Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (81)
  • Open Access

    ABSTRACT

    Recovery of 3D Tractions Exerted by Cells on Fibrous Extracellular Matrices

    Dawei Song1,*, Nicholas Hugenberg2, Assad A Oberai1

    Molecular & Cellular Biomechanics, Vol.16, Suppl.2, pp. 45-45, 2019, DOI:10.32604/mcb.2019.07138

    Abstract Tractions exerted by cells on the extracellular matrix (ECM) are critical in many important physiological and pathological processes such as embryonic morphogenesis, cell migration, wound healing, and cancer metastasis. Traction Force Microscopy (TFM) is a robust tool to quantify cellular tractions during cell-matrix interactions. It works by measuring the motion of fiducial markers inside the ECM in response to cellular tractions and using this information to infer the traction field. Most applications of this technique have heretofore assumed that the ECM is homogeneous and isotropic [1], although the native ECM is typically composed of fibrous networks, and thus heterogeneous and… More >

  • Open Access

    ARTICLE

    Effects of PEMFs on Patients’ Recovery after Reconstruction with Use of Double-looped Semitendinosus and Gracilis Tendon Grafts: a Multicenter, Prospective, Randomized and Double-blind Study

    R. Cadossi1, L. Massari2, F. Benazzo3, F. Falez4, S. Giannini5, C. Zorzi6, L. Pederzini7, S. Setti1

    Molecular & Cellular Biomechanics, Vol.3, No.4, pp. 239-240, 2006, DOI:10.32604/mcb.2006.003.239

    Abstract This article has no abstract. More >

  • Open Access

    ABSTRACT

    Post-traumatic recovery mechanism on the ankle articulation

    Asist. Univ. Drd. Abalasei Catalin1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.12, No.3, pp. 95-102, 2009, DOI:10.3970/icces.2009.012.095

    Abstract The mechanism which is going to be made following the technical data presented in this work, represents a major step in the post-traumatic rehabilitation on the ankle articulation. The machine's support is a metallic confection of welded rectangular pipe, metallic profiles and sheet, which assures the appliance of the component parts and contains the sitting basis of the mechanism on the floor. The plaque is the element which directly sustains the person using the mechanism, and which has an oscillating movement in a vertical plane on the circumference. The plaque is turning-proof around the vertical axis of the 1st axel,… More >

  • Open Access

    ABSTRACT

    Extension of an Error Estimator Approach Based on Gradient Recovery for the Panel Method

    B.S. Sousa1, D.R. Petrucci1, A.B. Jorge1, N. Manzanares-Filho1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.4, No.1, pp. 47-52, 2007, DOI:10.3970/icces.2007.004.047

    Abstract The use of computational methods in modern engineering is an irreversible trend, especially in the field of aerodynamics. The validation of these methods is an essential part of their development. In many situations this validation can be made by using experimental results. In other situations, particularly for potential flow methods, the validation can be made by using analytical results (Joukowski, Karman-Trefftz and Van de Vooren airfoils, for example). In general situations, however, especially when no analytical solutions are available (for example, NACA airfoils series), it is highly desirable to know the errors due to the use of numerical methods in… More >

  • Open Access

    ARTICLE

    Electrical Data Matrix Decomposition in Smart Grid

    Qian Dang1, Huafeng Zhang1, Bo Zhao2, Yanwen He2, Shiming He3,*, Hye-Jin Kim4

    Journal on Internet of Things, Vol.1, No.1, pp. 1-7, 2019, DOI:10.32604/jiot.2019.05804

    Abstract As the development of smart grid and energy internet, this leads to a significant increase in the amount of data transmitted in real time. Due to the mismatch with communication networks that were not designed to carry high-speed and real time data, data losses and data quality degradation may happen constantly. For this problem, according to the strong spatial and temporal correlation of electricity data which is generated by human’s actions and feelings, we build a low-rank electricity data matrix where the row is time and the column is user. Inspired by matrix decomposition, we divide the low-rank electricity data… More >

  • Open Access

    ARTICLE

    Selective Adsorption of Ag(I) from Electronic Waste Leachate Using Modified Silk Sericin

    Sijing Zhang1*, Fengjiao Ao1, Yongping Wang2, Junxue Zhao3, Yongliang Ji1, Shuangli Chen1

    Journal of Renewable Materials, Vol.6, No.1, pp. 102-116, 2018, DOI:10.7569/JRM.2017.634154

