Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (241)
  • Open Access

    ARTICLE

    Upregulation of miR-324-5p Inhibits Proliferation and Invasion of Colorectal Cancer Cells by Targeting ELAVL1

    Chijiang Gu*, Mingyuan Zhang*, Weiliang Sun*, Changzheng Dong

    Oncology Research, Vol.27, No.5, pp. 515-524, 2019, DOI:10.3727/096504018X15166183598572

    Abstract Colorectal cancer (CRC) is a common clinical cancer that remains incurable in most cases. miRNAs are reported to play a part in the development of various tumors. In the present study, we found that miR-324-5p was downregulated in CRC cells, while ELAV (embryonic lethal, abnormal vision, Drosophila)-like protein 1 (ELAVL1) showed a higher expression. miR-324-5p transfection significantly inhibited the proliferation as well as invasion in both SW620 and SW480 cells. miR-324-5p mimic transfection markedly decreased the expression of ELAVL1. Luciferase reporter gene assay confirmed that ELAVL1 is a direct target of miR- 324-5p. Furthermore, cancer invasion More >

  • Open Access

    ARTICLE

    Personal Data Security and Supervision in the Age of Large Data

    DU Zhen-Yuan

    Intelligent Automation & Soft Computing, Vol.25, No.4, pp. 847-853, 2019, DOI:10.31209/2019.100000088

    Abstract Big data’s fast growth and development has triggered the attention of academic circles. Most of the studies are focusing on the concept of personal data, the definition of data rights, etc. In China, the current status of laws protecting personal data is still scarce and incomplete, relying on specific regulations that are lacking an overall architecture, which has not been efficient in the age of rapid development and application of big data. In the western countries with relatively mature personal data supervision system, the supervision principle is centered on the data subject, and it is More >

  • Open Access

    ARTICLE

    Intelligent Service Robot Vision Control Using Embedded System

    Li-Hong Juang1, Shengxiang Zhang2

    Intelligent Automation & Soft Computing, Vol.25, No.3, pp. 451-458, 2019, DOI:10.31209/2019.100000126

    Abstract Intelligent robots are the combination of computer engineering, software engineering, control engineering, electronic engineering, mechanical engineering, and systems design engineering in order to design, and manufacture useful products. In this paper, the author derives some novel computing and algorithm applications on computer vision and image processing and intelligent control and navigation of mobile robots for the intelligent service robot system. In this paper, we proposed an idea of flexible design for a intelligent service robot, which refers to a single robot with a variety of flexure structure. We presented an integrated system for vision-guided finding More >

  • Open Access

    ARTICLE

    Trust Provision in the Internet of Things Using Transversal Blockchain Networks

    Borja Bordela, Ramon Alcarriab, Diego Martína, Álvaro Sánchez-Picota

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 155-170, 2019, DOI:10.31209/2018.100000052

    Abstract The Internet-of-Things (IoT) paradigm faces new and genuine challenges and problems associated, mainly, with the ubiquitous access to the Internet, the huge number of devices involved and the heterogeneity of the components making up this new global network. In this context, protecting these systems against cyberattacks and cybercrimes has turn into a basic issue. In relation to this topic, most proposed solutions in the literature are focused on security; however other aspects have to be considered (such as privacy or trust). Therefore, in this paper we define a theoretical framework for trust in IoT scenarios, More >

  • Open Access

    ARTICLE

    Digital Vision Based Concrete Compressive Strength Evaluating Model Using Deep Convolutional Neural Network

    Hyun Kyu Shin1, Yong Han Ahn2, Sang Hyo Lee3, Ha Young Kim4,*

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 911-928, 2019, DOI:10.32604/cmc.2019.08269

    Abstract Compressive strength of concrete is a significant factor to assess building structure health and safety. Therefore, various methods have been developed to evaluate the compressive strength of concrete structures. However, previous methods have several challenges in costly, time-consuming, and unsafety. To address these drawbacks, this paper proposed a digital vision based concrete compressive strength evaluating model using deep convolutional neural network (DCNN). The proposed model presented an alternative approach to evaluating the concrete strength and contributed to improving efficiency and accuracy. The model was developed with 4,000 digital images and 61,996 images extracted from video More >

