This study presents a systematic review of the environmental impact associated with urologic procedures, telemedicine, and professional conference practices, highlighting...
Antibody–drug conjugates (ADCs) targeting B-cell maturation antigen (BCMA) mark a new era in tackling multiple myeloma, a challenging blood cancer. These “smart...
A breakthrough in alkaline fuel cell membrane design: bi-crown-ether modified piperidinium side chains on poly(aryl piperidinium) backbone create molecular highways...
Energy Engineering is honored to announce that Prof. Lin Lu of The Hong Kong Polytechnic University will officially assume the role of Editor-in-Chief of the journal.Looking ahead to 2026, Energy...
We are pleased to announce that two additional journals published by Tech Science Press have been officially selected for inclusion in the Chemical Abstracts Service (CAS) databases. These additions...
Background: Adolescents increasingly engage with social media for connection, self-expression, and identity exploration. This growing digital engagement...
Grape (Vitis vinifera L.) cultivation has progressed from early domestication and clonal propagation to modern, data-driven breeding that is reshaping...
Circadian biorhythms are fundamental in plant adaptability and development. To reveal the effect of organic and inorganic forms of Se, foliar treatments...
Background: While the treatment of metastatic renal cell carcinoma (mRCC) is evolving due to immune checkpoint inhibitors (ICIs), optimal strategies for...
The fabrication of highly flame-retardant polyamide 6 (PA6) composites is of great significance for expanding their practical applications. Herein, a...
With the global diabetes epidemic, diabetic foot ulcers (DFUs) have become a major health burden, affecting approximately 18 million people worldwide...
Neurodegenerative diseases (NDs) such as Alzheimer’s disease (AD), Parkinson’s disease (PD), Huntington’s disease (HD), and amyotrophic lateral sclerosis...
Precast concrete structures have gained popularity due to their advantages. However, the seismic performance of their connection joints remains an area...
This study presents a numerical analysis of the effects of a rigid flat wall with oscillating motion on the pressure wave propagation during a single...
Background: The life-course management of children with tetralogy of Fallot (TOF) has focused on demonstrating brain structural alterations, developmental...
Pediatric congenital heart disease (CHD) pharmacotherapy faces three fundamental barriers: developmental pharmacokinetic complexity, anatomic-genetic...
Objectives: Parentification, a role reversal where children assume age-inappropriate duties in the family, is a significant childhood adversity often...
Nanomedicine has evolved significantly over the last decades and expanded its applications in pediatric oncology, which represents a special domain with...
Ovarian endometrioid carcinoma (OEC) accounts for ~10% of epithelial ovarian cancers and displays broad morphologic diversity that complicates diagnosis...
Bangladesh has achieved notable progress in expanding electricity access nationwide. Nonetheless, remote and topographically challenging regions such...
To enhance power supply reliability and reduce customer outage time, Mobile Emergency Power Supply Vehicles (MEPSVs), including Mobile Diesel Generator...
The tumor microenvironment encompasses not only the tumor cells themselves, but also the surrounding fibroblasts, immunological and inflammatory cells,...
The mobile internet has revolutionized our daily lives, providing continuous connectivity, communication, and access to a wide range of services and applications...
Machine vision detection and intelligent recognition are important research areas in computer vision with wide-ranging applications in manufacturing,...
Object detection and tracking in videos has become an increasingly important area of research due to its potential applications in a variety of domains...
With the progress of science and technology, more and more complex engineering structures are serving in extreme environments. In the service life of...
Extracellular vesicles (EVs) are phospholipid bilayer vesicles released from tumor and non-tumor cells for intercellular communication. EVs contain...
The peridynamics proposed by Silling [1] is a non-local theory of solid mechanics. It redefines the problems by using integral equations rather than partial...
In modern time, experts started to use interdisciplinary properties with the developing of technology and science. Thus, these disciplines provide more...
