Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (817)
  • Open Access

    REVIEW

    Immune Mechanisms of the Comorbid Course of Chronic Obstructive Pulmonary Disease and Tuberculosis

    Stanislav Kotlyarov1,*, Dmitry Oskin2

    BIOCELL, Vol.49, No.9, pp. 1631-1661, 2025, DOI:10.32604/biocell.2025.066675 - 25 September 2025

    Abstract Chronic obstructive pulmonary disease (COPD) and respiratory tuberculosis are important respiratory problems. Meeting together, these diseases can mutually worsen the severity of clinical manifestations and negatively affect prognosis. COPD and tuberculosis share a number of common risk factors and pathogenetic mechanisms involving various immune and non-immune cells. Inflammation, hypoxia, oxidative stress, and lung tissue remodeling play an important role in the comorbid course of COPD and respiratory tuberculosis. These mechanisms are of diagnostic interest and are promising therapeutic targets. Thus, the aim of the current review is to discuss the mechanisms of the comorbid course More >

  • Open Access

    ARTICLE

    LR-Net: Lossless Feature Fusion and Revised SIoU for Small Object Detection

    Gang Li1,#, Ru Wang1,#, Yang Zhang2,*, Chuanyun Xu2, Xinyu Fan1, Zheng Zhou1, Pengfei Lv1, Zihan Ruan1

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3267-3288, 2025, DOI:10.32604/cmc.2025.067763 - 23 September 2025

    Abstract Currently, challenges such as small object size and occlusion lead to a lack of accuracy and robustness in small object detection. Since small objects occupy only a few pixels in an image, the extracted features are limited, and mainstream downsampling convolution operations further exacerbate feature loss. Additionally, due to the occlusion-prone nature of small objects and their higher sensitivity to localization deviations, conventional Intersection over Union (IoU) loss functions struggle to achieve stable convergence. To address these limitations, LR-Net is proposed for small object detection. Specifically, the proposed Lossless Feature Fusion (LFF) method transfers spatial… More >

  • Open Access

    ARTICLE

    Delving into End-to-End Dual-View Prohibited Item Detection for Security Inspection System

    Zihan Jia, Bowen Ma, Dongyue Chen*

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 2873-2891, 2025, DOI:10.32604/cmc.2025.067460 - 23 September 2025

    Abstract In real-world scenarios, dual-view X-ray machines have outnumbered single-view X-ray machines due to their ability to provide comprehensive internal information about the baggage, which is important for identifying prohibited items that are not visible in one view due to rotation or overlap. However, existing work still focuses mainly on single-view, and the limited dual-view based work only performs simple information fusion at the feature or decision level and lacks effective utilization of the complementary information hidden in dual view. To this end, this paper proposes an end-to-end dual-view prohibited item detection method, the core of… More >

  • Open Access

    ARTICLE

    Attention U-Net for Precision Skeletal Segmentation in Chest X-Ray Imaging: Advancing Person Identification Techniques in Forensic Science

    Hazem Farah1, Akram Bennour1,*, Hama Soltani1, Mouaaz Nahas2, Rashiq Rafiq Marie3, Mohammed Al-Sarem3,4,*

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3335-3348, 2025, DOI:10.32604/cmc.2025.067226 - 23 September 2025

    Abstract This study presents an advanced method for post-mortem person identification using the segmentation of skeletal structures from chest X-ray images. The proposed approach employs the Attention U-Net architecture, enhanced with gated attention mechanisms, to refine segmentation by emphasizing spatially relevant anatomical features while suppressing irrelevant details. By isolating skeletal structures which remain stable over time compared to soft tissues, this method leverages bones as reliable biometric markers for identity verification. The model integrates custom-designed encoder and decoder blocks with attention gates, achieving high segmentation precision. To evaluate the impact of architectural choices, we conducted an… More >

  • Open Access

    ARTICLE

    Interpretable Vulnerability Detection in LLMs: A BERT-Based Approach with SHAP Explanations

    Nouman Ahmad*, Changsheng Zhang

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3321-3334, 2025, DOI:10.32604/cmc.2025.067044 - 23 September 2025

    Abstract Source code vulnerabilities present significant security threats, necessitating effective detection techniques. Rigid rule-sets and pattern matching are the foundation of traditional static analysis tools, which drown developers in false positives and miss context-sensitive vulnerabilities. Large Language Models (LLMs) like BERT, in particular, are examples of artificial intelligence (AI) that exhibit promise but frequently lack transparency. In order to overcome the issues with model interpretability, this work suggests a BERT-based LLM strategy for vulnerability detection that incorporates Explainable AI (XAI) methods like SHAP and attention heatmaps. Furthermore, to ensure auditable and comprehensible choices, we present a… More >

  • Open Access

    ARTICLE

    MMIF: Multimodal Medical Image Fusion Network Based on Multi-Scale Hybrid Attention

