Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (92)
  • Open Access

    ARTICLE

    The Endosperm-Specific Expression of YUCCA Genes Enhances Rice Grain Filling

    Huijun Jiang1,#, Kaien Zhai3,#, Xiaofan Ye3,#, Tianwei Hu2, Jieming Jiang4, Xiaoqiu Dong1, Weihuai Pan1, Jianwei Pan2, Jianxin Shou1,*

    Phyton-International Journal of Experimental Botany, Vol.91, No.12, pp. 2633-2648, 2022, DOI:10.32604/phyton.2022.021474

    Abstract Grain filling is a crucial process that affects yield in rice (Oryza sativa L.). Auxin biosynthesis and signaling are closely related to rice yield; therefore, it is important to understand the effects of auxin biosynthesis on rice grain filling to improve crop yield. In this study, we used physiological and molecular strategies to identify the roles of auxin in rice grain filling. Exogenous application of auxin (IAA) or auxin analogues (2, 4-D) to young spikelets and flag leaves improved the seed-setting rate and yield per spike. Furthermore, real-time quantitative PCR assays confirmed that nine members of the OsYUCCA family of… More >

  • Open Access

    ARTICLE

    Optimization of the Plugging Agent Dosage for High Temperature Salt Profile Control in Heavy Oil Reservoirs

    Jiayu Ruan1, Mingjing Lu2,3, Wei Zhang4, Yuxi Zhang1, Yuhui Zhou1,*, Jie Gong1, Fan Wang1, Yuanxiao Guan1

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.2, pp. 421-436, 2023, DOI:10.32604/fdmp.2022.020665

    Abstract After steam discharge in heavy oil reservoirs, the distribution of temperature, pressure, and permeability in different wells becomes irregular. Flow channels can easily be produced, which affect the sweep efficiency of the oil displacement. Previous studies have shown that the salting-out plugging method can effectively block these channels in high-temperature reservoirs, improve the suction profile, and increase oil production. In the present study, the optimal dosage of the plugging agent is determined taking into account connection transmissibility and inter-well volumes. Together with the connectivity model, a water flooding simulation model is introduced. Moreover, a non-gradient stochastic disturbance algorithm is used… More >

  • Open Access

    ARTICLE

    A Quasi-Newton Neural Network Based Efficient Intrusion Detection System for Wireless Sensor Network

    A. Gautami1,*, J. Shanthini2, S. Karthik3

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 427-443, 2023, DOI:10.32604/csse.2023.026688

    Abstract In Wireless Sensor Networks (WSN), attacks mostly aim in limiting or eliminating the capability of the network to do its normal function. Detecting this misbehaviour is a demanding issue. And so far the prevailing research methods show poor performance. AQN3 centred efficient Intrusion Detection Systems (IDS) is proposed in WSN to ameliorate the performance. The proposed system encompasses Data Gathering (DG) in WSN as well as Intrusion Detection (ID) phases. In DG, the Sensor Nodes (SN) is formed as clusters in the WSN and the Distance-based Fruit Fly Fuzzy c-means (DFFF) algorithm chooses the Cluster Head (CH). Then, the data… More >

  • Open Access

    ARTICLE

    Progressive Transfer Learning-based Deep Q Network for DDOS Defence in WSN

    S. Rameshkumar1,*, R. Ganesan2, A. Merline1

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2379-2394, 2023, DOI:10.32604/csse.2023.027910

    Abstract In The Wireless Multimedia Sensor Network (WNSMs) have achieved popularity among diverse communities as a result of technological breakthroughs in sensor and current gadgets. By utilising portable technologies, it achieves solid and significant results in wireless communication, media transfer, and digital transmission. Sensor nodes have been used in agriculture and industry to detect characteristics such as temperature, moisture content, and other environmental conditions in recent decades. WNSMs have also made apps easier to use by giving devices self-governing access to send and process data connected with appropriate audio and video information. Many video sensor network studies focus on lowering power… More >

  • Open Access

    ARTICLE

    Endostar, an Antiangiogenesis Inhibitor, Combined With Chemoradiotherapy for Locally Advanced Cervical Cancer

    Heming Lu*†1, Yuying Wu‡1, Xu Liu, Huixian Huang, Hailan Jiang, Chaohua Zhu, Yuping Man§, Zhaohong Chen, Xianfeng Long, Qiang Pang, Luxing Peng, Xianglong Li, Junzhao Gu, Shan Deng, Ligang Xing*

    Oncology Research, Vol.28, No.9, pp. 929-944, 2020, DOI:10.3727/096504021X16318716607908

    Abstract This phase II randomized clinical trial aimed to assess the efficacy and toxicity of Endostar, an antiangiogenesis inhibitor, combined with concurrent chemoradiotherapy (CCRT) for locally advanced cervical cancer (LACC). Patients with LACC were randomly assigned to either CCRT plus Endostar (CCRT+E arm) or CCRT alone (CCRT arm). All patients received pelvic intensity-modulated radiation therapy (IMRT) and brachytherapy. Weekly cisplatin was administered concurrently with IMRT. Patients in the CCRT+E arm also received concurrent Endostar every 3 weeks for two cycles. The primary endpoint was progression-free survival (PFS) and acute toxicities. The exploratory endpoint was the impact of vascular endothelial growth factor… More >

  • Open Access

    ARTICLE

    uPAR Controls Vasculogenic Mimicry Ability Expressed by Drug-Resistant Melanoma Cells

