Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,025)
  • Open Access

    ARTICLE

    Exosomal microRNA let-7c-5p enhances cell malignant characteristics by inhibiting TAGLN in oral cancer

    YI LI1, TIANYI WANG1, HAORAN DING1, SHIYONG ZHUANG1, XIAOBO DAI1, BING YAN1,2,*

    Oncology Research, Vol.32, No.10, pp. 1623-1635, 2024, DOI:10.32604/or.2024.048191

    Abstract Background: Oral cancer, a malignancy that is prevalent worldwide, is often diagnosed at an advanced stage. MicroRNAs (miRNAs) in circulating exosomes have emerged as promising cancer biomarkers. The role of miRNA let-7c-5p in oral cancer remains underexplored, and its potential involvement in tumorigenesis warrants comprehensive investigation. Methods: Serum samples from 30 patients with oral cancer and 20 healthy controls were used to isolate exosomes and quantify their RNA content. Isolation of the exosomes was confirmed through transmission electron microscopy. Quantitative PCR was used to assess the miRNA profiles. The effects of let-7c-5p and TAGLN overexpression… More >

  • Open Access

    ARTICLE

    Solving the Generalized Traveling Salesman Problem Using Sequential Constructive Crossover Operator in Genetic Algorithm

    Zakir Hussain Ahmed1,*, Maha Ata Al-Furhood2, Abdul Khader Jilani Saudagar3, Shakir Khan4

    Computer Systems Science and Engineering, Vol.48, No.5, pp. 1113-1131, 2024, DOI:10.32604/csse.2024.053574

    Abstract The generalized travelling salesman problem (GTSP), a generalization of the well-known travelling salesman problem (TSP), is considered for our study. Since the GTSP is NP-hard and very complex, finding exact solutions is highly expensive, we will develop genetic algorithms (GAs) to obtain heuristic solutions to the problem. In GAs, as the crossover is a very important process, the crossover methods proposed for the traditional TSP could be adapted for the GTSP. The sequential constructive crossover (SCX) and three other operators are adapted to use in GAs to solve the GTSP. The effectiveness of GA using More >

  • Open Access

    ARTICLE

    A Joint Estimation Method of SOC and SOH for Lithium-ion Battery Considering Cyber-Attacks Based on GA-BP

    Tianqing Yuan1,2, Na Li1,2, Hao Sun3, Sen Tan4,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4497-4512, 2024, DOI:10.32604/cmc.2024.056061

    Abstract To improve the estimation accuracy of state of charge (SOC) and state of health (SOH) for lithium-ion batteries, in this paper, a joint estimation method of SOC and SOH at charging cut-off voltage based on genetic algorithm (GA) combined with back propagation (BP) neural network is proposed, the research addresses the issue of data manipulation resulting from cyber-attacks. Firstly, anomalous data stemming from cyber-attacks are identified and eliminated using the isolated forest algorithm, followed by data restoration. Secondly, the incremental capacity (IC) curve is derived from the restored data using the Kalman filtering algorithm, with… More >

  • Open Access

    ARTICLE

    Automatic Generation of Attribute-Based Access Control Policies from Natural Language Documents

    Fangfang Shan1,2,*, Zhenyu Wang1,2, Mengyao Liu1,2, Menghan Zhang1,2

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3881-3902, 2024, DOI:10.32604/cmc.2024.055167

    Abstract In response to the challenges of generating Attribute-Based Access Control (ABAC) policies, this paper proposes a deep learning-based method to automatically generate ABAC policies from natural language documents. This method is aimed at organizations such as companies and schools that are transitioning from traditional access control models to the ABAC model. The manual retrieval and analysis involved in this transition are inefficient, prone to errors, and costly. Most organizations have high-level specifications defined for security policies that include a set of access control policies, which often exist in the form of natural language documents. Utilizing… More >

  • Open Access

    ARTICLE

    Heterogeneous Task Allocation Model and Algorithm for Intelligent Connected Vehicles

    Neng Wan1,2, Guangping Zeng1,*, Xianwei Zhou1

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4281-4302, 2024, DOI:10.32604/cmc.2024.054794

    Abstract With the development of vehicles towards intelligence and connectivity, vehicular data is diversifying and growing dramatically. A task allocation model and algorithm for heterogeneous Intelligent Connected Vehicle (ICV) applications are proposed for the dispersed computing network composed of heterogeneous task vehicles and Network Computing Points (NCPs). Considering the amount of task data and the idle resources of NCPs, a computing resource scheduling model for NCPs is established. Taking the heterogeneous task execution delay threshold as a constraint, the optimization problem is described as the problem of maximizing the utilization of computing resources by NCPs. The… More >

  • Open Access

    ARTICLE

    Network Traffic Synthesis and Simulation Framework for Cybersecurity Exercise Systems

