Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (114)
  • Open Access

    ARTICLE

    Machine learning and bioinformatics to identify biomarkers in response to Burkholderia pseudomallei infection in mice

    YAO FANG1,2,#, FEI XIA1,#, FEIFEI TIAN3, LEI QU1, FANG YANG1, JUAN FANG1,2, ZHENHONG HU1,*, HAICHAO LIU1,*

    BIOCELL, Vol.48, No.4, pp. 613-621, 2024, DOI:10.32604/biocell.2024.031539

    Abstract Objective: In the realm of Class I pathogens, Burkholderia pseudomallei (BP) stands out for its propensity to induce severe pathogenicity. Investigating the intricate interactions between BP and host cells is imperative for comprehending the dynamics of BP infection and discerning biomarkers indicative of the host cell response process. Methods: mRNA extraction from BP-infected mouse macrophages constituted the initial step of our study. Employing gene expression arrays, the extracted RNA underwent conversion into digital signals. The percentile shift method facilitated data processing, with the identification of genes manifesting significant differences accomplished through the application of the t-test. Subsequently, a comprehensive analysis… More >

  • Open Access

    ARTICLE

    Bronchoalveolar lavage fluid metagenomic next-generation sequencing assay for identifying pathogens in lung cancer patients

    JIYU WANG1,2, HUIXIA LI1,2, DEYUAN ZHOU1,2, LIHONG BAI1,2, KEJING TANG1,2,3,*

    BIOCELL, Vol.48, No.4, pp. 623-637, 2024, DOI:10.32604/biocell.2024.030420

    Abstract Background: For patients with lung cancer, timely identification of new lung lesions as infectious or non-infectious, and accurate identification of pathogens is very important in improving OS of patients. As a new auxiliary examination, metagenomic next-generation sequencing (mNGS) is believed to be more accurate in diagnosing infectious diseases in patients without underlying diseases, compared with conventional microbial tests (CMTs). We designed this study to find out whether mNGS has better performance in distinguishing infectious and non-infectious diseases in lung cancer patients using bronchoalveolar lavage fluid (BALF). Materials and Methods: This study was a real-world retrospective review based on electronic medical… More >

  • Open Access

    ARTICLE

    Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells

    Chanumolu Kiran Kumar, Nandhakumar Ramachandran*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3151-3176, 2024, DOI:10.32604/cmc.2023.043534

    Abstract Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions, vulnerabilities, and assaults. Complex security systems, such as Intrusion Detection Systems (IDS), are essential due to the limitations of simpler security measures, such as cryptography and firewalls. Due to their compact nature and low energy reserves, wireless networks present a significant challenge for security procedures. The features of small cells can cause threats to the network. Network Coding (NC) enabled small cells are vulnerable to various types of attacks. Avoiding attacks and performing secure “peer” to “peer” data transmission is a challenging task in small… More >

  • Open Access

    ARTICLE

    Effet modérateur de la perception de menace du cancer du sein sur la relation entre les connaissances et l’autopalpation

    Carolle Annie Njopvoui*, Armel Valdin Teague Tsopgny, Henri Rodrigue Njengoue Ngamaleu

    Psycho-Oncologie, Vol.18, No.1, pp. 59-68, 2024, DOI:10.32604/po.2023.047499

    Abstract Estimated at more than 2.2 million cases worldwide, most breast cancer cases and deaths from breast cancer occur in low and middle-income countries. In Cameroon, many studies have underlined the effect of knowledge of breast cancer on screening measures such as self-examination and, to a lesser extent, the perception of the threat of this disease. This research aims to assess according to the Health Belief Model (HBM), the moderating effect of perceived threat of breast cancer on the relation between knowledge and breast self-examination. A questionnaire survey was conducted among 517 Cameroonian women to assess their general knowledge about breast… More >

  • Open Access

    ARTICLE

    Démocratie en santé et narration : une synthèse des connaissances

    Rossi Silvia1,2,*, Sandrine de Montgolfier1,3, Joëlle Kivits4

    Psycho-Oncologie, Vol.18, No.1, pp. 33-41, 2024, DOI:10.32604/po.2024.042709

    Abstract Objectif: La démocratie en santé nécessite de disposer d’outils et de méthodologies pour impliquer les acteurs non scientifiques dans l’élaboration et la mise en œuvre des politiques de santé. La narration pourrait être un des outils qui permettent de rendre la démocratie en santé effective. Notre objectif est de voir comment la narration est mobilisée en lien avec la démocratie en santé, de décrire les objectifs de son usage, la méthodologie adoptée et les résultats obtenus. Matériel et méthodes: Nous avons réalisé une revue de la littérature narrative. Notre équation de recherche a été composée par le mot-clé « narration… More >