Background: Adolescents increasingly engage with social media for connection, self-expression, and identity exploration. This growing digital engagement...
Grape (Vitis vinifera L.) cultivation has progressed from early domestication and clonal propagation to modern, data-driven breeding that is reshaping...
Circadian biorhythms are fundamental in plant adaptability and development. To reveal the effect of organic and inorganic forms of Se, foliar treatments...
Background: While the treatment of metastatic renal cell carcinoma (mRCC) is evolving due to immune checkpoint inhibitors (ICIs), optimal strategies for...
The fabrication of highly flame-retardant polyamide 6 (PA6) composites is of great significance for expanding their practical applications. Herein, a...
With the global diabetes epidemic, diabetic foot ulcers (DFUs) have become a major health burden, affecting approximately 18 million people worldwide...
Neurodegenerative diseases (NDs) such as Alzheimer’s disease (AD), Parkinson’s disease (PD), Huntington’s disease (HD), and amyotrophic lateral sclerosis...
Precast concrete structures have gained popularity due to their advantages. However, the seismic performance of their connection joints remains an area...
This study presents a numerical analysis of the effects of a rigid flat wall with oscillating motion on the pressure wave propagation during a single...
Background: The life-course management of children with tetralogy of Fallot (TOF) has focused on demonstrating brain structural alterations, developmental...
Pediatric congenital heart disease (CHD) pharmacotherapy faces three fundamental barriers: developmental pharmacokinetic complexity, anatomic-genetic...
Objectives: Parentification, a role reversal where children assume age-inappropriate duties in the family, is a significant childhood adversity often...
Nanomedicine has evolved significantly over the last decades and expanded its applications in pediatric oncology, which represents a special domain with...
Ovarian endometrioid carcinoma (OEC) accounts for ~10% of epithelial ovarian cancers and displays broad morphologic diversity that complicates diagnosis...
Bangladesh has achieved notable progress in expanding electricity access nationwide. Nonetheless, remote and topographically challenging regions such...
To enhance power supply reliability and reduce customer outage time, Mobile Emergency Power Supply Vehicles (MEPSVs), including Mobile Diesel Generator...
The tumor microenvironment encompasses not only the tumor cells themselves, but also the surrounding fibroblasts, immunological and inflammatory cells,...
The mobile internet has revolutionized our daily lives, providing continuous connectivity, communication, and access to a wide range of services and applications...
Machine vision detection and intelligent recognition are important research areas in computer vision with wide-ranging applications in manufacturing,...
Object detection and tracking in videos has become an increasingly important area of research due to its potential applications in a variety of domains...
With the progress of science and technology, more and more complex engineering structures are serving in extreme environments. In the service life of...
Extracellular vesicles (EVs) are phospholipid bilayer vesicles released from tumor and non-tumor cells for intercellular communication. EVs contain...
The peridynamics proposed by Silling [1] is a non-local theory of solid mechanics. It redefines the problems by using integral equations rather than partial...
In modern time, experts started to use interdisciplinary properties with the developing of technology and science. Thus, these disciplines provide more...
