Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (295)
  • Open Access

    ARTICLE

    PDNet: A Convolutional Neural Network Has Potential to be Deployed on Small Intelligent Devices for Arrhythmia Diagnosis

    Fei Yang1,2,#, Xiaoqing Zhang1,*,#, Yong Zhu3

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.1, pp. 365-382, 2020, DOI:10.32604/cmes.2020.010798 - 18 September 2020

    Abstract Heart arrhythmia is a group of irregular heartbeat conditions and is usually detected by electrocardiograms (ECG) signals. Over the past years, deep learning methods have been developed to classify different types of heart arrhythmias through ECG based on computer-aided diagnosis systems (CADs), but these deep learning methods usually cannot trade-off between classification performance and parameters of deep learning methods. To tackle this problem, this work proposes a convolutional neural network (CNN) model named PDNet to recognize different types of heart arrhythmias efficiently. In the PDNet, a convolutional block named PDblock is devised, which is comprised More >

  • Open Access

    ARTICLE

    A Novel System for Recognizing Recording Devices from Recorded Speech Signals

    Yongqiang Bao1, *, Qi Shao1, Xuxu Zhang1, Jiahui Jiang1, Yue Xie1, Tingting Liu1, Weiye Xu2

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2557-2570, 2020, DOI:10.32604/cmc.2020.011241 - 16 September 2020

    Abstract The field of digital audio forensics aims to detect threats and fraud in audio signals. Contemporary audio forensic techniques use digital signal processing to detect the authenticity of recorded speech, recognize speakers, and recognize recording devices. User-generated audio recordings from mobile phones are very helpful in a number of forensic applications. This article proposed a novel method for recognizing recording devices based on recorded audio signals. First, a database of the features of various recording devices was constructed using 32 recording devices (20 mobile phones of different brands and 12 kinds of recording pens) More >

  • Open Access

    ARTICLE

    Identification and Segmentation of Impurities Accumulated in a Cold-Trap Device by Using Radiographic Images

    Thamotharan B1,*, Venkatraman B2, Chandrasekaran S3

    Intelligent Automation & Soft Computing, Vol.26, No.2, pp. 335-340, 2020, DOI:10.31209/2019.100000156

    Abstract Accumulation of impurities within cold trap device results in degradation of efficient performance in a nuclear reactor systems. The impurities have to be identified and the device has to be replaced periodically based on the accumulation level. Though there are a few techniques available to identify these impurities from the cold trap device, there are certain limitations in these techniques. In order to overcome these constraints, a new harmless and easy approach for identifying and separating the impurities using the radiographic images of cold traps is proposed in this paper. It includes a new segmentation More >

  • Open Access

    ARTICLE

    Identifying Honeypots from ICS Devices Using Lightweight Fuzzy Testing

    Yanbin Sun1, Xiaojun Pan1, Chao Xu2, Penggang Sun2, Quanlong Guan3, Mohan Li1, *, Men Han4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1723-1737, 2020, DOI:10.32604/cmc.2020.010593 - 20 August 2020

    Abstract The security issues of industrial control systems (ICSs) have become increasingly prevalent. As an important part of ICS security, honeypots and antihoneypots have become the focus of offensive and defensive confrontation. However, research on ICS honeypots still lacks breakthroughs, and it is difficult to simulate real ICS devices perfectly. In this paper, we studied ICS honeypots to identify and address their weaknesses. First, an intelligent honeypot identification framework is proposed, based on which feature data type requirements and feature data acquisition for honeypot identification is studied. Inspired by vulnerability mining, we propose a feature acquisition More >

  • Open Access

    ARTICLE

    A Robust Resource Allocation Scheme for Device-to-Device Communications Based on Q-Learning

    Azka Amin1, Xihua Liu2, Imran Khan3, Peerapong Uthansakul4, *, Masoud Forsat5, Seyed Sajad Mirjavadi5

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1487-1505, 2020, DOI:10.32604/cmc.2020.011749 - 20 August 2020

    Abstract One of the most effective technology for the 5G mobile communications is Device-to-device (D2D) communication which is also called terminal pass-through technology. It can directly communicate between devices under the control of a base station and does not require a base station to forward it. The advantages of applying D2D communication technology to cellular networks are: It can increase the communication system capacity, improve the system spectrum efficiency, increase the data transmission rate, and reduce the base station load. Aiming at the problem of co-channel interference between the D2D and cellular users, this paper proposes… More >

  • Open Access

    ARTICLE

    Noise Cancellation Based on Voice Activity Detection Using Spectral Variation for Speech Recognition in Smart Home Devices

