Franklin Open最新文献

筛选
英文 中文
Comprehensive bibliometric analysis of advancements in artificial intelligence applications in medicine using Scopus database
Franklin Open Pub Date : 2025-01-13 DOI: 10.1016/j.fraope.2025.100212
Kevin Chamorro , Ricardo Calderón Álvarez , Melany Carvajal Ahtty , Moises Quinga
{"title":"Comprehensive bibliometric analysis of advancements in artificial intelligence applications in medicine using Scopus database","authors":"Kevin Chamorro ,&nbsp;Ricardo Calderón Álvarez ,&nbsp;Melany Carvajal Ahtty ,&nbsp;Moises Quinga","doi":"10.1016/j.fraope.2025.100212","DOIUrl":"10.1016/j.fraope.2025.100212","url":null,"abstract":"<div><div>Artificial Intelligence (AI) is transforming healthcare by enhancing efficiency and improving the quality of medical services. This study presents a comprehensive bibliometric analysis of AI’s advancements in medicine from 2017 to 2024, leveraging data from the Scopus database. Utilizing advanced bibliometric tools such as Bibliometrix and VOSviewer, we analyzed 6900 scholarly articles to uncover key trends, significant contributions, and emerging research areas in AI-driven medical applications. Our findings demonstrate a remarkable increase in AI research, particularly in deep learning and machine learning technologies, with substantial impacts on diagnostics, personalized medicine, and disease management. The United States and China emerged as leaders in research output, underscoring their robust research infrastructure and funding. This analysis provides valuable insights for researchers, healthcare professionals, highlighting the critical role of ongoing research and international collaboration in addressing complex healthcare challenges and driving future innovations in AI and medicine.</div></div>","PeriodicalId":100554,"journal":{"name":"Franklin Open","volume":"10 ","pages":"Article 100212"},"PeriodicalIF":0.0,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143102074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sizing passive filters for mitigation of harmonics in a low voltage network containing solar PV units
Franklin Open Pub Date : 2025-01-13 DOI: 10.1016/j.fraope.2025.100220
Saad T․ Y․ Alfalahi , Muhamad Bin Mansor , Aiman Nouh , Salahuddin I․ Abdrabba , Faisal Mohamed
{"title":"Sizing passive filters for mitigation of harmonics in a low voltage network containing solar PV units","authors":"Saad T․ Y․ Alfalahi ,&nbsp;Muhamad Bin Mansor ,&nbsp;Aiman Nouh ,&nbsp;Salahuddin I․ Abdrabba ,&nbsp;Faisal Mohamed","doi":"10.1016/j.fraope.2025.100220","DOIUrl":"10.1016/j.fraope.2025.100220","url":null,"abstract":"<div><div>The continual growth of renewables in the distribution scale is converting the conventional arrangement of power grid into a modern arrangement in which the Distribution Generation (DG) units are included within the distribution section of any power system. These renewable units include power electronics-based converters in their construction and the advent of these new technologies deteriorates the Power Quality (PQ) and introduces serious issues of harmonic distortion in both voltage and current waveforms. This research attempts to alleviate the problem of harmonic distortion in low voltage distribution networks containing solar PV modules through the proper sizing of adaptive Passive Harmonic Filters (PHFs). For this purpose, a real distribution network is simulated by ETAP environment, and the harmonic's load flow study is performed to specify the harmonic content at various busbars in the network. Hence PHF models based on the frequency scan performed are proposed to minimize the Total Harmonic Distortion (THD) in the network. The results of the simulations performed have shown that this approach reduces the THD significantly to comply with the permissible limits specified by the international standards IEEE STD 519 and IEC STD 61,000–3–6.</div></div>","PeriodicalId":100554,"journal":{"name":"Franklin Open","volume":"10 ","pages":"Article 100220"},"PeriodicalIF":0.0,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143101580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stability and bifurcation of a time-varying delay predator–prey model with Allee effect, prey refuge and B-D function
Franklin Open Pub Date : 2025-01-01 DOI: 10.1016/j.fraope.2024.100208
Qiang Zhou, Xin-You Meng
