Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,029)
  • Open Access

    ARTICLE

    Correlation between chronic prostate inflammation and overactive bladder symptoms following transurethral resection of the prostate due to benign prostate hyperplasia

    Ozgu Aydogdu1,*, Onur Erdemoglu2, Halil Ibrahim Bozkurt2, Tansu Degirmenci2, Michael Winder3

    Canadian Journal of Urology, Vol.32, No.5, pp. 529-538, 2025, DOI:10.32604/cju.2025.064564 - 30 October 2025

    Abstract Objectives: Treatment of patients with lower urinary tract symptoms (LUTS) is often challenging. In men, the origin of LUTS, in particular overactive bladder (OAB) symptoms, is often due to prostate enlargement. However, patients with chronic prostate inflammation (CPI) also frequently experience OAB. Thus far, it is not known if the inflammation per se or concomitant prostate enlargement is the underlying cause of LUTS. Currently, we aim to examine if there is any correlation between CPI and the persistence of OAB symptoms in patients with benign prostate hyperplasia (BPH). Methods: Fifty-one men underwent transurethral resection of… More >

  • Open Access

    ARTICLE

    Efficient Malicious QR Code Detection System Using an Advanced Deep Learning Approach

    Abdulaziz A. Alsulami1, Qasem Abu Al-Haija2,*, Badraddin Alturki3, Ayman Yafoz1, Ali Alqahtani4, Raed Alsini1, Sami Saeed Binyamin5

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 1117-1140, 2025, DOI:10.32604/cmes.2025.070745 - 30 October 2025

    Abstract QR codes are widely used in applications such as information sharing, advertising, and digital payments. However, their growing adoption has made them attractive targets for malicious activities, including malware distribution and phishing attacks. Traditional detection approaches rely on URL analysis or image-based feature extraction, which may introduce significant computational overhead and limit real-time applicability, and their performance often depends on the quality of extracted features. Previous studies in malicious detection do not fully focus on QR code security when combining convolutional neural networks (CNNs) with recurrent neural networks (RNNs). This research proposes a deep learning… More >

  • Open Access

    ARTICLE

    Priority-Based Scheduling and Orchestration in Edge-Cloud Computing: A Deep Reinforcement Learning-Enhanced Concurrency Control Approach

    Mohammad A Al Khaldy1, Ahmad Nabot2, Ahmad Al-Qerem3,*, Mohammad Alauthman4, Amina Salhi5,*, Suhaila Abuowaida6, Naceur Chihaoui7

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 673-697, 2025, DOI:10.32604/cmes.2025.070004 - 30 October 2025

    Abstract The exponential growth of Internet of Things (IoT) devices has created unprecedented challenges in data processing and resource management for time-critical applications. Traditional cloud computing paradigms cannot meet the stringent latency requirements of modern IoT systems, while pure edge computing faces resource constraints that limit processing capabilities. This paper addresses these challenges by proposing a novel Deep Reinforcement Learning (DRL)-enhanced priority-based scheduling framework for hybrid edge-cloud computing environments. Our approach integrates adaptive priority assignment with a two-level concurrency control protocol that ensures both optimal performance and data consistency. The framework introduces three key innovations: (1)… More >

  • Open Access

    ARTICLE

    Non-Newtonian Electroosmotic Flow Effects on a Self-Propelled Undulating Sheet in a Wavy Channel

    Rehman Ali Shah1,2, Zeeshan Asghar3,*, Chenji Li2, Arezoo Ardekani2, Nasir Ali1

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 753-778, 2025, DOI:10.32604/cmes.2025.069177 - 30 October 2025

    Abstract The objective of this work is to investigate the dynamics of a self-propelled undulating sheet in a non-Newtonian electrolyte solution inside a wavy channel under the electroosmotic effect. The electrolyte solution, which is non-Newtonian, is modeled as a Carreau-Yasuda fluid. The flow generated by a combination of an undulating sheet and electroosmotic effect is obtained by solving the continuity and momentum equations. The electroosmotic body force term is derived using the Poisson-Boltzmann equation for the electric potential. A fourth-order ordinary differential equation for the stream function is solved under the Stokes flow regime. The dynamics More >

  • Open Access

    ARTICLE

    Explicit ARL Computational for a Modified EWMA Control Chart in Autocorrelated Statistical Process Control Models

    Yadpirun Supharakonsakun1, Yupaporn Areepong2, Korakoch Silpakob3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 699-720, 2025, DOI:10.32604/cmes.2025.067702 - 30 October 2025

    Abstract This study presents an innovative development of the exponentially weighted moving average (EWMA) control chart, explicitly adapted for the examination of time series data distinguished by seasonal autoregressive moving average behavior—SARMA(1,1)L under exponential white noise. Unlike previous works that rely on simplified models such as AR(1) or assume independence, this research derives for the first time an exact two-sided Average Run Length (ARL) formula for the Modified EWMA chart under SARMA(1,1)L conditions, using a mathematically rigorous Fredholm integral approach. The derived formulas are validated against numerical integral equation (NIE) solutions, showing strong agreement and significantly reduced More > Graphic Abstract

