Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (262)
  • Open Access

    ARTICLE

    Role of Surgery on Growth of Tricuspid Valve in Pulmonary Atresia with Intact Ventricular Septum: Mid-Term Results of Modified Right-Ventricular Overhauling Procedure

    Jae Gun Kwak1, Eung Re Kim2, Taeyoung Yun1, Sungkyu Cho1, Chang-Ha Lee2, Woong-Han Kim1,*

    Congenital Heart Disease, Vol.18, No.3, pp. 325-336, 2023, DOI:10.32604/chd.2023.027758

    Abstract Objectives: To access the effectiveness of our modified right-ventricular overhauling procedure on tricuspid valve (TV) growth in patients with pulmonary atresia with intact ventricular septum (PAIVS). Methods: We retrospectively reviewed 21 patients with PAIVS who underwent modified right ventricular overhauling (mRVoh) between 2008 and 2019 at two institutions. Our mRVoh consisted of wide resection of hypertrophied infundibular and trabecular muscle, peeling off fibrotic endocardial tissue in the right ventricle (RV) cavity, surgical pulmonary valvotomy, and Blalock-Taussig shunt or banding of ductus arteriosus under cardiopulmonary bypass. The TV annulus sizes were measured and analyzed using echocardiography before and after mRVoh. Results:More > Graphic Abstract

    Role of Surgery on Growth of Tricuspid Valve in Pulmonary Atresia with Intact Ventricular Septum: Mid-Term Results of Modified Right-Ventricular Overhauling Procedure

  • Open Access

    ARTICLE

    A Modified PointNet-Based DDoS Attack Classification and Segmentation in Blockchain

    Jieren Cheng1,3, Xiulai Li1,2,3,4,*, Xinbing Xu2,3, Xiangyan Tang1,3, Victor S. Sheng5

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 975-992, 2023, DOI:10.32604/csse.2023.039280

    Abstract With the rapid development of blockchain technology, the number of distributed applications continues to increase, so ensuring the security of the network has become particularly important. However, due to its decentralized, decentralized nature, blockchain networks are vulnerable to distributed denial-of-service (DDoS) attacks, which can lead to service stops, causing serious economic losses and social impacts. The research questions in this paper mainly include two aspects: first, the classification of DDoS, which refers to detecting whether blockchain nodes are suffering DDoS attacks, that is, detecting the data of nodes in parallel; The second is the problem of DDoS segmentation, that is,… More >

  • Open Access

    ARTICLE

    Modified Dwarf Mongoose Optimization Enabled Energy Aware Clustering Scheme for Cognitive Radio Wireless Sensor Networks

    Sami Saeed Binyamin1, Mahmoud Ragab2,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 105-119, 2023, DOI:10.32604/csse.2023.037311

    Abstract Cognitive radio wireless sensor networks (CRWSN) can be defined as a promising technology for developing bandwidth-limited applications. CRWSN is widely utilized by future Internet of Things (IoT) applications. Since a promising technology, Cognitive Radio (CR) can be modelled to alleviate the spectrum scarcity issue. Generally, CRWSN has cognitive radio-enabled sensor nodes (SNs), which are energy limited. Hierarchical cluster-related techniques for overall network management can be suitable for the scalability and stability of the network. This paper focuses on designing the Modified Dwarf Mongoose Optimization Enabled Energy Aware Clustering (MDMO-EAC) Scheme for CRWSN. The MDMO-EAC technique mainly intends to group the… More >

  • Open Access

    ARTICLE

    Iris Recognition Based on Multilevel Thresholding Technique and Modified Fuzzy c-Means Algorithm

    Slim Ben Chaabane1,2,*, Rafika Harrabi1,2, Anas Bushnag1, Hassene Seddik2

    Journal on Artificial Intelligence, Vol.4, No.4, pp. 201-214, 2022, DOI:10.32604/jai.2022.032850

    Abstract Biometrics represents the technology for measuring the characteristics of the human body. Biometric authentication currently allows for secure, easy, and fast access by recognizing a person based on facial, voice, and fingerprint traits. Iris authentication is one of the essential biometric methods for identifying a person. This authentication type has become popular in research and practical applications. Unlike the face and hands, the iris is an internal organ, protected and therefore less likely to be damaged. However, the number of helpful information collected from the iris is much greater than the other biometric human organs. This work proposes a new… More >

  • Open Access

    ARTICLE

    Modified Computational Ranking Model for Cloud Trust Factor Using Fuzzy Logic

    Lei Shen*, Ting Huang, Nishui Cai, Hao Wu

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 507-524, 2023, DOI:10.32604/iasc.2023.037640

    Abstract Through the use of the internet and cloud computing, users may access their data as well as the programmes they have installed. It is now more challenging than ever before to choose which cloud service providers to take advantage of. When it comes to the dependability of the cloud infrastructure service, those who supply cloud services, as well as those who seek cloud services, have an equal responsibility to exercise utmost care. Because of this, further caution is required to ensure that the appropriate values are reached in light of the ever-increasing need for correct decision-making. The purpose of this… More >