As containerized environments become increasingly prevalent in cloud-native infrastructures, the need for effective monitoring and detection of malicious behaviors has become critical. Malicious containers pose significant risks by exploiting shared host resources, enabling privilege escalation, or launching large-scale attacks such as cryptomining and botnet activities. Therefore, developing accurate and efficient detection mechanisms is essential for ensuring the security and stability of containerized systems. To this end, we propose a hybrid detection framework that leverages the…
As artificial Intelligence (AI) continues to expand exponentially, particularly with the emergence of generative pre-trained transformers (GPT) based on a transformer’s architecture, which has revolutionized data processing and enabled significant improvements in various applications. This document seeks to investigate the security vulnerabilities detection in the source code using a range of large language models (LLM). Our primary objective is to evaluate the effectiveness of Static Application Security Testing (SAST) by applying various techniques such as…
In modern construction, Lightweight Aggregate Concrete (LWAC) has been recognized as a vital material of concern because of its unique properties, such as reduced density and improved thermal insulation. Despite the extensive knowledge regarding its macroscopic properties, there is a wide knowledge gap in understanding the influence of microscale parameters like aggregate porosity and volume ratio on the mechanical response of LWAC. This study aims to bridge this knowledge gap, spurred by the need to…
In the field of intelligent surveillance, weakly supervised video anomaly detection (WSVAD) has garnered widespread attention as a key technology that identifies anomalous events using only video-level labels. Although multiple instance learning (MIL) has dominated the WSVAD for a long time, its reliance solely on video-level labels without semantic grounding hinders a fine-grained understanding of visually similar yet semantically distinct events. In addition, insufficient temporal modeling obscures causal relationships between events, making anomaly decisions reactive…
The cloud-fog computing paradigm has emerged as a novel hybrid computing model that integrates computational resources at both fog nodes and cloud servers to address the challenges posed by dynamic and heterogeneous computing networks. Finding an optimal computational resource for task offloading and then executing efficiently is a critical issue to achieve a trade-off between energy consumption and transmission delay. In this network, the task processed at fog nodes reduces transmission delay. Still, it increases…
This study presents a framework involving statistical modeling and machine learning to accurately predict and optimize the mechanical and damping properties of hybrid granite–epoxy (G–E) composites reinforced with cast iron (CI) filler particles. Hybrid G–E composite with added cast iron (CI) filler particles enhances stiffness, strength, and vibration damping, offering enhanced performance for vibration-sensitive engineering applications. Unlike conventional approaches, this work simultaneously employs Artificial Neural Networks (ANN) for high-accuracy property prediction and Response Surface Methodology…
Deep learning has made significant progress in the field of oriented object detection for remote sensing images. However, existing methods still face challenges when dealing with difficult tasks such as multi-scale targets, complex backgrounds, and small objects in remote sensing. Maintaining model lightweight to address resource constraints in remote sensing scenarios while improving task completion for remote sensing tasks remains a research hotspot. Therefore, we propose an enhanced multi-scale feature extraction lightweight network EM-YOLO based…
With the rapid development of smart manufacturing, intelligent safety monitoring in industrial workshops has become increasingly important. To address the challenges of complex backgrounds, target scale variation, and excessive model parameters in worker violation detection, this study proposes ADCP-YOLO, an enhanced lightweight model based on YOLOv8. Here, “ADCP” represents four key improvements: Alterable Kernel Convolution (AKConv), Dilated-Wise Residual (DWR) module, Channel Reconstruction Global Attention Mechanism (CRGAM), and Powerful-IoU loss. These components collaboratively enhance feature extraction,
With the increasing complexity of malware attack techniques, traditional detection methods face significant challenges, such as privacy preservation, data heterogeneity, and lacking category information. To address these issues, we propose Federated Dynamic Prototype Learning (FedDPL) for malware classification by integrating Federated Learning with a specifically designed K-means. Under the Federated Learning framework, model training occurs locally without data sharing, effectively protecting user data privacy and preventing the leakage of sensitive information. Furthermore, to tackle the challenges…
