期刊文献+
共找到15篇文章
< 1 >
每页显示 20 50 100
Testicular germ cell tumors type 2 have high RNA expression of LDHB,the gene for lactate dehydrogenase subunit B
1
作者 Finn Edler von Eyben Jorge Parraga-Alava Shi-Ming Tu 《Asian Journal of Andrology》 SCIE CAS CSCD 2021年第4期357-362,共6页
This study analyzed RNA expression of genes for three serum tumor markers,alpha fetoprotein(AFP),human chorionic gonadotropin(hCG),and lactate dehydrogenase(LDH),in patients with testicular germ cell tumors(TGCT)type ... This study analyzed RNA expression of genes for three serum tumor markers,alpha fetoprotein(AFP),human chorionic gonadotropin(hCG),and lactate dehydrogenase(LDH),in patients with testicular germ cell tumors(TGCT)type 2.The gene AFP encodes AFP,the gene for chorionic gonadotropin beta polypeptide 5(CGB5)encodes a major part of the specific beta subunit of hCG,and the genes for LDH subunit A(LDHA),LDH subunit B(LDHB),and LDH subunit C(LDHC)encode three different subunits of LDH.LDHB encodes the LDHB subunit present as a tetramer in LDH isoenzyme 1(LDH-1).We examined three datasets with 203 samples of normal testis tissue(NT)and TGCT type 2.Yolk sac tumor(YST)expressed RNA of AFP fourteen thousand times higher than seminoma(SE),embryonal carcinoma(EC),and teratoma(TER)combined(P=0.00015).In the second microarray,choriocarcinoma(CC)expressed RNA of CGB5 ten times higher than other histologic types of TGCT combined.EC expressed RNA of LDHB twice higher than SE,YST and TER combined(P=0.000041).EC expressed RNA of LDHB higher than that YST expressed RNA of AFP and that CC expressed RNA of CGB5.In conclusion,TGCT type 2 expressed RNA of LDHB markedly higher than the RNA of 23 other candidate genes for TGCT type 2. 展开更多
关键词 alpha fetoprotein gene regulation human chorionic gonadotropin lactate dehydrogenase lactate dehydrogenase isoenzymes testicular germ cell tumors
原文传递
A system for detection of cervical precancerous in field emission scanning electron microscope images using texture features
2
作者 Yessi Jusman Siew-Cheok Ng +3 位作者 Khairunnisa Hasikin Rahmadi Kurnia Noor Azuan Abu Osman Kean Hooi Teoh 《Journal of Innovative Optical Health Sciences》 SCIE EI CAS 2017年第2期81-92,共12页
This study develops a novel cervical precancerous detection system by using texture analysis of field emission scanning electron microscopy(FE-SEM)images.The processing scheme adopted in the proposed system focused on... This study develops a novel cervical precancerous detection system by using texture analysis of field emission scanning electron microscopy(FE-SEM)images.The processing scheme adopted in the proposed system focused on two steps.The first step was to enhance cervical cell FE-SEM images in order to show the precancerous characterization indicator.A problem arises from the question of how to extract features which characterize cervical precancerous cells.For the first step,a preprocessing technique called intensity transformation and morphological operation(ITMO)algorithm used to enhance the quality of images was proposed.The algo-rithm consisted of contrast stretching and morphological opening operations.The second step was to characterize the cervical cells to three classes,namely normal,low grade intra-epithelial squamous lesion(LSIL),and high grade intra-epithelial squamous lesion(HSIL).To differen-tiate between normal and precancerous cells of the cervical cell FE-SEM images,human papillomavirus(HPV)contained in the surface of cells were used as indicators.In this paper,we investigated the use of texture as a tool in determining precancerous cell images based on the observation that cell images have a distinct visual texture.Gray level co-occurrences matrix(GLCM)technique was used to extract the texture features.To confirm the system's perfor-mance,the system was tested using 150 cervical cell FE-SEM images.The results showed that the accuracy,sensitivity and specificity of the proposed system are 95.7%,95.7%and 95.8%,respectively. 展开更多
关键词 Cervical cancer detection electron image image processing features extraction intelligent system.
