Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4,123)
  • Open Access

    ARTICLE

    Cystectomy for benign disease: readmission, morbidity, and complications

    Scott G. Erpelding1, Adam Dugan2, Sudhir Isharwal3, Stephen Strup1, Andrew James1, Shubham Gupta1

    Canadian Journal of Urology, Vol.25, No.5, pp. 9473-9479, 2018

    Abstract Introduction: We sought to elucidate outcomes and risks associated with cystectomy and urinary diversion for benign urological conditions compared to malignant conditions.
    Materials and methods: We identified patients who underwent cystectomy and urinary diversion for benign and malignant diseases through the American College of Surgeons National Surgery Quality Improvement Program database for the period 2007-2015. Patients were selected for inclusion based upon their current procedure terminology and International Classification of Disease, Ninth Revision codes. Primary outcome was 30-day morbidity, including return to the operating room (OR); infectious, respiratory, and/or cardiovascular complications; readmission to the hospital; and mortality.… More >

  • Open Access

    ARTICLE

    Incisional hernia after cystectomy: incidence, risk factors and anthropometric predisposition

    Daniel C. Edwards1, David B. Cahn2, Madhu Reddy3, Dana Kivlin4, Aseem Malhotra5, Tianyu Li6, David Y.T. Chen2, Rosalia Viterbo2, Robert G. Uzzo2, Richard E. Greenberg2, Marc C. Smaldone2, Paul Curcillo7, Alexander Kutikov2

    Canadian Journal of Urology, Vol.25, No.6, pp. 9573-9578, 2018

    Abstract Introduction: Postoperative incisional hernias (PIH) are an established complication of abdominal surgery, with rates after radical cystectomy (RC) poorly defined. The objective of this analysis is to compare rates and risk factors of PIH after open (ORC) and robotic-assisted (RARC) cystectomy at a tertiary-care referral center.
    Materials and methods: We performed a retrospective review of patients undergoing ORC and RARC from 2000-2015 with pre- and postoperative cross-sectional imaging available. Images were evaluated for anthropometric measurements and the presence of postoperative radiographic PIH (RPIH). Patient demographics, type of urinary diversion, and postoperative hernia repair (PHR) were also assessed.
    Results:More >

  • Open Access

    ARTICLE

    Detection of Necroptosis in Ligand-Mediated and Hypoxia-Induced Injury of Hepatocytes Using a Novel Optic Probe-Detecting Receptor-Interacting Protein (RIP)1/RIP3 Binding

    Sanae Haga*, Akira Kanno, Takeaki Ozawa, Naoki Morita§, Mami Asano,¶ and Michitaka Ozaki

    Oncology Research, Vol.26, No.3, pp. 503-513, 2018, DOI:10.3727/096504017X15005102445191

    Abstract Liver injury is often observed in various pathological conditions including posthepatectomy state and cancer chemotherapy. It occurs mainly as a consequence of the combined necrotic and apoptotic types of cell death. In order to study liver/hepatocyte injury by the necrotic type of cell death, we studied signal-regulated necrosis (necroptosis) by developing a new optic probe for detecting receptor-interacting protein kinase 1 (RIP)/RIP3 binding, an essential process for necroptosis induction. In the mouse hepatocyte cell line, TIB-73 cells, TNF-a/cycloheximide (T/C) induced RIP1/3 binding only when caspase activity was suppressed by the caspase-specific inhibitor z-VAD-fmk (zVAD). T/C/zVAD-induced… More >

  • Open Access

    ARTICLE

    EFFECTS OF VARIABLE FLUID PROPERTIES ON A DOUBLE DIFFUSIVE MIXED CONVECTION VISCOUS FLUID OVER A SEMI INFINITE VERTICAL SURFACE IN A SPARSELY PACKED MEDIUM

    R. Suresh Babu1,2, B. Rushi Kumar1,*, P.A. Dinesh2

    Frontiers in Heat and Mass Transfer, Vol.10, pp. 1-9, 2018, DOI:10.5098/hmt.10.3

    Abstract This problem deals with the effects of double diffusive, mixed convective flow of an incompressible viscous fluid through a vertical heated plate embedded in a non-Darcy porous medium under the influence of variable fluid properties numerically. The governing equations are modeled for the double diffusive boundary layer flow to understand the behaviour of velocity, temperature and concentration for variable fluid properties namely permeability, porosity, thermal conductivity and solutal diffusivity of the physical modal. Using a suitable similarity transformation, the highly nonlinear coupled PDE's are reduced into a set of coupled ordinary differential equations. By applying More >

