Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (931)
  • Open Access

    ARTICLE

    Selenium Differentially Regulates Flavonoid Accumulation and Antioxidant Capacities in Sprouts of Twenty Diverse Mungbean ( (L.) Wilczek) Genotypes

    Fenglan Zhao1, Jizhi Jin1, Meng Yang1, Franklin Eduardo Melo Santiago2, Jianping Xue1, Li Xu3,*, Yongbo Duan1,*

    Phyton-International Journal of Experimental Botany, Vol.93, No.3, pp. 611-625, 2024, DOI:10.32604/phyton.2024.048295

    Abstract

    Seed germination with selenium (Se) is promising for producing Se-biofortified foods. Mungbean (Vigna radiata (L.) Wilczek) sprout is freshly eaten as a salad dressed with sauce, making it superior for Se biofortification. Since the Se safety range for the human body is extremely narrow, it is imperative to evaluate the genotypic responses of mungbean sprouts to Se. This study evaluated the Se enrichment capacity and interaction with flavonoids and antioxidant systems in sprouts of 20 mungbean germplasms. Selenium treatment was done by immersing mungbean seeds in 20 μM sodium selenite solution for 8 h. Afterward, the biomass, Se amounts, flavonoid… More >

  • Open Access

    ARTICLE

    Effects of Flowering Mode and Pollinator Sharing on Reproductive Success in Natural Hybrid of Two Epimedium (Berberidaceae) Species

    Lanying Chen1,2, Qiumei Quan3,*, Yunxiang Li3

    Phyton-International Journal of Experimental Botany, Vol.93, No.3, pp. 551-566, 2024, DOI:10.32604/phyton.2024.048103

    Abstract Mediated by pollen flow, natural hybridization is deemed a crucial factor that propels speciation in floral plants. Despite the fact that the diversity of Epimedium species is concentrated mainly in Southwestern China, the potential impact of interspecific pollination on natural hybridization has yet to be empirically scrutinized. To explore this, we studied the flowering period and the visitors of flowers in three frequently overlapping Epimedium species at Jinchengshan National Forest Park, located in Nanchong, Sichuan Province. Additionally, we performed a series of pollination experiments to examine breeding systems and hybrid compatibility. Morphologically, Epimedium pubescens and Epimedium wushanense are clearly distinct… More >

  • Open Access

    ARTICLE

    BCCLR: A Skeleton-Based Action Recognition with Graph Convolutional Network Combining Behavior Dependence and Context Clues

    Yunhe Wang1, Yuxin Xia2, Shuai Liu2,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4489-4507, 2024, DOI:10.32604/cmc.2024.048813

    Abstract In recent years, skeleton-based action recognition has made great achievements in Computer Vision. A graph convolutional network (GCN) is effective for action recognition, modelling the human skeleton as a spatio-temporal graph. Most GCNs define the graph topology by physical relations of the human joints. However, this predefined graph ignores the spatial relationship between non-adjacent joint pairs in special actions and the behavior dependence between joint pairs, resulting in a low recognition rate for specific actions with implicit correlation between joint pairs. In addition, existing methods ignore the trend correlation between adjacent frames within an action and context clues, leading to… More >

  • Open Access

    ARTICLE

    Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust

    Xiaoyan Zhu1, Ruchun Jia2, Tingrui Zhang3, Song Yao4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4363-4377, 2024, DOI:10.32604/cmc.2023.045615

    Abstract The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect, which is easy to leads to the problem that the data is usurped. Starting from the application of the ATC (automatic train control) network, this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data. Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation, this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the… More >

  • Open Access

    ARTICLE

    Enhancing ChatGPT’s Querying Capability with Voice-Based Interaction and CNN-Based Impair Vision Detection Model

    Awais Ahmad1, Sohail Jabbar1,*, Sheeraz Akram1, Anand Paul2, Umar Raza3, Nuha Mohammed Alshuqayran1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3129-3150, 2024, DOI:10.32604/cmc.2024.045385

    Abstract This paper presents an innovative approach to enhance the querying capability of ChatGPT, a conversational artificial intelligence model, by incorporating voice-based interaction and a convolutional neural network (CNN)-based impaired vision detection model. The proposed system aims to improve user experience and accessibility by allowing users to interact with ChatGPT using voice commands. Additionally, a CNN-based model is employed to detect impairments in user vision, enabling the system to adapt its responses and provide appropriate assistance. This research tackles head-on the challenges of user experience and inclusivity in artificial intelligence (AI). It underscores our commitment to overcoming these obstacles, making ChatGPT… More >

  • Open Access

    ARTICLE

    A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM

    Navaneetha Krishnan Muthunambu1, Senthil Prabakaran2, Balasubramanian Prabhu Kavin3, Kishore Senthil Siruvangur4, Kavitha Chinnadurai1, Jehad Ali5,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3089-3127, 2024, DOI:10.32604/cmc.2023.043172