Federated Learning (FL) has become a leading decentralized solution that enables multiple clients to train a model in a collaborative environment without directly sharing raw data, making it suitable for privacy-sensitive applications such as healthcare, finance, and smart systems. As the field continues to evolve, the research field has become more complex and scattered, covering different system designs, training methods, and privacy techniques. This survey is organized around the three core challenges: how the data…
Predictive maintenance (PdM) is vital for ensuring the reliability, safety, and cost efficiency of heavy-duty vehicle fleets. However, real-world sensor data are often highly imbalanced, noisy, and temporally irregular, posing significant challenges to model robustness and deployment. Using multivariate time-series data from Scania trucks, this study proposes a novel PdM framework that integrates efficient feature summarization with cost-sensitive hierarchical classification. First, the proposed last_k_summary method transforms recent operational records into compact statistical and trend-based descriptors…
The increasing interconnection of modern industrial control systems (ICSs) with the Internet has enhanced operational efficiency, but also made these systems more vulnerable to cyberattacks. This heightened exposure has driven a growing need for robust ICS security measures. Among the key defences, intrusion detection technology is critical in identifying threats to ICS networks. This paper provides an overview of the distinctive characteristics of ICS network security, highlighting standard attack methods. It then examines various intrusion
Attribute-Based Encryption (ABE) has emerged as a fundamental access control mechanism in data sharing, enabling data owners to define flexible access policies. A critical aspect of ABE is key revocation, which plays a pivotal role in maintaining security. However, existing key revocation mechanisms face two major challenges: (1) High overhead due to ciphertext and key updates, primarily stemming from the reliance on revocation lists during attribute revocation, which increases computation and communication costs. (2) Limited…
The rapid advancement of large language models (LLMs) has driven the pervasive adoption of AI-generated content (AIGC), while also raising concerns about misinformation, academic misconduct, biased or harmful content, and other risks. Detecting AI-generated text has thus become essential to safeguard the authenticity and reliability of digital information. This survey reviews recent progress in detection methods, categorizing approaches into passive and active categories based on their reliance on intrinsic textual features or embedded signals. Passive…
With the development of sharded blockchains, high cross-shard rates and load imbalance have emerged as major challenges. Account partitioning based on hashing and real-time load faces the issue of high cross-shard rates. Account partitioning based on historical transaction graphs is effective in reducing cross-shard rates but suffers from load imbalance and limited adaptability to dynamic workloads. Meanwhile, because of the coupling between consensus and execution, a target shard must receive both the partitioned transactions and…
Cloud services, favored by many enterprises due to their high flexibility and easy operation, are widely used for data storage and processing. However, the high latency, together with transmission overheads of the cloud architecture, makes it difficult to quickly respond to the demands of IoT applications and local computation. To make up for these deficiencies in the cloud, fog computing has emerged as a critical role in the IoT applications. It decentralizes the computing power…
Guest Editors: Emilio Cervantes Deadline: 31 October 2026
Guest Editors: Maria Letizia Motti; Immacolata Belviso Deadline: 31 October 2026
Guest Editors: Mohammad Shokouhifar; Frank Werner Deadline: 31 August 2026
Guest Editors: Dulf Eva-H.; Kovacs Levente; Denes-Fazakas Lehel; Pintea Paul-Andrei Deadline: 31 August 2026
Guest Editors: Hoon Ko; Marek R. Ogiela Deadline: 31 July 2026
Guest Editors: Jevier Bermejo Higuera; Juan Ramón Bermejo Higuera Deadline: 31 July 2026
Guest Editors: Shyi-Chyi Cheng; Naomi A. Ubina Deadline: 31 July 2026
Guest Editors: Wenfeng Zheng; Lirong Yin; Shan Liu Deadline: 30 June 2026
Guest Editors: Consolato M. Sergi Deadline: 30 June 2026
Guest Editors: Snježana Kaštelan; Ivica Lukšić; Jelena Juri Mandić; Matija... Deadline: 30 June 2026
Guest Editors: Viktor Gribniak; Zdeněk Kala; Constantin E. Chalioris Deadline: 31 March 2026
Guest Editors: Kang-Di Lu; Yun Fu; Yong Xu Deadline: 30 March 2026
Guest Editors: Hwa-Young Jeong; Jason C. Hung; Yen Neil Yuwen Deadline: 28 February 2026
Guest Editors: A. Dounis; I. Kalatzis Deadline: 28 February 2026
Guest Editors: Sukhjit Singh Sehra Deadline: 15 February 2026
Guest Editors: José Braga de Vasconcelos; Hugo Barbosa Deadline: 10 February 2026






