Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (342)
  • Open Access

    ARTICLE

    Noninherited Factors in Fetal Congenital Heart Diseases Based on Bayesian Network: A Large Multicenter Study

    Yanping Ruan1,#, Xiangyu Liu2,#, Haogang Zhu3,*, Yijie Lu3, Xiaowei Liu1, Jiancheng Han1, Lin Sun1, Ye Zhang1, Xiaoyan Gu1, Ying Zhao1, Lei Li2, Suzhen Ran4, Jingli Chen5, Qiong Yu6, Yan Xu7, Hongmei Xia8, Yihua He1,*

    Congenital Heart Disease, Vol.16, No.6, pp. 529-549, 2021, DOI:10.32604/CHD.2021.015862 - 08 July 2021

    Abstract Background: Current studies have confirmed that fetal congenital heart diseases (CHDs) are caused by various factors. However, the quantitative risk of CHD is not clear given the combined effects of multiple factors. Objective: This cross-sectional study aimed to detect associated factors of fetal CHD using a Bayesian network in a large sample and quantitatively analyze relative risk ratios (RRs). Methods: Pregnant women who underwent fetal echocardiography (N = 16,086 including 3,312 with CHD fetuses) were analyzed. Twenty-six maternal and fetal factors were obtained. A Bayesian network is constructed based on all variables through structural learning and parameter… More >

  • Open Access

    ARTICLE

    A Mortality Risk Assessment Approach on ICU Patients Clinical Medication Events Using Deep Learning

    Dejia Shi1, Hanzhong Zheng2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.128, No.1, pp. 161-181, 2021, DOI:10.32604/cmes.2021.014917 - 28 June 2021

    Abstract ICU patients are vulnerable to medications, especially infusion medications, and the rate and dosage of infusion drugs may worsen the condition. The mortality prediction model can monitor the real-time response of patients to drug treatment, evaluate doctors’ treatment plans to avoid severe situations such as inverse Drug-Drug Interactions (DDI), and facilitate the timely intervention and adjustment of doctor’s treatment plan. The treatment process of patients usually has a time-sequence relation (which usually has the missing data problem) in patients’ treatment history. The state-of-the-art method to model such time-sequence is to use Recurrent Neural Network (RNN).… More >

  • Open Access

    ARTICLE

    Study of Burning Behaviors and Fire Risk of Flame Retardant Plywood by Cone Calorimeter and TG Test

    Liping Yu1, Zhongyou Luo1, Lifen Li1, Xuedong Xi2,3, Zhigang Wu1,2,*, Bengang Zhang4,*

    Journal of Renewable Materials, Vol.9, No.12, pp. 2143-2157, 2021, DOI:10.32604/jrm.2021.016092 - 22 June 2021

    Abstract A flame retardant composition was prepared by using phosphoguanidine, guanidine sulfamate, disodium octaborate tetrahydrate and dodecyl dimethyl benzyl ammonium chloride. Veneers were immersed in such flame retardant mixture to prepare plywood. The combustion characteristics and thermal stability of plywood were assessed using a cone calorimeter and TG. Results showed that: (1) High concentration and loading of flame retardant were beneficial for the fire resistance of the plywood. (2) The limiting oxygen index (LOI) and residual mass of plywood processed using the flame retardant was increased by 87.52% and 58.66% compared to those of the untreated… More >

  • Open Access

    ARTICLE

    CNN-Based Voice Emotion Classification Model for Risk Detection

    Hyun Yoo1, Ji-Won Baek2, Kyungyong Chung3,*

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 319-334, 2021, DOI:10.32604/iasc.2021.018115 - 16 June 2021

    Abstract With the convergence and development of the Internet of things (IoT) and artificial intelligence, closed-circuit television, wearable devices, and artificial neural networks have been combined and applied to crime prevention and follow-up measures against crimes. However, these IoT devices have various limitations based on the physical environment and face the fundamental problem of privacy violations. In this study, voice data are collected and emotions are classified based on an acoustic sensor that is free of privacy violations and is not sensitive to changes in external environments, to overcome these limitations. For the classification of emotions… More >

  • Open Access

    ARTICLE

    Improved Attribute Chain Sampling Plan for Darna Distribution

    Harsh Tripathi1, Amer Ibrahim Al-Omari2, Mahendra Saha1, Ayed R. A. Alanzi3,*

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 381-392, 2021, DOI:10.32604/csse.2021.015624 - 19 May 2021

    Abstract Recently, the Darna distribution has been introduced as a new lifetime distribution. The two-parameter Darna distribution represents is a mixture of two well-known gamma and exponential distributions. A manufacturer or an engineer of products conducts life testing to examine whether the quality level of products meets the customer’s requirements, such as reliability or the minimum lifetime. In this article, an attribute modified chain sampling inspection plan based on the time truncated life test is proposed for items whose lifetime follows the Darna distribution. The plan parameters, including the sample size, the acceptance number, and the… More >

