Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    Analysis of the Applicability of a Risk Quantitative Evaluation Method to High Temperature-Pressure Drilling Engineering

    Renjun Xie1, Xingquan Zhang1, Baolun He2,*, Ningyu Zheng2, Yuqiang Xu2,*

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.6, pp. 1385-1395, 2023, DOI:10.32604/fdmp.2023.025454

    Abstract The optimization of methods for the quantitative evaluation of risks in drilling engineering is an effective means to ensure safety in situations where high temperature and high pressure blocks are considered. In such a context, this study analyzes the complexity of the drilled wells in such blocks. It is shown that phenomena such as well kick, loss, circulation, and sticking, are related to the imbalance of wellbore pressure. A method for risk quantitative evaluation is proposed accordingly. The method is used to evaluate the risk for 9 drilled wells. By comparing the predictions of the method with actual historical data… More > Graphic Abstract

    Analysis of the Applicability of a Risk Quantitative Evaluation Method to High Temperature-Pressure Drilling Engineering

  • Open Access

    ARTICLE

    Quantitative Evaluation of Mental-Health in Type-2 Diabetes Patients Through Computational Model

    Fawaz Alassery1, Ahmed Alzahrani2, Asif Irshad Khan2, Ashi Khan3,*, Mohd Nadeem4, Md Tarique Jamal Ansari4

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1701-1715, 2022, DOI:10.32604/iasc.2022.023314

    Abstract A large number of people live in diabetes worldwide. Type-2 Diabetes (D2) accounts for 92% of patients with D2 and puts a huge burden on the healthcare industry. This multi-criterion medical research is based on the data collected from the hospitals of Uttar Pradesh, India. In recent times there is a need for a web-based electronic system to determine the impact of mental health in D2 patients. This study will examine the impact assessment in D2 patients. This paper used the integrated methodology of Fuzzy Analytic Hierarchy (FAHP) and Fuzzy Technique for Order Performance by Similarity to Ideal Solution (FTOPSIS).… More >

  • Open Access

    ARTICLE

    Screening of COVID-19 Patients Using Deep Learning and IoT Framework

    Harshit Kaushik1, Dilbag Singh2, Shailendra Tiwari3, Manjit Kaur2, Chang-Won Jeong4, Yunyoung Nam5,*, Muhammad Attique Khan6

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3459-3475, 2021, DOI:10.32604/cmc.2021.017337

    Abstract In March 2020, the World Health Organization declared the coronavirus disease (COVID-19) outbreak as a pandemic due to its uncontrolled global spread. Reverse transcription polymerase chain reaction is a laboratory test that is widely used for the diagnosis of this deadly disease. However, the limited availability of testing kits and qualified staff and the drastically increasing number of cases have hampered massive testing. To handle COVID-19 testing problems, we apply the Internet of Things and artificial intelligence to achieve self-adaptive, secure, and fast resource allocation, real-time tracking, remote screening, and patient monitoring. In addition, we implement a cloud platform for… More >

  • Open Access

    ARTICLE

    Security-Critical Components Recognition Algorithm for Complex Heterogeneous Information Systems

    Jinxin Zuo1,2, Yueming Lu1,2,*, Hui Gao2,3, Tong Peng1,2, Ziyv Guo2,3, Tong An1,2, Enjie Liu4

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2579-2595, 2021, DOI:10.32604/cmc.2021.016623

    Abstract With the skyrocketing development of technologies, there are many issues in information security quantitative evaluation (ISQE) of complex heterogeneous information systems (CHISs). The development of CHIS calls for an ISQE model based on security-critical components to improve the efficiency of system security evaluation urgently. In this paper, we summarize the implication of critical components in different filed and propose a recognition algorithm of security-critical components based on threat attack tree to support the ISQE process. The evaluation model establishes a framework for ISQE of CHISs that are updated iteratively. Firstly, with the support of asset identification and topology data, we… More >

  • Open Access

    ARTICLE

    Comprehensive Information Security Evaluation Model Based on Multi-Level Decomposition Feedback for IoT

    Jinxin Zuo1, 3, Yueming Lu1, 3, *, Hui Gao2, 3, Ruohan Cao2, 3, Ziyv Guo2, 3, Jim Feng4

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 683-704, 2020, DOI:10.32604/cmc.2020.010793

    Abstract The development of the Internet of Things (IoT) calls for a comprehensive information security evaluation framework to quantitatively measure the safety score and risk (S&R) value of the network urgently. In this paper, we summarize the architecture and vulnerability in IoT and propose a comprehensive information security evaluation model based on multi-level decomposition feedback. The evaluation model provides an idea for information security evaluation of IoT and guides the security decision maker for dynamic protection. Firstly, we establish an overall evaluation indicator system that includes four primary indicators of threat information, asset, vulnerability, and management, respectively. It also includes eleven… More >

  • Open Access

    ARTICLE

    Morphoquantitative evaluation of the duodenal myenteric neuronal population in rats fed with hypoproteic ration

    MARIA RAQUEL MARÇAL NATALI, SONIA LUCY MOLINARI, LUIZ CRISTIANO VALENTINI, MARCÍLIO HUBNER DE MIRANDA NETO.

    BIOCELL, Vol.29, No.1, pp. 39-46, 2005, DOI:10.32604/biocell.2005.29.039

    Abstract The purpose of this work was to analyze the morphoquantitative behavior of the neurons of the myenteric plexus, as well as the morphometry of the duodenal wall, in adult rats fed with normoproteic (22%) and hypoproteic (8%) rations, killed at the age of 345 days. For neuronal assessments duodenal wholemounts stained with the Giemsa method were used, and for the evaluation of the duodenal wall routine histological processing and staining with Hematoxilin-Eosin were employed. The means of the number of neurons in 80 microscopic fields (12.72 mm2 ) and of the size of the neuronal cell bodies did not reveal… More >

  • Open Access

    ARTICLE

    A Method for Vulnerability Database Quantitative Evaluation

    Tiantian Tan1,*, Baosheng Wang1, Yong Tang1, Xu Zhou1, Jingwen Han2

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1129-1144, 2019, DOI:10.32604/cmc.2019.06051

    Abstract During system development, implementation and operation, vulnerability database technique is necessary to system security; there are many vulnerability databases but a lack of quality standardization and general evaluation method are needed. this paper summarized current international popular vulnerability databases, systematically introduced the present situation of current vulnerability databases, and found the problems of vulnerability database technology, extracted common metrics by analyzing vulnerability data of current popular vulnerability databases, introduced 4 measure indexes: the number scale of vulnerabilities, the independence level, the standardization degree and the integrity of vulnerability description, proposed a method for vulnerability database quantitative evaluation using SCAP protocol… More >

Displaying 1-10 on page 1 of 7. Per Page