Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21,887)
  • Open Access

    ARTICLE

    A Retrospective Analysis of 94 Patients with Hemophagocytic Lymphohistiocytosis of Unknown Etiology from a Single Center

    Xiaodan He, Jingshi Wang, Zhao Wang*

    Oncologie, Vol.23, No.4, pp. 559-567, 2021, DOI:10.32604/oncologie.2021.018647

    Abstract Despite extensive work-ups, some patients have been diagnosed with hemophagocytic lymphohistiocytosis (HLH) of unknown etiology. For HLH of unknown etiology, to investigate the clinical features and the factors that may affect the prognosis, we retrospectively reviewed the medical records of 94 patients hospitalized from January 2014 to December 2019. Survival times were evaluated until April 2020. For the 94 patients, the underlying causes of their diseases remained unclear at the end of the follow-up period, and the 1-, 3-, and 6-month survival rates, and the overall survival (OS) rates were 86.2%, 78.7%, 73.4%, and 70.2%, respectively. The multivariate analysis showed… More >

  • Open Access

    RETRACTION

    Retraction Notice to: New Solution Generation Strategy to Improve Brain Storm Optimization Algorithm for Classification

    Yu Xue1,2,* and Yan Zhao1

    Journal on Internet of Things, Vol.3, No.4, pp. 183-183, 2021, DOI:10.32604/jiot.2021.021063

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Authentication in Wireless Body Area Network: Taxonomy and Open Challenges

    Abdullah M. Almuhaideb, Kawther S. Alqudaihi*

    Journal on Internet of Things, Vol.3, No.4, pp. 159-182, 2021, DOI:10.32604/jiot.2021.018088

    Abstract Wearable body area network (WBAN) aids the communication between the health providers and patients by supporting health monitoring services. It assists the users to maintain their health status records by collecting the body signals and transmitting them for further processing measurements. However, sensor data are publicly transferred through insecure network that facilitates the attacker malicious acts like performing masquerading attack, man in the middle, and snooping. Several authentication techniques were suggested to levitate the security of the communication channels to preserve the user data from exposure. Moreover, authentication schemes aid plenty of security issues related to user and data privacy,… More >

  • Open Access

    ARTICLE

    A Virtual Machine Placement Strategy Based on Virtual Machine Selection and Integration

    Denghui Zhang1,*, Guocai Yin2

    Journal on Internet of Things, Vol.3, No.4, pp. 149-157, 2021, DOI:10.32604/jiot.2021.016936

    Abstract Cloud data centers face the largest energy consumption. In order to save energy consumption in cloud data centers, cloud service providers adopt a virtual machine migration strategy. In this paper, we propose an efficient virtual machine placement strategy (VMP-SI) based on virtual machine selection and integration. Our proposed VMP-SI strategy divides the migration process into three phases: physical host state detection, virtual machine selection and virtual machine placement. The local regression robust (LRR) algorithm and minimum migration time (MMT) policy are individual used in the first and section phase, respectively. Then we design a virtual machine migration strategy that integrates… More >

  • Open Access

    ARTICLE

    Routing Protocol in Underwater Wireless Acoustic Communication Using Non Orthogonal Multiple Access

    J. V. Anand1, R. Praveena2,*, T. R. Ganesh Babu2

    Journal on Internet of Things, Vol.3, No.4, pp. 139-147, 2021, DOI:10.32604/jiot.2021.016747

    Abstract The underwater wireless communication with the complexity of attenuation and low propagation speed makes resource constraints in networking sensor nodes and sink. Underwater Sensor Transmission with Attenuation Calculation using Non Orthogonal Multiple Access (UWSTAC-NOMA) protocol has been proposed. This protocol calculates channel gain along with attenuation in underwater channels and provides internetworking sensor for rate allocation minimizing interference. Successive Interference Cancellation has been used at the receiving sensor to decode the information sent. The network level performance of sensors and increasing the data rate improves the overall throughput. Simultaneously, connecting several sensors to sink based on its depth region of… More >

