Empowering Human Decision-Making in AI Models: The Path to Trust and Transparency
Open Access
ARTICLE
BIOCELL, Vol.47, No.4, pp. 905-917, 2023, DOI:10.32604/biocell.2023.026930
Abstract Allium senescens, is an important economic and ecological grassland plant with drought-resistant characteristics. A TCP protein transcription factor is important in the regulation of plant development and adverse responses. However, the mechanism by which TCP transcription functions in drought resistance in Allium senescens is still not clear. Here, we obtained a total of 190,305 transcripts with 115,562 single gene clusters based on RNA-Seq sequencing of Allium senescens under drought stress. The total number of bases was 97,195,096 bp, and the average length was 841.06 bp. Furthermore, we found that there were eight genes of the TCP family that showed an… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.45, No.1, pp. 99-115, 2023, DOI:10.32604/csse.2023.030801
Abstract Recently, multipath transmission control protocol (MPTCP) was standardized so that data can be transmitted through multiple paths to utilize all available path bandwidths. However, when high-speed long-distance networks are included in MPTCP paths, the traffic transmission performance of MPTCP is severely deteriorated, especially in case the multiple paths’ characteristics are heavily asymmetric. In order to alleviate this problem, we propose a “Coupled CUBIC congestion control” that adopts TCP CUBIC on a large bandwidth-delay product (BDP) path in a linked increase manner for maintaining fairness with an ordinary TCP traversing the same bottleneck path. To verify the performance excellence of the… More >
Open Access
ARTICLE
Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 837-848, 2022, DOI:10.32604/iasc.2022.023055
Abstract Multipath TCP (SMPTCP) has gained more attention as a valuable approach for IoT systems. SMPTCP is introduced as an evolution of Transmission Control Protocol (TCP) to pass packets simultaneously across several routes to completely exploit virtual networks on multi-homed consoles and other network services. The current multipath networking algorithms and simulation software strategies are confronted with sub-flow irregularity issues due to network heterogeneity, and routing configuration issues can be fixed adequately. To overcome the issues, this paper proposes a novel deep reinforcement-based extreme learning machines (DRLELM) approach to examine the complexities between routes, pathways, sub-flows, and SMPTCP connections in different… More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.3, No.3, pp. 99-107, 2021, DOI:10.32604/jiot.2021.014921
Abstract The Mimic Defense (MD) is an endogenous security technology with the core technique of Dynamic Heterogeneous Redundancy (DHR) architecture. It can effectively resist unknown vulnerabilities, backdoors, and other security threats by schedule strategy, negative feedback control, and other mechanisms. To solve the problem that Cyber Mimic Defense devices difficulty of supporting the TCP protocol. This paper proposes a TCP protocol normalization scheme for DHR architecture. Theoretical analysis and experimental results show that this scheme can realize the support of DHR-based network devices to TCP protocol without affecting the security of mimicry defense architecture. More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3839-3851, 2022, DOI:10.32604/cmc.2022.023399
Abstract The success of Internet of Things (IoT) deployment has emerged important smart applications. These applications are running independently on different platforms, almost everywhere in the world. Internet of Medical Things (IoMT), also referred as the healthcare Internet of Things, is the most widely deployed application against COVID-19 and offering extensive healthcare services that are connected to the healthcare information technologies systems. Indeed, with the impact of the COVID-19 pandemic, a large number of interconnected devices designed to create smart networks. These networks monitor patients from remote locations as well as tracking medication orders. However, IoT may be jeopardized by attacks… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3781-3801, 2022, DOI:10.32604/cmc.2022.020510
Abstract On average, every two years, the amount of data existing globally doubles. Software development will be affected and improved by Cyber-Physical Systems (CPS). The number of problems remained even though developments helped Information Technology experts extract better value from their storage investments. Because of poor interoperability between different vendors and devices, countless numbers of Storage Area Networks were created. Network setup used for data storage includes a complex and rigid arrangement of routers, switch, hosts/servers, storage arrays. We have evaluated the performance of routing protocol Transmission Control Protocol (TCP) and Fibre Channel Protocol (FCP) under different network scenario by Network… More >
Open Access
ARTICLE
Intelligent Automation & Soft Computing, Vol.26, No.4, pp. 773-781, 2020, DOI:10.32604/iasc.2020.010112
Abstract It is known that congestion in the reverse direction happens in advance of the congestion in the forward direction due to the significant bandwidth asymmetry in the two directions of the space networks, especially in the satellite networks, which enables the TCP Vegas to enter the phase of the congestion avoidance blindly and reduce the throughput of the forward direction. To solve this problem, a congestion control model, TCP Vegas-DDA, which maintains the frequency of the acknowledgments in the reverse direction is proposed. The model sets the interval time between acknowledgments dynamically based on the variation of the queuing delay… More >
Open Access
ARTICLE
Congenital Heart Disease, Vol.14, No.1, pp. 6-14, 2019, DOI:10.1111/chd.12729
Abstract Background: Patent ductus arteriosus (PDA) is highly prevalent in extremely low
birth weight (ELBW), preterm infants. There are diverse management approaches for
the PDA in ELBW infants. The objectives of this research were to identify current
PDA management practices among cardiologists and neonatologists in the United
States, describe any significant differences in management, and describe areas where
practices align.
Methods: A survey of 10 questions based on the management of PDA in ELBW infants was conducted among 100 prominent neonatologists from 74 centers and 103
prominent cardiologists from 75 centers. Among the cardiologists, approximately
50% were interventionists who perform transcatheter… More >
Open Access
ARTICLE
Congenital Heart Disease, Vol.14, No.1, pp. 85-89, 2019, DOI:10.1111/chd.12710
Abstract Objective: The objective of this article is to describe a live case transmission of tran‐
scatheter closure of a patent ductus arteriosus (PDA) in an extremely low birth weight
(ELBW) infant during the first International PDA Symposium conducted in Memphis,
Tennessee.
Setting: A multidisciplinary team approach including audiovisual specialists, informa‐
tion technology specialists, physicians, nurses, and other health care specialists was
required to perform the transcatheter PDA closure (TCPC) in an ELBW infant at
LeBonheur Children’s Hospital and the procedure was broadcast live to the attend‐
ees at the International PDA Symposium allowing for a two‐way audiovisual discus‐
sion during… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 233-244, 2020, DOI:10.32604/cmc.2020.06135
Abstract The wireless network is limited by the transmission medium, and the transmission process is subject to large interference and jitter. This jitter can cause sporadic loss and is mistaken for congestion by the congestion control mechanism. The TCP Westwood protocol (referred to as TCPW) is such that it cannot distinguish between congestion loss and wireless jitter loss, which makes the congestion mechanism too sensitive and reduces bandwidth utilization. Based on this, the TCPW protocol is modified based on the estimate of the Round-Trip Time (referred to as RTT) value-called TCPW BR. The algorithm uses the measured smooth RTT value and… More >