Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21,909)
  • Open Access

    ARTICLE

    Tolerance and Efficacy of Regorafenib according to UGT Pharmacogenetical Status in the Treatment of Metastatic Refractory Colorectal Cancer

    Pierre-Guillaume Poureau1,2,*, Estelle Dhamelincourt2, Jessica Nguyen2, Hélène Babey2, Emmanuelle Renaud2, Margaux Geier2, Michèle Boisdron-Celle3, Jean-Philippe Metges2

    Oncologie, Vol.23, No.2, pp. 195-202, 2021, DOI:10.32604/Oncologie.2021.015929

    Abstract Introduction: Regorafenib is a multi tyrosin-kinase inhibitor prescribed in metastatic refractory colorectal cancer treatment. Its toxicity is significant but inconstant. The metabolism of regorafenib includes oxydation via cytochrome P3A4, then glucuroconjugation. A pharmacogenetical approach of mutational status of Uridine-Diphospho-Glucuronosyltransfersase (UDP-glucuronosyl-transferase, UGT) could be a strategy to optimise the use of regorafenib. Patients and Method: This is a restrospective, unicentric study. All adult patients treated with regorafenib for a metastatic colorectal cancer in our center between 2013 and 2017 were analysed. UGT1A1 polypmorphism was previously researched in the laboratory after written informed consent. Results: Thirty-five patients received regorafenib during the study… More >

  • Open Access

    REVIEW

    MicroRNA in HCC: Biomarkers and Therapeutic Targets

    Zheng Wang1, Yongxia He1, Yuwei Song1, Yue Wang2, Feng Chen3,*

    Oncologie, Vol.23, No.2, pp. 177-184, 2021, DOI:10.32604/Oncologie.2021.014773

    Abstract Hepatocellular carcinoma (HCC) is a malignant tumor with high morbidity and mortality. At present, diagnostic methods such as imaging observation, serum testing and tissue biopsy, as well as treatment methods such as surgical resection, radiotherapy, and chemotherapy have certain limitations in clinical interventions for HCC due to the complex pathogenesis and drug resistance of liver cancer, which seriously affect the survival and prognosis of patients. As a large-scale cytokine, microRNA (miRNA) plays an important role in regulating various life activities of cells. Extensive evidence proved that certain miRNAs are specifically expressed in the tissues and blood of HCC patients, and… More >

  • Open Access

    ARTICLE

    Optimization for Variable Height Wind Farm Layout Model

    Bin Xu1,2,3,*, Jianming Zhu1, Junzhe Wen1, Shanshan Lin1, Yunkai Zhao1, Jin Qi1,2, Yu Xue4, Sichong Qin5

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 525-537, 2021, DOI:10.32604/iasc.2021.018338

    Abstract The optimization of wind farm layouts is very important for the effective utilization of wind resources. A fixed wind turbine hub height in the layout of wind farms leads to a low wind energy utilization and a higher LCOE (levelized cost of electricity). WOMH (Wind Farm Layout Optimization Model Considering Multiple Hub Heights) is proposed in this paper to tackle the above problem. This model is different from the traditional fixed hub height model, as it uses a variable height wind turbine. In WOMH, the Jensen wake and Weibull distribution are used to describe the wake effect on the wind… More >

  • Open Access

    ARTICLE

    Optimal Parameter Estimation of Proton Exchange Membrane Fuel Cells

    A. M. Abdullah1, Hegazy Rezk2,3,*, A. Hadad1, Mohamed K. Hassan1,4, A. F. Mohamed1,5

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 619-631, 2021, DOI:10.32604/iasc.2021.018289

    Abstract The problem of parameter estimation of the proton exchange membrane fuel cell (PEMFC) model plays a significant role in the simulation and optimization of a PEMFC system. In the current research, a moth flame optimization algorithm (MFOA) is used to identify the best parameters of PEMFC. Two different PEMFCs, Nedstack PS6, 6 kW, and SR-12 PEM 500 W are used to demonstrate the accuracy of the MFOA. Throughout the optimization process, seven unidentified parameters (1, 2, 3, 4, λ, ℛ, and B) of PEMFC are appointed to be decision variables. The fitness function, which needed to be minimum, is represented… More >

  • Open Access

    ARTICLE

    Paralleling Collision Detection on Five-Axis Machining

    Cheng-Yan Siao1, Jhe-Wei Lin1, Ting-Hsuan Chien2,*, Rong-Guey Chang1

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 559-569, 2021, DOI:10.32604/iasc.2021.018252