{"title":"Stability and bifurcation of a time-varying delay predator–prey model with Allee effect, prey refuge and B-D function","authors":"Qiang Zhou,&nbsp;Xin-You Meng","doi":"10.1016/j.fraope.2024.100208","DOIUrl":"10.1016/j.fraope.2024.100208","url":null,"abstract":"<div><div>This paper mainly considers a time-varying delay predator–prey model with Allee effect, prey refuge and B-D functional response. First, the positivity and boundedness of solutions of such model without delay are proved. Next, the conditions for the existence and local stability of equilibriums are provided. The global stability of the system near the positive equilibrium is also obtained by constructing appropriate Lyapunov function. Then, the existence of Hopf bifurcation and the stability of periodic solutions of bifurcation are proved. Furthermore, when the time-varying delay is a periodic function, periodic perturbation is applied to the delay to suppress oscillations by the method of multiple scales, which calculates the amplitude of the perturbation to control oscillations. Finally, the results show that oscillations can be weakened, and numerical simulations are showed to verify our analytical results.</div></div>","PeriodicalId":100554,"journal":{"name":"Franklin Open","volume":"10 ","pages":"Article 100208"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143102067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust reachability of Boolean control networks with arbitrary disturbance inputs
Franklin Open Pub Date : 2024-12-31 DOI: 10.1016/j.fraope.2024.100209
Fengli Sun , Jun-e Feng , Rong Zhao , Xiaoyu Zhao , Biao Wang
{"title":"Robust reachability of Boolean control networks with arbitrary disturbance inputs","authors":"Fengli Sun ,&nbsp;Jun-e Feng ,&nbsp;Rong Zhao ,&nbsp;Xiaoyu Zhao ,&nbsp;Biao Wang","doi":"10.1016/j.fraope.2024.100209","DOIUrl":"10.1016/j.fraope.2024.100209","url":null,"abstract":"<div><div>This paper investigates the robust reachability of Boolean control networks (BCNs) with arbitrary disturbance inputs. First, in order to describe the dynamics of a BCN with arbitrary disturbance inputs, a new concept, possible reachability, is introduced. By exploring the relationship between the robust reachability and the transition matrix, a necessary and sufficient condition is derived for checking the robust reachability. Subsequently, the dynamic progress graph is introduced to describe the dynamics of BCNs and based on the breadth-first search (BFS), an algorithm is proposed to design the shortest control input sequence to ensure robust reachability.</div></div>","PeriodicalId":100554,"journal":{"name":"Franklin Open","volume":"10 ","pages":"Article 100209"},"PeriodicalIF":0.0,"publicationDate":"2024-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143102070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hyperchaos on the dynamics of memristive Tabu learning neuron model under influence of electromagnetic radiation: Application in biomedical data privacy
Franklin Open Pub Date : 2024-12-30 DOI: 10.1016/j.fraope.2024.100210
Bertrand Frederick Boui A Boya , Jacques Kengne , Arnaud Nanfak , Sishu Shankar Muni , Jean de Dieu Nkapkop , Germaine Djuidje Kenmoe , Lyudmila Klimentyevna Babenko
{"title":"Hyperchaos on the dynamics of memristive Tabu learning neuron model under influence of electromagnetic radiation: Application in biomedical data privacy","authors":"Bertrand Frederick Boui A Boya ,&nbsp;Jacques Kengne ,&nbsp;Arnaud Nanfak ,&nbsp;Sishu Shankar Muni ,&nbsp;Jean de Dieu Nkapkop ,&nbsp;Germaine Djuidje Kenmoe ,&nbsp;Lyudmila Klimentyevna Babenko","doi":"10.1016/j.fraope.2024.100210","DOIUrl":"10.1016/j.fraope.2024.100210","url":null,"abstract":"<div><div>This paper presents a novel biological neural networks based on memristive Tabu learning neuron (MTLN) model influenced by electromagnetic radiation. Despite the model having an unstable equilibrium plane, numerical investigation without the influence of electromagnetic radiation reveal that when increasing the memristor strength induces complex phenomena, including the coexistence of infinite bubbles of bifurcations, offset plane coexistence of various attractors. Furthermore, electromagnetic radiation can significantly impact the system's behavior, giving rise to hyperchaotic dynamics. A decent understanding is seen between the mathematical outcomes, approved through trial execution on an Arduino microcontroller-based. The insights gained from neural dynamics could pave the way for applications in neuromorphic computing, engineering, and brain-machine interfaces. Based on the complex dynamics of the model, a data privacy of biomedical data has been build and reveals good results, and enable to resist to robust attacks.</div></div>","PeriodicalId":100554,"journal":{"name":"Franklin Open","volume":"10 ","pages":"Article 100210"},"PeriodicalIF":0.0,"publicationDate":"2024-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143102069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Persistence of resonant torus doubling bifurcation under polynomial perturbations
Franklin Open Pub Date : 2024-12-26 DOI: 10.1016/j.fraope.2024.100207
Sishu Shankar Muni
