Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (921)
  • Open Access

    ARTICLE

    BCCLR: A Skeleton-Based Action Recognition with Graph Convolutional Network Combining Behavior Dependence and Context Clues

    Yunhe Wang1, Yuxin Xia2, Shuai Liu2,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4489-4507, 2024, DOI:10.32604/cmc.2024.048813

    Abstract In recent years, skeleton-based action recognition has made great achievements in Computer Vision. A graph convolutional network (GCN) is effective for action recognition, modelling the human skeleton as a spatio-temporal graph. Most GCNs define the graph topology by physical relations of the human joints. However, this predefined graph ignores the spatial relationship between non-adjacent joint pairs in special actions and the behavior dependence between joint pairs, resulting in a low recognition rate for specific actions with implicit correlation between joint pairs. In addition, existing methods ignore the trend correlation between adjacent frames within an action and context clues, leading to… More >

  • Open Access

    ARTICLE

    Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust

    Xiaoyan Zhu1, Ruchun Jia2, Tingrui Zhang3, Song Yao4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4363-4377, 2024, DOI:10.32604/cmc.2023.045615

    Abstract The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect, which is easy to leads to the problem that the data is usurped. Starting from the application of the ATC (automatic train control) network, this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data. Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation, this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the… More >

  • Open Access

    ARTICLE

    Enhancing ChatGPT’s Querying Capability with Voice-Based Interaction and CNN-Based Impair Vision Detection Model

    Awais Ahmad1, Sohail Jabbar1,*, Sheeraz Akram1, Anand Paul2, Umar Raza3, Nuha Mohammed Alshuqayran1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3129-3150, 2024, DOI:10.32604/cmc.2024.045385

    Abstract This paper presents an innovative approach to enhance the querying capability of ChatGPT, a conversational artificial intelligence model, by incorporating voice-based interaction and a convolutional neural network (CNN)-based impaired vision detection model. The proposed system aims to improve user experience and accessibility by allowing users to interact with ChatGPT using voice commands. Additionally, a CNN-based model is employed to detect impairments in user vision, enabling the system to adapt its responses and provide appropriate assistance. This research tackles head-on the challenges of user experience and inclusivity in artificial intelligence (AI). It underscores our commitment to overcoming these obstacles, making ChatGPT… More >

  • Open Access

    ARTICLE

    A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM

    Navaneetha Krishnan Muthunambu1, Senthil Prabakaran2, Balasubramanian Prabhu Kavin3, Kishore Senthil Siruvangur4, Kavitha Chinnadurai1, Jehad Ali5,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3089-3127, 2024, DOI:10.32604/cmc.2023.043172

    Abstract The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the Internet. Regrettably, this development has expanded the potential targets that hackers might exploit. Without adequate safeguards, data transmitted on the internet is significantly more susceptible to unauthorized access, theft, or alteration. The identification of unauthorised access attempts is a critical component of cybersecurity as it aids in the detection and prevention of malicious attacks. This research paper introduces a novel intrusion detection framework that utilizes Recurrent Neural Networks (RNN) integrated with… More >

  • Open Access

    ARTICLE

    A Deep Reinforcement Learning-Based Technique for Optimal Power Allocation in Multiple Access Communications

    Sepehr Soltani1, Ehsan Ghafourian2, Reza Salehi3, Diego Martín3,*, Milad Vahidi4

    Intelligent Automation & Soft Computing, Vol.39, No.1, pp. 93-108, 2024, DOI:10.32604/iasc.2024.042693

    Abstract For many years, researchers have explored power allocation (PA) algorithms driven by models in wireless networks where multiple-user communications with interference are present. Nowadays, data-driven machine learning methods have become quite popular in analyzing wireless communication systems, which among them deep reinforcement learning (DRL) has a significant role in solving optimization issues under certain constraints. To this purpose, in this paper, we investigate the PA problem in a -user multiple access channels (MAC), where transmitters (e.g., mobile users) aim to send an independent message to a common receiver (e.g., base station) through wireless channels. To this end, we first train… More >

  • Open Access

    ARTICLE

    Prediction Model of Wax Deposition Rate in Waxy Crude Oil Pipelines by Elman Neural Network Based on Improved Reptile Search Algorithm

    Zhuo Chen1,*, Ningning Wang2, Wenbo Jin3, Dui Li1

    Energy Engineering, Vol.121, No.4, pp. 1007-1026, 2024, DOI:10.32604/ee.2023.045270

    Abstract A hard problem that hinders the movement of waxy crude oil is wax deposition in oil pipelines. To ensure the safe operation of crude oil pipelines, an accurate model must be developed to predict the rate of wax deposition in crude oil pipelines. Aiming at the shortcomings of the ENN prediction model, which easily falls into the local minimum value and weak generalization ability in the implementation process, an optimized ENN prediction model based on the IRSA is proposed. The validity of the new model was confirmed by the accurate prediction of two sets of experimental data on wax deposition… More > Graphic Abstract

