Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (100)
  • Open Access

    REVIEW

    The genetics of pediatric inflammatory bowel disease: Towards precision medicine

    AHMAD SHAHIR MOHAMAD NAZRI, NAZIHAH MOHD YUNUS, MARAHAINI MUSA*

    BIOCELL, Vol.49, No.1, pp. 149-160, 2025, DOI:10.32604/biocell.2024.057352 - 24 January 2025

    Abstract Pediatric inflammatory bowel disease (IBD) is a chronic and heterogeneous disease. IBD is commonly classified into Crohn’s disease and ulcerative colitis. It is linked to serious symptoms and complications. The onset of IBD commonly occurs during adolescence. Despite the significant number of cases globally (~5 million), the causes of pediatric IBD, which constitutes 25% of IBD patients, are not yet fully understood. Apart from environmental factors, genetic factors contribute to a higher risk of developing IBD. The predisposition risk of IBD can be investigated using genetic testing. Genetic mechanisms of pediatric IBD are highly complex More >

  • Open Access

    REVIEW

    Review of Techniques for Integrating Security in Software Development Lifecycle

    Hassan Saeed1, Imran Shafi1, Jamil Ahmad2, Adnan Ahmed Khan3, Tahir Khurshaid4,*, Imran Ashraf5,*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 139-172, 2025, DOI:10.32604/cmc.2024.057587 - 03 January 2025

    Abstract Software-related security aspects are a growing and legitimate concern, especially with 5G data available just at our palms. To conduct research in this field, periodic comparative analysis is needed with the new techniques coming up rapidly. The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle (SDLC) by analyzing the articles published in the last two decades and to propose a way forward. This review follows Kitchenham’s review protocol. The review has been divided into three main stages including planning, execution, and analysis.… More >

  • Open Access

    PROCEEDINGS

    Towards High Reynolds Number Flows by a High-Order SPH Method

    Zifei Meng1, Pengnan Sun1,*, Yang Xu1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.31, No.1, pp. 1-1, 2024, DOI:10.32604/icces.2024.011674

    Abstract DNS simulations on incompressible flows with high Reynolds number using meshfree methods remain an enduring challenge to be addressed. In the present work, we attempt to use a high-order SPH scheme (TENO-SPH) to make DNS simulations on high Reynolds number flows. To investigate this, several spatial reconstructions are applied under the Riemann-ALE-SPH framework, and their performances are compared. Particularly, the accuracy of SPH is significantly enhanced by WENO and TENO reconstructions. For free surface flows, we implement a Lagrangian TENO-SPH to reproduce these flows at different Reynolds numbers. More importantly, to make DNS simulations, the More >

  • Open Access

    PROCEEDINGS

    Towards High-Fidelity and Efficient Computation for Diagnosis and Treatment of Cardiovascular Disease

    Lei Wang1,*, Blanca Rodriguez2, Xiaoyu Luo3, Charles Augarde4

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.30, No.4, pp. 1-2, 2024, DOI:10.32604/icces.2024.013350

    Abstract Cardiovascular disease is the leading cause of death worldwide. Disease-specific software, like FFRct from HeartFlow, and high-fidelity computational models within a general-purpose software, like Living Heart Project within Abaqus, are essential to revolutionise diagnosis and treatment of cardiovascular disease for clinicians and design of medical devices for industries. This talk presents our past researches on computational modelling of tear propagation in the aortic dissection [1-2] and of electromechanical coupling in the human heart with the finite element method [3], and our current exploration on high-fidelity and efficient computation and software development for diagnosis and treatment More >

  • Open Access

    ARTICLE

    Advancing PCB Quality Control: Harnessing YOLOv8 Deep Learning for Real-Time Fault Detection

    Rehman Ullah Khan1, Fazal Shah2,*, Ahmad Ali Khan3, Hamza Tahir2

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 345-367, 2024, DOI:10.32604/cmc.2024.054439 - 15 October 2024

    Abstract Printed Circuit Boards (PCBs) are materials used to connect components to one another to form a working circuit. PCBs play a crucial role in modern electronics by connecting various components. The trend of integrating more components onto PCBs is becoming increasingly common, which presents significant challenges for quality control processes. Given the potential impact that even minute defects can have on signal traces, the surface inspection of PCB remains pivotal in ensuring the overall system integrity. To address the limitations associated with manual inspection, this research endeavors to automate the inspection process using the YOLOv8… More >

  • Open Access

    ARTICLE

    YOLO-RLC: An Advanced Target-Detection Algorithm for Surface Defects of Printed Circuit Boards Based on YOLOv5

