Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (534)
  • Open Access

    ARTICLE

    A Study for the Influence of the Location of PCMs Assembly System on Improving Thermal Environment inside Disaster-Relief Temporary Houses

    Caixia Wang2, Xiao Huang1,*, Hongqing Chen2, Weijie Liang2

    Journal of Renewable Materials, Vol.9, No.7, pp. 1239-1252, 2021, DOI:10.32604/jrm.2021.014746

    Abstract Currently, people pay more and more attention to the transitional resettlement of victims after various natural disasters. There is an urgent need for a large number of temporary houses to resettle the victims after natural disasters. Disaster-relief temporary houses (DTHs) played an important role in the post-disaster resettlement in the past, which can not only be produced on a large scale, but also can be quickly and conveniently erected, which were the main means to solve the problem of transitional resettlement. However, due to their temporary nature, there was no extra energy consuming system installed in the DTHs generally. Hence… More >

  • Open Access

    ARTICLE

    Chemokine Ligand 13 Expression is Abundant in the Tumor Microenvironment and Indicates Poor Prognosis of Kidney Clear Cell Carcinoma

    MENGDAN WU1, MENGYAO SUN1, QINHUAI LAI1, YIN LU1, YUYIN FU1, YUJIA PENG1, WEIRONG LAI1, LISHI ZENG1, SHENGYAN ZHAO1, YUYAN LI1, ZHIXIONG ZHANG1, XIAOFENG CHEN1, FAN QIAO1, YIWEN ZHANG1,*, SHIJIE ZHOU1,2,*, LANTU GOU1, JINLIANG YANG1,2

    BIOCELL, Vol.45, No.3, pp. 589-597, 2021, DOI:10.32604/biocell.2021.013882

    Abstract The chemokine ligand 13-chemokine receptor 5 (CXCL13-CXCR5) axis has been characterized as a critical tumor-promoting signaling pathway in the tumor microenvironment (TME) in multiple types of solid tumors. In this study, we analyzed the expression profile of CXCL13 in kidney clear cell carcinoma (KIRC) and its correlation with tumor-infiltrating immune cells (TIICs). A monoclonal antibody against CXCL13 with high affinity and purity was generated in our lab for western blot and immunohistochemistry (IHC). Bioinformatic analysis was performed based on bulk-seq data from the Cancer Genome Atlas (TCGA)-KIRC and single-cell RNA-seq data from scRNASeqDB and PanglaoDB. Results showed that high CXCL13More >

  • Open Access

    ARTICLE

    Estimation Performance for the Cubature Particle Filter under Nonlinear/Non-Gaussian Environments

    Dah-Jing Jwo1,*, Chien-Hao Tseng2

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1555-1575, 2021, DOI:10.32604/cmc.2021.014875

    Abstract This paper evaluates the state estimation performance for processing nonlinear/non-Gaussian systems using the cubature particle filter (CPF), which is an estimation algorithm that combines the cubature Kalman filter (CKF) and the particle filter (PF). The CPF is essentially a realization of PF where the third-degree cubature rule based on numerical integration method is adopted to approximate the proposal distribution. It is beneficial where the CKF is used to generate the importance density function in the PF framework for effectively resolving the nonlinear/non-Gaussian problems. Based on the spherical-radial transformation to generate an even number of equally weighted cubature points, the CKF… More >

  • Open Access

    ARTICLE

    MMALE—A Methodology for Malware Analysis in Linux Environments

    José Javier de Vicente Mohino1, Javier Bermejo Higuera1, Juan Ramón Bermejo Higuera1, Juan Antonio Sicilia Montalvo1,*, Manuel Sánchez Rubio1, José Javier Martínez Herraiz2

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1447-1469, 2021, DOI:10.32604/cmc.2021.014596

    Abstract In a computer environment, an operating system is prone to malware, and even the Linux operating system is not an exception. In recent years, malware has evolved, and attackers have become more qualified compared to a few years ago. Furthermore, Linux-based systems have become more attractive to cybercriminals because of the increasing use of the Linux operating system in web servers and Internet of Things (IoT) devices. Windows is the most employed OS, so most of the research efforts have been focused on its malware protection rather than on other operating systems. As a result, hundreds of research articles, documents,… More >

  • Open Access

    ARTICLE

    OPPR: An Outsourcing Privacy-Preserving JPEG Image Retrieval Scheme with Local Histograms in Cloud Environment

    Jian Tang, Zhihua Xia*, Lan Wang, Chengsheng Yuan, Xueli Zhao

    Journal on Big Data, Vol.3, No.1, pp. 21-33, 2021, DOI:10.32604/jbd.2021.015892

    Abstract As the wide application of imaging technology, the number of big image data which may containing private information is growing fast. Due to insufficient computing power and storage space for local server device, many people hand over these images to cloud servers for management. But actually, it is unsafe to store the images to the cloud, so encryption becomes a necessary step before uploading to reduce the risk of privacy leakage. However, it is not conducive to the efficient application of image, especially in the Content-Based Image Retrieval (CBIR) scheme. This paper proposes an outsourcing privacypreserving JPEG CBIR scheme. We… More >

