Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (573)
  • Open Access

    REVIEW

    Exploring the Applications of Digital Twin Technology in Enhancing Sustainability in Civil Engineering: A Review

    Jiamin Huang1,2, Ping Wu2,*, Wangxin Li3, Jun Zhang2, Yidong Xu2

    Structural Durability & Health Monitoring, Vol.18, No.5, pp. 577-598, 2024, DOI:10.32604/sdhm.2024.050338

    Abstract With the advent of the big data era and the rise of Industrial Revolution 4.0, digital twins (DTs) have gained significant attention in various industries. DTs offer the opportunity to combine the physical and digital worlds and aid the digital transformation of the civil engineering industry. In this paper, 605 documents obtained from the search were first analysed using CiteSpace for literature visualisation, and an author co-occurrence network, a keyword co-occurrence network, and a keyword clustering set were obtained. Next, through a literature review of 86 papers, this paper summarises the current status of DT More >

  • Open Access

    REVIEW

    Mitigating Urban Heat Island Effects: A Review of Innovative Pavement Technologies and Integrated Solutions

    S. F. Ismael1,2,*, A. H. Alias1, N. A. Haron1, B. B. Zaidan3, Abdulrahman M. Abdulghani4

    Structural Durability & Health Monitoring, Vol.18, No.5, pp. 525-551, 2024, DOI:10.32604/sdhm.2024.050088

    Abstract In this review paper, we present a thorough investigation into the role of pavement technologies in advancing urban sustainability. Our analysis traverses the historical evolution of these technologies, meticulously evaluating their socio-economic and environmental impacts, with a particular emphasis on their role in mitigating the urban heat island effect. The evaluation of pavement types and variables influencing pavement performance to be used in the multi-criteria decision-making (MCDM) framework to choose the optimal pavement application are at the heart of our research. Which serves to assess a spectrum of pavement options, revealing insights into the most More >

  • Open Access

    REVIEW

    A Comprehensive Survey on Deep Learning Multi-Modal Fusion: Methods, Technologies and Applications

    Tianzhe Jiao, Chaopeng Guo, Xiaoyue Feng, Yuming Chen, Jie Song*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1-35, 2024, DOI:10.32604/cmc.2024.053204

    Abstract Multi-modal fusion technology gradually become a fundamental task in many fields, such as autonomous driving, smart healthcare, sentiment analysis, and human-computer interaction. It is rapidly becoming the dominant research due to its powerful perception and judgment capabilities. Under complex scenes, multi-modal fusion technology utilizes the complementary characteristics of multiple data streams to fuse different data types and achieve more accurate predictions. However, achieving outstanding performance is challenging because of equipment performance limitations, missing information, and data noise. This paper comprehensively reviews existing methods based on multi-modal fusion techniques and completes a detailed and in-depth analysis.… More >

  • Open Access

    REVIEW

    A Review on Characteristics, Extraction Methods and Applications of Renewable Insect Protein

    Adelya Khayrova*, Sergey Lopatin, Valery Varlamov

    Journal of Renewable Materials, Vol.12, No.5, pp. 923-950, 2024, DOI:10.32604/jrm.2024.050033

    Abstract Due to the expected rise in the world population, an increase in the requirements for quality and safety of food and feed is expected, which leads to the growing demand for new sources of sustainable and renewable protein. Insect protein is gaining importance as a renewable material for several reasons, reflecting its potential contributions to sustainability, resource efficiency, and environmental conservation. Some insect species are known to be able to efficiently convert organic waste into high-value products such as protein, requiring less land and water compared to traditional livestock. In addition, insect farming produces fewer… More > Graphic Abstract

    A Review on Characteristics, Extraction Methods and Applications of Renewable Insect Protein

  • Open Access

    REVIEW

    Hypoxia-inducible factor 1alpha and vascular endothelial growth factor in Glioblastoma Multiforme: a systematic review going beyond pathologic implications

    DIMITRA P. VAGELI1,2,*, PANAGIOTIS G. DOUKAS3, KERASIA GOUPOU2, ANTONIOS D. BENOS2, KYRIAKI ASTARA2,4, KONSTANTINA ZACHAROULI2, SOTIRIS SOTIRIOU5, MARIA IOANNOU2

    Oncology Research, Vol.32, No.8, pp. 1239-1256, 2024, DOI:10.32604/or.2024.052130

    Abstract Glioblastoma multiforme (GBM) is an aggressive primary brain tumor characterized by extensive heterogeneity and vascular proliferation. Hypoxic conditions in the tissue microenvironment are considered a pivotal player leading tumor progression. Specifically, hypoxia is known to activate inducible factors, such as hypoxia-inducible factor 1alpha (HIF-1α), which in turn can stimulate tumor neo-angiogenesis through activation of various downward mediators, such as the vascular endothelial growth factor (VEGF). Here, we aimed to explore the role of HIF-1α/VEGF immunophenotypes alone and in combination with other prognostic markers or clinical and image analysis data, as potential biomarkers of GBM prognosis… More >