  • Open Access

    ARTICLE

    Wearable Sensors and Internet of Things Integration to Track and Monitor Children Students with Chronic Diseases Using Arduino UNO

    Ali Abdulameer Aldujaili1, Mohammed Dauwed2, Ahmed Meri3,*

    Journal on Internet of Things, Vol.3, No.4, pp. 131-137, 2021, DOI:10.32604/jiot.2021.015994

    Abstract Parents concerns for their children who has a critical health conditions may limit the children movements and live to engage with others peers anytime and anywhere. Thus, in this study aims to propose a framework to help the children who has critical disease to have more activity and engagement with other peers. Additionally, reducing their parents’ concerns by providing monitoring and tracking system to their parents for their children health conditions. However, this study proposed a framework include tracking and monitoring wearable (TMW) device and decision system to alert healthcare providers and parents for any failure in the children health… More >

  • Open Access

    ARTICLE

    Complex Network Formation and Analysis of Online Social Media Systems

    Hafiz Abid Mahmood Malik*

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.3, pp. 1737-1750, 2022, DOI:10.32604/cmes.2022.018015

    Abstract To discover and identify the influential nodes in any complex network has been an important issue. It is a significant factor in order to control over the network. Through control on a network, any information can be spread and stopped in a short span of time. Both targets can be achieved, since network of information can be extended and as well destroyed. So, information spread and community formation have become one of the most crucial issues in the world of SNA (Social Network Analysis). In this work, the complex network of twitter social network has been formalized and results are… More >

  • Open Access

    ARTICLE

    Strengthened Initialization of Adaptive Cross-Generation Differential Evolution

    Wei Wan1, Gaige Wang1,2,3,*, Junyu Dong1

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.3, pp. 1495-1516, 2022, DOI:10.32604/cmes.2021.017987

    Abstract Adaptive Cross-Generation Differential Evolution (ACGDE) is a recently-introduced algorithm for solving multiobjective problems with remarkable performance compared to other evolutionary algorithms (EAs). However, its convergence and diversity are not satisfactory compared with the latest algorithms. In order to adapt to the current environment, ACGDE requires improvements in many aspects, such as its initialization and mutant operator. In this paper, an enhanced version is proposed, namely SIACGDE. It incorporates a strengthened initialization strategy and optimized parameters in contrast to its predecessor. These improvements make the direction of crossgeneration mutation more clearly and the ability of searching more efficiently. The experiments show… More >

  • Open Access

    ARTICLE

    Parameter Estimation Based on Censored Data under Partially Accelerated Life Testing for Hybrid Systems due to Unknown Failure Causes

    Mustafa Kamal*

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.3, pp. 1239-1269, 2022, DOI:10.32604/cmes.2022.017532

    Abstract In general, simple subsystems like series or parallel are integrated to produce a complex hybrid system. The reliability of a system is determined by the reliability of its constituent components. It is often extremely difficult or impossible to get specific information about the component that caused the system to fail. Unknown failure causes are instances in which the actual cause of system failure is unknown. On the other side, thanks to current advanced technology based on computers, automation, and simulation, products have become incredibly dependable and trustworthy, and as a result, obtaining failure data for testing such exceptionally reliable items… More >

  • Open Access

    ARTICLE

    A Novel Method for the Reconstruction of Road Profiles from Measured Vehicle Responses Based on the Kalman Filter Method

    Jianghui Zhu1,3, Xiaotong Chang2, Xueli Zhang2, Yutai Su2, Xu Long2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.3, pp. 1719-1735, 2022, DOI:10.32604/cmes.2022.019140

    Abstract The estimation of the disturbance input acting on a vehicle from its given responses is an inverse problem. To overcome some of the issues related to ill-posed inverse problems, this work proposes a method of reconstructing the road roughness based on the Kalman filter method. A half-car model that considers both the vehicle and equipment is established, and the joint input-state estimation method is used to identify the road profile. The capabilities of this methodology in the presence of noise are numerically demonstrated. Moreover, to reduce the influence of the driving speed on the estimation results, a method of choosing… More >

Displaying 9181-9190 on page 919 of 21887. Per Page