    Elena Andreucci*1, Anna Laurenzana*, Silvia Peppicelli*, Alessio Biagioni*, Francesca Margheri*, Jessica Ruzzolini*, Francesca Bianchini*, Gabriella Fibbi*, Mario Del Rosso*†, Chiara Nediani*, Simona Serratì, Livia Fucci§, Michele Guida, Lido Calorini*†1

    Oncology Research, Vol.28, No.9, pp. 873-884, 2020, DOI:10.3727/096504021X16273798026651

    Abstract Malignant melanoma is a highly aggressive skin cancer characterized by an elevated grade of tumor cell plasticity. Such plasticity allows adaptation of melanoma cells to different hostile conditions and guarantees tumor survival and disease progression, including aggressive features such as drug resistance. Indeed, almost 50% of melanoma rapidly develop resistance to the BRAFV600E inhibitor vemurafenib, with fast tumor dissemination, a devastating consequence for patients’ outcomes. Vasculogenic mimicry (VM), the ability of cancer cells to organize themselves in perfused vascular-like channels, might sustain tumor spread by providing vemurafenibresistant cancer cells with supplementary ways to enter into circulation and disseminate. Thus, this… More >

  • Open Access

    ARTICLE

    Comparison of UGT1A1 Polymorphism as Guidance of Irinotecan Dose Escalation in RAS Wild-Type Metastatic Colorectal Cancer Patients Treated With Cetuximab or Bevacizumab Plus FOLFIRI as the First-Line Therapy

    Hsiang-Lin Tsai*†, Yen-Cheng Chen*‡, Tzu-Chieh Yin*§¶, Wei-Chih Su*‡, Po-Jung Chen*,Tsung-Kun Chang*†, Ching-Chun Li*, Ching-Wen Huang*†, Jaw-Yuan Wang*†‡#**††‡‡

    Oncology Research, Vol.29, No.1, pp. 47-61, 2021, DOI:10.3727/096504022X16451187313084

    Abstract Uridine diphosphate glucuronosyltransferase 1A1 (UGT1A1) polymorphism plays a crucial role in the increased susceptibility and toxicity of patients to irinotecan. This retrospective, observational study compared the clinical outcomes and adverse events (AEs) in RAS wild-type metastatic colorectal cancer (mCRC) patients treated with cetuximab or bevacizumab plus FOLFIRI with UGT1A1 genotyping and irinotecan dose escalation as the first-line therapy. In total, 173 patients with mCRC with RAS wild-type were enrolled. Among them, 98 patients were treated with cetuximab, whereas 75 patients were treated with bevacizumab. All patients received irinotecan dose escalation based on UGT1A1 genotyping. We compared the progression-free survival (PFS),… More >

  • Open Access

    ARTICLE

    Lactate Maintains BCR/Abl Expression and Signaling in Chronic Myeloid Leukemia Cells Under Nutrient Restriction

    Angela Silvano*†1, Giulio Menegazzi*1, Silvia Peppicelli*1, Caterina Mancini*, Alessio Biagioni*, Alessandro Tubita*, Ignazia Tusa*, Jessica Ruzzolini*, Matteo Lulli*, Elisabetta Rovida*, Persio Dello Sbarba*

    Oncology Research, Vol.29, No.1, pp. 33-46, 2021, DOI:10.3727/096504022X16442289212164

    Abstract This study was directed to deepen the effects of nutrient shortage on BCR/Ablprotein expression and signaling in chronic myeloid leukemia (CML) cells. The backbone of the study was cell culture in medium lacking glucose, the consumption of which we had previously shown to drive BCR/Ablprotein suppression, and glutamine, the other main nutrient besides glucose. In this context, we focused on the role of lactate, the main by-product of glucose metabolism under conditions of rapid cell growth, in particular as a modulator of the maintenance of CML stem/progenitor cell potential, a crucial determinant of disease course and relapse of disease. The… More >

  • Open Access

    ARTICLE

    HDLIDP: A Hybrid Deep Learning Intrusion Detection and Prevention Framework

    Magdy M. Fadel1,*, Sally M. El-Ghamrawy2, Amr M. T. Ali-Eldin1, Mohammed K. Hassan3, Ali I. El-Desoky1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2293-2312, 2022, DOI:10.32604/cmc.2022.028287

    Abstract Distributed denial-of-service (DDoS) attacks are designed to interrupt network services such as email servers and webpages in traditional computer networks. Furthermore, the enormous number of connected devices makes it difficult to operate such a network effectively. Software defined networks (SDN) are networks that are managed through a centralized control system, according to researchers. This controller is the brain of any SDN, composing the forwarding table of all data plane network switches. Despite the advantages of SDN controllers, DDoS attacks are easier to perpetrate than on traditional networks. Because the controller is a single point of failure, if it fails, the… More >

  • Open Access

    ARTICLE

    Securing Consumer Internet of Things for Botnet Attacks: Deep Learning Approach

    Tariq Ahamed Ahanger1,*, Abdulaziz Aldaej1, Mohammed Atiquzzaman2, Imdad Ullah1, Mohammed Yousuf Uddin1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3199-3217, 2022, DOI:10.32604/cmc.2022.027212

    Abstract DDoS attacks in the Internet of Things (IoT) technology have increased significantly due to its spread adoption in different industrial domains. The purpose of the current research is to propose a novel technique for detecting botnet attacks in user-oriented IoT environments. Conspicuously, an attack identification technique inspired by Recurrent Neural networks and Bidirectional Long Short Term Memory (BLRNN) is presented using a unique Deep Learning (DL) technique. For text identification and translation of attack data segments into tokenized form, word embedding is employed. The performance analysis of the presented technique is performed in comparison to the state-of-the-art DL techniques. Specifically,… More >

Displaying 31-40 on page 4 of 92. Per Page