Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (662)
  • Open Access

    ARTICLE

    Improving Network Availability through Optimized Multipath Routing and Incremental Deployment Strategies

    Wei Zhang1, Haijun Geng2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 427-448, 2024, DOI:10.32604/cmc.2024.051871

    Abstract Currently, distributed routing protocols are constrained by offering a single path between any pair of nodes, thereby limiting the potential throughput and overall network performance. This approach not only restricts the flow of data but also makes the network susceptible to failures in case the primary path is disrupted. In contrast, routing protocols that leverage multiple paths within the network offer a more resilient and efficient solution. Multipath routing, as a fundamental concept, surpasses the limitations of traditional shortest path first protocols. It not only redirects traffic to unused resources, effectively mitigating network congestion, but… More >

  • Open Access

    ARTICLE

    Knowledge Reasoning Method Based on Deep Transfer Reinforcement Learning: DTRLpath

    Shiming Lin1,2,3, Ling Ye2, Yijie Zhuang1, Lingyun Lu2,*, Shaoqiu Zheng2,*, Chenxi Huang1, Ng Yin Kwee4

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 299-317, 2024, DOI:10.32604/cmc.2024.051379

    Abstract In recent years, with the continuous development of deep learning and knowledge graph reasoning methods, more and more researchers have shown great interest in improving knowledge graph reasoning methods by inferring missing facts through reasoning. By searching paths on the knowledge graph and making fact and link predictions based on these paths, deep learning-based Reinforcement Learning (RL) agents can demonstrate good performance and interpretability. Therefore, deep reinforcement learning-based knowledge reasoning methods have rapidly emerged in recent years and have become a hot research topic. However, even in a small and fixed knowledge graph reasoning action… More >

  • Open Access

    ARTICLE

    An Improved Iterated Greedy Algorithm for Solving Rescue Robot Path Planning Problem with Limited Survival Time

    Xiaoqing Wang1, Peng Duan1,*, Leilei Meng1,*, Kaidong Yang2

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 931-947, 2024, DOI:10.32604/cmc.2024.050612

    Abstract Effective path planning is crucial for mobile robots to quickly reach rescue destination and complete rescue tasks in a post-disaster scenario. In this study, we investigated the post-disaster rescue path planning problem and modeled this problem as a variant of the travel salesman problem (TSP) with life-strength constraints. To address this problem, we proposed an improved iterated greedy (IIG) algorithm. First, a push-forward insertion heuristic (PFIH) strategy was employed to generate a high-quality initial solution. Second, a greedy-based insertion strategy was designed and used in the destruction-construction stage to increase the algorithm’s exploration ability. Furthermore,… More >

  • Open Access

    ARTICLE

    Passive IoT Localization Technology Based on SD-PDOA in NLOS and Multi-Path Environments

    Junyang Liu1, Yuan Li2, Yulu Zhang2, Shuai Ma2, Gui Li3, Yi He1, Haiwen Yi1, Yue Liu1, Xiaotao Xu4, Xu Zhang1, Jinyao He1, Guangjun Wen1, Jian Li1,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 913-930, 2024, DOI:10.32604/cmc.2024.049999

    Abstract Addressing the challenges of passive Radio Frequency Identification (RFID) indoor localization technology in Non-Line-of-Sight (NLoS) and multipath environments, this paper presents an innovative approach by introducing a combined technology integrating an improved Kalman Filter with Space Domain Phase Difference of Arrival (SD-PDOA) and Received Signal Strength Indicator (RSSI). This methodology utilizes the distinct channel characteristics in multipath and NLoS contexts to effectively filter out interference and accurately extract localization information, thereby facilitating high precision and stability in passive RFID localization. The efficacy of this approach is demonstrated through detailed simulations and empirical tests conducted on… More >

  • Open Access

    ARTICLE

    A Multi-Strategy-Improved Northern Goshawk Optimization Algorithm for Global Optimization and Engineering Design

    Liang Zeng1,2, Mai Hu1, Chenning Zhang1, Quan Yuan1, Shanshan Wang1,2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1677-1709, 2024, DOI:10.32604/cmc.2024.049717

