Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (785)
  • Open Access

    ARTICLE

    Deep Learning-Based Decision Support System for Predicting Pregnancy Risk Levels through Cardiotocograph (CTG) Imaging Analysis

    Ali Hasan Dakheel1,*, Mohammed Raheem Mohammed1, Zainab Ali Abd Alhuseen1, Wassan Adnan Hashim2,3

    Intelligent Automation & Soft Computing, Vol.40, pp. 195-220, 2025, DOI:10.32604/iasc.2025.061622 - 28 February 2025

    Abstract The prediction of pregnancy-related hazards must be accurate and timely to safeguard mother and fetal health. This study aims to enhance risk prediction in pregnancy with a novel deep learning model based on a Long Short-Term Memory (LSTM) generator, designed to capture temporal relationships in cardiotocography (CTG) data. This methodology integrates CTG signals with demographic characteristics and utilizes preprocessing techniques such as noise reduction, normalization, and segmentation to create high-quality input for the model. It uses convolutional layers to extract spatial information, followed by LSTM layers to model sequences for superior predictive performance. The overall More >

  • Open Access

    ARTICLE

    Reliable Task Offloading for 6G-Based IoT Applications

    Usman Mahmood Malik1, Muhammad Awais Javed2, Ahmad Naseem Alvi2, Mohammed Alkhathami3,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2255-2274, 2025, DOI:10.32604/cmc.2025.061254 - 17 February 2025

    Abstract Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing, and data storage services which are required for several 6G applications. Artificial Intelligence (AI) algorithms will be an integral part of 6G systems and efficient task offloading techniques using fog computing will improve their performance and reliability. In this paper, the focus is on the scenario of Partial Offloading of a Task to Multiple Helpers (POMH) in which larger tasks are divided into smaller subtasks and processed in parallel, hence expediting task completion. However, using POMH presents challenges… More >

  • Open Access

    ARTICLE

    A Novel Reliable and Trust Objective Function for RPL-Based IoT Routing Protocol

    Mariam A. Alotaibi1,2,*, Sami S. Alwakeel1,*, Aasem N. Alyahya1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3467-3497, 2025, DOI:10.32604/cmc.2025.060599 - 17 February 2025

    Abstract The Internet of Things (IoT) integrates diverse devices into the Internet infrastructure, including sensors, meters, and wearable devices. Designing efficient IoT networks with these heterogeneous devices requires the selection of appropriate routing protocols, which is crucial for maintaining high Quality of Service (QoS). The Internet Engineering Task Force’s Routing Over Low Power and Lossy Networks (IETF ROLL) working group developed the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) to meet these needs. While the initial RPL standard focused on single-metric route selection, ongoing research explores enhancing RPL by incorporating multiple routing metrics… More >

  • Open Access

    REVIEW

    An Overview of LoRa Localization Technologies

    Huajiang Ruan1,2, Panjun Sun1,2, Yuanyuan Dong1,2, Hamid Tahaei1, Zhaoxi Fang1,2,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 1645-1680, 2025, DOI:10.32604/cmc.2024.059746 - 17 February 2025

    Abstract Traditional Global Positioning System (GPS) technology, with its high power consumption and limited performance in obstructed environments, is unsuitable for many Internet of Things (IoT) applications. This paper explores LoRa as an alternative localization technology, leveraging its low power consumption, robust indoor penetration, and extensive coverage area, which render it highly suitable for diverse IoT settings. We comprehensively review several LoRa-based localization techniques, including time of arrival (ToA), time difference of arrival (TDoA), round trip time (RTT), received signal strength indicator (RSSI), and fingerprinting methods. Through this review, we evaluate the strengths and limitations of More >

  • Open Access

    ARTICLE

    End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme for Resource Constrained IoT Network

    Shafi Ullah1,*, Haidawati Muhammad Nasir2, Kushsairy Kadir3,*, Akbar Khan1, Ahsanullah Memon4, Shanila Azhar1, Ilyas Khan5, Muhammad Ashraf1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3223-3249, 2025, DOI:10.32604/cmc.2024.054676 - 17 February 2025

    Abstract Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backbone for Industrial IoT, smart cities, and other autonomous systems. Due to the limited computing and memory capacity, these devices cannot maintain strong security if conventional security methods are applied such as heavy encryption. This article proposed a novel lightweight mutual authentication scheme including elliptic curve cryptography (ECC) driven end-to-end encryption through curve25519 such as (i): efficient end-to-end encrypted communication with pre-calculation strategy using curve25519; and (ii): elliptic curve More >

  • Open Access

    ARTICLE

    Enhanced Multi-Object Dwarf Mongoose Algorithm for Optimization Stochastic Data Fusion Wireless Sensor Network Deployment

    Shumin Li1, Qifang Luo1,2,*, Yongquan Zhou1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.2, pp. 1955-1994, 2025, DOI:10.32604/cmes.2025.059738 - 27 January 2025

