Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4,195)
  • Open Access

    ARTICLE

    Anti-Noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model

    Zhexi Zhang1, Zhiguo Qu1,2,*

    Journal of Quantum Computing, Vol.1, No.2, pp. 89-109, 2019, DOI:10.32604/jqc.2019.07415

    Abstract How to establish a secure and efficient quantum network coding algorithm is one of important research topics of quantum secure communications. Based on the butterfly network model and the characteristics of easy preparation of Bell states, a novel anti-noise quantum network coding protocol is proposed in this paper. The new protocol encodes and transmits classical information by virtue of Bell states. It can guarantee the transparency of the intermediate nodes during information, so that the eavesdropper Eve disables to get any information even if he intercepts the transmitted quantum states. In view of the inevitability More >

  • Open Access

    ARTICLE

    Quantum Multi-User Detection Based on Coherent State Signals

    Wenbin Yu1, 2, 3, 4, *, Yinsong Xu1, 2, 3, Wenjie Liu1, 2, 3, Alex Xiangyang Liu4, Baoyu Zheng5

    Journal of Quantum Computing, Vol.1, No.2, pp. 81-88, 2019, DOI:10.32604/jqc.2019.07324

    Abstract Multi-user detection is one of the important technical problems for modern communications. In the field of quantum communication, the multi-access channel on which we apply the technology of quantum information processing is still an open question. In this work, we investigate the multi-user detection problem based on the binary coherent-state signals whose communication way is supposed to be seen as a quantum channel. A binary phase shift keying model of this multi-access channel is studied and a novel method of quantum detection proposed according to the conclusion of the quantum measurement theory. As a result, More >

  • Open Access

    ARTICLE

    Crack Detection and Localization on Wind Turbine Blade Using Machine Learning Algorithms: A Data Mining Approach

    A. Joshuva1, V. Sugumaran2

    Structural Durability & Health Monitoring, Vol.13, No.2, pp. 181-203, 2019, DOI:10.32604/sdhm.2019.00287

    Abstract Wind turbine blades are generally manufactured using fiber type material because of their cost effectiveness and light weight property however, blade get damaged due to wind gusts, bad weather conditions, unpredictable aerodynamic forces, lightning strikes and gravitational loads which causes crack on the surface of wind turbine blade. It is very much essential to identify the damage on blade before it crashes catastrophically which might possibly destroy the complete wind turbine. In this paper, a fifteen tree classification based machine learning algorithms were modelled for identifying and detecting the crack on wind turbine blades. The More >

  • Open Access

    ARTICLE

    Mechanical Behaviors and Deformation Properties of Retaining Wall Formed by Grouting Mould-Bag Pile

    Shengcai Li1,*, Jun Tang1,2, Lin Guo3

    Structural Durability & Health Monitoring, Vol.13, No.1, pp. 61-84, 2019, DOI:10.32604/sdhm.2019.06058

    Abstract The simplified mechanical model and finite element model are established on the basis of the measured results and analysis of the grouting pile deformation monitoring, surface horizontal displacement and vertical displacement monitoring, deep horizontal displacement (inclinometer) monitoring, soil pressure monitoring and seepage pressure monitoring in the lower reaches of Wuan River regulation project in Shishi, Fujian Province. The mechanical behavior and deformation performance of mould-bag pile retaining wall formed after controlled cement grouting in the silty stratum of the test section are analyzed and compared. The results show that the use of controlled cement grouting… More >

  • Open Access

    REVIEW

    Systems Neuroprotective Mechanisms in Ischemic Stroke

    Shu Q. Liu*

    Molecular & Cellular Biomechanics, Vol.16, No.2, pp. 75-85, 2019, DOI:10.32604/mcb.2019.06920

    Abstract Ischemic stroke, although causing brain infarction and neurological deficits, can activate innate neuroprotective mechanisms, including regional mechanisms within the ischemic brain and distant mechanisms from non-ischemic organs such as the liver, spleen, and pancreas, supporting neuronal survival, confining brain infarction, and alleviating neurological deficits. Both regional and distant mechanisms are defined as systems neuroprotective mechanisms. The regional neuroprotective mechanisms involve release and activation of neuroprotective factors such as adenosine and bradykinin, inflammatory responses, expression of growth factors such as nerve growth factors and neurotrophins, and activation and differentiation of resident neural stem cells to neurons… More >