  • Open Access

    ARTICLE

    A Dynamic Online Protection Framework for Android Applications

    Junfeng Xu, Linna Zhou

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 361-368, 2018, DOI:10.32604/csse.2018.33.361

    Abstract At present, Android is the most popular Operating System (OS) which is widespreadly installed on mobile phones, smart TVs and other wearable devices. Due to its overwhelming market share, Android attracts the attentions from many attackers. Reverse Engineering technology plays an important role in the field of Android security, such as cracking applications, malware analysis, software protection, etc. In order to prevent others from obtaining the real codes and tampering them, this paper designs and implements a online dynamic protection framework by deploying dynamic anti-debugging technology for Android application with comprehensive utilization of encryption, dynamic More >

  • Open Access

    ARTICLE

    Face Detection Method for Public Safety Surveillance based on Convex Grouping

    Jianhui Wu1,2, Feng Huang1,2, Wenjing Hu2,Wei He1,2, Bing Tu1,2, Longyuan Guo1,2, Xianfeng Ou1,2,*

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 327-334, 2018, DOI:10.32604/csse.2018.33.327

    Abstract Face detection is very important in video surveillance of public safety. This paper proposed a face detection method based on the best optimization convex grouping to detect the face regions from different face shape images at actual conditions. Firstly, the basic principle of convex grouping was discussed, the main rules of convex and the structure of the convex polygons was described. And then the best optimization convex grouping algorithm of the convex polygons was designed. At last, all of the algorithms, which used the best optimization convex grouping to detect the face region on the… More >

  • Open Access

    ARTICLE

    Design of Greenhouse Temperature and Humidity Measuring System based on Zigbee Technology

    Xuejun Tian, Jianliang Li, Lihua Luo

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 317-326, 2018, DOI:10.32604/csse.2018.33.317

    Abstract In this paper, the wireless network communication system based on ZigBee protocol is design using CC2530 chip as the processor together with front-end CC2530. In the system, the temperature and humidity information collected by DHTII temperature and humidity sensor is gathered and processed by CC2530 chip; the data of temperature and humidity sent back by the receiving nodes of main module will be sent to the upper compouter by serial assistant; then the upper computer recieves and displays the data so that users can check them conveniently. The application of the aforementioned ZigBee wireless communication More >

  • Open Access

    EDITORIAL

    SPECIAL ISSUE: 2017 International Conference on Applications and Techniques in Cyber Intelligence (ATCI 2017)

    Zheng Xu1, Kun Gao2

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 297-298, 2018, DOI:10.32604/csse.2018.33.297

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    A Dynamic Online Protection Framework for Android Applications

    Junfeng Xu, Linna Zhou

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 149-155, 2018, DOI:10.32604/csse.2018.33.149

    Abstract At present, Android is the most popular Operating System (OS) which is widespreadly installed on mobile phones, smart TVs and other wearable devices. Due to its overwhelming market share, Android attracts the attentions from many attackers. Reverse Engineering technology plays an important role in the field of Android security, such as cracking applications, malware analysis, software protection, etc. In order to prevent others from obtaining the real codes and tampering them, this paper designs and implements a online dynamic protection framework by deploying dynamic anti-debugging technology for Android application with comprehensive utilization of encryption, dynamic More >

  • Open Access

    ARTICLE

    Human Movement Detection and Gait Periodicity Analysis via Channel State Information

    Wenyuan Liu1,2, Zijuan Liu1,*, Lin Wang1, Binbin Li1, Nan Jing1

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 137-147, 2018, DOI:10.32604/csse.2018.33.137

    Abstract In recent years, movement detection and gait recognition methods using different techniques emerge in an endless stream. On the one hand, wearable sensors need be worn by the detecting target and the method based on camera requires line of sight. On the other hand, radio frequency signals are easy to be impaired. In this paper, we propose a novel multi-layer filter of channel state information (CSI) to capture moving individuals in dynamic environments and analyze his/her gait periodicity. We design and evaluate an efficient CSI subcarrier feature difference to the multi-layer filtering method leveraging principal More >

Displaying 3541-3550 on page 355 of 4123. Per Page