Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (681)
  • Open Access

    REVIEW

    A review on re-emerging bacteriophage therapy in the era of XDR

    POOJA BHADORIYA1, RICHA SHARMA1, REKHA MEHROTRA1, SIMRAN KAUR1, ISHA SRIVASTAVA1, MUKUL JAIN2, PRASHANT KAUSHIK3,*

    BIOCELL, Vol.47, No.9, pp. 1915-1930, 2023, DOI:10.32604/biocell.2023.029564

    Abstract In the present medicine world antibiotic resistance is one of the key threats to universal health coverage. Researchers continue to work hard to combat this global health concern. Phage therapy, an age-old practice during the early twentieth century, was outshined by the discovery of antibiotics. With the advent of widespread antibiotic resistance, phage therapy has again redeemed itself as a potential alternative owing to its adeptness to target bacteria precisely. Limited side effects, the ability to migrate to different body organs, a distinct mode of action, and proliferation at the infection site, make phages a profitable candidate to replace conventional… More > Graphic Abstract

    A review on re-emerging bacteriophage therapy in the era of XDR

  • Open Access

    ARTICLE

    An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things

    Senshan Ouyang1,2, Xiang Liu2, Lei Liu2, Shangchao Wang2, Baichuan Shao3, Yang Zhao3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 903-915, 2024, DOI:10.32604/cmes.2023.028895

    Abstract With the continuous expansion of the Industrial Internet of Things (IIoT), more and more organisations are placing large amounts of data in the cloud to reduce overheads. However, the channel between cloud servers and smart equipment is not trustworthy, so the issue of data authenticity needs to be addressed. The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems. Unfortunately, it still suffers from the problem of key exposure. In order to address this concern, this study first introduces a key-insulated scheme, SM2-KI-SIGN, based on the SM2 algorithm. This scheme boasts strong key insulation… More >

  • Open Access

    ARTICLE

    Anti-Jamming Null Space Projection Beamforming Based on Symbiotic Radio

    Baofeng Ji1,2,3,4,*, Yifan Liu1,2,3,4, Tingpeng Li1, Ling Xing2, Weixing Wang2, Shahid Mumtaz5, Xiaolong Shang6, Wanying Liu2, Congzheng Han4

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 679-689, 2024, DOI:10.32604/cmes.2023.028667

    Abstract With the development of information technology, more and more devices are connected to the Internet through wireless communication to complete data interconnection. Due to the broadcast characteristics of wireless channels, wireless networks have suffered more and more malicious attacks. Physical layer security has received extensive attention from industry and academia. MIMO is considered to be one of the most important technologies related to physical layer security. Through beamforming technology, messages can be transmitted to legitimate users in an offset direction that is as orthogonal as possible to the interference channel to ensure the reception SINR by legitimate users. Combining the… More >

  • Open Access

    ARTICLE

    A Secure Device Management Scheme with Audio-Based Location Distinction in IoT

    Haifeng Lin1,2, Xiangfeng Liu2, Chen Chen2, Zhibo Liu2, Dexin Zhao3, Yiwen Zhang4, Weizhuang Li4, Mingsheng Cao5,6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 939-956, 2024, DOI:10.32604/cmes.2023.028656

    Abstract Identifying a device and detecting a change in its position is critical for secure devices management in the Internet of Things (IoT). In this paper, a device management system is proposed to track the devices by using audio-based location distinction techniques. In the proposed scheme, traditional cryptographic techniques, such as symmetric encryption algorithm, RSA-based signcryption scheme, and audio-based secure transmission, are utilized to provide authentication, non-repudiation, and confidentiality in the information interaction of the management system. Moreover, an audio-based location distinction method is designed to detect the position change of the devices. Specifically, the audio frequency response (AFR) of several… More >

  • Open Access

    ARTICLE

    A Novel IoT Architecture, Assessment of Threats and Their Classification with Machine Learning Solutions

    Oliva Debnath1, Saptarshi Debnath1, Sreyashi Karmakar2, MD Tausif Mallick3, Himadri Nath Saha4,*

    Journal on Internet of Things, Vol.5, pp. 13-43, 2023, DOI:10.32604/jiot.2023.039391

    Abstract The Internet of Things (IoT) will significantly impact our social and economic lives in the near future. Many Internet of Things (IoT) applications aim to automate multiple tasks so inactive physical objects can behave independently of others. IoT devices, however, are also vulnerable, mostly because they lack the essential built-in security to thwart attackers. It is essential to perform the necessary adjustments in the structure of the IoT systems in order to create an end-to-end secure IoT environment. As a result, the IoT designs that are now in use do not completely support all of the advancements that have been… More >