  • Open Access

    ARTICLE

    Experimental Study of Aqueous Humor Flow in a Transparent Anterior Segment Phantom by Using PIV Technique

    Wenjia Wang1, 2, Xiuqing Qian1, 2, Qi Li1, 2, Gong Zhang1, 2, Huangxuan Zhao1, 2, Tan Li1, 2, Yang Yu1, 2, Hongfang Song1, 2, *, Zhicheng Liu1, 2, *

    Molecular & Cellular Biomechanics, Vol.16, No.1, pp. 59-74, 2019, DOI:10.32604/mcb.2019.06393

    Abstract Pupillary block is considered as an important cause of primary angle-closure glaucoma (PACG). In order to investigate the effect of pupillary block on the hydrodynamics of aqueous humor (AH) in anterior chamber (AC) and potential risks, a 3D printed eye model was developed to mimic the AH flow driven by fluid generation, the differential pressure between AC and posterior chambers (PC) and pupillary block. Particle image velocimetry technology was applied to visualize flow distribution. The results demonstrated obvious differences in AH flow with and without pupillary block. Under the normal condition (without pupillary block), the… More >

  • Open Access

    ARTICLE

    A Review on Deep Learning Approaches to Image Classification and Object Segmentation

    Hao Wu1, Qi Liu2, 3, *, Xiaodong Liu4

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 575-597, 2019, DOI:10.32604/cmc.2019.03595

    Abstract Deep learning technology has brought great impetus to artificial intelligence, especially in the fields of image processing, pattern and object recognition in recent years. Present proposed artificial neural networks and optimization skills have effectively achieved large-scale deep learnt neural networks showing better performance with deeper depth and wider width of networks. With the efforts in the present deep learning approaches, factors, e.g., network structures, training methods and training data sets are playing critical roles in improving the performance of networks. In this paper, deep learning models in recent years are summarized and compared with detailed More >

  • Open Access

    RETRACTION

    RETRACTED: Automatic Arrhythmia Detection Based on Convolutional Neural Networks

    Zhong Liu1,2, Xinan Wang1,*, Kuntao Lu1, David Su3

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 497-509, 2019, DOI:10.32604/cmc.2019.04882

    Abstract ECG signal is of great importance in the clinical diagnosis of various heart diseases. The abnormal origin or conduction of excitation is the electrophysiological mechanism leading to arrhythmia, but the type and frequency of arrhythmia is an important indicator reflecting the stability of cardiac electrical activity. In clinical practice, arrhythmic signals can be classified according to the origin of excitation, the frequency of excitation, or the transmission of excitation. Traditional heart disease diagnosis depends on doctors, and it is influenced by doctors' professional skills and the department's specialty. ECG signal has the characteristics of weak More >

  • Open Access

    ARTICLE

    Online Burst Events Detection Oriented Real-Time Microblog Message Stream

    Guozhong Dong1,2,*, Jun Gao3, Liang Huang4, Chunlei Shi1

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 213-225, 2019, DOI:10.32604/cmc.2019.05601

    Abstract The rapid spread of microblog messages and sensitivity of unexpected events make microblog become the public opinion center of burst events. Online burst events detection oriented real-time microblog message stream has become an important research problem in the field of microblog public opinion. Because of the large amount of real-time microblog message stream and irregular language of microblog message, it is important to process real-time microblog message stream and detect burst events accurately. In this paper, an online burst events detection framework is proposed. In this framework, abnormal messages are detected based on sliding time More >

  • Open Access

    ARTICLE

    A Scalable Approach for Fraud Detection in Online E-Commerce Transactions with Big Data Analytics

    Hangjun Zhou1,2,*, Guang Sun1,3, Sha Fu1, Wangdong Jiang1, Juan Xue1

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 179-192, 2019, DOI:10.32604/cmc.2019.05214

    Abstract With the rapid development of mobile Internet and finance technology, online e-commerce transactions have been increasing and expanding very fast, which globally brings a lot of convenience and availability to our life, but meanwhile, chances of committing frauds also come in all shapes and sizes. Moreover, fraud detection in online e-commerce transactions is not totally the same to that in the existing areas due to the massive amounts of data generated in e-commerce, which makes the fraudulent transactions more covertly scattered with genuine transactions than before. In this article, a novel scalable and comprehensive approach More >

Displaying 3561-3570 on page 357 of 4195. Per Page