Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (226)
  • Open Access

    ARTICLE

    Decoding of Factorial Experimental Design Models Implemented in Production Process

    Borislav Savkovic1, Pavel Kovac1, Branislav Dudic2,3,*, Michal Gregus2

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1661-1675, 2022, DOI:10.32604/cmc.2022.021642

    Abstract The paper deals with factorial experimental design models decoding. For the ease of calculation of the experimental mathematical models, it is convenient first to code the independent variables. When selecting independent variables, it is necessary to take into account the range covered by each. A wide range of choices of different variables is presented in this paper. After calculating the regression model, its variables must be returned to their original values for the model to be easy recognized and represented. In the paper, the procedures of simple first order models, with interactions and with second order models, are presented, which… More >

  • Open Access

    ARTICLE

    Mobile Fog Computing by Using SDN/NFV on 5G Edge Nodes

    G. R. Sreekanth1,*, S. Ahmed Najat Ahmed2, Marko Sarac3, Ivana Strumberger3, Nebojsa Bacanin3, Miodrag Zivkovic3

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 751-765, 2022, DOI:10.32604/csse.2022.020534

    Abstract Fog computing provides quality of service for cloud infrastructure. As the data computation intensifies, edge computing becomes difficult. Therefore, mobile fog computing is used for reducing traffic and the time for data computation in the network. In previous studies, software-defined networking (SDN) and network functions virtualization (NFV) were used separately in edge computing. Current industrial and academic research is tackling to integrate SDN and NFV in different environments to address the challenges in performance, reliability, and scalability. SDN/NFV is still in development. The traditional Internet of things (IoT) data analysis system is only based on a linear and time-variant system… More >

  • Open Access

    ARTICLE

    Novel Quantum Algorithms to Minimize Switching Functions Based on Graph Partitions

    Peng Gao*, Marek Perkowski, Yiwei Li, Xiaoyu Song

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4545-4561, 2022, DOI:10.32604/cmc.2022.020483

    Abstract After Google reported its realization of quantum supremacy, Solving the classical problems with quantum computing is becoming a valuable research topic. Switching function minimization is an important problem in Electronic Design Automation (EDA) and logic synthesis, most of the solutions are based on heuristic algorithms with a classical computer, it is a good practice to solve this problem with a quantum processer. In this paper, we introduce a new hybrid classic quantum algorithm using Grover’s algorithm and symmetric functions to minimize small Disjoint Sum of Product (DSOP) and Sum of Product (SOP) for Boolean switching functions. Our method is based… More >

  • Open Access

    ARTICLE

    Efficient Deep CNN Model for COVID-19 Classification

    Walid El-Shafai1,2,*, Amira A. Mahmoud1, El-Sayed M. El-Rabaie1, Taha E. Taha1, Osama F. Zahran1, Adel S. El-Fishawy1, Mohammed Abd-Elnaby3, Fathi E. Abd El-Samie1,4

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4373-4391, 2022, DOI:10.32604/cmc.2022.019354

    Abstract Coronavirus (COVID-19) infection was initially acknowledged as a global pandemic in Wuhan in China. World Health Organization (WHO) stated that the COVID-19 is an epidemic that causes a 3.4% death rate. Chest X-Ray (CXR) and Computerized Tomography (CT) screening of infected persons are essential in diagnosis applications. There are numerous ways to identify positive COVID-19 cases. One of the fundamental ways is radiology imaging through CXR, or CT images. The comparison of CT and CXR scans revealed that CT scans are more effective in the diagnosis process due to their high quality. Hence, automated classification techniques are required to facilitate… More >

  • Open Access

    ARTICLE

    Some Results on Type 2 Degenerate Poly-Fubini Polynomials and Numbers

    Ghulam Muhiuddin1,*, Waseem A. Khan2, Abdulghani Muhyi3, Deena Al-Kadi4

    CMES-Computer Modeling in Engineering & Sciences, Vol.129, No.2, pp. 1051-1073, 2021, DOI:10.32604/cmes.2021.016546

    Abstract In this paper, we introduce type 2 degenerate poly-Fubini polynomials and derive several interesting characteristics and properties. In addition, we define type 2 degenerate unipoly-Fubini polynomials and establish some certain identities. Furthermore, we give some relationships between degenerate unipoly polynomials and special numbers and polynomials. In the last section, certain beautiful zeros and graphical representations of type 2 degenerate poly-Fubini polynomials are shown. More >

  • Open Access

    VIEWPOINT

    Nitric oxide and hydrogen sulfide share regulatory functions in higher plant events

