Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (155)
  • Open Access

    ARTICLE

    Support Vector Machine (SVM) and Object Based Classification in Earth Linear Features Extraction: A Comparison

    Siti Aekbal Salleh1,2,*, Nafisah Khalid1, Natasha Danny6, Nurul Ain Mohd. Zaki2,3, Mustafa Ustuner4, Zulkiflee Abd Latif1,2, Vladimir Foronda5

    Revue Internationale de Géomatique, Vol.33, pp. 183-199, 2024, DOI:10.32604/rig.2024.050723

    Abstract Due to the spectral and spatial properties of pervious and impervious surfaces, image classification and information extraction in detailed, small-scale mapping of urban surface materials is quite difficult and complex. Emerging methods and innovations in image classification have centred on object-based classification techniques and various segmentation techniques, which are fundamental to this approach. Consequently, the purpose of this study is to determine which classification method is most suitable for extracting linear features in terms of techniques and performance by comparing two classification methods, pixel-based approach and object-based approach, using WorldView-2 satellite imagery to specifically highlight… More > Graphic Abstract

    Support Vector Machine (SVM) and Object Based Classification in Earth Linear Features Extraction: A Comparison

  • Open Access

    ARTICLE

    Vector Dominance with Threshold Searchable Encryption (VDTSE) for the Internet of Things

    Jingjing Nie1,*, Zhenhua Chen2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4763-4779, 2024, DOI:10.32604/cmc.2024.051181

    Abstract The Internet of Medical Things (IoMT) is an application of the Internet of Things (IoT) in the medical field. It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems, which is essential in smart healthcare. However, Personal Health Records (PHRs) are normally kept in public cloud servers controlled by IoMT service providers, so privacy and security incidents may be frequent. Fortunately, Searchable Encryption (SE), which can be used to execute queries on encrypted data, can address the issue above. Nevertheless, most existing SE schemes cannot solve the vector dominance threshold… More >

  • Open Access

    ARTICLE

    Reinforcement Effect of Recycled CFRP on Cement-Based Composites: With a Comparison to Commercial Carbon Fiber Powder

    Hantao Huang, Zhifang Zhang*, Zhenhua Wu, Yao Liu

    Structural Durability & Health Monitoring, Vol.18, No.4, pp. 409-423, 2024, DOI:10.32604/sdhm.2024.048597

    Abstract In this paper, recycled carbon fiber reinforced polymer (CFRP) mixture (CFRP-M, including recycled carbon fiber and powder) and refined recycled CFRP fiber (CFRP-F, mostly recycled carbon fiber) were added to cement to study the influence of addition on the flexural strength, compressive strength, and fluidity of cement-based materials. The recycled CFRP were prepared by mechanically processing the prepreg scraps generated during the manufacture of CFRP products. For comparison, commercial carbon fiber powder was also added in cement and the performance was compared to that of addition of recycled CFRP. The hydration products and strengthening mechanism… More >

  • Open Access

    ARTICLE

    A Retrospective Comparison of the Clinical Efficacy of Gefitinib, Erlotinib, and Afatinib in Japanese Patients With Non-Small Cell Lung Cancer

    Atsushi Fujiwara*, Masamichi Yoshida*, Hajime Fujimoto, Hiroki Nakahara, Kentaro Ito, Kota Nishihama§, Taro Yasuma§, Osamu Hataji, Osamu Taguchi, Corina N. D’Alessandro-Gabazza§, Esteban C. Gabazza§, Tetsu Kobayashi

    Oncology Research, Vol.26, No.7, pp. 1031-1036, 2018, DOI:10.3727/096504018X15151523767752

    Abstract Tyrosine kinase inhibitors (TKIs) are very effective against non-small cell lung cancer (NSCLC) caused by epidermal growth factor receptor (EGFR) mutation. Before the approval of osimertinib in March 2016, there were only three available EGFR TKIs (gefitinib, erlotinib, and afatinib) for the therapy of NSCLC in Japan. Osimertinib can be indicated only against T790M+ lung cancer as a second-line therapy. However, whether gefitinib, erlotinib, or afatinib is most appropriate as a first-line therapy is still a controversial issue. The aim of this study was to compare the effectiveness of gefitinib, erlotinib, and afatinib. We retrospectively reviewed… More >

  • Open Access

    ARTICLE

    Direct Pointwise Comparison of FE Predictions to StereoDIC Measurements: Developments and Validation Using Double Edge-Notched Tensile Specimen

    Troy Myers1, Michael A. Sutton1,*, Hubert Schreier2, Alistair Tofts2, Sreehari Rajan Kattil1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1263-1298, 2024, DOI:10.32604/cmes.2024.048743

