Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (297)
  • Open Access

    ARTICLE

    The anti-oncogenic effect of 17-DMAG via the inactivation of HSP90 and MET pathway in osteosarcoma cells

    MASANORI KAWANO, KAZUHIRO TANAKA*, ICHIRO ITONAGA, TATSUYA IWASAKI, YUTA KUBOTA, HIROSHI TSUMURA

    Oncology Research, Vol.31, No.5, pp. 631-643, 2023, DOI:10.32604/or.2023.029745

    Abstract Heat shock protein (HSP) 90 plays a crucial role in correcting the misfolded three-dimensional structure of proteins, assisting them in folding into proper conformations. HSP90 is critical in maintaining the normal functions of various proteins within cells, as essential factors for cellular homeostasis. Contrastingly, HSP90 simultaneously supports the maturation of cancer-related proteins, including mesenchymal epithelial transition factor (MET) within tumor cells. All osteosarcoma cell lines had elevated MET expression in the cDNA array in our possession. MET, a tyrosine kinase receptor, promotes proliferation and an anti-apoptotic state through the activation of the MET pathway constructed by HSP90. In this study,… More > Graphic Abstract

    The anti-oncogenic effect of 17-DMAG via the inactivation of HSP90 and MET pathway in osteosarcoma cells

  • Open Access

    ARTICLE

    Adversarial Attack-Based Robustness Evaluation for Trustworthy AI

    Eungyu Lee, Yongsoo Lee, Taejin Lee*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1919-1935, 2023, DOI:10.32604/csse.2023.039599

    Abstract Artificial Intelligence (AI) technology has been extensively researched in various fields, including the field of malware detection. AI models must be trustworthy to introduce AI systems into critical decision-making and resource protection roles. The problem of robustness to adversarial attacks is a significant barrier to trustworthy AI. Although various adversarial attack and defense methods are actively being studied, there is a lack of research on robustness evaluation metrics that serve as standards for determining whether AI models are safe and reliable against adversarial attacks. An AI model’s robustness level cannot be evaluated by traditional evaluation indicators such as accuracy and… More >

  • Open Access

    ARTICLE

    Effects of Plant Extracts and Beauveria bassiana on the Activity of Defense-Related Enzymes in Solanum lycopersicum L. during Interaction with Fusarium oxysporum f. sp. lycopersici

    José Adrian Perez-Robles, Carlos Alberto Lecona-Guzmán*, Víctor Manuel Ruíz-Valdiviezo, Joaquín Adolfo Montes-Molina*

    Phyton-International Journal of Experimental Botany, Vol.92, No.9, pp. 2503-2518, 2023, DOI:10.32604/phyton.2023.029784

    Abstract The objective to this work was to evaluate the enzymatic activity in the culture of Solanum lycopersicum L. infected with Fusarium oxysporum after the combined application of Beauveria bassiana and plant extracts. Solanum lycopersicum plantlets were transplanted 15 days after the emergency. Five days after transplanting, Beauveria bassiana spores were applied at a concentration of 1 × 107 spores mL−1 onto soil (along with A. indica (N) and P. auritum (H) leaf extracts) where S. lycopersicum plants were planted. Eight days after transplanting, spores of F. oxysporum strain were applied at a concentration of 1 × 106 spores mL−1 to… More >

  • Open Access

    ARTICLE

    Single Image Desnow Based on Vision Transformer and Conditional Generative Adversarial Network for Internet of Vehicles

    Bingcai Wei, Di Wang, Zhuang Wang, Liye Zhang*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 1975-1988, 2023, DOI:10.32604/cmes.2023.027727

    Abstract With the increasing popularity of artificial intelligence applications, machine learning is also playing an increasingly important role in the Internet of Things (IoT) and the Internet of Vehicles (IoV). As an essential part of the IoV, smart transportation relies heavily on information obtained from images. However, inclement weather, such as snowy weather, negatively impacts the process and can hinder the regular operation of imaging equipment and the acquisition of conventional image information. Not only that, but the snow also makes intelligent transportation systems make the wrong judgment of road conditions and the entire system of the Internet of Vehicles adverse.… More > Graphic Abstract

    Single Image Desnow Based on Vision Transformer and Conditional Generative Adversarial Network for Internet of Vehicles

  • Open Access

    ARTICLE

    Missing Value Imputation Model Based on Adversarial Autoencoder Using Spatiotemporal Feature Extraction

    Dong-Hoon Shin1, Seo-El Lee2, Byeong-Uk Jeon1, Kyungyong Chung3,*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1925-1940, 2023, DOI:10.32604/iasc.2023.039317