    Abstract Optimization algorithms play a pivotal role in enhancing the performance and efficiency of systems across various scientific and engineering disciplines. To enhance the performance and alleviate the limitations of the Northern Goshawk Optimization (NGO) algorithm, particularly its tendency towards premature convergence and entrapment in local optima during function optimization processes, this study introduces an advanced Improved Northern Goshawk Optimization (INGO) algorithm. This algorithm incorporates a multifaceted enhancement strategy to boost operational efficiency. Initially, a tent chaotic map is employed in the initialization phase to generate a diverse initial population, providing high-quality feasible solutions. Subsequently, after… More >

  • Open Access

    RETRACTION

    Retraction: Emodin Inhibits Colon Cancer Cell Invasion and Migration by Suppressing Epithelial-Mesenchymal Transition via the Wnt/β-Catenin Pathway

    Oncology Research Editorial Office

    Oncology Research, Vol.32, No.8, pp. 1375-1375, 2024, DOI:10.32604/or.2024.055032

    Abstract This article has no abstract. More >

  • Open Access

    CORRECTION

    Correction: MicroRNA-329-3p inhibits the Wnt/β-catenin pathway and proliferation of osteosarcoma cells by targeting transcription factor 7-like 1

    HUI SUN, MASANORI KAWANO*, TATSUYA IWASAKI, ICHIRO ITONAGA, YUTA KUBOTA, HIROSHI TSUMURA, KAZUHIRO TANAKA

    Oncology Research, Vol.32, No.8, pp. 1369-1370, 2024, DOI:10.32604/or.2024.052652

    Abstract This article has no abstract. More >

  • Open Access

    REVIEW

    Hypoxia-inducible factor 1alpha and vascular endothelial growth factor in Glioblastoma Multiforme: a systematic review going beyond pathologic implications

    DIMITRA P. VAGELI1,2,*, PANAGIOTIS G. DOUKAS3, KERASIA GOUPOU2, ANTONIOS D. BENOS2, KYRIAKI ASTARA2,4, KONSTANTINA ZACHAROULI2, SOTIRIS SOTIRIOU5, MARIA IOANNOU2

    Oncology Research, Vol.32, No.8, pp. 1239-1256, 2024, DOI:10.32604/or.2024.052130

    Abstract Glioblastoma multiforme (GBM) is an aggressive primary brain tumor characterized by extensive heterogeneity and vascular proliferation. Hypoxic conditions in the tissue microenvironment are considered a pivotal player leading tumor progression. Specifically, hypoxia is known to activate inducible factors, such as hypoxia-inducible factor 1alpha (HIF-1α), which in turn can stimulate tumor neo-angiogenesis through activation of various downward mediators, such as the vascular endothelial growth factor (VEGF). Here, we aimed to explore the role of HIF-1α/VEGF immunophenotypes alone and in combination with other prognostic markers or clinical and image analysis data, as potential biomarkers of GBM prognosis… More >

  • Open Access

    ARTICLE

    Enhancing Critical Path Problem in Neutrosophic Environment Using Python

    M. Navya Pratyusha, Ranjan Kumar*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2957-2976, 2024, DOI:10.32604/cmes.2024.051581

    Abstract In the real world, one of the most common problems in project management is the unpredictability of resources and timelines. An efficient way to resolve uncertainty problems and overcome such obstacles is through an extended fuzzy approach, often known as neutrosophic logic. Our rigorous proposed model has led to the creation of an advanced technique for computing the triangular single-valued neutrosophic number. This innovative approach evaluates the inherent uncertainty in project durations of the planning phase, which enhances the potential significance of the decision-making process in the project. Our proposed method, for the first time… More >

  • Open Access

    ARTICLE

    Efficient Penetration Testing Path Planning Based on Reinforcement Learning with Episodic Memory

    Ziqiao Zhou1, Tianyang Zhou1,*, Jinghao Xu2, Junhu Zhu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2613-2634, 2024, DOI:10.32604/cmes.2023.028553

    Abstract Intelligent penetration testing is of great significance for the improvement of the security of information systems, and the critical issue is the planning of penetration test paths. In view of the difficulty for attackers to obtain complete network information in realistic network scenarios, Reinforcement Learning (RL) is a promising solution to discover the optimal penetration path under incomplete information about the target network. Existing RL-based methods are challenged by the sizeable discrete action space, which leads to difficulties in the convergence. Moreover, most methods still rely on experts’ knowledge. To address these issues, this paper… More >

Displaying 1-10 on page 1 of 662. Per Page