    Abstract Wireless sensor network deployment optimization is a classic NP-hard problem and a popular topic in academic research. However, the current research on wireless sensor network deployment problems uses overly simplistic models, and there is a significant gap between the research results and actual wireless sensor networks. Some scholars have now modeled data fusion networks to make them more suitable for practical applications. This paper will explore the deployment problem of a stochastic data fusion wireless sensor network (SDFWSN), a model that reflects the randomness of environmental monitoring and uses data fusion techniques widely used in… More >

  • Open Access

    ARTICLE

    Protective Effects of Probiotics against Methotrexate-Induced Intestinal Toxicity in the Mice Model

    KSENIA S. STAFEEVA1, NATALIA A. SAMOYLOVA1, OLGA A. KARANDEEVA1, VERONIKA V. NESTEROVA1, KIRILL A. STARODUBTSEV1, EVGENY V. MIKHAILOV2, ILYA O. KRUTOV2, EVGENY S. POPOV3, NATALIA S. RODIONOVA4, ANASTASIA V. KOKINA1,5, ARTEM P. GUREEV1,5,*

    BIOCELL, Vol.49, No.1, pp. 7-20, 2025, DOI:10.32604/biocell.2024.058339 - 24 January 2025

    Abstract Objective: The objective of this study was to determine the level of methotrexate (MTX) toxicity in the intestines of mice and to evaluate the protective effect of probiotics composed of Streptococcus, Bifidobacterium, and Lactobacillus species on intestinal cells during MTX treatment. Methods: Mice were divided into three groups: control, MTX group (received MTX injections), and MTX + probiotics group (received MTX injections along with a diet containing probiotics). Morphological and histological changes, the level of mitochondrial DNA (mtDNA) damage, the level of lipid peroxidation products, and gene expression in the mice’s small intestine were assessed. Results: We… More > Graphic Abstract

    Protective Effects of Probiotics against Methotrexate-Induced Intestinal Toxicity in the Mice Model

  • Open Access

    ARTICLE

    Genome-Wide Identification and Expression Analysis of Calmodulin-Like Proteins in Tobacco

    Mengjie Xu, Anbin Wang, Tonghong Zuo, Hecui Zhang, Zhihao Hu, Liquan Zhu*

    Phyton-International Journal of Experimental Botany, Vol.94, No.1, pp. 157-179, 2025, DOI:10.32604/phyton.2025.060566 - 24 January 2025

    Abstract Calmodulin-like (CMLs) proteins are critical in calcium signaling and essential for plant growth, development, and stress responses. In many species, the CMLs families have been identified and described. However, the characterization and expression profiling of CMLs genes in tobacco is retrievable. In this study, a comprehensive whole-genome identification and analysis, and 75 NtCML genes were identified in tobacco, each containing two to four EF-hand domains. Most NtCML proteins exhibited conserved gene structures and motifs. Notably, most NtCML proteins were intron-less and distributed across 18 chromosomes. Two pairs of tandemly duplicated genes and seven pairs of segmentally More >

  • Open Access

    REVIEW

    Enhancing Plant Resilience to Abiotic Stress: The Power of Biostimulants

    Su-Ee Lau1,2,*, Lucas Wei Tze Lim3, Mohd Fadhli Hamdan4, Colin Chan5, Noor Baity Saidi6, Janna Ong-Abdullah6, Boon Chin Tan1,*

    Phyton-International Journal of Experimental Botany, Vol.94, No.1, pp. 1-31, 2025, DOI:10.32604/phyton.2025.059930 - 24 January 2025

    Abstract Abiotic stresses such as drought, heat, salinity, and heavy metal contamination severely affect global agricultural productivity. Between 2005 and 2015, droughts caused losses of approximately USD 29 billion in developing countries, and from 2008 to 2018, droughts accounted for over 34% of crop and livestock yield losses, totaling about USD 37 billion. To support the growing human population, agricultural output must increase substantially, necessitating a 60%–100% rise in crop productivity to meet the escalating demand. To address environmental challenges, organic, inorganic, and microbial biostimulants are increasingly employed to enhance plant resilience through various morphological, physiological,… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Access Management System for Enhanced Patient Privacy and Secure Telehealth and Telemedicine Data

    Ayoub Ghani1,*, Ahmed Zinedine1, Mohammed El Mohajir2

    Intelligent Automation & Soft Computing, Vol.40, pp. 75-98, 2025, DOI:10.32604/iasc.2025.060143 - 23 January 2025

    Abstract The Internet of Things (IoT) advances allow healthcare providers to distantly gather and immediately analyze patient health data for diagnostic purposes via connected health devices. In a COVID-19-like pandemic, connected devices can mitigate virus spread and make essential information, such as respiratory patterns, available to healthcare professionals. However, these devices generate vast amounts of data, rendering them susceptible to privacy breaches, and data leaks. Blockchain technology is a robust solution to address these issues in telemedicine systems. This paper proposes a blockchain-based access management solution to enhance patient privacy and secure telehealth and telemedicine data.… More >

Displaying 11-20 on page 2 of 785. Per Page