原文传递
Location Evaluation of Childcare Facilities Focusing on Transportation in Japanese Urban Areas
3
作者 Keisho Satoh Koya Tsukahara Kayoko Yamamoto 《Journal of Geographic Information System》 2018年第5期521-538,共18页
In recent Japan, as there has been an increase of dual-income households and the demand for childcare facilities has especially increased especially in urban areas, childcare facilities and workers are lacking and it ... In recent Japan, as there has been an increase of dual-income households and the demand for childcare facilities has especially increased especially in urban areas, childcare facilities and workers are lacking and it leads to the serious issue of children on waiting lists. Based on the background mentioned above, using statistical method, geographical information system (GIS) and public open data, scenario analysis to select transportation, the present study aimed to propose a method to quantitatively evaluate the current location of childcare facilities in Japanese urban areas. In the present study, the model of the p-median problem used to obtain the optimal location of facilities was modified, and a method to evaluate the current situation concerning the shortage or overage of childcare facilities by district was proposed. As evaluations are conducted using quantitative data such as the specialization coefficient of person trip for transportation and the distance between childcare facilities and districts, the evaluation results are also quantitative, making it an effective indicator for evaluating the locations of childcare facilities. Additionally, the specialization coefficient of person trip for transportation and the distance between childcare facilities and districts were calculated based on public open data. Therefore, the evaluation method in the present study has a high temporal reproducibility as well as spatial reproducibility. 展开更多
关键词 Childcare Facility TRANSPORTATION PERSON TRIP P-MEDIAN Problem Statistical Method GIS (Geographic Information Systems) Public Open Data Scenario Analysis
暂未订购
Preprocessing Model of Manuscripts in Javanese Characters
4
作者 Anastasia Rita Widiarti Agus Harjoko +1 位作者 Marsono   Sri Hartati 《Journal of Signal and Information Processing》 2014年第4期112-122,共11页
Manuscript preprocessing is the earliest stage in transliteration process of manuscripts in Javanese scripts. Manuscript preprocessing stage is aimed to produce images of letters which form the manuscripts to be proce... Manuscript preprocessing is the earliest stage in transliteration process of manuscripts in Javanese scripts. Manuscript preprocessing stage is aimed to produce images of letters which form the manuscripts to be processed further in manuscript transliteration system. There are four main steps in manuscript preprocessing, which are manuscript binarization, noise reduction, line segmentation, and character segmentation for every line image produced by line segmentation. The result of the test on parts of PB.A57 manuscript which contains 291 character images, with 95% level of confidence concluded that the success percentage of preprocessing in producing Javanese character images ranged 85.9% - 94.82%. 展开更多
关键词 BINARIZATION CHARACTERS SEGMENTATION Line SEGMENTATION Noise Reduction MANUSCRIPT Image PREPROCESSING
暂未订购
Search Methods for Evacuation Routes during Torrential Rain Disasters Using Genetic Algorithms and GIS
5
作者 Koichiro Tani Kayoko Yamamoto 《Journal of Geographic Information System》 2020年第3期256-274,共19页
The present study aims to propose a method to search for the most appropriate evacuation routes that take calorie consumption required for evacuees to reach evacuation sites into consideration, by focusing on disaster... The present study aims to propose a method to search for the most appropriate evacuation routes that take calorie consumption required for evacuees to reach evacuation sites into consideration, by focusing on disasters caused by heavy rainfall, and using genetic algorithm (GA) and geographic information system (GIS). Specifically, GA was used to design and develop an evacuation route search algorithm and 4 parameters including the number of generations, mutation rate number of individuals and crossover rate were set by conducting sensitivity analyses. Additionally, GIS was also used to create road network data and contour data for digital maps and calculate the altitude of each crossover point. Based on these, the necessary calorie consumption to reach evacuation sites for each route was calculated, and that made it possible to derive the several evacuation routes