    Jianjun Liu1, Yang Li2,*, Xiaoting Sun3,*, Xiaohui Wang1, Hanjiang Luo2

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3551-3568, 2025, DOI:10.32604/cmc.2025.066864 - 23 September 2025

    Abstract Multimodal image fusion plays an important role in image analysis and applications. Multimodal medical image fusion helps to combine contrast features from two or more input imaging modalities to represent fused information in a single image. One of the critical clinical applications of medical image fusion is to fuse anatomical and functional modalities for rapid diagnosis of malignant tissues. This paper proposes a multimodal medical image fusion network (MMIF-Net) based on multiscale hybrid attention. The method first decomposes the original image to obtain the low-rank and significant parts. Then, to utilize the features at different More >

  • Open Access

    ARTICLE

    CMACF-Net: Cross-Multiscale Adaptive Collaborative and Fusion Grasp Detection Network

    Xi Li1,2, Runpu Nie1,*, Zhaoyong Fan2, Lianying Zou2, Zhenhua Xiao2, Kaile Dong1

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 2959-2984, 2025, DOI:10.32604/cmc.2025.066740 - 23 September 2025

    Abstract With the rapid development of robotics, grasp prediction has become fundamental to achieving intelligent physical interactions. To enhance grasp detection accuracy in unstructured environments, we propose a novel Cross-Multiscale Adaptive Collaborative and Fusion Grasp Detection Network (CMACF-Net). Addressing the limitations of conventional methods in capturing multi-scale spatial features, CMACF-Net introduces the Quantized Multi-scale Global Attention Module (QMGAM), which enables precise multi-scale spatial calibration and adaptive spatial-channel interaction, ultimately yielding a more robust and discriminative feature representation. To reduce the degradation of local features and the loss of high-frequency information, the Cross-scale Context Integration Module (CCI) More >

  • Open Access

    ARTICLE

    Deep Learning-Driven Intrusion Detection and Defense Mechanisms: A Novel Approach to Mitigating Cyber Attacks

    Junzhe Cheng*

    Journal of Cyber Security, Vol.7, pp. 343-357, 2025, DOI:10.32604/jcs.2025.067979 - 22 September 2025

    Abstract We present a novel Transformer-based network intrusion detection system (IDS) that automatically learns complex feature relationships from raw traffic. Our architecture embeds both categorical (e.g., protocol, flag) and numerical (e.g., packet count, duration) inputs into a unified latent space with positional encodings, and processes them through multi-layer multi-head self-attention blocks. The Transformer’s global attention enables the IDS to capture subtle, long-range correlations in the data (e.g., coordinated multi-step attacks) without manual feature engineering. We complement the model with extensive data augmentation (SMOTE, GANs) to mitigate class imbalance and improve robustness. In evaluation on benchmark datasets… More >

  • Open Access

    REVIEW

    Natural Language Processing with Transformer-Based Models: A Meta-Analysis

    Charles Munyao*, John Ndia

    Journal on Artificial Intelligence, Vol.7, pp. 329-346, 2025, DOI:10.32604/jai.2025.069226 - 22 September 2025

    Abstract The natural language processing (NLP) domain has witnessed significant advancements with the emergence of transformer-based models, which have reshaped the text understanding and generation landscape. While their capabilities are well recognized, there remains a limited systematic synthesis of how these models perform across tasks, scale efficiently, adapt to domains, and address ethical challenges. Therefore, the aim of this paper was to analyze the performance of transformer-based models across various NLP tasks, their scalability, domain adaptation, and the ethical implications of such models. This meta-analysis paper synthesizes findings from 25 peer-reviewed studies on NLP transformer-based models,… More >

  • Open Access

    ARTICLE

    Mechanisms and Mitigation of Heavy Oil Invasion into Drilling Fluids in Carbonate Reservoirs

    Yang Yu1,2, Sheng Fan1,2, Zhonglin Li1,2, Zhong He1,2, Jingwei Liu3,*, Peng Xu3,*

    FDMP-Fluid Dynamics & Materials Processing, Vol.21, No.8, pp. 1875-1894, 2025, DOI:10.32604/fdmp.2025.066404 - 12 September 2025

    Abstract Drilling operations in carbonate rock heavy oil blocks (e.g., in the Tahe Oilfield) are challenged by the intrusion of high-viscosity, temperature-sensitive formation heavy oil into the drilling fluid. This phenomenon often results in wellbore blockage, reduced penetration rates, and compromised well control, thereby significantly limiting drilling efficiency and operational safety. To address this issue, this study conducts a comprehensive investigation into the mechanisms governing heavy oil invasion using a combination of laboratory experiments and field data analysis. Findings indicate that the reservoir exhibits strong heterogeneity and that the heavy oil possesses distinctive physical properties. The… More >

Displaying 21-30 on page 3 of 817. Per Page