Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,169)
  • Open Access

    REVIEW

    Climate Change and Aquatic Phytoremediation of Contaminants: Exploring the Future of Contaminant Removal

    Marcelo Pedrosa Gomes*

    Phyton-International Journal of Experimental Botany, Vol.93, No.9, pp. 2127-2147, 2024, DOI:10.32604/phyton.2024.056360 - 30 September 2024

    Abstract Climate change, driven by anthropogenic activities, profoundly impacts ecosystems worldwide, particularly aquatic environments. This review explores the multifaceted effects of climate change on the phytoremediation capabilities of aquatic plants, focusing on the physiological responses to key environmental factors such as temperature, carbone dioxide (CO2) and ozone (O3) levels, pH, salinity, and light intensity. As global temperatures rise, moderate increases can enhance photosynthesis and biomass production, boosting the plants’ ability to absorb and detoxify contaminants, such as metals, pharmaceuticals, and nutrients. However, extreme temperatures and salinity levels impose stress, disrupting metabolic processes and reducing phytoremediation efficiency. Elevated CO2More >

  • Open Access

    REVIEW

    Pioneering a new era in Parkinson’s disease management through adipose-derived mesenchymal stem cell therapy

    MOHAMMAD-SADEGH LOTFI, FATEMEH B. RASSOULI*

    BIOCELL, Vol.48, No.10, pp. 1419-1428, 2024, DOI:10.32604/biocell.2024.053597 - 02 October 2024

    Abstract Parkinson’s disease (PD) is one of the fastest-growing neurodegenerative disorders worldwide. So far, PD treatments only offer little clinical relief and cannot reverse or stop the disease progression. Stem cell (SC) therapy is a rapidly evolving technology that holds significant promise for enhancing current therapeutic approaches. Adipose-derived mesenchymal SCs (AD-MSCs) have many features such as easy harvest with minimal invasive techniques, high plasticity, non-immunogenicity, and no ethical issues, which have made them suitable choices for clinical applications in regenerative research. AD-MSCs are ideal tools to treat PD, as they have the potential to differentiate into… More >

  • Open Access

    REVIEW

    Neural stem cell-derived exosomes: a cell-free transplant for potential cure of neurological diseases

    JIAJUN HUANG1,#, WEI WANG1,#, WENTONG LIN2, HENGSEN CAI3, ZHIHAN ZHU1, WAQAS AHMED4, QIANKUN ZHANG1, JIALE LIU1, YIFAN ZHANG1, RONG LI1, ZHINUO LI1, AHSAN ALI KHAN5, DENG LU3, YONG HU6, LUKUI CHEN1,*

    BIOCELL, Vol.48, No.10, pp. 1405-1418, 2024, DOI:10.32604/biocell.2024.053148 - 02 October 2024

    Abstract Degeneration and death of nerve cells are inevitable with the occurrence and progression of nervous system disorders. Researchers transplanted neural stem cells into relevant areas, trying to solve the difficulty of neural cell loss by differentiating neural stem cells into various nerve cells. In recent years, however, studies have shown that transplanted neural stem cells help neural tissues regenerate and return to normal through paracrine action rather than just replacing cells. Exosomes are essential paracrine mediators, which can participate in cell communication through substance transmission. In this regard, this review mainly discusses the current research More >

  • Open Access

    ARTICLE

    Self-Attention Spatio-Temporal Deep Collaborative Network for Robust FDIA Detection in Smart Grids

    Tong Zu, Fengyong Li*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1395-1417, 2024, DOI:10.32604/cmes.2024.055442 - 27 September 2024

    Abstract False data injection attack (FDIA) can affect the state estimation of the power grid by tampering with the measured value of the power grid data, and then destroying the stable operation of the smart grid. Existing work usually trains a detection model by fusing the data-driven features from diverse power data streams. Data-driven features, however, cannot effectively capture the differences between noisy data and attack samples. As a result, slight noise disturbances in the power grid may cause a large number of false detections for FDIA attacks. To address this problem, this paper designs a… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Large-Scale AI Models for Intelligent Railway Transportation Systems: Hierarchical Poisoning Attacks and Defenses in Federated Learning

    Yongsheng Zhu1,2,*, Chong Liu3,4, Chunlei Chen5, Xiaoting Lyu3,4, Zheng Chen3,4, Bin Wang6, Fuqiang Hu3,4, Hanxi Li3,4, Jiao Dai3,4, Baigen Cai1, Wei Wang3,4

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1305-1325, 2024, DOI:10.32604/cmes.2024.054820 - 27 September 2024

    Abstract The development of Intelligent Railway Transportation Systems necessitates incorporating privacy-preserving mechanisms into AI models to protect sensitive information and enhance system efficiency. Federated learning offers a promising solution by allowing multiple clients to train models collaboratively without sharing private data. However, despite its privacy benefits, federated learning systems are vulnerable to poisoning attacks, where adversaries alter local model parameters on compromised clients and send malicious updates to the server, potentially compromising the global model’s accuracy. In this study, we introduce PMM (Perturbation coefficient Multiplied by Maximum value), a new poisoning attack method that perturbs model More >