  • Open Access

    ARTICLE

    Research on Robot Control Technology Based on Vision Localization

    Ruijiao Yin1, Jie Yang1,*

    Journal on Artificial Intelligence, Vol.1, No.1, pp. 37-44, 2019, DOI:10.32604/jai.2019.05815

    Abstract Based on the understanding of machine vision localization technology at home and abroad, this paper outlines the overall design of the system, and analyses the working principle and workflow of the robot with vision system in workpiece grinding. The hardware design of the system is introduced. The process of image processing is analyzed in detail, and the results of image processing are given. The basic parameters of camera imaging are taken as internal parameters. The camera calibration is obtained by rotation matrix R and translation parameter T. The coordinate transformation of camera coordinate system and More >

  • Open Access

    ARTICLE

    A Quantum Authorization Management Protocol Based on EPR-Pairs

    Yan Chang1,*, Shibin Zhang1, Lili Yan1, Guihua Han1, Haiquan Song1, Yan Zhang1, Xueyang Li1, Qirun Wang2

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 1005-1014, 2019, DOI:10.32604/cmc.2019.06297

    Abstract Quantum authorization management (QAM) is the quantum scheme for privilege management infrastructure (PMI) problem. Privilege management (authorization management) includes authentication and authorization. Authentication is to verify a user’s identity. Authorization is the process of verifying that a authenticated user has the authority to perform a operation, which is more fine-grained. In most classical schemes, the authority management center (AMC) manages the resources permissions for all network nodes within the jurisdiction. However, the existence of AMC may be the weakest link of the whole scheme. In this paper, a protocol for QAM without AMC is proposed More >

  • Open Access

    ARTICLE

    Blending Basic Shapes By C-Type Splines and Subdivision Scheme

    Xiang Li1, Mei-E Fang1,2,*, QIan Qi2

    CMES-Computer Modeling in Engineering & Sciences, Vol.120, No.1, pp. 45-62, 2019, DOI:10.32604/cmes.2019.05659

    Abstract In this article, we adopt the C-type spline of degree 2 to model and blend basic shapes including conics and circle arcs. The C-type spline belongs to the ωB-spline category of splines that are capable of blending polynomial, trigonometric and hyperbolic functions. Commonly used basic shapes can be exactly represented by these types of splines. We derive explicit formulas for the convenience of modeling the basic curves. The entire blending curve is C1-continuous. In comparison with the existing best blending method by rational G2 splines, which are rational splines of degree 3, the proposed method allows simpler… More >

  • Open Access

    ARTICLE

    Distant Supervised Relation Extraction with Cost-Sensitive Loss

    Daojian Zeng1,2, Yao Xiao1,2, Jin Wang2,*, Yuan Dai1,2, Arun Kumar Sangaiah3

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1251-1261, 2019, DOI:10.32604/cmc.2019.06100

    Abstract Recently, many researchers have concentrated on distant supervision relation extraction (DSRE). DSRE has solved the problem of the lack of data for supervised learning, however, the data automatically labeled by DSRE has a serious problem, which is class imbalance. The data from the majority class obviously dominates the dataset, in this case, most neural network classifiers will have a strong bias towards the majority class, so they cannot correctly classify the minority class. Studies have shown that the degree of separability between classes greatly determines the performance of imbalanced data. Therefore, in this paper we More >

  • Open Access

    ARTICLE

    Portrait Vision Fusion for Augmented Reality

    Li-Hong Juanga, Ming-Ni Wub, Feng-Mao Tsoub

    Intelligent Automation & Soft Computing, Vol.24, No.4, pp. 739-745, 2018, DOI:10.1080/10798587.2017.1327549

    Abstract Kinect(+openCV); Dynamic portrait segmentation; Skeletal tracking; Edge transparent processing; Video interactive More >

Displaying 211-220 on page 22 of 241. Per Page