with the small values unlike other methods. By using GA and GIS to suggest detailed evacuation routes, which take the necessary calories required to reach evacuation sites into consideration, it can be expected that the present study should contribute to the decision-making of evacuees. Additionally, as the method is based on public information, the method has high spatial and temporal repeatability. Because evacuation routes are proposed based on quantified data, the selected evacuation routes are quantitatively evaluated, and are an effective indicator for deciding on an evacuation route. Additionally, evacuation routes that accurately reflect current conditions can be derived by utilizing detailed information as data. 展开更多
关键词 Torrential Rain Disasters Evacuation Route Evacuation Site Calorie Consumption Genetic Algorism (GA) Geographic Information Systems (GIS)
在线阅读 下载PDF
Enhancing Smart Grid with Session-Oriented Communication System to Truly Support Reliability and Robustness
6
作者 Augusto V. Neto Helber W. da Silva +5 位作者 Eduardo C. Cerqueira Jose Neuman de Souza Luci Pirmez Danielo G. Gomes Flavia C. Delicato Rui L. Aguiar 《Smart Grid and Renewable Energy》 2012年第4期260-265,共6页
Environmental sustainability issues and the costs of new power generation and transmission have increased the interest in evolving current power grid to new technologies. The Smart Grid is a promising technology, sinc... Environmental sustainability issues and the costs of new power generation and transmission have increased the interest in evolving current power grid to new technologies. The Smart Grid is a promising technology, since it allows a distributed computing approach with potentials for self-diagnosing/-healing, reliable multi-user communication and fast hard real-time control. However, the missing standardization associated with heterogeneity of legacy systems and wide-area service demands, makes very challenging to adopt Smart Grid in a cost-effective way. By considering this, we propose the Session-Oriented Communication System (SOCSys) to overcome the above issues by enhancing Smart Grid with truly reliable and robust capabilities over heterogeneous environments. SOCSys achieves this goal by orchestrating session-control with innovative network-centric facilities operating over a wireless mesh Information Network compliant with IEEE 802.11e/s standard. The simulation results show that SOCSys improved network performance in terms of bandwidth utilization and minimization of delay, while consuming low network resources. Graphical analyses showed that SOCSys supported multimedia sessions with excellent quality, where it outperforms the experiments with regular settings. 展开更多
关键词 Smart Grid SESSION Control Quality of Service IP MULTICAST Wireless MESH Networks
在线阅读 下载PDF
Heart Rate Variability Applied to Short-Term Cardiovascular Event Risk Assessment
7
作者 Simao Paredes Teresa Rocha +3 位作者 Paulo de Carvalho Jorge Henriques Ramona Cabiddu Joao Morais 《Engineering(科研)》 2013年第10期237-243,共7页
Cardiovascular disease (CVD) risk assessment is an important instrument to enhance the clinical decision in the daily practice as well as to improve the preventive health care promoting the transfer from the hospital ... Cardiovascular disease (CVD) risk assessment is an important instrument to enhance the clinical decision in the daily practice as well as to improve the preventive health care promoting the transfer from the hospital to patient’s home. Due to its importance, clinical guidelines recommend the use of risk scores to predict the risk of a cardiovascular disease event. Therefore, there are several well known risk assessment tools, unfortunately they present some limitations.This work addresses this problem with two different methodologies:1) combination of risk assessment tools based on fusion of Bayesian classifiers complemented with genetic algorithm optimization;2) personalization of risk assessment through the creation of groups of patients that maximize the performance of each risk assessment tool. This last approach is implemented based on subtractive clustering applied to a reduced-dimension space.Both methodologies were developed to short-term CVD risk prediction for patients with Acute Coronary Syndromes without ST segment eleva-tion (ACS-NSTEMI). Two different real patients’ datasets were considered to validate the developed strategies:1) Santa Cruz Hospital, Portugal, N=460 patients;2)LeiriaPombal Hospital Centre, Portugal, N=99 patients.This work improved the performance in relation to current risk assessment tools reaching