  • Open Access

    ARTICLE

    Hypertension and Heart Failure as Predictors of Mortality in an Adult Congenital Heart Defect Population

    Cheryl Raskind-Hood1,*, Kashaine A. Gray2,3, Jayne Morgan3, Wendy M. Book4,*

    Congenital Heart Disease, Vol.16, No.4, pp. 333-355, 2021, DOI:10.32604/CHD.2021.014384 - 19 April 2021

    Abstract Early intervention to prevent premature mortality is vital for adults with congenital heart defects (CHD). Anatomic complexity and comorbid conditions are thought to contribute to CHD mortality. Since hypertension (HTN) and heart failure (HF) are the comorbid conditions among the most prevalent causes of death in the United States, and commonly accompany CHD, it is crucial to evaluate whether they are reliable predictors of mortality for adults with CHD (ACHD) independent of anatomic CHD complexity. A retrospective cross-sectional analysis of ACHD, aged 18–64, with concomitant HTN and/or HF and at least one health care encounter… More >

  • Open Access

    ARTICLE

    A Network Security Risk Assessment Method Based on a B_NAG Model

    Hui Wang1, Chuanhan Zhu1, Zihao Shen1,*, Dengwei Lin2, Kun Liu1, MengYao Zhao3

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 103-117, 2021, DOI:10.32604/csse.2021.014680 - 01 April 2021

    Abstract Computer networks face a variety of cyberattacks. Most network attacks are contagious and destructive, and these types of attacks can be harmful to society and computer network security. Security evaluation is an effective method to solve network security problems. For accurate assessment of the vulnerabilities of computer networks, this paper proposes a network security risk assessment method based on a Bayesian network attack graph (B_NAG) model. First, a new resource attack graph (RAG) and the algorithm E-Loop, which is applied to eliminate loops in the B_NAG, are proposed. Second, to distinguish the confusing relationships between… More >

  • Open Access

    ARTICLE

    Systematic Analysis of Safety and Security Risks in Smart Homes

    Habib Ullah Khan1,*, Mohammad Kamel Alomari1, Sulaiman Khan2, Shah Nazir2, Asif Qumer Gill3, Alanoud Ali Al-Maadid4, Zaki Khalid Abu-Shawish1, Mostafa Kamal Hassan1

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1409-1428, 2021, DOI:10.32604/cmc.2021.016058 - 22 March 2021

    Abstract The revolution in Internet of Things (IoT)-based devices and applications has provided smart applications for humans. These applications range from healthcare to traffic-flow management, to communication devices, to smart security devices, and many others. In particular, government and private organizations are showing significant interest in IoT-enabled applications for smart homes. Despite the perceived benefits and interest, human safety is also a key concern. This research is aimed at systematically analyzing the available literature on smart homes and identifying areas of concern or risk with a view to supporting the design of safe and secure smart More >

  • Open Access

    ARTICLE

    Evaluating the Risk of Disclosure and Utility in a Synthetic Dataset

    Kang-Cheng Chen1, Chia-Mu Yu2,*, Tooska Dargahi3

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 761-787, 2021, DOI:10.32604/cmc.2021.014984 - 22 March 2021

    Abstract The advancement of information technology has improved the delivery of financial services by the introduction of Financial Technology (FinTech). To enhance their customer satisfaction, Fintech companies leverage artificial intelligence (AI) to collect fine-grained data about individuals, which enables them to provide more intelligent and customized services. However, although visions thereof promise to make customers’ lives easier, they also raise major security and privacy concerns for their users. Differential privacy (DP) is a common privacy-preserving data publishing technique that is proved to ensure a high level of privacy preservation. However, an important concern arises from the… More >

  • Open Access

    ARTICLE

    Managing Software Security Risks through an Integrated Computational Method

    Abdullah Alharbi1, Wael Alosaimi1, Hashem Alyami2, Mohd Nadeem3, Mohd Faizan3, Alka Agrawal3, Rajeev Kumar3,4,*, Raees Ahmad Khan3

    Intelligent Automation & Soft Computing, Vol.28, No.1, pp. 179-194, 2021, DOI:10.32604/iasc.2021.016646 - 17 March 2021

    Abstract Security risk evaluation of web-based healthcare applications is important from a design perspective. The developers as well as the users need to make sure that the applications must be secure. Citing the disastrous effects of unsecured web applications, Accuntix Online states that the IT industry has lost millions of dollars due to security theft and malware attacks. Protecting the integrity of patients’ health data is of utmost importance. Thus, assessing the security risk of web-based healthcare applications should be accorded the highest priority while developing the web applications. To fulfill the security requirements, the developers must… More >

Displaying 181-190 on page 19 of 342. Per Page