    Explicit ARL Computational for a Modified EWMA Control Chart in Autocorrelated Statistical Process Control Models

  • Open Access

    PROCEEDINGS

    Resolving Self-Stress Artifacts in Twin Boundary Migration: A Stress Correction Scheme for the CPFE-PF Model of HCP Alloys

    Linfeng Jiang1,*, Guisen Liu1, Yao Shen1, Jian Wang2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.33, No.3, pp. 1-1, 2025, DOI:10.32604/icces.2025.011397

    Abstract The plastic deformation of Mg/Ti alloys arises from the synergistic interplay of dislocation slip and deformation twinning. To model these mechanisms, we previously developed a mesoscale CPFE-PF framework that couples crystal plasticity finite element (CPFE) and phase field (PF) methods, enabling predictions of microstructure evolution and mechanical behavior under complex loading. A central challenge, however, lies in accurately capturing deformation twinning—a process critical for accommodating shear and reorienting crystal domains in low-symmetry metals. Twin propagation and thickening occur via twinning dislocations/disconnections at the atomic scale, while at larger scales they are governed by the migration… More >

  • Open Access

    PROCEEDINGS

    Quantitative Assessment of Irreversible Deformation and Fatigue Damage Based on DIC

    Chenghuan Liu, Xiangbo Hu, Xiaogang Wang*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.33, No.3, pp. 1-1, 2025, DOI:10.32604/icces.2025.010910

    Abstract Digital image correlation (DIC) is an emerging non-contact optical measurement method that tracks speckle patterns on the specimen surface to obtain the deformation, providing an advanced methodology for the quantitative evaluation of full-field strain. The present work focuses on the quantitative assessment of deformation from micro to macro scales based on the DIC method and examines damage evolution in metal materials under static and cyclic loading conditions. First, an SEM-based DIC method allowing high-resolution strain measurement at subgrain scales is developed for investigating strain partitioning in dual-phase steel. The results reveal that the strain distribution… More >

  • Open Access

    ARTICLE

    Numerical Simulation via Homotopy Perturbation Approach of a Dissipative Squeezed Carreau Fluid Flow Due to a Sensor Surface

    Sara I. Abdelsalam1,2,*, W. Abbas3, Ahmed M. Megahed4, Hassan M. H. Sadek5, M. S. Emam5

    Frontiers in Heat and Mass Transfer, Vol.23, No.5, pp. 1511-1527, 2025, DOI:10.32604/fhmt.2025.069359 - 31 October 2025

    Abstract This study rigorously examines the interplay between viscous dissipation, magnetic effects, and thermal radiation on the flow behavior of a non-Newtonian Carreau squeezed fluid passing by a sensor surface within a micro cantilever channel, aiming to deepen our understanding of heat transport processes in complex fluid dynamics scenarios. The primary objective is to elucidate how physical operational parameters influence both the velocity of fluid flow and its temperature distribution, utilizing a comprehensive numerical approach. Employing a combination of mathematical modeling techniques, including similarity transformation, this investigation transforms complex partial differential equations into more manageable ordinary… More >

  • Open Access

    ARTICLE

    An Innovative Semi-Supervised Fuzzy Clustering Technique Using Cluster Boundaries

    Duong Tien Dung1,2,3, Ha Hai Nam4, Nguyen Long Giang3, Luong Thi Hong Lan5,*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5341-5357, 2025, DOI:10.32604/cmc.2025.068299 - 23 October 2025

    Abstract Active semi-supervised fuzzy clustering integrates fuzzy clustering techniques with limited labeled data, guided by active learning, to enhance classification accuracy, particularly in complex and ambiguous datasets. Although several active semi-supervised fuzzy clustering methods have been developed previously, they typically face significant limitations, including high computational complexity, sensitivity to initial cluster centroids, and difficulties in accurately managing boundary clusters where data points often overlap among multiple clusters. This study introduces a novel Active Semi-Supervised Fuzzy Clustering algorithm specifically designed to identify, analyze, and correct misclassified boundary elements. By strategically utilizing labeled data through active learning, our More >

  • Open Access

    ARTICLE

    Transfer Learning-Based Approach with an Ensemble Classifier for Detecting Keylogging Attack on the Internet of Things

    Yahya Alhaj Maz1, Mohammed Anbar1, Selvakumar Manickam1,*, Mosleh M. Abualhaj2, Sultan Ahmed Almalki3, Basim Ahmad Alabsi4

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5287-5307, 2025, DOI:10.32604/cmc.2025.068257 - 23 October 2025

    Abstract The Internet of Things (IoT) is an innovation that combines imagined space with the actual world on a single platform. Because of the recent rapid rise of IoT devices, there has been a lack of standards, leading to a massive increase in unprotected devices connecting to networks. Consequently, cyberattacks on IoT are becoming more common, particularly keylogging attacks, which are often caused by security vulnerabilities on IoT networks. This research focuses on the role of transfer learning and ensemble classifiers in enhancing the detection of keylogging attacks within small, imbalanced IoT datasets. The authors propose… More >

Displaying 31-40 on page 4 of 1029. Per Page