    FRANCISCO J. CORPAS*, SALVADOR GONZÁLEZ-GORDO, MARTA RODRÍGUEZ-RUIZ, MARÍA A. MUÑOZ-VARGAS, JOSÉ M. PALMA

    BIOCELL, Vol.46, No.1, pp. 1-5, 2022, DOI:10.32604/biocell.2021.017300

    Abstract Nitric oxide (NO) and hydrogen sulfide (H2S) are two molecules that share signaling properties in plant and animal cells. NO and H2S originate two families of derived molecules designated reactive nitrogen and sulfur species (RNS and RSS, respectively). These molecules are responsible for certain protein regulatory processes through posttranslational modifications (PTMs), being the most remarkable S-nitrosation and persulfidation, which affect the thiol group of cysteine residues. NO and H2S can also exert regulatory functions due to their interaction through the iron present in proteins that contain heme groups or iron-sulfur clusters, as reported mainly in animal cells. However, the available… More >

  • Open Access

    REVIEW

    The Functions of MicroRNAs and Their Potential Applications in the Diagnosis and Treatment of Gastric Cancer

    Yongxia He1, Zheng Wang1, Yue Wang2, Man Sun3,*

    Oncologie, Vol.23, No.3, pp. 351-357, 2021, DOI:10.32604/Oncologie.2021.014772

    Abstract Gastric cancer is a highly malignant disease with complex pathogenic mechanisms, and has high incidence and mortality rate. At present, the diagnosis of gastric cancer mainly includes gastroscopy, serum analysis and needle biopsy, and the treatment methods include conventional surgical resection, radiotherapy and chemotherapy. Yet, some limitations were involved in these diagnostic and therapeutic methods, so accurate targeted therapy has received considerable attention. MicroRNAs (miRNAs) are non-coding RNA that can interact with the 3-terminal non-translational region of the target gene mRNA to reduce the expression of the target gene, participate in the regulation of multiple signaling pathways, and play an… More >

  • Open Access

    ARTICLE

    Study of Degenerate Poly-Bernoulli Polynomials by λ-Umbral Calculus

    Lee-Chae Jang1, Dae San Kim2, Hanyoung Kim3, Taekyun Kim3,*, Hyunseok Lee3

    CMES-Computer Modeling in Engineering & Sciences, Vol.129, No.1, pp. 393-408, 2021, DOI:10.32604/cmes.2021.016917

    Abstract Recently, degenerate poly-Bernoulli polynomials are defined in terms of degenerate polyexponential functions by Kim-Kim-Kwon-Lee. The aim of this paper is to further examine some properties of the degenerate poly-Bernoulli polynomials by using three formulas from the recently developed ‘λ-umbral calculus.’ In more detail, we represent the degenerate poly-Bernoulli polynomials by Carlitz Bernoulli polynomials and degenerate Stirling numbers of the first kind, by fully degenerate Bell polynomials and degenerate Stirling numbers of the first kind, and by higherorder degenerate Bernoulli polynomials and degenerate Stirling numbers of the second kind. More >

  • Open Access

    ARTICLE

    An Efficient Meshless Method for Hyperbolic Telegraph Equations in (1 + 1) Dimensions

    Fuzhang Wang1,2, Enran Hou2,*, Imtiaz Ahmad3, Hijaz Ahmad4, Yan Gu5

    CMES-Computer Modeling in Engineering & Sciences, Vol.128, No.2, pp. 687-698, 2021, DOI:10.32604/cmes.2021.014739

    Abstract Numerical solutions of the second-order one-dimensional hyperbolic telegraph equations are presented using the radial basis functions. The purpose of this paper is to propose a simple novel direct meshless scheme for solving hyperbolic telegraph equations. This is fulfilled by considering time variable as normal space variable. Under this scheme, there is no need to remove time-dependent variable during the whole solution process. Since the numerical solution accuracy depends on the condition of coefficient matrix derived from the radial basis function method. We propose a simple shifted domain method, which can avoid the full-coefficient interpolation matrix easily. Numerical experiments performed with… More >

  • Open Access

    ARTICLE

    Cryptographic Based Secure Model on Dataset for Deep Learning Algorithms

    Muhammad Tayyab1,*, Mohsen Marjani1, N. Z. Jhanjhi1, Ibrahim Abaker Targio Hashim2, Abdulwahab Ali Almazroi3, Abdulaleem Ali Almazroi4

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1183-1200, 2021, DOI:10.32604/cmc.2021.017199

    Abstract Deep learning (DL) algorithms have been widely used in various security applications to enhance the performances of decision-based models. Malicious data added by an attacker can cause several security and privacy problems in the operation of DL models. The two most common active attacks are poisoning and evasion attacks, which can cause various problems, including wrong prediction and misclassification of decision-based models. Therefore, to design an efficient DL model, it is crucial to mitigate these attacks. In this regard, this study proposes a secure neural network (NN) model that provides data security during model training and testing phases. The main… More >

Displaying 51-60 on page 6 of 226. Per Page