maximum values of sensitivity, specificity and geometric mean of, respectively, 80.0%, 82.9%, 81.5%. Besides this enhancement, the proposed methodologies allow the incorporation of new risk factors, deal with missing risk factors and avoid the selection of a single tool to be applied in the daily clinical practice. In spite of these achievements, the CVD risk assessment (patient stratification) should be improved. The incorporation of new risk factors recognized as clinically significant, namely parameters derived from heart rate variability (HRV), is introduced in this work. HRV is a strong and independent predictor of mortality in patients following acute myocardial infarction. The impact of HRV parameters in the characterization of coronary artery disease (CAD) patients will be conducted during hospitalization of these patients in the Leiria-Pombal Hospital Centre (LPHC). 展开更多
关键词 CVD Risk Assessment Knowledge Management Management of Cardiovascular Diseases Decision-Support Systems
暂未订购
Combining MobileNetV1 and Depthwise Separable convolution bottleneck with Expansion for classifying the freshness of fish eyes 被引量:2
8
作者 Eko Prasetyo Rani Purbaningtyas +2 位作者 Raden Dimas Adityo Nanik Suciati Chastine Fatichah 《Information Processing in Agriculture》 EI 2022年第4期485-496,共12页
Image classification using Convolutional Neural Network(CNN)achieves optimal perfor-mance with a particular strategy.MobileNet reduces the parameter number for learning features by switching from the standard convolut... Image classification using Convolutional Neural Network(CNN)achieves optimal perfor-mance with a particular strategy.MobileNet reduces the parameter number for learning features by switching from the standard convolution paradigm to the depthwise separable convolution(DSC)paradigm.However,there are not enough features to learn for identify-ing the freshness of fish eyes.Furthermore,minor variances in features should not require complicated CNN architecture.In this paper,our first contribution proposed DSC Bottle-neck with Expansion for learning features of the freshness of fish eyes with a Bottleneck Multiplier.The second contribution proposed Residual Transition to bridge current feature maps and skip connection feature maps to the next convolution block.The third contribu-tion proposed MobileNetV1 Bottleneck with Expansion(MB-BE)for classifying the freshness of fish eyes.The result obtained from the Freshness of the Fish Eyes dataset shows that MB-BE outperformed other models such as original MobileNet,VGG16,Densenet,Nasnet Mobile with 63.21%accuracy. 展开更多
关键词 Depthwise separable convolution BOTTLENECK Classification FRESHNESS Fish eye Residual transition
原文传递
Towards the automation of book typesetting 被引量:1
9
作者 Sérgio M.Rebelo Tiago Martins +1 位作者 Diogo Ferreira Artur Rebelo 《Visual Informatics》 EI 2023年第2期1-12,共12页
This paper proposes a generative approach for the automatic typesetting of books in desktop publishing.The presented system consists in a computer script that operates inside a widely used design software tool and imp... This paper proposes a generative approach for the automatic typesetting of books in desktop publishing.The presented system consists in a computer script that operates inside a widely used design software tool and implements a generative process based on several typographic rules,styles and principles which have been identified in the literature.The performance of the proposed system is tested through an experiment which included the evaluation of its outputs with people.The results reveal the ability of the system to consistently create varied book designs from the same input content as well as visually coherent book designs with different contents while complying with fundamental typographic principles. 展开更多
关键词 Design tools Data-driven design Generative design Graphic design TYPOGRAPHY
原文传递
Provisioning of Inter-Domain QoS-Aware Services
10
作者 Fernando Matos Alexandre Matos +1 位作者 Paulo Simoes Edmundo Monteiro 《Journal of Computer Science & Technology》 SCIE EI CSCD 2015年第2期404-420,共17页