    Abstract To compare finite element analysis (FEA) predictions and stereovision digital image correlation (StereoDIC) strain measurements at the same spatial positions throughout a region of interest, a field comparison procedure is developed. The procedure includes (a) conversion of the finite element data into a triangular mesh, (b) selection of a common coordinate system, (c) determination of the rigid body transformation to place both measurements and FEA data in the same system and (d) interpolation of the FEA nodal information to the same spatial locations as the StereoDIC measurements using barycentric coordinates. For an aluminum Al-6061 double edge More >

  • Open Access

    ARTICLE

    A Study on the Influence of Social Media Use on Psychological Anxiety among Young Women

    Tao Liu1, Huiyin Shi1, Chen Chen1,*, Rong Fu2,*

    International Journal of Mental Health Promotion, Vol.26, No.3, pp. 199-209, 2024, DOI:10.32604/ijmhp.2024.046303

    Abstract To explore the relationship between social influence, social comparison, clarity of self-concept, and psychological anxiety among young women during their usage of social networking sites, our study selected 338 young women aged 14–34 from the social site platforms of Little Red Book and Weibo for questionnaire surveys. The Passive Social Network Utilization Scale, Social Comparison Scale (SCS), Social Influence Questionnaire, Self-Concept Clarity Scale (SCCS), and Generalized Anxiety Disorder Scale (GAD-7) were employed to measure the subjects. Our results show that the frequency of passive social media use is positively related to the level of psychological… More >

  • Open Access

    ARTICLE

    Experimental Study of Heat Transfer in an Insulated Local Heated from Below and Comparison with Simulation by Lattice Boltzmann Method

    Noureddine Abouricha1,*, Ayoub Gounni2, Mustapha El Alami2

    Frontiers in Heat and Mass Transfer, Vol.22, No.1, pp. 359-375, 2024, DOI:10.32604/fhmt.2024.047632

    Abstract In this paper, experimental and numerical studies of heat transfer in a test local of side heated from below are presented and compared. All the walls, the rest of the floor and the ceiling are made from plywood and polystyrene in sandwich form ( plywood- polystyrene- plywood) just on one of the vertical walls contained a glazed door (). This local is heated during two heating cycles by a square plate of iron the width , which represents the heat source, its temperature is controlled. The plate is heated for two cycles by an adjustable… More >

  • Open Access

    ARTICLE

    Comparison of QT Correction Methods in the Pediatric Population of a Community Hospital: A Retrospective Study

    Koren Hyogene Kwag1,*, Ibrahim Kak1, Ying Li2, Walid Khass1, Alec McKechnie1, Oksana Nulman1, Brande Brown1, Manoj Chhabra1

    Congenital Heart Disease, Vol.19, No.1, pp. 107-121, 2024, DOI:10.32604/chd.2024.045953

    Abstract Objective: Accurate measurement of QT interval, the ventricular action potential from depolarization to repolarization, is important for the early detection of Long QT syndrome. The most effective QT correction (QTc) formula has yet to be determined in the pediatric population, although it has intrinsically greater extremes in heart rate (HR) and is more susceptible to errors in measurement. The authors of this study compare six different QTc methods (Bazett, Fridericia, Framingham, Hodges, Rautaharju, and a computer algorithm utilizing the Bazett formula) for consistency against variations in HR and RR interval. Methods: Descriptive Retrospective Study. We… More >

  • Open Access

    ARTICLE

    Influence of Various Earth-Retaining Walls on the Dynamic Response Comparison Based on 3D Modeling

    Muhammad Akbar1, Huali Pan1,*, Jiangcheng Huang2, Bilal Ahmed3, Guoqiang Ou1

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 2835-2863, 2024, DOI:10.32604/cmes.2024.046993

    Abstract The present work aims to assess earthquake-induced earth-retaining (ER) wall displacement. This study is on the dynamics analysis of various earth-retaining wall designs in hollow precast concrete panels, reinforcement concrete facing panels, and gravity-type earth-retaining walls. The finite element (FE) simulations utilized a 3D plane strain condition to model full-scale ER walls and numerous nonlinear dynamics analyses. The seismic performance of different models, which includes reinforcement concrete panels and gravity-type and hollow precast concrete ER walls, was simulated and examined using the FE approach. It also displays comparative studies such as stress distribution, deflection of… More >

  • Open Access

    ARTICLE

    Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing

    Nader Abdel Karim1,*, Osama A. Khashan2,*, Waleed K. Abdulraheem3, Moutaz Alazab1, Hasan Kanaker4, Mahmoud E. Farfoura5, Mohammad Alshinwan5,6

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2023-2045, 2024, DOI:10.32604/cmc.2023.044304

    Abstract As the extensive use of cloud computing raises questions about the security of any personal data stored there, cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment. A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware. The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment. An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance; Each hypervisor… More >

Displaying 1-10 on page 1 of 155. Per Page