  • Open Access

    ARTICLE

    Modified Sine Cosine Optimization with Adaptive Deep Belief Network for Movie Review Classification

    Hala J. Alshahrani1, Abdulbaset Gaddah2, Ehab S. Alnuzaili3, Mesfer Al Duhayyim4,*, Heba Mohsen5, Ishfaq Yaseen6, Amgad Atta Abdelmageed6, Gouse Pasha Mohammed6

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 283-300, 2023, DOI:10.32604/iasc.2023.035334

    Abstract Sentiment analysis (SA) is a growing field at the intersection of computer science and computational linguistics that endeavors to automatically identify the sentiment presented in text. Computational linguistics aims to describe the fundamental methods utilized in the formation of computer methods for understanding natural language. Sentiment is classified as a negative or positive assessment articulated through language. SA can be commonly used for the movie review classification that involves the automatic determination that a review posted online (of a movie) can be negative or positive toward the thing that has been reviewed. Deep learning (DL) is becoming a powerful machine… More >

  • Open Access

    ARTICLE

    Deep Learning Based Underground Sewer Defect Classification Using a Modified RegNet

    Yu Chen1, Sagar A. S. M. Sharifuzzaman2, Hangxiang Wang1, Yanfen Li1, L. Minh Dang3, Hyoung-Kyu Song3, Hyeonjoon Moon1,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5455-5473, 2023, DOI:10.32604/cmc.2023.033787

    Abstract The sewer system plays an important role in protecting rainfall and treating urban wastewater. Due to the harsh internal environment and complex structure of the sewer, it is difficult to monitor the sewer system. Researchers are developing different methods, such as the Internet of Things and Artificial Intelligence, to monitor and detect the faults in the sewer system. Deep learning is a promising artificial intelligence technology that can effectively identify and classify different sewer system defects. However, the existing deep learning based solution does not provide high accuracy prediction and the defect class considered for classification is very small, which… More >

  • Open Access

    ARTICLE

    THERMAL PERFORMANCE ASSESSMENT IN A CIRCULAR TUBE FITTED WITH VARIOUS SIZES OF MODIFIED V-BAFFLES: A NUMERICAL INVESTIGATION

    Amnart Boonloia, Withada Jedsadaratanachaib,*

    Frontiers in Heat and Mass Transfer, Vol.16, pp. 1-16, 2021, DOI:10.5098/hmt.16.17

    Abstract This research reports numerical examinations on fluid flow, heat transfer behavior and thermal performance analysis in a circular tube equipped with modified V-baffles (CTMVB). The modified V-baffle (MVB) is a combination vortex generator between V-baffles/V-orifices which are placed on the tube wall and V-baffles which are inserted at the core of the tested tube. The MVB height is separated into two parts; b1 represents the MVB height on the tube wall, while b2 represents the MVB height at the core of the tested round tube. The MVB height to tube diameter ratios, b/D, are adjusted; b1/D = 0.05, 0.1, 0.15… More >

  • Open Access

    ARTICLE

    EFFECT OF MODIFIED FLY ASH PREPARED BY CATALYTIC COMBUSTION FURNACE ON Ca2+ AND Mg2+ IN WATER

    Hongjun Wang*, Shihong Zhang

    Frontiers in Heat and Mass Transfer, Vol.16, pp. 1-5, 2021, DOI:10.5098/hmt.16.6

    Abstract Catalytic combustion can inhibit the formation of CO and NOx, and greatly reduce the concentration of unburned alkanes. The hardness of tap water in Beijing is too high. In order to test whether the modified fly ash can reduce its hardness, clay, shale and fly ash bricks were prepared by catalytic combustion furnace. The results show that the fly ash brick has a great influence on Ca2+ and Mg2+ in water, increasing Ca2+ concentration by 59.96% and decreasing Mg2+ concentration by 41.22%. Thus modified fly ash could not reduce hardness of water but could be used as an Mg2+ adsorbent. More >

  • Open Access

    ARTICLE

    New Soliton Wave Solutions to a Nonlinear Equation Arising in Plasma Physics

    M. B. Almatrafi, Abdulghani Alharbi*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 827-841, 2023, DOI:10.32604/cmes.2023.027344

    Abstract The extraction of traveling wave solutions for nonlinear evolution equations is a challenge in various mathematics, physics, and engineering disciplines. This article intends to analyze several traveling wave solutions for the modified regularized long-wave (MRLW) equation using several approaches, namely, the generalized algebraic method, the Jacobian elliptic functions technique, and the improved Q-expansion strategy. We successfully obtain analytical solutions consisting of rational, trigonometric, and hyperbolic structures. The adaptive moving mesh technique is applied to approximate the numerical solution of the proposed equation. The adaptive moving mesh method evenly distributes the points on the high error areas. This method perfectly and… More >

Displaying 31-40 on page 4 of 262. Per Page