1, pp. 95-119, 2018, DOI:10.3970/cmc.2018.055.095

    Abstract Distributed denial-of-service (DDoS) is a rapidly growing problem with the fast development of the Internet. There are multitude DDoS detection approaches, however, three major problems about DDoS attack detection appear in the big data environment. Firstly, to shorten the respond time of the DDoS attack detector; secondly, to reduce the required compute resources; lastly, to achieve a high detection rate with low false alarm rate. In the paper, we propose an abnormal network flow feature sequence prediction approach which could fit to be used as a DDoS attack detector in the big data environment and… More >

  • Open Access

    ARTICLE

    A Fusion Steganographic Algorithm Based on Faster R-CNN

    Ruohan Meng1,2, Steven G. Rice3, Jin Wang4, Xingming Sun1,2,*

    CMC-Computers, Materials & Continua, Vol.55, No.1, pp. 1-16, 2018, DOI:10.3970/cmc.2018.055.001

    Abstract The aim of information hiding is to embed the secret message in a normal cover media such as image, video, voice or text, and then the secret message is transmitted through the transmission of the cover media. The secret message should not be damaged on the process of the cover media. In order to ensure the invisibility of secret message, complex texture objects should be chosen for embedding information. In this paper, an approach which corresponds multiple steganographic algorithms to complex texture objects was presented for hiding secret message. Firstly, complex texture regions are selected More >

  • Open Access

    ARTICLE

    Joint Bearing Mechanism of Coal Pillar and Backfilling Body in Roadway Backfilling Mining Technology

    Zhengzheng Cao1, Ping Xu1,*, Zhenhua Li2, Minxia Zhang1, Yu Zhao1, Wenlong Shen2

    CMC-Computers, Materials & Continua, Vol.54, No.2, pp. 137-159, 2018, DOI:10.3970/cmc.2018.054.137

    Abstract In the traditional mining technology, the coal resources trapped beneath surface buildings, railways, and water bodies cannot be mined massively, thereby causing the lower coal recovery and dynamic disasters. In order to solve the aforementioned problems, the roadway backfilling mining technology is developed and the joint bearing mechanism of coal pillar and backfilling body is presented in this paper. The mechanical model of bearing system of coal pillar and backfilling body is established, by analyzing the basic characteristics of overlying strata deformation in roadway backfilling mining technology. According to the Ritz method in energy variation… More >

  • Open Access

    ARTICLE

    Regorafenib Plus FOLFIRI With Irinotecan Dose Escalated According to Uridine Diphosphate Glucuronosyltransferase 1A1 Genotyping in Patients With Metastatic Colorectal Cancer

    Cheng-Jen Ma*†‡, Ching-Wen Huang*‡§, Yung-Sung Yeh*†¶, Hsiang-Lin Tsai*§#**, Huang-Ming Hu††‡‡, I-Chen Wu††‡‡, Tian-Lu Cheng§§¶¶, Jaw-Yuan Wang*†‡§**¶¶

    Oncology Research, Vol.25, No.5, pp. 673-679, 2017, DOI:10.3727/97818823455816X14786040691928

    Abstract We analyzed the results of previously treated patients with metastatic colorectal cancer (mCRC) who received regorafenib plus FOLFIRI with the irinotecan dose escalation on the basis of uridine diphosphate glucuronosyltransferase 1A1 (UGT1A1) genotyping. Thirteen patients with previously treated mCRC were subjected to UGT1A1 genotyping between October 2013 and June 2015 and were administered regorafenib plus FOLFIRI with irinotecan dose escalation. Patients with UGT1A1*1/*1 and *1/*28 genotypes were administered 180 mg/m2 of irinotecan, whereas those with the UGT1A1*28/*28 genotype were administered 120 mg/m2 of irinotecan. For all patients, the irinotecan dose was increased by 30 mg/m2 every… More >

  • Open Access

    ARTICLE

    Validity of Osteoprotegerin and Receptor Activator of NF-κB Ligand for the Detection of Bone Metastasis in Breast Cancer

    Gamal A. Elfar*†, Mohamed A. Ebrahim, Nehal M. Elsherbiny*, Laila A. Eissa*

    Oncology Research, Vol.25, No.4, pp. 641-650, 2017, DOI:10.3727/096504016X14768398678750

