Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,233)
  • Open Access

    ARTICLE

    Characteristics of In-Hospital Patients with Congenital Heart Disease Requiring Rapid Response System Activations: A Japanese Database Study

    Taiki Haga1,*, Tomoyuki Masuyama2, Yoshiro Hayashi3, Takahiro Atsumi4, Kenzo Ishii5, Shinsuke Fujiwara6

    Congenital Heart Disease, Vol.17, No.1, pp. 31-43, 2022, DOI:10.32604/CHD.2022.017407

    Abstract Objectives: This study aimed to study the characteristics of in-hospital deterioration in patients with congenital heart disease who required rapid response system activation and identify risk factors associated with 1-month mortality. Methods: We retrospectively analysed data from a Japanese rapid response system registry with 35 participating hospitals. We included consecutive patients with congenital heart disease who required rapid response system activation between January 2014 and March 2018. Logistic regression analyses were performed to examine the associations between 1-month mortality and other patient-specific variables. Results: Among 9,607 patients for whom the rapid response system was activated, only 82 (0.9%) had congenital… More >

  • Open Access

    ARTICLE

    A Generalized State Space Average Model for Parallel DC-to-DC Converters

    Hasan Alrajhi*

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 717-734, 2022, DOI:10.32604/csse.2022.021279

    Abstract The high potentiality of integrating renewable energies, such as photovoltaic, into a modern electrical microgrid system, using DC-to-DC converters, raises some issues associated with controller loop design and system stability. The generalized state space average model (GSSAM) concept was consequently introduced to design a DC-to-DC converter controller in order to evaluate DC-to-DC converter performance and to conduct stability studies. This paper presents a GSSAM for parallel DC-to-DC converters, namely: buck, boost, and buck-boost converters. The rationale of this study is that modern electrical systems, such as DC networks, hybrid microgrids, and electric ships, are formed by parallel DC-to-DC converters with… More >

  • Open Access

    ARTICLE

    Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol

    S. Gladson Oliver1,*, T. Purusothaman2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 767-780, 2022, DOI:10.32604/csse.2022.020888

    Abstract Internet of things enables every real world objects to be seamlessly integrated with traditional internet. Heterogeneous objects of real world are enhanced with capability to communicate, computing capabilities and standards to interoperate with existing network and these entities are resource constrained and vulnerable to various security attacks. Huge number of research works are being carried out to analyze various possible attacks and to propose standards for securing communication between devices in internet of things (IoT). In this article, a robust and lightweight authentication scheme for mutual authentication between client and server using constrained application protocol is proposed. Internet of things… More >

  • Open Access

    ARTICLE

    Evaluating the Impacts of Security-Durability Characteristic: Data Science Perspective

    Abdullah Alharbi1, Masood Ahmad2, Wael Alosaimi1, Hashem Alyami3, Alka Agrawal2, Rajeev Kumar4,*, Abdul Wahid5, Raees Ahmad Khan2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 557-567, 2022, DOI:10.32604/csse.2022.020843

    Abstract Security has always been a vital research topic since the birth of web application. A great deal of research has been conducted to determine the ways of identifying and classifying security issues or goals However, in the recent years, it has been noticed that high secure web applications have less durability; thus reducing their business continuity. High security features of a web application are worthless unless they provide effective services to the user and meet the standards of commercial viability. Hence, there is a need to bridge the gap between security and durability of the web application. Indeed, security mechanisms… More >

  • Open Access

    ARTICLE

    Stochastic Gradient Boosting Model for Twitter Spam Detection

    K. Kiruthika Devi1,*, G. A. Sathish Kumar2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 849-859, 2022, DOI:10.32604/csse.2022.020836

    Abstract

    In today’s world of connectivity there is a huge amount of data than we could imagine. The number of network users are increasing day by day and there are large number of social networks which keeps the users connected all the time. These social networks give the complete independence to the user to post the data either political, commercial or entertainment value. Some data may be sensitive and have a greater impact on the society as a result. The trustworthiness of data is important when it comes to public social networking sites like facebook and twitter. Due to the large… More >