Cooperation among service providers, network providers, and access providers in the Internet allows the creation of new services to offer to customers that are in other domains, thus increasing revenue. However, the I... Cooperation among service providers, network providers, and access providers in the Internet allows the creation of new services to offer to customers that are in other domains, thus increasing revenue. However, the Internet heterogeneous environment, where each provider has its own policies, infrastructure and business goals, hinders the deployment of more advanced communication services. This paper presents a Quality of Service (QoS) for Inter-Domain Services (QIDS) model that allows inter-domain QoS-aware services to be defined, configured, and adapted in a dynamic and on-demand fashion, among service providers. This is accomplished by: 1) the use of a common communication channel (business layer) where service providers publish and search for services, and interact with each other to contract and manage these services; 2) the templates to specify the business and technical characteristics of the services; 3) the automatic composition of services using service dements (smaller services) a^cording to performance and service-specific QoS parameters; and 4) the creation and enforcement of configuration rules for the underlying infrastructure. A prototype was implemented to validate QIDS and performance tests were conducted on an inter-domain Border Gateway Protocol (BGP)/Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) scenario. 展开更多
关键词 service provisioning inter-domain QOS service composition
原文传递
Enabling data-driven anomaly detection by design in cyber-physical production systems
11
作者 Rui Pinto Gil Goncalves +1 位作者 Jerker Delsing Eduardo Tovar 《Cybersecurity》 EI CSCD 2022年第3期34-51,共18页
Designing and developing distributed cyber-physical production systems(CPPS)is a time-consuming,complex,and error-prone process.These systems are typically heterogeneous,i.e.,they consist of multiple components implem... Designing and developing distributed cyber-physical production systems(CPPS)is a time-consuming,complex,and error-prone process.These systems are typically heterogeneous,i.e.,they consist of multiple components implemented with different languages and development tools.One of the main problems nowadays in CPPS implementation is enabling security mechanisms by design while reducing the complexity and increasing the system’s maintainability.Adopting the IEC 61499 standard is an excellent approach to tackle these challenges by enabling the design,deployment,and management of CPPS in a model-based engineering methodology.We propose a method for CPPS design based on the IEC 61499 standard.The method allows designers to embed a bio-inspired anomaly-based host intrusion detection system(A-HIDS)in Edge devices.This A-HIDS is based on the incremental Dendritic Cell Algorithm(iDCA)and can analyze OPC UA network data exchanged between the Edge devices and detect attacks that target the CPPS’Edge layer.This study’s findings have practical implications on the industrial security community by making novel contributions to the intrusion detection problem in CPPS considering immune-inspired solutions,and cost-effective security by design system implementation.According to the experimental data,the proposed solution can dramatically reduce design and code complexity while improving application maintainability and successfully detecting network attacks without negatively impacting the performance of the CPPS Edge devices. 展开更多
关键词 Artificial immune systems Cyber-physical production systems IEC 61499 Function blocks Industrial Internet of Things Anomaly-based host intrusion detection system Model-based engineering
原文传递
Survey on Simulation for Mobile Ad-Hoc Communication for Disaster Scenarios
12
作者 Erika Rosas Nicolas Hidalgo +6 位作者 Veronica Gil-Costa Carolina Bonacic Mauricio Marin Hermes Senger Luciana Arantes CesarMarcondes Olivier Marin 《Journal of Computer Science & Technology》 SCIE EI CSCD 2016年第2期326-349,共24页
Mobile ad-hoc communication is a demonstrated solution to mitigate the impact of infrastructure failures during large-scale disasters. A very complex issue in this domain is the design validation of software applicati... Mobile ad-hoc communication is a demonstrated solution to mitigate the impact of infrastructure failures during large-scale disasters. A very complex issue in this domain is the design validation of software applications that support decision-making and communication during natural disasters. Such disasters are irreproducible, highly unpredictable, and impossible to scale down, and thus extensive assessments cannot be led in situ. In this context, simulation constitutes the best approach towards the testing of software solutions for natural disaster responses. The present survey reviews mobility models, ad-hoc network architectures, routing protocols and network simulators. Our aim is to provide guidelines for software developers with regards to the performance evaluation of their applications by means of simulation. 展开更多