  • Open Access

    EDITORIAL

    Editorial: Welcome Message from Editor-in-Chief, Xuming Mo

    Xuming Mo*

    Congenital Heart Disease, Vol.19, No.1, pp. 1-3, 2024, DOI:10.32604/chd.2024.051192

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Prediction on Failure Pressure of Pipeline Containing Corrosion Defects Based on ISSA-BPNN Model

    Qi Zhuang1,*, Dong Liu2, Zhuo Chen3

    Energy Engineering, Vol.121, No.3, pp. 821-834, 2024, DOI:10.32604/ee.2023.044054

    Abstract Oil and gas pipelines are affected by many factors, such as pipe wall thinning and pipeline rupture. Accurate prediction of failure pressure of oil and gas pipelines can provide technical support for pipeline safety management. Aiming at the shortcomings of the BP Neural Network (BPNN) model, such as low learning efficiency, sensitivity to initial weights, and easy falling into a local optimal state, an Improved Sparrow Search Algorithm (ISSA) is adopted to optimize the initial weights and thresholds of BPNN, and an ISSA-BPNN failure pressure prediction model for corroded pipelines is established. Taking 61 sets of pipelines blasting test data… More >

  • Open Access

    ARTICLE

    A Time Series Intrusion Detection Method Based on SSAE, TCN and Bi-LSTM

    Zhenxiang He*, Xunxi Wang, Chunwei Li

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 845-871, 2024, DOI:10.32604/cmc.2023.046607

    Abstract In the fast-evolving landscape of digital networks, the incidence of network intrusions has escalated alarmingly. Simultaneously, the crucial role of time series data in intrusion detection remains largely underappreciated, with most systems failing to capture the time-bound nuances of network traffic. This leads to compromised detection accuracy and overlooked temporal patterns. Addressing this gap, we introduce a novel SSAE-TCN-BiLSTM (STL) model that integrates time series analysis, significantly enhancing detection capabilities. Our approach reduces feature dimensionality with a Stacked Sparse Autoencoder (SSAE) and extracts temporally relevant features through a Temporal Convolutional Network (TCN) and Bidirectional Long Short-term Memory Network (Bi-LSTM). By… More >

  • Open Access

    ARTICLE

    An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault

    Syeda Wajiha Zahra1, Muhammad Nadeem2, Ali Arshad3,*, Saman Riaz3, Muhammad Abu Bakr4, Ashit Kumar Dutta5, Zaid Alzaid6, Badr Almutairi7, Sultan Almotairi8

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 589-616, 2024, DOI:10.32604/cmc.2023.042386

    Abstract Various organizations store data online rather than on physical servers. As the number of user’s data stored in cloud servers increases, the attack rate to access data from cloud servers also increases. Different researchers worked on different algorithms to protect cloud data from replay attacks. None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack. This study presents the development of a TKN (Text, Key and Name) cryptographic algorithm aimed at protecting data from replay attacks. The program employs distinct ways to encrypt plain text [P], a user-defined Key [K], and a Secret Code… More >

  • Open Access

    ARTICLE

    An End-To-End Hyperbolic Deep Graph Convolutional Neural Network Framework

    Yuchen Zhou1, Hongtao Huo1, Zhiwen Hou1, Lingbin Bu1, Yifan Wang1, Jingyi Mao1, Xiaojun Lv2, Fanliang Bu1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 537-563, 2024, DOI:10.32604/cmes.2023.044895

    Abstract Graph Convolutional Neural Networks (GCNs) have been widely used in various fields due to their powerful capabilities in processing graph-structured data. However, GCNs encounter significant challenges when applied to scale-free graphs with power-law distributions, resulting in substantial distortions. Moreover, most of the existing GCN models are shallow structures, which restricts their ability to capture dependencies among distant nodes and more refined high-order node features in scale-free graphs with hierarchical structures. To more broadly and precisely apply GCNs to real-world graphs exhibiting scale-free or hierarchical structures and utilize multi-level aggregation of GCNs for capturing high-level information in local representations, we propose… More >

Displaying 1-10 on page 1 of 114. Per Page