    Abstract The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the Internet. Regrettably, this development has expanded the potential targets that hackers might exploit. Without adequate safeguards, data transmitted on the internet is significantly more susceptible to unauthorized access, theft, or alteration. The identification of unauthorised access attempts is a critical component of cybersecurity as it aids in the detection and prevention of malicious attacks. This research paper introduces a novel intrusion detection framework that utilizes Recurrent Neural Networks (RNN) integrated with… More >

  • Open Access

    ARTICLE

    A Deep Reinforcement Learning-Based Technique for Optimal Power Allocation in Multiple Access Communications

    Sepehr Soltani1, Ehsan Ghafourian2, Reza Salehi3, Diego Martín3,*, Milad Vahidi4

    Intelligent Automation & Soft Computing, Vol.39, No.1, pp. 93-108, 2024, DOI:10.32604/iasc.2024.042693

    Abstract For many years, researchers have explored power allocation (PA) algorithms driven by models in wireless networks where multiple-user communications with interference are present. Nowadays, data-driven machine learning methods have become quite popular in analyzing wireless communication systems, which among them deep reinforcement learning (DRL) has a significant role in solving optimization issues under certain constraints. To this purpose, in this paper, we investigate the PA problem in a -user multiple access channels (MAC), where transmitters (e.g., mobile users) aim to send an independent message to a common receiver (e.g., base station) through wireless channels. To this end, we first train… More >

  • Open Access

    ARTICLE

    Prediction Model of Wax Deposition Rate in Waxy Crude Oil Pipelines by Elman Neural Network Based on Improved Reptile Search Algorithm

    Zhuo Chen1,*, Ningning Wang2, Wenbo Jin3, Dui Li1

    Energy Engineering, Vol.121, No.4, pp. 1007-1026, 2024, DOI:10.32604/ee.2023.045270

    Abstract A hard problem that hinders the movement of waxy crude oil is wax deposition in oil pipelines. To ensure the safe operation of crude oil pipelines, an accurate model must be developed to predict the rate of wax deposition in crude oil pipelines. Aiming at the shortcomings of the ENN prediction model, which easily falls into the local minimum value and weak generalization ability in the implementation process, an optimized ENN prediction model based on the IRSA is proposed. The validity of the new model was confirmed by the accurate prediction of two sets of experimental data on wax deposition… More > Graphic Abstract

    Prediction Model of Wax Deposition Rate in Waxy Crude Oil Pipelines by Elman Neural Network Based on Improved Reptile Search Algorithm

  • Open Access

    EDITORIAL

    Femoral Access with Ultrasound-Guided Puncture and Z-Stitch Hemostasis for Adults with Congenital Heart Diseases Undergoing Electrophysiological Procedures

    Fu Guan1,*, Matthias Gass2, Florian Berger2, Heiko Schneider1, Firat Duru1,3, Thomas Wolber1,3,*

    Congenital Heart Disease, Vol.19, No.1, pp. 85-92, 2024, DOI:10.32604/chd.2024.047266

    Abstract Aims: Although the application of ultrasound-guided vascular puncture and Z-stitch hemostasis to manage femoral access has been widely utilized, there is limited data on this combined application in adult congenital heart disease (ACHD) patients undergoing electrophysiological (EP) procedures. We sought to evaluate the safety and efficacy of ultrasound-guided puncture and postprocedural Z-stitch hemostasis for ACHD patients undergoing EP procedures. Methods and Results: The population of ACHD patients undergoing transfemoral EP procedures at the University of Zurich Heart Center between January 2019 and December 2022 was observed and analyzed. During the study period, femoral access (left/right, arterial/venous) was performed under real-time… More >

  • Open Access

    ARTICLE

    Degradation of FAK-targeting by proteolytic targeting chimera technology to inhibit the metastasis of hepatocellular carcinoma

    XINFENG ZHANG1,2,#, SHUANG LI2,#, MEIRU SONG1,2, YUE CHEN3, LIANGZHENG CHANG3, ZHERUI LIU4, HONGYUAN DAI3, YUTAO WANG4, GANGQI YANG3, YUN JIANG5,6,*, YINYING LU1,2,*

    Oncology Research, Vol.32, No.4, pp. 679-690, 2024, DOI:10.32604/or.2024.046231

    Abstract Liver cancer is a prevalent malignant cancer, ranking third in terms of mortality rate. Metastasis and recurrence primarily contribute to the high mortality rate of liver cancer. Hepatocellular carcinoma (HCC) has low expression of focal adhesion kinase (FAK), which increases the risk of metastasis and recurrence. Nevertheless, the efficacy of FAK phosphorylation inhibitors is currently limited. Thus, investigating the mechanisms by which FAK affects HCC metastasis to develop targeted therapies for FAK may present a novel strategy to inhibit HCC metastasis. This study examined the correlation between FAK expression and the prognosis of HCC. Additionally, we explored the impact of… More >

Displaying 11-20 on page 2 of 931. Per Page