关键词 mobile ad-hoc communication SIMULATION disaster scenario mobility model
原文传递
Deep chemometrics for nondestructive photosynthetic pigments prediction using leaf reflectance spectra
13
作者 Kestrilia Rega Prilianti Edi Setiyono +1 位作者 Oesman Hendra Kelana Tatas Hardo Panintingjati Brotosudarmo 《Information Processing in Agriculture》 EI 2021年第1期194-204,共11页
The need for the rapid assessment of the photosynthetic pigment contents in plants has encouraged the development of studies to produce nondestructive quantification methods.This need is driven by the fact that data o... The need for the rapid assessment of the photosynthetic pigment contents in plants has encouraged the development of studies to produce nondestructive quantification methods.This need is driven by the fact that data on the photosynthetic pigment contents can provide a variety of important information that is related to plant conditions.Using deep chemometrics,we developed a novel one-dimensional convolutional neural network(CNN)model to predict the photosynthetic pigment contents in a nondestructive and real-time manner.Intact leaf reflectance spectra from spectroscopic measurements were used as the inputs.The prediction was simultaneously carried out for three main photosynthetic pigments,i.e.,chlorophyll,carotenoid and anthocyanin.The experimental results show that the prediction accuracy is very satisfying,with a mean absolute error(MAE)=0.0122±0.0004 for training and 0.0321±0.0022 for validation(data range of 0–1). 展开更多
关键词 Convolutional neural network Deep chemometrics Leaf reflectance Nondestructive method Photosynthetic pigments
原文传递
Entire Functions Sharing One Value with Finite Weight
14
作者 Hong Yan XU Ting Bin CAO 《Journal of Mathematical Research and Exposition》 CSCD 2010年第4期687-695,共9页
This paper deals with some uniqueness problems of entire functions concerning differential polynomials that share one value with finite weight in a different form. We obtain some theorems which generalize some results... This paper deals with some uniqueness problems of entire functions concerning differential polynomials that share one value with finite weight in a different form. We obtain some theorems which generalize some results given by Banerjee, Fang and Hua, Zhang and Lin, Zhang, etc. 展开更多
关键词 entire functions differential polynomial weighted sharing.
在线阅读 下载PDF
Differentially private data publication with multi‐level data utility
15
作者 Honglu Jiang S.M.Sarwar +1 位作者 Haotian Yu Sheikh Ariful Islam 《High-Confidence Computing》 2022年第2期61-68,共8页
Conventional private data publication mechanisms aim to retain as much data utility as possible while ensuring sufficient privacy protection on sensitive data.Such data publication schemes implicitly assume that all d... Conventional private data publication mechanisms aim to retain as much data utility as possible while ensuring sufficient privacy protection on sensitive data.Such data publication schemes implicitly assume that all data analysts and users have the same data access privilege levels.However,it is not applicable for the scenario that data users often have different levels of access to the same data,or different requirements of data utility.The multi-level privacy requirements for different authorization levels pose new challenges for private data publication.Traditional PPDP mechanisms only publish one perturbed and private data copy satisfying some privacy guarantee to provide relatively accurate analysis results.To find a good tradeoffbetween privacy preservation level and data utility itself is a hard problem,let alone achieving multi-level data utility on this basis.In this paper,we address this challenge in proposing a novel framework of data publication with compressive sensing supporting multi-level utility-privacy tradeoffs,which provides differential privacy.Specifically,we resort to compressive sensing(CS)method to project a n-dimensional vector representation of users’data to a lower m-dimensional space,and then add deliberately designed noise to satisfy differential privacy.Then,we selectively obfuscate the measurement vector under compressive sensing by adding linearly encoded noise,and provide different data reconstruction algorithms for users with different authorization levels.Extensive experimental results demonstrate that ML-DPCS yields multi-level of data utility for specific users at different authorization levels. 展开更多
关键词 Differential privacy Compressive sensing Multi-level utility Privacy preservation
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部