    Jeong-Sik Park1, Seok-Hoon Kim2,*

    Intelligent Automation & Soft Computing, Vol.26, No.1, pp. 149-159, 2020, DOI:10.31209/2019.100000136

    Abstract Variety types of smart home devices have a main function of a human-machine interaction by speech recognition. Speech recognition system may be vulnerable to rapidly changing noises in home environments. This study proposes an efficient noise cancellation approach to eliminate the noises directly on the devices in real time. Firstly, we propose an advanced voice activity detection (VAD) technique to efficiently detect speech and non-speech regions on the basis of spectral property of speech signals. The VAD is then employed to enhance the conventional spectral subtraction method by steadily estimating noise signals in non-speech regions. More >

  • Open Access

    ARTICLE

    Dynamic Simulation Analysis of the Working Device of a ZL50 Loader

    Guiju Zhang1,2, Caiyuan Xiao1,2,*

    FDMP-Fluid Dynamics & Materials Processing, Vol.16, No.4, pp. 699-707, 2020, DOI:10.32604/fdmp.2020.09481 - 11 August 2020

    Abstract In this study, assuming a certain type of wheel loader as the main objective of the research, the performances of the working device of the loader are investigated on the basis of an in-house code. After creating a three-dimensional model of the working device using Solidworks, this model has been imported into the dynamic simulation software ADAMS, and the simulation problem has been completed by adding the relevant constraints and loadings. The load stress curve relating to the main connecting point of the working device has been obtained in the frame work of this approach More >

  • Open Access

    ARTICLE

    Device-Independent Quantum Key Distribution Protocol Based on Hyper-Entanglement

    Yan Chang1, *, Shibin Zhang1, Lili Yan1, Xueyang Li1, Tian Cao1, Qirun Wang2

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 879-896, 2020, DOI:10.32604/cmc.2020.010042 - 23 July 2020

    Abstract The secure key rate of quantum key distribution (QKD) is greatly reduced because of the untrusted devices. In this paper, to raise the secure key rate of QKD, a device-independent quantum key distribution (DIQKD) protocol is proposed based on hyper-entangled states and Bell inequalities. The security of the protocol is analyzed against the individual attack by an adversary only limited by the no-signaling condition. Based on the formalization of Clauser-Horne Shimony-Holt (CHSH) violation measurement on local correlation, the probability of a secure secret bit is obtained, which is produced by a pair of hyper-entangled particles. More >

  • Open Access

    ARTICLE

    Successful Percutaneous Closure of Atrial Septal Defect via Transjugular Approach with the Cocoon Septal Occluder

    Maria Drakopoulou1, George Oikonomou1, Stergios Soulaidopoulos1, Basil Thanopoulos2, Konstantina Aggeli1, Dimitrios Tousoulis1, Konstantinos Toutouzas1,*

    Congenital Heart Disease, Vol.15, No.3, pp. 147-151, 2020, DOI:10.32604/CHD.2020.011338 - 15 July 2020

    Abstract The percutaneous closure of ostium secundum atrial septal defects (ASD) is a well-established procedure. Currently available devices and delivery systems are designed to be used via the femoral venous route. However, an alternative approach needs to be considered in cases of congenital or acquired caval obstruction. We describe a successful transjugular closure of a moderate sized secundum ASD with the Cocoon Septal Occluder in a 37-year-old symptomatic woman with inferior vena cava (IVC) thrombosis, using a novel deployment technique to overcome difficulties, namely maintaining stable sheath position in the left atrium. Percutaneous closure of secundum More >

  • Open Access

    ARTICLE

    Use of Implantable Cardioverter-Defibrillators in Congenital Heart Disease and Pediatric Patients: Results from the German National Registry for Congenital Heart Defects

    Coralie Katharina Dicks1, Gerhard-Paul Diller1, Kristina Wasmer2, Paul C. Helm3,4, Ulrike M. M. Bauer3,4, Helmut Baumgartner1, Stefan Orwat1,#, Alicia Jeanette Fischer1,#,*

    Congenital Heart Disease, Vol.15, No.2, pp. 117-125, 2020, DOI:10.32604/CHD.2020.011520 - 23 June 2020

    Abstract Background: Sudden cardiac death is a leading cause of death in patients with congenital heart disease (CHD). Risk stratification for implantable cardioverter defibrillators (ICD) remains difficult due to limited data about use and outcome of device therapy in CHD patients in larger community-based cohorts. Methods and results: Out of a dataset with more than 50,000 patients registered at the German National Register for Congenital Heart Defects, 109 patients (median age 35.5; IQR 23.75–46.00), 68 (62%) male) with an ICD were identified and were retrospectively analyzed. Although the number of implantations increased steadily throughout the investigated time interval… More >

Displaying 211-220 on page 22 of 295. Per Page