Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,233)
  • Open Access

    ARTICLE

    Évaluation d’un second traitement chirurgical conservateur pour récidive locale d’un cancer du sein
    Assessment of a Second Surgical Conservative Treatment for Ipsilateral Recurrence of a Breast Cancer

    F. Guillemin, F. Marchal, M. Geffroy

    Oncologie, Vol.21, No.1, pp. 22-28, 2019, DOI:10.3166/onco-2019-0028

    Abstract Purpose: Assessment of a second surgical conservative treatment (T) [N = 41] compared to total mastectomy (M) [N = 93] for ipsilateral breast tumor recurrence after initial breast conserving surgery in a retrospective study of 134 patients. Results: Five years global survival was 82.5% in each group. No statistical difference for the specific survival and survival without metastasis. The 5 years local control was 92.9% in group M and 66.2% in group T (RR = 4.48). Lymphovascular invasion (LVI), multifocal tumors, and clinical symptoms of the recurrence are pejorative factors for survival. Over the 134 patients, 25 have preserved their… More >

  • Open Access

    ARTICLE

    Protocole d’IRM abrégée pour le diagnostic et le dépistage du cancer du sein
    Abbreviated Breast MRI for Diagnostic and Screening of Breast Carcinoma

    G. Oldrini, P. Henrot, F. Marchal

    Oncologie, Vol.21, No.1, pp. 17-21, 2019, DOI:10.3166/onco-2019-0033

    Abstract Breast cancer is the first female cancer in France and its early detection is essential. Breast MRI is an element of choice in its diagnosis but it has high direct and indirect costs because of its duration which slows down its wider use. Given its elements, the use of an abbreviated protocol develops to overcome these disadvantages. Early literature data suggests that this faster examination also allows for a shorter interpretation time. In addition, the sensitivity and specificity of the examination are not inferior to that of the complete protocol. This article explains the new concept and its interest, compares… More >

  • Open Access

    ARTICLE

    L’exploration axillaire en pratique quotidienne dans le parcours diagnostique d’un cancer du sein
    Axillary staging in daily practice in the diagnosis of breast cancer

    J. Boudier, G. Oldrini, C. Barlier, A. Lesur

    Oncologie, Vol.21, No.1, pp. 11-16, 2019, DOI:10.3166/onco-2019-0034

    Abstract When a breast cancer is diagnosed, the quality of the evaluation before treatment is essential to guide the therapeutic decision. The staging axillary is necessary because it estimates the regional extension of the disease, which makes it a paramount prognosis factor. Some different preoperative medical imaging can reveal metastasis axillary nodes. However, the axillary ultrasound remains the reference imaging and it also leads the biopsies too. Since theACOSOG-Z0011 trial, we are facing a therapeutic deescalation in the axillary surgery. According to recent results, we can note that the position of the axillary imaging is more and more important. The purpose… More >

  • Open Access

    ARTICLE

    L’exploration axillaire : un standard du bilan préthérapeutique
    Axillary Evaluation: a Standard in Pretreatment Staging

    S. Dejust

    Oncologie, Vol.21, No.1, pp. 5-10, 2019, DOI:10.3166/onco-2019-0031

    Abstract Axillary evaluation is a major step in the initial staging of breast cancer. Ultrasound guided biopsy is currently recommended in first-line. MRI and 18FDG PET/CT are useful in axillary lymph node evaluation. Imaging sensitivities and specificities are globally identical and their combination allows obtaining the best performances. Currently, sentinel node technique is essential in case of T1-T2 N0 mammary tumors and in case of suspected lymph node adenopathy with negative cytopuncture or microbiopsy.