  • Open Access

    ARTICLE

    Graphics Evolutionary Computations in Higher Order Parametric Bezier Curves

    Monday Eze1,*, Charles Okunbor2, Deborah Aleburu3, Olubukola Adekola1, Ibrahim Ramon4, Nneka Richard-Nnabu5, Oghenetega Avwokuruaye6, Abisola Olayiwola3, Rume Yoro7, Esomu Solomon8

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 595-609, 2022, DOI:10.32604/csse.2022.020835

    Abstract This work demonstrates in practical terms the evolutionary concepts and computational applications of Parametric Curves. Specific cases were drawn from higher order parametric Bezier curves of degrees 2 and above. Bezier curves find real life applications in diverse areas of Engineering and Computer Science, such as computer graphics, robotics, animations, virtual reality, among others. Some of the evolutionary issues explored in this work are in the areas of parametric equations derivations, proof of related theorems, first and second order calculus related computations, among others. A Practical case is demonstrated using a graphical design, physical hand sketching, and programmatic implementation of… More >

  • Open Access

    ARTICLE

    Brain Image Classification Using Time Frequency Extraction with Histogram Intensity Similarity

    Thangavel Renukadevi1,*, Kuppusamy Saraswathi1, P. Prabu2, K. Venkatachalam3

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 645-460, 2022, DOI:10.32604/csse.2022.020810

    Abstract Brain medical image classification is an essential procedure in Computer-Aided Diagnosis (CAD) systems. Conventional methods depend specifically on the local or global features. Several fusion methods have also been developed, most of which are problem-distinct and have shown to be highly favorable in medical images. However, intensity-specific images are not extracted. The recent deep learning methods ensure an efficient means to design an end-to-end model that produces final classification accuracy with brain medical images, compromising normalization. To solve these classification problems, in this paper, Histogram and Time-frequency Differential Deep (HTF-DD) method for medical image classification using Brain Magnetic Resonance Image… More >

  • Open Access

    ARTICLE

    Analysis of the Desynchronization Attack Impact on the E2EA Scheme

    Shadi Nashwan*

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 625-644, 2022, DOI:10.32604/csse.2022.020799

    Abstract The healthcare IoT system is considered to be a significant and modern medical system. There is broad consensus that these systems will play a vital role in the achievement of economic growth in numerous growth countries. Among the major challenges preventing the fast and widespread adoption of such systems is the failure to maintain the data privacy of patients and the integrity of remote clinical diagnostics. Recently, the author proposed an end-to-end authentication scheme for healthcare IoT systems (E2EA), to provide a mutual authentication with a high data rate between the communication nodes of the healthcare IoT systems. Although the… More >

  • Open Access

    ARTICLE

    Parallel Cloth Simulation Using OpenGL Shading Language

    Hongly Va1, Min-Hyung Choi2, Min Hong3,*

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 427-443, 2022, DOI:10.32604/csse.2022.020685

    Abstract The primary goal of cloth simulation is to express object behavior in a realistic manner and achieve real-time performance by following the fundamental concept of physic. In general, the mass–spring system is applied to real-time cloth simulation with three types of springs. However, hard spring cloth simulation using the mass–spring system requires a small integration time-step in order to use a large stiffness coefficient. Furthermore, to obtain stable behavior, constraint enforcement is used instead of maintenance of the force of each spring. Constraint force computation involves a large sparse linear solving operation. Due to the large computation, we implement a… More >

  • Open Access

    ARTICLE

    Evaluation of NFC-Guidable System to Manage Polypharmacy in Elderly Patients

    Khalid Alzahrani1,*, Mrim Alnfiai2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 445-460, 2022, DOI:10.32604/csse.2022.020620

    Abstract A complete and thorough understanding by patients of their prescriptions is one of the most critical components of a successful treatment journey. Being unfamiliar with the intricacies of prescribed medication can cause serious health risks due to not adhering to prescription instructions or noting potential drug interactions, which can lead to life-threatening injuries. Pharmacists face communication barriers (including non-English speaking patients), lack of time, lack of knowledge, workload, and frequent interruption when dispensing medicines often preventing them from providing the necessary guidance to their patients. To minimize this risk, an NFC-Guidable polypharmacy system was developed integrating Near Field Technology (NFC)… More >

Displaying 10311-10320 on page 1032 of 22233. Per Page