    Abstract With the rapid growth of the Fourth Industrial Revolution (or Industry 4.0), five-axis machining has played an important role nowadays. Due to the expensive cost of five-axis machining, how to solve the collision detection for five-axis machining in real-time is very critical. In this paper, we present a parallel method to detect collision for five-axis machining. Moreover, we apply the bounding volume hierarchy technique with two-level bounding volume represent the surface or solid of the object to reduce triangle meshes inside each axis of the five-axis machine tool, and then matching the operating range limit of the five-axis machine tool… More >

  • Open Access

    ARTICLE

    Investigating the Role of Trust Dimension as a Mediator on CC-SaaS Adoption

    Hiba Jasim Hadi*, Mohd Adan Omar, Wan Rozaini Sheik Osman

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 373-386, 2021, DOI:10.32604/iasc.2021.018207

    Abstract The public sector of Iraq has been struggling from poor management of resources and numerous difficulties that affect its governmental organization’s development, such as financial issues resulting from corruption, insecurity, and the lack of IT resources and infrastructure. Thus, cloud computing Software as a Service (CC-SaaS) can be a useful solution to help governmental organizations increase their service efficiency through the adoption of low-cost technology and provision of better services. The adoption of CC-SaaS remains limited in Iraqi public organizations due to numerous challenges, including privacy and protection, legal policy, and trust. Trust was found to be an effective facilitator… More >

  • Open Access

    ARTICLE

    Attitude Towards Adopting Cloud Computing in the Saudi Banking Sector

    Mohammed Hamdi1, Fekry Olayah2, Amin A. Al-Awady3, Ahlam F. Shamsan4, Mokhtar M. Ghilan5,*

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 605-617, 2021, DOI:10.32604/iasc.2021.018170

    Abstract Cloud computing plays a significant role in business organisations by offering many benefits and opportunities. However, the adoption of cloud computing involves some trepidation. The adoption of cloud computing in developing countries is still in the early phase. The bank sector in Saudi Arabia aims to benefit from opportunities offered by the cloud computing technology; however, some banks continue to hesitate in the implementation of this technology. Therefore, this study aims to investigate factors that influence the attitude of the Saudi Arabian bank sector towards adopting cloud computing. A model that incorporates factors derived from the literature is developed in… More >

  • Open Access

    ARTICLE

    CNN-Based Voice Emotion Classification Model for Risk Detection

    Hyun Yoo1, Ji-Won Baek2, Kyungyong Chung3,*

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 319-334, 2021, DOI:10.32604/iasc.2021.018115

    Abstract With the convergence and development of the Internet of things (IoT) and artificial intelligence, closed-circuit television, wearable devices, and artificial neural networks have been combined and applied to crime prevention and follow-up measures against crimes. However, these IoT devices have various limitations based on the physical environment and face the fundamental problem of privacy violations. In this study, voice data are collected and emotions are classified based on an acoustic sensor that is free of privacy violations and is not sensitive to changes in external environments, to overcome these limitations. For the classification of emotions in the voice, the data… More >

  • Open Access

    ARTICLE

    Impact of Skim Reading Based on Different Screen Sizes

    Sara Mehmood1, Naeem Ahmed Mahoto2, Asadullah Shaikh3, Hani Alshahrani3, Mana Saleh Al Reshan3,*

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 587-604, 2021, DOI:10.32604/iasc.2021.017843

    Abstract

    Digital technologies have identified themselves in several application domains. This has resulted in massive data availability over the internet. These web contents are generally too long to read. The reader, therefore, skims over the matter because of the limited time available while focusing on understanding the concept of the subject. A hypothesis suggests that full-screen skimming provides a better understanding of ideas as compared to mobile screen skimming. The small size of a mobile device screen is facilitated by a scrolling feature to cover the entire text. In contrast, a full screen provides a larger chunk of text on the… More >

  • Open Access

    ARTICLE

    A Hybrid Scheme for Secure Wireless Communications in IoT

    Muhammad Irshad Nazeer1,2,*, Ghulam Ali Mallah1, Raheel Ahmed Memon2

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 633-648, 2021, DOI:10.32604/iasc.2021.017771

    Abstract Network Coding is a potential technology for the future wireless communications and Internet of Things (IoT) as it reduces the number of transmissions and offers energy efficiency. It is vulnerable to threat and attack that can harm intermediate nodes. Indeed, it exhibits an ability to incorporate security of transmitted data, yet a lot of work needs to be done to provide a safeguard from threats. The purpose of this study is to strengthen the existing Network Coding scheme with a set of generic requirements for Network Coding Protocols by adopting system models and a Genetic Algorithm based cryptosystem. A hybrid… More >

Displaying 11361-11370 on page 1137 of 21909. Per Page