Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (56)
  • Open Access

    ARTICLE

    Stress-Based Plaque Vulnerability Index and Assessment for Carotid Atherosclerotic Plaques Using Patient-Specific Vessel Material Properties

    Qingyu Wang1, Dalin Tang1,2,*, Gador Canton3, Zheyang Wu2, Thomas S. Hatsukami4, Kristen L. Billiar5, Chun Yuan6

    Molecular & Cellular Biomechanics, Vol.15, No.4, pp. 189-201, 2018, DOI:10.32604/mcb.2018.04572

    Abstract Cardiovascular diseases are closely linked to atherosclerotic plaque development and rupture. Assessment of plaque vulnerability is of fundamental significance to cardiovascular research and disease diagnosis, prevention, treatment and management. Magnetic resonance image (MRI) data of carotid atherosclerotic plaques from 8 patients (5 male, 3 female; age: 62-83, mean=71) were acquired at the University of Washington (UW), Seattle by the Vascular Imaging Laboratory (VIL) with written informed consent obtained. Patient-specific vessel material properties were quantified using Cine MRI data for modeling use. 3D thin-layer models were used to obtain plaque stress and strain for plaque assessment. A stress-based plaque vulnerability index… More >

  • Open Access

    ARTICLE

    The Correlation Between Texture Features and Fibrous Cap Thickness of Lipid-Rich Atheroma Based on Optical Coherence Tomography Imaging

    Chunliu He1, Jiaqiu Wang2, Yuxiang Huang1, Tongjing Zhu1, Yuehong Miao1, Zhiyong Li1,2*

    Molecular & Cellular Biomechanics, Vol.13, No.1, pp. 23-36, 2016, DOI:10.3970/mcb.2016.013.027

    Abstract Fibrous cap thickness (FCT) is seen as critical to plaque vulnerability. Therefore, the development of automatic algorithms for the quantification of FCT is for estimating cardiovascular risk of patients. Intravascular optical coherence tomography (IVOCT) is currently the only in vivo imaging modality with which FCT, the critical component of plaque vulnerability, can be assessed accurately. This study was aimed to discussion the correlation between the texture features of OCT images and the FCT in lipid-rich atheroma. Methods: Firstly, a full automatic segmentation algorithm based on unsupervised fuzzy c means (FCM) clustering with geometric constrains was developed to segment the ROIs… More >

  • Open Access

    ARTICLE

    IVUS-Based Computational Modeling and Planar Biaxial Artery Material Properties for Human Coronary Plaque Vulnerability Assessment

    Molecular & Cellular Biomechanics, Vol.9, No.1, pp. 77-94, 2012, DOI:10.3970/mcb.2012.009.077

    Abstract Image-based computational modeling has been introduced for vulnerable atherosclerotic plaques to identify critical mechanical conditions which may be used for better plaque assessment and rupture predictions. In vivo patient-specific coronary plaque models are lagging due to limitations on non-invasive image resolution, flow data, and vessel material properties. A framework is proposed to combine intravascular ultrasound (IVUS) imaging, biaxial mechanical testing and computational modeling with fluid-structure interactions and anisotropic material properties to acquire better and more complete plaque data and make more accurate plaque vulnerability assessment and predictions. Impact of pre-shrink-stretch process, vessel curvature and high blood pressure on stress, strain,… More >

  • Open Access

    ARTICLE

    CM-Droid: Secure Container for Android Password Misuse Vulnerability

    Wen Zhang1, Keyue Li1,*, Tianyang Li1, Shaozhang Niu1, Zhenguang Gao2

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 181-198, 2019, DOI:10.32604/cmc.2019.05813

    Abstract Android applications are associated with a large amount of sensitive data, therefore application developers use encryption algorithms to provide user data encryption, authentication and data integrity protection. However, application developers do not have the knowledge of cryptography, thus the cryptographic algorithm may not be used correctly. As a result, security vulnerabilities are generated. Based on the previous studies, this paper summarizes the characteristics of password misuse vulnerability of Android application software, establishes an evaluation model to rate the security level of the risk of password misuse vulnerability and develops a repair strategy for password misuse vulnerability. And on this basis,… More >

  • Open Access

    ARTICLE

    A Framework for Comprehensive Impact Assessment in the Case of an ExtremeWinter Scenario, Considering Integrative Aspects of Systemic Vulnerability and Resilience

    Riitta Molarius1, Pekka Tuomaala1, Kalevi Piira1, Minna Räikkönen1, Christoph Aubrecht2, Maria Polese3, Giulio Zuccaro3,4, KaroliinaPilli-Sihvola5, Kalev Ranna

    CMES-Computer Modeling in Engineering & Sciences, Vol.109-110, No.2, pp. 131-158, 2015, DOI:10.3970/cmes.2015.109.131

    Abstract In northern regions, society can be seriously interrupted by a prolonged electricity network blackout due to a winter storm that cuts off power, communication and road networks. Due to hard winter weather it is essential to enhance the resilience of society to avoid danger to life. This can be achieved by developing new models to enhance preparedness for coming disaster events and to support rescue and other authorities to focus their resources on the most vulnerable targets in actual cases of emergencies. This paper presents a part of the results of activities performed within the EU project ‘CRISMA – Modelling… More >

  • Open Access

    ARTICLE

    The Application of BP Neural Networks to Analysis the National Vulnerability

    Guodong Zhao1, Yuewei Zhang1, Yiqi Shi2, Haiyan Lan1,*, Qing Yang3

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 421-436, 2019, DOI:10.32604/cmc.2019.03782

    Abstract Climate change is the main factor affecting the country’s vulnerability, meanwhile, it is also a complicated and nonlinear dynamic system. In order to solve this complex problem, this paper first uses the analytic hierarchy process (AHP) and natural breakpoint method (NBM) to implement an AHP-NBM comprehensive evaluation model to assess the national vulnerability. By using ArcGIS, national vulnerability scores are classified and the country’s vulnerability is divided into three levels: fragile, vulnerable, and stable. Then, a BP neural network prediction model which is based on multivariate linear regression is used to predict the critical point of vulnerability. The function of… More >

Displaying 51-60 on page 6 of 56. Per Page