Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (229)
  • Open Access

    ARTICLE

    Physio-Mechanical Characterization of Recycled Polyethylene Terephthalate and Soda-Lime Glass Waste Composite for Roof Tile Application

    Yusuf Olanrewaju Busari1,2,*, Issah Sadiq Ibrahim1, Kabir S. Ajao1, Norliana Mohd Abbas2, James Obafemi Adegbola1, Hassan Kobe Ibrahim3, Abdallah Reghioua4, Yusuf Lanre Shuaib-Babata1, Rachael Oluwatoyosi Idowu1

    Journal of Polymer Materials, Vol.41, No.3, pp. 117-129, 2024, DOI:10.32604/jpm.2024.055895 - 30 September 2024

    Abstract The research paper focuses on manufacturing composite materials from waste polyethylene terephthalate (PET) reinforced with soda-lime glass to provide a lightweight, less brittle, and high rust resistance when exposed to hazardous environment. In developing nations such as Nigeria, there is a significant surge in the volume of bottled water and other packaging materials used in households, leading to a rapid accumulation of biodegradable waste, that presents concerns such as the creation of landfills and health issues. PET are thermoplastic polymer that can be melted and shaped into various objects. This study involves the incorporation of… More >

  • Open Access

    CORRECTION

    Correction: Long non-coding RNA LINC02163 accelerates malignant tumor behaviors in breast cancer by regulating the microRNA-511-3p/HMGA2 axis as a competing endogenous RNA

    CHENGLIN QIN1,2, LINFANG JIN1,3, JIA LI1,4, WENZHANG ZHA2, HUIMING DING2, XIAORONG LIU1,5, XUN ZHU1,*

    Oncology Research, Vol.32, No.9, pp. 1517-1522, 2024, DOI:10.32604/or.2024.051893 - 23 August 2024

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Wild Gibbon Optimization Algorithm

    Jia Guo1,2,4,6, Jin Wang2, Ke Yan3, Qiankun Zuo1,2,4,*, Ruiheng Li1,2,4, Zhou He1,2,4, Dong Wang5, Yuji Sato6

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1203-1233, 2024, DOI:10.32604/cmc.2024.051336 - 18 July 2024

    Abstract Complex optimization problems hold broad significance across numerous fields and applications. However, as the dimensionality of such problems increases, issues like the curse of dimensionality and local optima trapping also arise. To address these challenges, this paper proposes a novel Wild Gibbon Optimization Algorithm (WGOA) based on an analysis of wild gibbon population behavior. WGOA comprises two strategies: community search and community competition. The community search strategy facilitates information exchange between two gibbon families, generating multiple candidate solutions to enhance algorithm diversity. Meanwhile, the community competition strategy reselects leaders for the population after each iteration, More >

  • Open Access

    ARTICLE

    A Data Intrusion Tolerance Model Based on an Improved Evolutionary Game Theory for the Energy Internet

    Song Deng1,*, Yiming Yuan2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3679-3697, 2024, DOI:10.32604/cmc.2024.052008 - 20 June 2024

    Abstract Malicious attacks against data are unavoidable in the interconnected, open and shared Energy Internet (EI), Intrusion tolerant techniques are critical to the data security of EI. Existing intrusion tolerant techniques suffered from problems such as low adaptability, policy lag, and difficulty in determining the degree of tolerance. To address these issues, we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas: 1) it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights; and 2) it combines a tournament competition More >

  • Open Access

    ARTICLE

    An Interactive Collaborative Creation System for Shadow Puppets Based on Smooth Generative Adversarial Networks

    Cheng Yang1,2, Miaojia Lou2,*, Xiaoyu Chen1,2, Zixuan Ren1

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4107-4126, 2024, DOI:10.32604/cmc.2024.049183 - 20 June 2024

    Abstract Chinese shadow puppetry has been recognized as a world intangible cultural heritage. However, it faces substantial challenges in its preservation and advancement due to the intricate and labor-intensive nature of crafting shadow puppets. To ensure the inheritance and development of this cultural heritage, it is imperative to enable traditional art to flourish in the digital era. This paper presents an Interactive Collaborative Creation System for shadow puppets, designed to facilitate the creation of high-quality shadow puppet images with greater ease. The system comprises four key functions: Image contour extraction, intelligent reference recommendation, generation network, and… More >