  • Open Access

    ARTICLE

    Deoxynortryptoquivaline: A unique antiprostate cancer agent

    YOHKO YAMAZAKI1,*, MANABU KAWADA2, ISAO MOMOSE1

    Oncology Research, Vol.31, No.6, pp. 845-853, 2023, DOI:10.32604/or.2023.030266

    Abstract The androgen receptor (AR) is a critical target in all the clinical stages of prostate cancer. To identify a new AR inhibitor, we constructed a new screening system using the androgen-dependent growth of prostate cancer cell lines as a screening indicator. We screened 50,000 culture broths of microorganisms using this screening system and found that the fermentation broth produced by a fungus inhibited androgen-dependent growth of human prostate cancer LNCaP cells without cytotoxicity. Purification of this culture medium was performed, and this resulted in deoxynortryptoquivaline (DNT) being identified as a novel inhibitor of AR function. DNT showed potent inhibition of… More > Graphic Abstract

    Deoxynortryptoquivaline: A unique antiprostate cancer agent

  • Open Access

    REVIEW

    Applications of Microalgae in Five Areas of Biotechnology

    Héctor Alejandro Reza-Solis1, Ofelia Adriana Hernández-Rodríguez1,*, Andrés Francisco Martínez-Rosales2, Dámaris Leopoldina Ojeda-Barrios1

    Phyton-International Journal of Experimental Botany, Vol.92, No.10, pp. 2737-2759, 2023, DOI:10.32604/phyton.2023.029851

    Abstract Microalgae are mostly photoautotrophic microscopic organisms. According to their cellular structure, they are classified into two types, eukaryotes, and prokaryotes, and they are distributed in all types of ecosystems, presenting unique qualities due to the fact that they synthesize high value-added molecules used in various productive and environmental activities, and because their biomass is used as raw material to obtain various products. Therefore, the objective of this review was to collect, organize, and collate current information on the use of microalgae in the development of biotechnology involving the areas of agriculture, health, food, bioremediation, and biofuels. The results show that… More >

  • Open Access

    ARTICLE

    A Nonlinear Spatiotemporal Optimization Method of Hypergraph Convolution Networks for Traffic Prediction

    Difeng Zhu1, Zhimou Zhu2, Xuan Gong1, Demao Ye1, Chao Li3,*, Jingjing Chen4,*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 3083-3100, 2023, DOI:10.32604/iasc.2023.040517

    Abstract Traffic prediction is a necessary function in intelligent transportation systems to alleviate traffic congestion. Graph learning methods mainly focus on the spatiotemporal dimension, but ignore the nonlinear movement of traffic prediction and the high-order relationships among various kinds of road segments. There exist two issues: 1) deep integration of the spatiotemporal information and 2) global spatial dependencies for structural properties. To address these issues, we propose a nonlinear spatiotemporal optimization method, which introduces hypergraph convolution networks (HGCN). The method utilizes the higher-order spatial features of the road network captured by HGCN, and dynamically integrates them with the historical data to… More >

  • Open Access

    ARTICLE

    A Novel Attack on Complex APUFs Using the Evolutionary Deep Convolutional Neural Network

    Ali Ahmadi Shahrakht1, Parisa Hajirahimi2, Omid Rostami3, Diego Martín4,*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 3059-3081, 2023, DOI:10.32604/iasc.2023.040502

    Abstract As the internet of things (IoT) continues to expand rapidly, the significance of its security concerns has grown in recent years. To address these concerns, physical unclonable functions (PUFs) have emerged as valuable tools for enhancing IoT security. PUFs leverage the inherent randomness found in the embedded hardware of IoT devices. However, it has been shown that some PUFs can be modeled by attackers using machine-learning-based approaches. In this paper, a new deep learning (DL)-based modeling attack is introduced to break the resistance of complex XAPUFs. Because training DL models is a problem that falls under the category of NP-hard… More >

  • Open Access

    ARTICLE

    Design the IoT Botnet Defense Process for Cybersecurity in Smart City

    Donghyun Kim1, Seungho Jeon2, Jiho Shin3, Jung Taek Seo4,*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2979-2997, 2023, DOI:10.32604/iasc.2023.040019

    Abstract The smart city comprises various infrastructures, including healthcare, transportation, manufacturing, and energy. A smart city’s Internet of Things (IoT) environment constitutes a massive IoT environment encompassing numerous devices. As many devices are installed, managing security for the entire IoT device ecosystem becomes challenging, and attack vectors accessible to attackers increase. However, these devices often have low power and specifications, lacking the same security features as general Information Technology (IT) systems, making them susceptible to cyberattacks. This vulnerability is particularly concerning in smart cities, where IoT devices are connected to essential support systems such as healthcare and transportation. Disruptions can lead… More >

Displaying 61-70 on page 7 of 681. Per Page