Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (121)
  • Open Access

    ARTICLE

    Optimization of a Heat Exchanger Using an ARM Core Intelligent Algorithm

    Yajuan Jia, Juanjuan Wang*, Lisha Shang

    FDMP-Fluid Dynamics & Materials Processing, Vol.16, No.5, pp. 871-882, 2020, DOI:10.32604/fdmp.2020.09957

    Abstract In order to optimize heat transfer in a heat exchanger using an ARM (advanced RISC machine) core intelligent computer algorithm, a new type of controller has been designed. The whole control structure of the heat exchange unit has been conceived on the basis of seven functional modules, including data processing and output, human-computer interaction, alarm, and data communication. The main controller and communication controller have been used in a combined fashion and a new MCU (micro control unit) system scheme has been proposed accordingly. A fuzzy controller has been designed by using a fuzzy control algorithm, and a new mode… More >

  • Open Access

    ARTICLE

    Comprehensive Network Analysis of Different Subtypes of Molecular Disorders in Lung Cancer

    Haoliang Zhang1,*, Xiaowei Xing2, Yang Liu1, Shuangli Li1, Weiyuan Li3

    Oncologie, Vol.22, No.2, pp. 107-116, 2020, DOI:10.32604/oncologie.2020.012494

    Abstract Lung cancer is the leading cause of death in cancer patients. Based on a modular and comprehensive analysis method, it is intended to identify their common pathogenesis. We downloaded data and analyzed differences in lung adenocarcinoma samples, lung squamous cell carcinoma samples, and normal samples. Co-expression analysis, enrichment analysis, and hypergeometric testing were used to predict transcription factors, ncRNAs, and retrospective target genes. We get 4596 differentially expressed genes in common differences in high multiples and clustered into 14 modules dysfunction. The 14 genes (including DOK2, COL5A1, and TSPAN8) have the highest connectivity in the dysfunction module and are identified… More >

  • Open Access

    ARTICLE

    A Survey and Systematic Categorization of Parallel K-Means and Fuzzy-C-Means Algorithms

    Ahmed A. M. Jamel1,∗, Bahriye Akay2,†

    Computer Systems Science and Engineering, Vol.34, No.5, pp. 259-281, 2019, DOI:10.32604/csse.2019.34.259

    Abstract Parallel processing has turned into one of the emerging fields of machine learning due to providing consistent work by performing several tasks simultaneously, enhancing reliability (the presence of more than one device ensures the workflow even if some devices disrupted), saving processing time and introducing low cost and high-performance computation units. This research study presents a survey of parallel K-means and Fuzzy-c-means clustering algorithms based on their implementations in parallel environments such as Hadoop, MapReduce, Graphical Processing Units, and multi-core systems. Additionally, the enhancement in parallel clustering algorithms is investigated as hybrid approaches in which K-means and Fuzzy-c-means clustering algorithms… More >

  • Open Access

    ARTICLE

    Core – An Optimal Data Placement Strategy in Hadoop for Data Intentitive Applications Based on Cohesion Relation

    Vengadeswaran, Balasundaram

    Computer Systems Science and Engineering, Vol.34, No.1, pp. 47-60, 2019, DOI:10.32604/csse.2019.34.047

    Abstract The tremendous growth of data being generated today is making storage and computing a mammoth task. With its distributed processing capability Hadoop gives an efficient solution for such large data. Hadoop’s default data placement strategy places the data blocks randomly across the nodes without considering the execution parameters resulting in several lacunas such as increased execution time, query latency etc., Also, most of the data required for a task execution may not be locally available which creates data-locality problem. Hence we propose an innovative data placement strategy based on dependency of data blocks across the nodes. Our strategy dynamically analyses… More >

  • Open Access

    ARTICLE

    Paillier-Based Fuzzy Multi-Keyword Searchable Encryption Scheme with Order-Preserving

    Xiehua Li1,*, Fang Li1, Jie Jiang1, Xiaoyu Mei2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1707-1721, 2020, DOI:10.32604/cmc.2020.011227

    Abstract Efficient multi-keyword fuzzy search over encrypted data is a desirable technology for data outsourcing in cloud storage. However, the current searchable encryption solutions still have deficiencies in search efficiency, accuracy and multiple data owner support. In this paper, we propose an encrypted data searching scheme that can support multiple keywords fuzzy search with order preserving (PMS). First, a new spelling correction algorithm-(Possibility-Levenshtein based Spelling Correction) is proposed to correct user input errors, so that fuzzy keywords input can be supported. Second, Paillier encryption is introduced to calculate encrypted relevance score of multiple keywords for order preserving. Then, a queue-based query… More >