{"title":"Persistence of resonant torus doubling bifurcation under polynomial perturbations","authors":"Sishu Shankar Muni","doi":"10.1016/j.fraope.2024.100207","DOIUrl":"10.1016/j.fraope.2024.100207","url":null,"abstract":"<div><div>Resonant torus doubling bifurcation occurs in discrete maps of three or more dimensions. To date, only three discrete maps have been known to exhibit such bifurcations namely Shilnikov map, generalised Hénon map, and quadratic map. In the present study, we explore if the resonant torus doubling bifurcation is persistent under perturbations. In a simplest case, we apply polynomial perturbations of various degrees. Interestingly, different maps even though all have quadratic nonlinearity showcase different existence intervals in the perturbation parameter space. A novel algorithm is used to detect the doubling bifurcation in two-dimensional parameter space. Furthermore, we explore different kinds of codimension-one bifurcation occurring near the non-existence of the doubling bifurcation. It is found in all three maps that near such bifurcation, (a) instead of eigenvalues crossing <span><math><mrow><mo>−</mo><mn>1</mn></mrow></math></span> for a period-doubling bifurcations, rather develop complex conjugate eigenvalues and undergo Neimark–Sacker bifurcation, (b) they form a resonant torus bubble which remains robust and no other bifurcations takes place. Moreover, we also explore the persistence of quasiperiodic torus doubling bifurcation in a similar way. For both resonant torus doubling bifurcation and quasiperiodic torus doubling bifurcation, it is found that Shilnikov map and generalised Hénon map showcase persistence in wide intervals of perturbations while the quadratic map is not as persistent and the resonant torus ceases to exist with even smaller range of perturbations.</div></div>","PeriodicalId":100554,"journal":{"name":"Franklin Open","volume":"10 ","pages":"Article 100207"},"PeriodicalIF":0.0,"publicationDate":"2024-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143101081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An error estimation of absolutely continuous signals and solution of Abel’s integral equation using the first kind pseudo-Chebyshev wavelet technique
Franklin Open Pub Date : 2024-12-26 DOI: 10.1016/j.fraope.2024.100205
Susheel Kumar , Aditya Kumar Awasthi , Sudhir Kumar Mishra , Harish Chandra Yadav , Abhilasha , Shyam Lal
{"title":"An error estimation of absolutely continuous signals and solution of Abel’s integral equation using the first kind pseudo-Chebyshev wavelet technique","authors":"Susheel Kumar ,&nbsp;Aditya Kumar Awasthi ,&nbsp;Sudhir Kumar Mishra ,&nbsp;Harish Chandra Yadav ,&nbsp;Abhilasha ,&nbsp;Shyam Lal","doi":"10.1016/j.fraope.2024.100205","DOIUrl":"10.1016/j.fraope.2024.100205","url":null,"abstract":"<div><div>This paper introduces a novel computational strategy for addressing challenges in approximation theory. It focuses on the use of first-kind pseudo-Chebyshev wavelet approximations and the methodology and evaluation of the error for a specific function are outlined, along with practical instances to showcase the method’s effectiveness and efficiency. This approach is motivated by the need for highly efficient and precise methods for function representation and the error reduction in this domain. The paper also establishes the error of a function associated with the class of absolutely continuous functions using first-kind pseudo-Chebyshev wavelets via orthogonal projection operators, highlighting their precision and theoretical optimality within the domain of wavelet analysis. Additionally, the use of wavelet approximation to solve Abel’s integral equation is demonstrated by computing the approximate solution using first kind pseudo-Chebyshev wavelet.</div></div>","PeriodicalId":100554,"journal":{"name":"Franklin Open","volume":"10 ","pages":"Article 100205"},"PeriodicalIF":0.0,"publicationDate":"2024-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143102068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated K-means clustering via dual decomposition-based distributed optimization
Franklin Open Pub Date : 2024-12-22 DOI: 10.1016/j.fraope.2024.100204
Vassilios Yfantis , Achim Wagner , Martin Ruskowski
{"title":"Federated K-means clustering via dual decomposition-based distributed optimization","authors":"Vassilios Yfantis ,&nbsp;Achim Wagner ,&nbsp;Martin Ruskowski","doi":"10.1016/j.fraope.2024.100204","DOIUrl":"10.1016/j.fraope.2024.100204","url":null,"abstract":"<div><div>The use of distributed optimization in machine learning can be motivated either by the resulting preservation of privacy or the increase in computational efficiency. On the one hand, training data might be stored across multiple devices. Training a global model within a network where each node only has access to its confidential data requires the use of distributed algorithms. Even if the data is not confidential, sharing it might be prohibitive due to bandwidth limitations. On the other hand, the ever-increasing amount of available data leads to large-scale machine learning problems. By splitting the training process across multiple nodes its efficiency can be significantly increased. This paper aims to demonstrate how dual decomposition can be applied for distributed training of <span><math><mi>K</mi></math></span>-means