    Abstract Osteoprotegerin (OPG) is a robust antiresorptive molecule that acts as a decoy receptor for the receptor activator of nuclear factor kB ligand (RANKL), the mediator of osteoclastogenesis. This study was designed to explore the possible role of serum OPG and RANKL in detecting bone metastasis in breast cancer and its interaction with clinicopathologic parameters. Serum levels of RANKL and OPG were estimated in 44 metastatic and 36 nonmetastatic breast cancer patients using ELISA kits. Serum OPG levels were significantly reduced in patients with bone metastasis and correlated negatively with the number of bone lesions and… More >

  • Open Access

    ARTICLE

    MHD CASSON VISCOUS DISSIPATIVE FLUID FLOW PAST A VERTICALLY INCLINED PLATE IN PRESENCE OF HEAT AND MASS TRANSFER: A FINITE ELEMENT TECHNIQUE

    R. Srinivasa Rajua,*, G. Jithender Reddyb , G. Anithaa

    Frontiers in Heat and Mass Transfer, Vol.8, pp. 1-12, 2017, DOI:10.5098/hmt.8.27

    Abstract In the present study, consider an influence of chemical reaction on an unsteady MHD free convective, viscous dissipative Casson fluid flow over a vertically inclined plate in presence of magnetic field, heat and mass transfer. The modeling equations are converted to dimensionless equations, then solved through finite element technique. Computations were performed to analyze the behavior of fluid velocity, temperature, concentration and induced magnetic field on the inclined vertical plate with the variation of emerging physical parameters. Compared the present results with earlier reported studies for correctness and applicability of finite element technique. This model More >

  • Open Access

    ARTICLE

    EXPERIMENTAL STUDY ON WATER CURTAIN FIGHTING FIRE BASED ON INFRARED TECHNIQUE

    Hui Zhong, Guohua Chen* , Saihua Jiang

    Frontiers in Heat and Mass Transfer, Vol.8, pp. 1-5, 2017, DOI:10.5098/hmt.8.17

    Abstract Infrared radiation is a type of electromagnetic radiation and invisible to human eyes. It is used widely in industrial, scientific, and medical applications. Pool fire is an emergent accident, which emits intense thermal radiation. In order to quantify the performance of water curtain fighting fire, a testing platform is built and experimental studies are carried out. An infrared imager is used to acquire real-time experimental data and respond to the variations of flame in time and space dimensions. Experimental principles and operating procedures are described in detail. The transmissivity is used to quantify the performance More >

  • Open Access

    ARTICLE

    Stenting the vertical ductus arteriosus via axillary artery access using “wire-target” technique

    Tugcin Bora Polat

    Congenital Heart Disease, Vol.12, No.6, pp. 800-807, 2017, DOI:10.1111/chd.12512

    Abstract Objectives: To retrospectively review the outcome of stent placement in neonates with a vertical ductus, present a technique of ductal stenting via the axillary artery and compare it to ductal stening via the femoral venous access.
    Design: Nineteen patients with duct-dependent pulmonary circulations through a vertical ductus arteriosus were treated with stent implantation. Those patients were retrospectively included in the study. In the first nine of these cases, stent delivery was done transvenously. In the latter ten cases, we favored the axillary artery access to the transvenous approach for stenting the vertical ductus arteriosus. Wire-target technique was… More >

  • Open Access

    ARTICLE

    Angiographically detectable Thebesian veins are a dynamic and reversible finding in the setting of congenital heart disease

    Paul Tannous1,2, Sunil J Ghelani1,2, Audrey C Marshall1,2, Diego Porras1,2

    Congenital Heart Disease, Vol.12, No.4, pp. 467-474, 2017, DOI:10.1111/chd.12457

    Abstract Objective: Angiographically detectable Thebesian veins (ThVs) are a rare finding sometimes associated with coronary steal and myocardial ischemia in adults, but there are limited data regarding prominent ThVs in the setting of complex congenital heart disease (CHD). This study represents the largest series to date describing the presence and temporal changes of angiographically detectable ThVs in children with CHD.
    Methods: This is a single center case series describing the clinical characteristics and coronary anatomy in children with CHD and angiographicall detectable ThVs. After identification of the index case, additional patients were identified in a prospective manner during… More >

Displaying 3111-3120 on page 312 of 3379. Per Page