  • Open Access

    ARTICLE

    New Multi-layer Method for Z-number Ranking Using Hyperbolic Tangent Function and Convex Combination

    Somayeh Ezadia, Tofigh Allahviranloob

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 217-221, 2018, DOI:10.1080/10798587.2017.1367146

    Abstract Many practical applications, under the definitive evolutionary state of the nature, the consequences of the decisions, mental states of a decision maker are required. Thus, the need is for a new concept in the analysis of decision-making. Zadeh has introduced this concept as the Z-number. Because the concept is relatively new, Z-number in fuzzy sets, hence, its basic theoretical aspects are yet undetermined. This paper presents a method for ranking Z-numbers. Hence, we propose a new method for ranking fuzzy numbers based on that of hyperbolic tangent function and convex combination. Then, using the same technique we propose a method… More >

  • Open Access

    ARTICLE

    Robust Core Tensor Dictionary Learning with Modified Gaussian Mixture Model for Multispectral Image Restoration

    Leilei Geng1, Chaoran Cui1, Qiang Guo1, Sijie Niu2, Guoqing Zhang3, Peng Fu4, *

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 913-928, 2020, DOI:10.32604/cmc.2020.09975

    Abstract The multispectral remote sensing image (MS-RSI) is degraded existing multispectral camera due to various hardware limitations. In this paper, we propose a novel core tensor dictionary learning approach with the robust modified Gaussian mixture model for MS-RSI restoration. First, the multispectral patch is modeled by three-order tensor and high-order singular value decomposition is applied to the tensor. Then the task of MS-RSI restoration is formulated as a minimum sparse core tensor estimation problem. To improve the accuracy of core tensor coding, the core tensor estimation based on the robust modified Gaussian mixture model is introduced into the proposed model by… More >

  • Open Access

    ARTICLE

    Comprehensive Information Security Evaluation Model Based on Multi-Level Decomposition Feedback for IoT

    Jinxin Zuo1, 3, Yueming Lu1, 3, *, Hui Gao2, 3, Ruohan Cao2, 3, Ziyv Guo2, 3, Jim Feng4

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 683-704, 2020, DOI:10.32604/cmc.2020.010793

    Abstract The development of the Internet of Things (IoT) calls for a comprehensive information security evaluation framework to quantitatively measure the safety score and risk (S&R) value of the network urgently. In this paper, we summarize the architecture and vulnerability in IoT and propose a comprehensive information security evaluation model based on multi-level decomposition feedback. The evaluation model provides an idea for information security evaluation of IoT and guides the security decision maker for dynamic protection. Firstly, we establish an overall evaluation indicator system that includes four primary indicators of threat information, asset, vulnerability, and management, respectively. It also includes eleven… More >

  • Open Access

    ARTICLE

    A Hybrid Method of Coreference Resolution in Information Security

    Yongjin Hu1, Yuanbo Guo1, Junxiu Liu2, Han Zhang3, *

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1297-1315, 2020, DOI:10.32604/cmc.2020.010855

    Abstract In the field of information security, a gap exists in the study of coreference resolution of entities. A hybrid method is proposed to solve the problem of coreference resolution in information security. The work consists of two parts: the first extracts all candidates (including noun phrases, pronouns, entities, and nested phrases) from a given document and classifies them; the second is coreference resolution of the selected candidates. In the first part, a method combining rules with a deep learning model (Dictionary BiLSTM-Attention-CRF, or DBAC) is proposed to extract all candidates in the text and classify them. In the DBAC model,… More >

  • Open Access

    ARTICLE

    Predicting long-term mortality after Fontan procedures: A risk score based on 6707 patients from 28 studies

    Tarek Alsaied1, Jouke P. Bokma2, Mark E. Engel3, Joey M. Kuijpers2, Samuel P. Hanke1, Liesl Zuhlke4, Bin Zhang5, Gruschen R. Veldtman6

    Congenital Heart Disease, Vol.12, No.4, pp. 393-398, 2017, DOI:10.1111/chd.12468

    Abstract Background: Reported long-term outcome measures vary greatly between studies in Fontan patients making comprehensive appraisal of mortality hazard challenging. We sought to create a clinical risk score to assist monitoring of Fontan patients in the outpatient setting.
    Methods: A systematic review was conducted to evaluate risk factors for long-term (beyond the first postoperative year) mortality in Fontan patients. Studies were eligible for inclusion if ≥90 patients were included or ≥20 long-term mortalities we reported. Risk factors for long-term mortality were determined. The pooled hazard ratios were used to create components of a clinical score for long-term mortality using meta-analysis techniques.
    More >

Displaying 81-90 on page 9 of 121. Per Page