  • Open Access

    ARTICLE

    MCIF-Transformer Mask RCNN: Multi-Branch Cross-Scale Interactive Feature Fusion Transformer Model for PET/CT Lung Tumor Instance Segmentation

    Huiling Lu1,*, Tao Zhou2,3

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4371-4393, 2024, DOI:10.32604/cmc.2024.047827 - 20 June 2024

    Abstract The precise detection and segmentation of tumor lesions are very important for lung cancer computer-aided diagnosis. However, in PET/CT (Positron Emission Tomography/Computed Tomography) lung images, the lesion shapes are complex, the edges are blurred, and the sample numbers are unbalanced. To solve these problems, this paper proposes a Multi-branch Cross-scale Interactive Feature fusion Transformer model (MCIF-Transformer Mask RCNN) for PET/CT lung tumor instance segmentation, The main innovative works of this paper are as follows: Firstly, the ResNet-Transformer backbone network is used to extract global feature and local feature in lung images. The pixel dependence relationship… More >

  • Open Access

    ARTICLE

    A Cooperated Imperialist Competitive Algorithm for Unrelated Parallel Batch Machine Scheduling Problem

    Deming Lei*, Heen Li

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 1855-1874, 2024, DOI:10.32604/cmc.2024.049480 - 15 May 2024

    Abstract This study focuses on the scheduling problem of unrelated parallel batch processing machines (BPM) with release times, a scenario derived from the moulding process in a foundry. In this process, a batch is initially formed, placed in a sandbox, and then the sandbox is positioned on a BPM for moulding. The complexity of the scheduling problem increases due to the consideration of BPM capacity and sandbox volume. To minimize the makespan, a new cooperated imperialist competitive algorithm (CICA) is introduced. In CICA, the number of empires is not a parameter, and four empires are maintained More >

  • Open Access

    ARTICLE

    Positron Emission Tomography Lung Image Respiratory Motion Correcting with Equivariant Transformer

    Jianfeng He1,2, Haowei Ye1, Jie Ning1, Hui Zhou1,2,*, Bo She3,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3355-3372, 2024, DOI:10.32604/cmc.2024.048706 - 15 May 2024

    Abstract In addressing the challenge of motion artifacts in Positron Emission Tomography (PET) lung scans, our study introduces the Triple Equivariant Motion Transformer (TEMT), an innovative, unsupervised, deep-learning-based framework for efficient respiratory motion correction in PET imaging. Unlike traditional techniques, which segment PET data into bins throughout a respiratory cycle and often face issues such as inefficiency and overemphasis on certain artifacts, TEMT employs Convolutional Neural Networks (CNNs) for effective feature extraction and motion decomposition.TEMT’s unique approach involves transforming motion sequences into Lie group domains to highlight fundamental motion patterns, coupled with employing competitive weighting for More >

  • Open Access

    ARTICLE

    Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia: A Fuzzy Decision-Making Approach

    Wajdi Alhakami*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3211-3237, 2024, DOI:10.32604/cmc.2023.043935 - 15 May 2024

    Abstract The Kingdom of Saudi Arabia (KSA) has achieved significant milestones in cybersecurity. KSA has maintained solid regulatory mechanisms to prevent, trace, and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage. The widespread usage of Information Technology (IT) and IT Enable Services (ITES) reinforces security measures. The constantly evolving cyber threats are a topic that is generating a lot of discussion. In this league, the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes… More >

  • Open Access

    ARTICLE

    How Emotion Nurtures Mentality: The Influencing Mechanism of Social-Emotional Competency on the Mental Health of University Students

    Yulei Chen1, Zhaojun Chen1,2, Shichao Wang1, Yang Hang1, Jianpeng Guo1,*

    International Journal of Mental Health Promotion, Vol.26, No.4, pp. 303-315, 2024, DOI:10.32604/ijmhp.2024.046863 - 04 May 2024

    Abstract Social-Emotional Competency (SEC), regarded as a critical psychological resource for individuals to adapt to social environments, is an effective protective factor for students’ mental health, impacting their future success and well-being. Analyzing the impact of SEC on university students’ mental health can offer valuable insights for nurturing talents with healthy psychological and physical development. Based on data from two large-scale surveys of Chinese university students, this study designed two comprehensive Multiple Mediation Models involving SEC, stress, coping strategies, and stress reaction to explore the pathway of emotion nurturing mentality. Study 1 utilized a parallel mediation model… More >

Displaying 1-10 on page 1 of 229. Per Page