  • Open Access

    ARTICLE

    Reducing the Encrypted Data Size: Healthcare with IoT-Cloud Computing Applications

    Romaissa Kebache1, Abdelkader Laouid1,*, Ahcene Bounceur2, Mostefa Kara1,3, Konstantinos Karampidis4, Giorgos Papadourakis4, Mohammad Hammoudeh2

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 1055-1072, 2024, DOI:10.32604/csse.2024.048738

    Abstract Internet cloud services come at a price, especially when they provide top-tier security measures. The cost incurred by cloud utilization is directly proportional to the storage requirements. Companies are always looking to increase profits and reduce costs while preserving the security of their data by encrypting them. One of the offered solutions is to find an efficient encryption method that can store data in a much smaller space than traditional encryption techniques. This article introduces a novel encryption approach centered on consolidating information into a single ciphertext by implementing Multi-Key Embedded Encryption (MKEE). The effectiveness… More >

  • Open Access

    ARTICLE

    Deep Learning: A Theoretical Framework with Applications in Cyberattack Detection

    Kaveh Heidary*

    Journal on Artificial Intelligence, Vol.6, pp. 153-175, 2024, DOI:10.32604/jai.2024.050563

    Abstract This paper provides a detailed mathematical model governing the operation of feedforward neural networks (FFNN) and derives the backpropagation formulation utilized in the training process. Network protection systems must ensure secure access to the Internet, reliability of network services, consistency of applications, safeguarding of stored information, and data integrity while in transit across networks. The paper reports on the application of neural networks (NN) and deep learning (DL) analytics to the detection of network traffic anomalies, including network intrusions, and the timely prevention and mitigation of cyberattacks. Among the most prevalent cyber threats are R2L,… More >

  • Open Access

    ARTICLE

    Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications

    Li-Woei Chen1, Kun-Lin Tsai2,*, Fang-Yie Leu3, Wen-Cheng Jiang2, Shih-Ting Tseng2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2779-2794, 2024, DOI:10.32604/cmes.2024.052124

    Abstract Various mobile devices and applications are now used in daily life. These devices require high-speed data processing, low energy consumption, low communication latency, and secure data transmission, especially in 5G and 6G mobile networks. High-security cryptography guarantees that essential data can be transmitted securely; however, it increases energy consumption and reduces data processing speed. Therefore, this study proposes a low-energy data encryption (LEDE) algorithm based on the Advanced Encryption Standard (AES) for improving data transmission security and reducing the energy consumption of encryption in Internet-of-Things (IoT) devices. In the proposed LEDE algorithm, the system time More >

  • Open Access

    ARTICLE

    FDSC-YOLOv8: Advancements in Automated Crack Identification for Enhanced Safety in Underground Engineering

    Rui Wang1, Zhihui Liu2,*, Hongdi Liu3, Baozhong Su4, Chuanyi Ma5

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 3035-3049, 2024, DOI:10.32604/cmes.2024.050806

    Abstract In underground engineering, the detection of structural cracks on tunnel surfaces stands as a pivotal task in ensuring the health and reliability of tunnel structures. However, the dim and dusty environment inherent to underground engineering poses considerable challenges to crack segmentation. This paper proposes a crack segmentation algorithm termed as Focused Detection for Subsurface Cracks YOLOv8 (FDSC-YOLOv8) specifically designed for underground engineering structural surfaces. Firstly, to improve the extraction of multi-layer convolutional features, the fixed convolutional module is replaced with a deformable convolutional module. Secondly, the model’s receptive field is enhanced by introducing a multi-branch More >

  • Open Access

    ARTICLE

    Evaluations of Chris-Jerry Data Using Generalized Progressive Hybrid Strategy and Its Engineering Applications

    Refah Alotaibi1, Hoda Rezk2, Ahmed Elshahhat3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 3073-3103, 2024, DOI:10.32604/cmes.2024.050606

    Abstract A new one-parameter Chris-Jerry distribution, created by mixing exponential and gamma distributions, is discussed in this article in the presence of incomplete lifetime data. We examine a novel generalized progressively hybrid censoring technique that ensures the experiment ends at a predefined period when the model of the test participants has a Chris-Jerry (CJ) distribution. When the indicated censored data is present, Bayes and likelihood estimations are used to explore the CJ parameter and reliability indices, including the hazard rate and reliability functions. We acquire the estimated asymptotic and credible confidence intervals of each unknown quantity. More >

Displaying 1-10 on page 1 of 573. Per Page