    Abstract Recently, the importance of data analysis has increased significantly due to the rapid data increase. In particular, vehicle communication data, considered a significant challenge in Intelligent Transportation Systems (ITS), has spatiotemporal characteristics and many missing values. High missing values in data lead to the decreased predictive performance of models. Existing missing value imputation models ignore the topology of transportation networks due to the structural connection of road networks, although physical distances are close in spatiotemporal image data. Additionally, the learning process of missing value imputation models requires complete data, but there are limitations in securing complete vehicle communication data. This… More >

  • Open Access

    ARTICLE

    DeepGan-Privacy Preserving of HealthCare System Using DL

    Sultan Mesfer Aldossary*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2199-2212, 2023, DOI:10.32604/iasc.2023.038243

    Abstract The challenge of encrypting sensitive information of a medical image in a healthcare system is still one that requires a high level of computing complexity, despite the ongoing development of cryptography. After looking through the previous research, it has become clear that the security issues still need to be looked into further because there is room for expansion in the research field. Recently, neural networks have emerged as a cost-effective and effective optimization strategy in terms of providing security for images. This revelation came about as a result of current developments. Nevertheless, such an implementation is a technique that is… More >

  • Open Access

    ARTICLE

    Instance Reweighting Adversarial Training Based on Confused Label

    Zhicong Qiu1,2, Xianmin Wang1,*, Huawei Ma1, Songcao Hou1, Jing Li1,2,*, Zuoyong Li2

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1243-1256, 2023, DOI:10.32604/iasc.2023.038241

    Abstract Reweighting adversarial examples during training plays an essential role in improving the robustness of neural networks, which lies in the fact that examples closer to the decision boundaries are much more vulnerable to being attacked and should be given larger weights. The probability margin (PM) method is a promising approach to continuously and path-independently measuring such closeness between the example and decision boundary. However, the performance of PM is limited due to the fact that PM fails to effectively distinguish the examples having only one misclassified category and the ones with multiple misclassified categories, where the latter is closer to… More >

  • Open Access

    ARTICLE

    ECGAN: Translate Real World to Cartoon Style Using Enhanced Cartoon Generative Adversarial Network

    Yixin Tang*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1195-1212, 2023, DOI:10.32604/cmc.2023.039182

    Abstract Visual illustration transformation from real-world to cartoon images is one of the famous and challenging tasks in computer vision. Image-to-image translation from real-world to cartoon domains poses issues such as a lack of paired training samples, lack of good image translation, low feature extraction from the previous domain images, and lack of high-quality image translation from the traditional generator algorithms. To solve the above-mentioned issues, paired independent model, high-quality dataset, Bayesian-based feature extractor, and an improved generator must be proposed. In this study, we propose a high-quality dataset to reduce the effect of paired training samples on the model’s performance.… More >

  • Open Access

    ARTICLE

    Text-to-Sketch Synthesis via Adversarial Network

    Jason Elroy Martis1, Sannidhan Manjaya Shetty2,*, Manas Ranjan Pradhan3, Usha Desai4, Biswaranjan Acharya5,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 915-938, 2023, DOI:10.32604/cmc.2023.038847

    Abstract In the past, sketches were a standard technique used for recognizing offenders and have remained a valuable tool for law enforcement and social security purposes. However, relying on eyewitness observations can lead to discrepancies in the depictions of the sketch, depending on the experience and skills of the sketch artist. With the emergence of modern technologies such as Generative Adversarial Networks (GANs), generating images using verbal and textual cues is now possible, resulting in more accurate sketch depictions. In this study, we propose an adversarial network that generates human facial sketches using such cues provided by an observer. Additionally, we… More >

  • Open Access

    ARTICLE

    Unsupervised Anomaly Detection Approach Based on Adversarial Memory Autoencoders for Multivariate Time Series

    Tianzi Zhao1,2,3,4, Liang Jin1,2,3,*, Xiaofeng Zhou1,2,3, Shuai Li1,2,3, Shurui Liu1,2,3,4, Jiang Zhu1,2,3

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 329-346, 2023, DOI:10.32604/cmc.2023.038595

    Abstract The widespread usage of Cyber Physical Systems (CPSs) generates a vast volume of time series data, and precisely determining anomalies in the data is critical for practical production. Autoencoder is the mainstream method for time series anomaly detection, and the anomaly is judged by reconstruction error. However, due to the strong generalization ability of neural networks, some abnormal samples close to normal samples may be judged as normal, which fails to detect the abnormality. In addition, the dataset rarely provides sufficient anomaly labels. This research proposes an unsupervised anomaly detection approach based on adversarial memory autoencoders for multivariate time series… More >

Displaying 41-50 on page 5 of 297. Per Page