  • Open Access

    REVIEW

    A Review of Dynamic Resource Management in Cloud Computing Environments

    Mohammad Aldossary*

    Computer Systems Science and Engineering, Vol.36, No.3, pp. 461-476, 2021, DOI:10.32604/csse.2021.014975

    Abstract In a cloud environment, Virtual Machines (VMs) consolidation and resource provisioning are used to address the issues of workload fluctuations. VM consolidation aims to move the VMs from one host to another in order to reduce the number of active hosts and save power. Whereas resource provisioning attempts to provide additional resource capacity to the VMs as needed in order to meet Quality of Service (QoS) requirements. However, these techniques have a set of limitations in terms of the additional costs related to migration and scaling time, and energy overhead that need further consideration. Therefore, this paper presents a comprehensive… More >

  • Open Access

    ARTICLE

    A Fuzzy-Based Bio-Inspired Neural Network Approach for Target Search by Multiple Autonomous Underwater Vehicles in Underwater Environments

    Aolin Sun, Xiang Cao*, Xu Xiao, Liwen Xu

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 551-564, 2021, DOI:10.32604/iasc.2021.01008

    Abstract An essential issue in a target search is safe navigation while quickly finding targets. In order to improve the efficiency of a target search and the smoothness of AUV’s (Autonomous Underwater Vehicle) trajectory, a fuzzy-based bio-inspired neural network approach is proposed in this paper. A bio-inspired neural network is applied to a multi-AUV target search, which can effectively plan search paths. In the meantime, a fuzzy algorithm is introduced into the bio-inspired neural network to make the trajectory of AUV obstacle avoidance smoother. Unlike other algorithms that need repeated training in the parameters selection, the proposed approach obtains all the… More >

  • Open Access

    ARTICLE

    AUV Global Security Path Planning Based on a Potential Field Bio-Inspired Neural Network in Underwater Environment

    Xiang Cao1,2,*, Ling Chen1, Liqiang Guo3, Wei Han4

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 391-407, 2021, DOI:10.32604/iasc.2021.01002

    Abstract As one of the classical problems in autonomous underwater vehicle (AUV) research, path planning has obtained a lot of research results. Many studies have focused on planning an optimal path for AUVs. These optimal paths are sometimes too close to obstacles. In the real environment, it is difficult for AUVs to avoid obstacles according to such an optimal path. To solve the safety problem of AUV path planning in a dynamic uncertain environment, an algorithm combining a bio-inspired neural network and potential field is proposed. Based on the environmental information, the bio-inspired neural network plans the optimal path for the… More >

  • Open Access

    ARTICLE

    Random Forests Algorithm Based Duplicate Detection in On-Site Programming Big Data Environment

    Qianqian Li1, Meng Li2, Lei Guo3,*, Zhen Zhang4

    Journal of Information Hiding and Privacy Protection, Vol.2, No.4, pp. 199-205, 2020, DOI:10.32604/jihpp.2020.016299

    Abstract On-site programming big data refers to the massive data generated in the process of software development with the characteristics of real-time, complexity and high-difficulty for processing. Therefore, data cleaning is essential for on-site programming big data. Duplicate data detection is an important step in data cleaning, which can save storage resources and enhance data consistency. Due to the insufficiency in traditional Sorted Neighborhood Method (SNM) and the difficulty of high-dimensional data detection, an optimized algorithm based on random forests with the dynamic and adaptive window size is proposed. The efficiency of the algorithm can be elevated by improving the method… More >

  • Open Access

    ARTICLE

    Imperfect Premise Matching Controller Design for Interval Type-2 Fuzzy Systems under Network Environments

    Zejian Zhang1, Dawei Wang2,*, Xiao-Zhi Gao3

    Intelligent Automation & Soft Computing, Vol.27, No.1, pp. 173-189, 2021, DOI:10.32604/iasc.2021.012805

    Abstract The interval type-2 fuzzy sets can describe nonlinear plants with uncertain parameters. It exists in nonlinearity. The parameter uncertainties extensively exist in the nonlinear practical Networked Control Systems (NCSs), and it is paramount to investigate the stabilization of the NCSs on account of the section type-2 fuzzy systems. Notice that most of the existing research work is only on account of the convention Parallel Distribution Compensation (PDC). For overcoming the weak point of the PDC and acquire certain guard stability conditions, the state tickling regulator under imperfect premise matching can be constructed to steady the NCSs using the section type-2… More >

Displaying 401-410 on page 41 of 534. Per Page