  • Open Access

    ARTICLE

    Encrypted Cyberattack Detection System over Encrypted IoT Traffic Based on Statistical Intelligence

    Il Hwan Ji1, Ju Hyeon Lee1, Seungho Jeon2, Jung Taek Seo2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1519-1549, 2024, DOI:10.32604/cmes.2024.053437 - 27 September 2024

    Abstract In the early days of IoT’s introduction, it was challenging to introduce encryption communication due to the lack of performance of each component, such as computing resources like CPUs and batteries, to encrypt and decrypt data. Because IoT is applied and utilized in many important fields, a cyberattack on IoT can result in astronomical financial and human casualties. For this reason, the application of encrypted communication to IoT has been required, and the application of encrypted communication to IoT has become possible due to improvements in the computing performance of IoT devices and the development… More >

  • Open Access

    ARTICLE

    Multi-Binary Classifiers Using Optimal Feature Selection for Memory-Saving Intrusion Detection Systems

    Ye-Seul Kil1,#, Yu-Ran Jeon1,#, Sun-Jin Lee1, Il-Gu Lee1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1473-1493, 2024, DOI:10.32604/cmes.2024.052637 - 27 September 2024

    Abstract With the rise of remote work and the digital industry, advanced cyberattacks have become more diverse and complex in terms of attack types and characteristics, rendering them difficult to detect with conventional intrusion detection methods. Signature-based intrusion detection methods can be used to detect attacks; however, they cannot detect new malware. Endpoint detection and response (EDR) tools are attracting attention as a means of detecting attacks on endpoints in real-time to overcome the limitations of signature-based intrusion detection techniques. However, EDR tools are restricted by the continuous generation of unnecessary logs, resulting in poor detection… More >

  • Open Access

    ARTICLE

    Optimal Cyber Attack Strategy Using Reinforcement Learning Based on Common Vulnerability Scoring System

    Bum-Sok Kim1, Hye-Won Suk1, Yong-Hoon Choi2, Dae-Sung Moon3, Min-Suk Kim2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1551-1574, 2024, DOI:10.32604/cmes.2024.052375 - 27 September 2024

    Abstract Currently, cybersecurity threats such as data breaches and phishing have been on the rise due to the many different attack strategies of cyber attackers, significantly increasing risks to individuals and organizations. Traditional security technologies such as intrusion detection have been developed to respond to these cyber threats. Recently, advanced integrated cybersecurity that incorporates Artificial Intelligence has been the focus. In this paper, we propose a response strategy using a reinforcement-learning-based cyber-attack-defense simulation tool to address continuously evolving cyber threats. Additionally, we have implemented an effective reinforcement-learning-based cyber-attack scenario using Cyber Battle Simulation, which is a… More >

  • Open Access

    ARTICLE

    Tannins from Acacia mangium Bark as Natural Dyes for Textiles: Characteristics and Applications

    Maya Ismayati1,*, Nissa Nurfajrin Solihat1, Fifi Melinda Setiawati2, Wasrin Syafii2, Yuki Tobimatsu3, Deni Zulfiana4

    Journal of Renewable Materials, Vol.12, No.9, pp. 1625-1637, 2024, DOI:10.32604/jrm.2024.054739 - 25 September 2024

    Abstract Tannins are capable of producing natural dyes with antioxidant and antibacterial propertis, while synthetic dyes are commonly used in the textile industry, causing environmental issues like water pollution. This research aims to utilize waste tannins as natural dyes as an alternative to synthetic dyes. This study examined the effect of the extraction method on tannin properties such as phenolic content, antioxidants, and antibacterial activity. In addition, Pyrolysis Gas Chromatography‒Mass Spectrometry (Py-GCMS) analysis was used to identify the effect of extraction temperature on the chemical elucidation of tannin. The effect of tannin concentration was evaluated against… More > Graphic Abstract

    Tannins from <i>Acacia mangium</i> Bark as Natural Dyes for Textiles: Characteristics and Applications

  • Open Access

    ARTICLE

    Influence of the Ambient Temperature on the Efficiency of Gas Turbines

    Mahdi Goucem*

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.10, pp. 2265-2279, 2024, DOI:10.32604/fdmp.2024.052365 - 23 September 2024

    Abstract In hot and arid regions like the Saharan area, effective methods for cooling and humidifying intake air are essential. This study explores the utilization of a water trickle cooler as a promising solution to meet this objective. In particular, the HASSI MESSAOUD area is considered as a testbed. The water trickle cooler is chosen for its adaptability to arid conditions. Modeling results demonstrate its effectiveness in conditioning air before it enters the compressor. The cooling system achieves a significant temperature reduction of 6 to 8 degrees Celsius, enhancing mass flow rate dynamics by 3 percent More >

Displaying 1-10 on page 1 of 3169. Per Page