    Résumé
    L’exploration préthérapeutique axillaire est une étape majeure du bilan initial du cancer du sein. L’échographie associée à un prélèvement est actuellement recommandée en première intention. L’IRM et la… More >

  • Open Access

    EDITORIAL

    Cancer du sein: évolution des dogmes
    Breast Cancer: Evolving Concepts

    A. Lesur, F. Guillemin

    Oncologie, Vol.21, No.1, pp. 3-4, 2019, DOI:10.3166/onco-2019-0032

    Abstract This article has no abstract. More >

  • Open Access

    BIOGRAPHICAL

    Hommages à Pierre-Marie Martin
    Tributes to Pierre-Marie Martin

    H. Magdelénat, J. Rouessé

    Oncologie, Vol.21, No.1, pp. 1-2, 2019, DOI:10.3166/onco-2019-0022

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Exploring Hybrid Genetic Algorithm Based Large-Scale Logistics Distribution for BBG Supermarket

    Yizhi Liu1,2, Rutian Qing1,2,*, Liangran Wu1,2, Min Liu1,2, Zhuhua Liao1,2, Yijiang Zhao1,2

    Journal on Artificial Intelligence, Vol.3, No.1, pp. 33-43, 2021, DOI:10.32604/jai.2021.016565

    Abstract In the large-scale logistics distribution of single logistic center, the method based on traditional genetic algorithm is slow in evolution and easy to fall into the local optimal solution. Addressing at this issue, we propose a novel approach of exploring hybrid genetic algorithm based large-scale logistic distribution for BBG supermarket. We integrate greedy algorithm and hillclimbing algorithm into genetic algorithm. Greedy algorithm is applied to initialize the population, and then hill-climbing algorithm is used to optimize individuals in each generation after selection, crossover and mutation. Our approach is evaluated on the dataset of BBG Supermarket which is one of the… More >

  • Open Access

    ARTICLE

    PS-Fuzz: Efficient Graybox Firmware Fuzzing Based on Protocol State

    Xiaoyi Li, Xiaojun Pan, Yanbin Sun*

    Journal on Artificial Intelligence, Vol.3, No.1, pp. 21-31, 2021, DOI:10.32604/jai.2021.017328

    Abstract The rise of the Internet of Things (IoT) exposes more and more important embedded devices to the network, which poses a serious threat to people’s lives and property. Therefore, ensuring the safety of embedded devices is a very important task. Fuzzing is currently the most effective technique for discovering vulnerabilities. In this work, we proposed PS-Fuzz (Protocol State Fuzz), a gray-box fuzzing technique based on protocol state orientation. By instrumenting the program that handles protocol fields in the firmware, the problem of lack of guidance information in common protocol fuzzing is solved. By recording and comparing state transition paths, the… More >

  • Open Access

    ARTICLE

    An Anomaly Detection Method of Industrial Data Based on Stacking Integration

    Kunkun Wang1,2, Xianda Liu2,3,4,*

    Journal on Artificial Intelligence, Vol.3, No.1, pp. 9-19, 2021, DOI:10.32604/jai.2021.016706

    Abstract With the development of Internet technology, the computing power of data has increased, and the development of machine learning has become faster and faster. In the industrial production of industrial control systems, quality inspection and safety production of process products have always been our concern. Aiming at the low accuracy of anomaly detection in process data in industrial control system, this paper proposes an anomaly detection method based on stacking integration using the machine learning algorithm. Data are collected from the industrial site and processed by feature engineering. Principal component analysis (PCA) and integrated rule tree method are adopted to… More >

  • Open Access

    ARTICLE

    An Adversarial Attack System for Face Recognition

    Yuetian Wang, Chuanjing Zhang, Xuxin Liao, Xingang Wang, Zhaoquan Gu*

    Journal on Artificial Intelligence, Vol.3, No.1, pp. 1-8, 2021, DOI:10.32604/jai.2021.014175

    Abstract Deep neural networks (DNNs) are widely adopted in daily life and the security problems of DNNs have drawn attention from both scientific researchers and industrial engineers. Many related works show that DNNs are vulnerable to adversarial examples that are generated with subtle perturbation to original images in both digital domain and physical domain. As a most common application of DNNs, face recognition systems are likely to cause serious consequences if they are attacked by the adversarial examples. In this paper, we implement an adversarial attack system for face recognition in both digital domain that generates adversarial face images to fool… More >

Displaying 12301-12310 on page 1231 of 22233. Per Page