    Abstract A novel biosorbent was synthesized by grafting bisthiourea (BTU) on a silk sericin (SS) matrix. This biosorbent was denoted as BTU-SS and characterized by Fourier transform infrared spectroscopy (FTIR), zeta potential measurements, elemental analysis, and X-ray photoelectron spectroscopy (XPS). As revealed by the adsorption experiments, both BTU-SS and SS showed low affinity towards coexisting base metallic ions in Ag(I)-Cu(II)-Zn(II)-Ni(II)-Pb(II) electronic waste leachate mixtures, while their adsorption capacities towards Ag(I) reached 30.5 and 10.4 mg·g–1 at a pH of 5.0, respectively. BTU-SS showed higher selectivity towards Ag(I) than SS, as revealed by the Ag(I) partition coefficients between the biosorbents and the… More >

  • Open Access

    ARTICLE

    Reversible Data Hiding in Encrypted Image Based on Block Classification Permutation

    Qun Mo1, Heng Yao1, Fang Cao2, Zheng Chang3, Chuan Qin1,*

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 119-133, 2019, DOI:10.32604/cmc.2019.05770

    Abstract Recently, reversible data hiding in encrypted image (RDHEI) has attracted extensive attention, which can be used in secure cloud computing and privacy protection effectively. In this paper, a novel RDHEI scheme based on block classification and permutation is proposed. Content owner first divides original image into non-overlapping blocks and then set a threshold to classify these blocks into smooth and non-smooth blocks respectively. After block classification, content owner utilizes a specific encryption method, including stream cipher encryption and block permutation to protect image content securely. For the encrypted image, data hider embeds additional secret information in the most significant bits… More >

  • Open Access

    ARTICLE

    A Homogenized Function to Recover Wave Source by Solving a Small Scale Linear System of Differencing Equations

    Chein-Shan Liu1,2,3, Wen Chen1, Ji Lin1

    CMES-Computer Modeling in Engineering & Sciences, Vol.111, No.5, pp. 421-435, 2016, DOI:10.3970/cmes.2016.111.421

    Abstract In order to recover unknown space-dependent function G(x) or unknown time-dependent function H(t) in the wave source F(x; t) = G(x)H(t), we develop a technique of homogenized function and differencing equations, which can significantly reduce the difficulty in the inverse wave source recovery problem, only needing to solve a few equations in the problem domain, since the initial condition/ boundary conditions and a supplementary final time condition are satisfied automatically. As a consequence, the eigenfunctions are used to expand the trial solutions, and then a small scale linear system is solved to determine the expansion coefficients from the differencing equations.… More >

  • Open Access

    ARTICLE

    GFCache: A Greedy Failure Cache Considering Failure Recency and Failure Frequency for an Erasure-Coded Storage System

    Mingzhu Deng1, Fang Liu2,*, Ming Zhao3, Zhiguang Chen2, Nong Xiao2,1

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 153-167, 2019, DOI:10.32604/cmc.2019.03585

    Abstract In the big data era, data unavailability, either temporary or permanent, becomes a normal occurrence on a daily basis. Unlike the permanent data failure, which is fixed through a background job, temporarily unavailable data is recovered on-the-fly to serve the ongoing read request. However, those newly revived data is discarded after serving the request, due to the assumption that data experiencing temporary failures could come back alive later. Such disposal of failure data prevents the sharing of failure information among clients, and leads to many unnecessary data recovery processes, (e.g. caused by either recurring unavailability of a data or multiple… More >

  • Open Access

    ARTICLE

    Self-embedding Image Watermarking based on Combined Decision Using Pre-offset and Post-offset Blocks

    Daofu Gong1,2, Yan Chen1,2, Haoyu Lu1,*, Zhenyu Li3, Yibing Han1

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 243-260, 2018, DOI:10.32604/cmc.2018.03781

    Abstract To detect and recover random tampering areas, a combined-decision-based self-embedding watermarking scheme is proposed herein. In this scheme, the image is first partitioned into 2×2 size blocks. Next, the high 5 bits of a block’s average value is embedded into its offset block. The tampering type of block is detected by comparing the watermarks of its pre-offset and post-offset blocks. The theoretical analysis and experiments demonstrate that the proposed scheme not only has a lower ratio of false detection but also better performance with regard to avoiding random tampering. More >

Displaying 71-80 on page 8 of 81. Per Page