    Yuanyuan Wang1,2,*, Jialong Huang1, Md Sharid Kayes Dipu1, Hu Zhao3, Shangbing Gao1,2, Haiyan Zhang1,2, Pinrong Lv1

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4973-4995, 2024, DOI:10.32604/cmc.2024.055839 - 12 September 2024

    Abstract Printed circuit boards (PCBs) provide stable connections between electronic components. However, defective printed circuit boards may cause the entire equipment system to malfunction, resulting in incalculable losses. Therefore, it is crucial to detect defective printed circuit boards during the generation process. Traditional detection methods have low accuracy in detecting subtle defects in complex background environments. In order to improve the detection accuracy of surface defects on industrial printed circuit boards, this paper proposes a residual large kernel network based on YOLOv5 (You Only Look Once version 5) for PCBs surface defect detection, called YOLO-RLC (You… More >

  • Open Access

    ARTICLE

    Towards Improving the Quality of Requirement and Testing Process in Agile Software Development: An Empirical Study

    Irum Ilays1, Yaser Hafeez1,*, Nabil Almashfi2, Sadia Ali1, Mamoona Humayun3,*, Muhammad Aqib1, Ghadah Alwakid4

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3761-3784, 2024, DOI:10.32604/cmc.2024.053830 - 12 September 2024

    Abstract Software testing is a critical phase due to misconceptions about ambiguities in the requirements during specification, which affect the testing process. Therefore, it is difficult to identify all faults in software. As requirement changes continuously, it increases the irrelevancy and redundancy during testing. Due to these challenges; fault detection capability decreases and there arises a need to improve the testing process, which is based on changes in requirements specification. In this research, we have developed a model to resolve testing challenges through requirement prioritization and prediction in an agile-based environment. The research objective is to… More >

  • Open Access

    ARTICLE

    IGED: Towards Intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN

    Yanhua Liu1,2,3, Yuting Han1,2,3, Hui Chen1,2,3, Baokang Zhao4,*, Xiaofeng Wang4, Ximeng Liu1,2,3

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 1851-1866, 2024, DOI:10.32604/cmc.2024.051194 - 15 August 2024

    Abstract As the scale of the networks continually expands, the detection of distributed denial of service (DDoS) attacks has become increasingly vital. We propose an intelligent detection model named IGED by using improved generalized entropy and deep neural network (DNN). The initial detection is based on improved generalized entropy to filter out as much normal traffic as possible, thereby reducing data volume. Then the fine detection is based on DNN to perform precise DDoS detection on the filtered suspicious traffic, enhancing the neural network’s generalization capabilities. Experimental results show that the proposed method can efficiently distinguish More >

  • Open Access

    ARTICLE

    Energy Blockchain in Smart Communities: Towards Affordable Clean Energy Supply for the Built Environment

    Mingguan Zhao1,4, Lida Liao2,*, Penglong Liang1, Meng Li1, Xinsheng Dong1, Yang Yang1, Hongxia Wang1, Zhenhao Zhang3

    Energy Engineering, Vol.121, No.8, pp. 2313-2330, 2024, DOI:10.32604/ee.2024.048261 - 19 July 2024

    Abstract The rapid growth of distributed renewable energy penetration is promoting the evolution of the energy system toward decentralization and decentralized and digitized smart grids. This study was based on energy blockchain, and developed a dual-biding mechanism based on the real-time energy surplus and demand in the local smart grid, which is expected to enable reliable, affordable, and clean energy supply in smart communities. In the proposed system, economic benefits could be achieved by replacing fossil-fuel-based electricity with the high penetration of affordable solar PV electricity. The reduction of energy surplus realized by distributed energy production More >

  • Open Access

    REVIEW

    Towards Blockchain-Based Secure BGP Routing, Challenges and Future Research Directions

    Qiong Yang1, Li Ma1,2,*, Shanshan Tu1, Sami Ullah3, Muhammad Waqas4,5, Hisham Alasmary6

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2035-2062, 2024, DOI:10.32604/cmc.2024.049970 - 15 May 2024

    Abstract Border Gateway Protocol (BGP) is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different destinations. The BGP protocol exhibits security design defects, such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes, easily triggering prefix hijacking, path forgery, route leakage, and other BGP security threats. Meanwhile, the traditional BGP security mechanism, relying on a public key infrastructure, faces issues like a single point of failure and a single point of trust. The decentralization, anti-tampering, and More >

Displaying 1-10 on page 1 of 100. Per Page