clustering problems. After an overview of distributed and federated machine learning, the mixed-integer quadratically constrained programming-based formulation of the <span><math><mi>K</mi></math></span>-means clustering training problem is presented. The training can be performed in a distributed manner by splitting the data across different nodes and linking these nodes through consensus constraints. Finally, the performance of the subgradient method, the bundle trust method, and the quasi-Newton dual ascent algorithm are evaluated on a set of benchmark problems. The main benefit stemming from the formulation of the clustering problem as a mixed-integer program and from the use of dual decomposition within a federated learning framework, apart from the preservation of privacy, is the computation of a lower bound of the objective of the overall clustering problem. In this way, the worst-case distance of any found solution to the global optimum can be easily assessed. While the mixed-integer programming-based formulation of the clustering problems suffers from weak integer relaxations, the presented approach can potentially be used to enable an efficient solution in the future, both in a central and distributed setting.</div></div>","PeriodicalId":100554,"journal":{"name":"Franklin Open","volume":"10 ","pages":"Article 100204"},"PeriodicalIF":0.0,"publicationDate":"2024-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143101575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interconnected systems for the Lyapunov’s linear operator equations in the Hilbert space
Franklin Open Pub Date : 2024-12-18 DOI: 10.1016/j.fraope.2024.100201
Oleksandr Pokutnyi , Yevhen Panasenko , Olena Polishchuk
{"title":"Interconnected systems for the Lyapunov’s linear operator equations in the Hilbert space","authors":"Oleksandr Pokutnyi ,&nbsp;Yevhen Panasenko ,&nbsp;Olena Polishchuk","doi":"10.1016/j.fraope.2024.100201","DOIUrl":"10.1016/j.fraope.2024.100201","url":null,"abstract":"<div><div>This paper investigates a perturbed interconnected system for linear operator Lyapunov equations in Hilbert space. We establish solvability conditions for the operator system in cases where the generating system of equations does and does not have solutions. Solutions are sought in the form of a completely convergent series.</div></div>","PeriodicalId":100554,"journal":{"name":"Franklin Open","volume":"10 ","pages":"Article 100201"},"PeriodicalIF":0.0,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143101584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strong non-repudiation certificateless scheme with an aggregate signature in vehicular ad-hoc network
Franklin Open Pub Date : 2024-12-17 DOI: 10.1016/j.fraope.2024.100206
Abdelkrim Imghoure, Ahmed El-Yahyaoui, Fouzia Omary
{"title":"Strong non-repudiation certificateless scheme with an aggregate signature in vehicular ad-hoc network","authors":"Abdelkrim Imghoure,&nbsp;Ahmed El-Yahyaoui,&nbsp;Fouzia Omary","doi":"10.1016/j.fraope.2024.100206","DOIUrl":"10.1016/j.fraope.2024.100206","url":null,"abstract":"<div><div>In Vehicular Ad-Hoc Networks (VANETs), a Certificateless Aggregate Signature (CLAS) scheme with a conditional anonymity authentication meets both anonymity and security requirements. This scheme enables a roadside unit to aggregate multiple signatures during Vehicle-to-Infrastructure communications and send the aggregate signature to other RSUs and a traffic control center. However, according to Girault's classification of trust levels (TLs) [<span><span>1</span></span>], the existing CLAS schemes only achieve TL 2. At this level, a malicious Trusted Authority (TA) or vehicle can impersonate a legitimate vehicle by launching a public key replacement attack during the authentication process. Consequently, the existing research does not provide strong non-repudiation, as it cannot be proven whether the authority or the vehicle has replaced the original public key. In this study, a new CLAS scheme is designed that achieves TL 3 using asymmetric pairing with a <em>type-2</em> sitting and the hashing technique of Al-Riyami and Paterson [<span><span>2</span></span>]. The results demonstrate that the proposed CLAS scheme offers strong non-repudiation and effectively prevents a public key replacement attack. A security proof is carried out and demonstrates that our scheme achieves Existential Unforgeability under Chosen Message Attack (EUF-CMA) security in the random oracle. Furthermore, the simulation outcomes demonstrate that the proposed scheme outperforms the existing schemes and allows to save communication bandwidth during V2I communications in VANET [<span><span>3</span></span>].</div></div>","PeriodicalId":100554,"journal":{"name":"Franklin Open","volume":"10 ","pages":"Article 100206"},"PeriodicalIF":0.0,"publicationDate":"2024-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143101583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信