    Dong-Wook Kim1, Gun-Yoon Sin2, Kwangsoo Kim3, Jaesik Kang3, Sun-Young Im3, Myung-Mook Han1,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3637-3653, 2024, DOI:10.32604/cmc.2024.054108

    Abstract In the rapidly evolving field of cybersecurity, the challenge of providing realistic exercise scenarios that accurately mimic real-world threats has become increasingly critical. Traditional methods often fall short in capturing the dynamic and complex nature of modern cyber threats. To address this gap, we propose a comprehensive framework designed to create authentic network environments tailored for cybersecurity exercise systems. Our framework leverages advanced simulation techniques to generate scenarios that mirror actual network conditions faced by professionals in the field. The cornerstone of our approach is the use of a conditional tabular generative adversarial network (CTGAN),… More >

  • Open Access

    ARTICLE

    AI-Driven Energy Optimization in UAV-Assisted Routing for Enhanced Wireless Sensor Networks Performance

    Syed Kamran Haider1,2, Abbas Ahmed2, Noman Mujeeb Khan2, Ali Nauman3,*, Sung Won Kim3,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4085-4110, 2024, DOI:10.32604/cmc.2024.052997

    Abstract In recent advancements within wireless sensor networks (WSN), the deployment of unmanned aerial vehicles (UAVs) has emerged as a groundbreaking strategy for enhancing routing efficiency and overall network functionality. This research introduces a sophisticated framework, driven by computational intelligence, that merges clustering techniques with UAV mobility to refine routing strategies in WSNs. The proposed approach divides the sensor field into distinct sectors and implements a novel weighting system for the selection of cluster heads (CHs). This system is primarily aimed at reducing energy consumption through meticulously planned routing and path determination. Employing a greedy algorithm More >

  • Open Access

    ARTICLE

    FPGA Accelerators for Computing Interatomic Potential-Based Molecular Dynamics Simulation for Gold Nanoparticles: Exploring Different Communication Protocols

    Ankitkumar Patel1, Srivathsan Vasudevan1,*, Satya Bulusu2,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3803-3818, 2024, DOI:10.32604/cmc.2024.052851

    Abstract Molecular Dynamics (MD) simulation for computing Interatomic Potential (IAP) is a very important High-Performance Computing (HPC) application. MD simulation on particles of experimental relevance takes huge computation time, despite using an expensive high-end server. Heterogeneous computing, a combination of the Field Programmable Gate Array (FPGA) and a computer, is proposed as a solution to compute MD simulation efficiently. In such heterogeneous computation, communication between FPGA and Computer is necessary. One such MD simulation, explained in the paper, is the (Artificial Neural Network) ANN-based IAP computation of gold (Au147 & Au309) nanoparticles. MD simulation calculates the forces… More >

  • Open Access

    REVIEW

    Solar- and/or Radiative Cooling-Driven Thermoelectric Generators: A Critical Review

    Jinglong Wang, Lin Lu*, Kai Jiao

    Energy Engineering, Vol.121, No.10, pp. 2681-2718, 2024, DOI:10.32604/ee.2024.051051

    Abstract Thermoelectric generators (TEGs) play a critical role in collecting renewable energy from the sun and deep space to generate clean electricity. With their environmentally friendly, reliable, and noise-free operation, TEGs offer diverse applications, including areas with limited power infrastructure, microelectronic devices, and wearable technology. The review thoroughly analyses TEG system configurations, performance, and applications driven by solar and/or radiative cooling, covering non-concentrating, concentrating, radiative cooling-driven, and dual-mode TEGs. Materials for solar absorbers and radiative coolers, simulation techniques, energy storage management, and thermal management strategies are explored. The integration of TEGs with combined heat and power More >

  • Open Access

    REVIEW

    The role of tazarotene-induced gene 1 in carcinogenesis: is it a tumor suppressor gene or an oncogene?

    CHUN-HUA WANG1,2, LU-KAI WANG3, RONG-YAUN SHYU4, FU-MING TSAI5,*

    BIOCELL, Vol.48, No.9, pp. 1285-1297, 2024, DOI:10.32604/biocell.2024.053746

    Abstract Tazarotene-induced gene 1 (TIG1) is induced by a derivative of vitamin A and is known to regulate many important biological processes and control the development of cancer. TIG1 is widely expressed in various tissues; yet in many cancer tissues, it is not expressed because of the methylation of its promoter. Additionally, the expression of TIG1 in cancer cells inhibits their growth and invasion, suggesting that TIG1 acts as a tumor suppressor gene. However, in some cancers, poor prognosis is associated with TIG1 expression, indicating its protumor growth characteristics, especially in promoting the invasion of inflammatory breast cancer More >

Displaying 1-10 on page 1 of 2025. Per Page