    Prediction Model of Wax Deposition Rate in Waxy Crude Oil Pipelines by Elman Neural Network Based on Improved Reptile Search Algorithm

  • Open Access

    EDITORIAL

    Femoral Access with Ultrasound-Guided Puncture and Z-Stitch Hemostasis for Adults with Congenital Heart Diseases Undergoing Electrophysiological Procedures

    Fu Guan1,*, Matthias Gass2, Florian Berger2, Heiko Schneider1, Firat Duru1,3, Thomas Wolber1,3,*

    Congenital Heart Disease, Vol.19, No.1, pp. 85-92, 2024, DOI:10.32604/chd.2024.047266

    Abstract Aims: Although the application of ultrasound-guided vascular puncture and Z-stitch hemostasis to manage femoral access has been widely utilized, there is limited data on this combined application in adult congenital heart disease (ACHD) patients undergoing electrophysiological (EP) procedures. We sought to evaluate the safety and efficacy of ultrasound-guided puncture and postprocedural Z-stitch hemostasis for ACHD patients undergoing EP procedures. Methods and Results: The population of ACHD patients undergoing transfemoral EP procedures at the University of Zurich Heart Center between January 2019 and December 2022 was observed and analyzed. During the study period, femoral access (left/right, arterial/venous) was performed under real-time… More >

  • Open Access

    ARTICLE

    Degradation of FAK-targeting by proteolytic targeting chimera technology to inhibit the metastasis of hepatocellular carcinoma

    XINFENG ZHANG1,2,#, SHUANG LI2,#, MEIRU SONG1,2, YUE CHEN3, LIANGZHENG CHANG3, ZHERUI LIU4, HONGYUAN DAI3, YUTAO WANG4, GANGQI YANG3, YUN JIANG5,6,*, YINYING LU1,2,*

    Oncology Research, Vol.32, No.4, pp. 679-690, 2024, DOI:10.32604/or.2024.046231

    Abstract Liver cancer is a prevalent malignant cancer, ranking third in terms of mortality rate. Metastasis and recurrence primarily contribute to the high mortality rate of liver cancer. Hepatocellular carcinoma (HCC) has low expression of focal adhesion kinase (FAK), which increases the risk of metastasis and recurrence. Nevertheless, the efficacy of FAK phosphorylation inhibitors is currently limited. Thus, investigating the mechanisms by which FAK affects HCC metastasis to develop targeted therapies for FAK may present a novel strategy to inhibit HCC metastasis. This study examined the correlation between FAK expression and the prognosis of HCC. Additionally, we explored the impact of… More >

  • Open Access

    ARTICLE

    Developing risk models and subtypes of autophagy-associated LncRNAs for enhanced prognostic prediction and precision in therapeutic approaches for liver cancer patients

    LU ZHANG*, JINGUO CHU*, YUSHAN YU

    Oncology Research, Vol.32, No.4, pp. 703-716, 2024, DOI:10.32604/or.2023.030988

    Abstract Background: Limited research has been conducted on the influence of autophagy-associated long non-coding RNAs (ARLncRNAs) on the prognosis of hepatocellular carcinoma (HCC). Methods: We analyzed 371 HCC samples from TCGA, identifying expression networks of ARLncRNAs using autophagy-related genes. Screening for prognostically relevant ARLncRNAs involved univariate Cox regression, Lasso regression, and multivariate Cox regression. A Nomogram was further employed to assess the reliability of Riskscore, calculated from the signatures of screened ARLncRNAs, in predicting outcomes. Additionally, we compared drug sensitivities in patient groups with differing risk levels and investigated potential biological pathways through enrichment analysis, using consensus clustering to identify subgroups… More >

  • Open Access

    REVIEW

    CHARACTERISTICS OF MICROLAYER FORMATION AND HEAT TRANSFER IN MINI/MICROCHANNEL BOILING SYSTEMS: A REVIEW

    Yaohua Zhanga,*, Yoshio Utakab

    Frontiers in Heat and Mass Transfer, Vol.3, No.1, pp. 1-12, 2012, DOI:10.5098/hmt.v3.1.3003

    Abstract This paper reviews recent research on microlayer formed by confined vapor bubbles during boiling in mini/microchannels. Experimental measurements, simulations and theoretical studies are described and compared. As a reference to clarify the mechanism for the formation of a microlayer, Taylor flow (i.e. elongated bubble flow in mini/micro circular tubes under adiabatic conditions and at Re << 1) and elongated bubble flow at high velocity, with consideration of the influence of inertia, are also reviewed. Compared to the steady adiabatic conditions, one of the distinct points for the boiling condition is that the bubble grows exponentially due to rapid evaporation of… More >

Displaying 1-10 on page 1 of 921. Per Page