Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (161)
  • Open Access

    ARTICLE

    Vibration Diagnosis and Optimization of Industrial Robot Based on TPA and EMD Methods

    Xiaoping Xie*, Shijie Cheng, Xuyang Li

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.3, pp. 2425-2448, 2023, DOI:10.32604/cmes.2023.023116

    Abstract This paper proposed method that combined transmission path analysis (TPA) and empirical mode decomposition (EMD) envelope analysis to solve the vibration problem of an industrial robot. Firstly, the deconvolution filter time-domain TPA method is proposed to trace the source along with the time variation. Secondly, the TPA method positioned the main source of robotic vibration under typically different working conditions. Thirdly, independent vibration testing of the Rotate Vector (RV) reducer is conducted under different loads and speeds, which are key components of an industrial robot. The method of EMD and Hilbert envelope was used to extract the fault feature of… More >

  • Open Access

    ARTICLE

    NOMA with Adaptive Transmit Power Using Intelligent Reflecting Surfaces

    Raed Alhamad1,*, Hatem Boujemaa2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2059-2070, 2023, DOI:10.32604/csse.2023.032610

    Abstract In this article, we use Intelligent Reflecting Surfaces (IRS) to improve the throughput of Non Orthogonal Multiple Access (NOMA) with Adaptive Transmit Power (ATP). The results are valid for Cognitive Radio Networks (CRN) where secondary source adapts its power to generate low interference at primary receiver. In all previous studies, IRS were implemented with fixed transmit power and previous results are not valid when the power of the secondary source is adaptive. In CRN, secondary nodes are allowed to transmit over the same band as primary users since they adapt their power to minimize the generated interference. Each NOMA user… More >

  • Open Access

    ARTICLE

    Millimeter Wave Massive MIMO Heterogeneous Networks Using Fuzzy-Based Deep Convolutional Neural Network (FDCNN)

    Hussain Alaaedi*, Masoud Sabaei

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 633-646, 2023, DOI:10.32604/iasc.2023.032462

    Abstract Enabling high mobility applications in millimeter wave (mmWave) based systems opens up a slew of new possibilities, including vehicle communications in addition to wireless virtual/augmented reality. The narrow beam usage in addition to the millimeter waves sensitivity might block the coverage along with the reliability of the mobile links. In this research work, the improvement in the quality of experience faced by the user for multimedia-related applications over the millimeter-wave band is investigated. The high attenuation loss in high frequencies is compensated with a massive array structure named Multiple Input and Multiple Output (MIMO) which is utilized in a hyperdense… More >

  • Open Access

    ARTICLE

    Towards Developing Privacy-Preserved Data Security Approach (PP-DSA) in Cloud Computing Environment

    S. Stewart Kirubakaran1,*, V. P. Arunachalam1, S. Karthik1, S. Kannan2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1881-1895, 2023, DOI:10.32604/csse.2023.026690

    Abstract In the present scenario of rapid growth in cloud computing models, several companies and users started to share their data on cloud servers. However, when the model is not completely trusted, the data owners face several security-related problems, such as user privacy breaches, data disclosure, data corruption, and so on, during the process of data outsourcing. For addressing and handling the security-related issues on Cloud, several models were proposed. With that concern, this paper develops a Privacy-Preserved Data Security Approach (PP-DSA) to provide the data security and data integrity for the outsourcing data in Cloud Environment. Privacy preservation is ensured… More >

  • Open Access

    ARTICLE

    LncRNA WEE2-AS1 knockdown inhibits the proliferation, migration and invasion of glioma cells via regulating miR-29b-2- 5p/TPM3 axis

    ZHEN JIA1,2,#, ZHENGTING QIAN1,2,#, YONG TANG2, XIANG LI2, YAN SHI2, HENG XIN1,2, YOUWU FAN1,2,*, HEMING WU2,*

    Oncology Research, Vol.29, No.2, pp. 105-117, 2021, DOI:10.32604/or.2022.03536

    Abstract Glioma is a general malignant tumor with a dismal prognosis. Long noncoding RNAs (lncRNAs) have been implicated in the initiation and processes of tumors. An investigation of the GEPIA database revealed that long noncoding RNA WEE2 antisense RNA 1 (WEE2-AS1) is upregulated in glioma tissues compared to normal brain tissues, and validation with quantitative real-time polymerase chain reaction (qRT–PCR) revealed that WEE2-AS1 expression was consistent with the database prediction. Fluorescence in situ hybridization (FISH) assays revealed that WEE2-AS1 was localized primarily in the cytoplasm. Clone formation experiment and EDU assay were used to detect cell proliferation ability, and Transwell assay… More >

  • Open Access

    ARTICLE

    Triptolide Inhibits Breast Cancer Cell Metastasis Through Inducing the Expression of miR-146a, a Negative Regulator of Rho GTPase

    Qin Liu*†, Wei Wang, Fangqiong Li, Dongyang Yu, Chunfen Xu*, Hongbing Hu*

    Oncology Research, Vol.27, No.9, pp. 1043-1050, 2019, DOI:10.3727/096504019X15560124931900

    Abstract Triptolide, an extract of Tripterygium wilfordii, has been shown to have a potent anticancer activity. In the present study, it was found that triptolide could effectively induce apoptosis and inhibit proliferation and invasion in malignant MDA-MB-231 breast cancer cells. The study focused on its effect on inhibiting invasion, which has not been extensively reported to date. We predicted that triptolide may change invasion activity via microRNAs (miRNAs), which have been recognized as important regulators of gene expression. miRNAome variation in MDA-MB-231 cells with or without triptolide treatment demonstrated that miR-146a was upregulated following treatment with triptolide. Our previous studies have… More >

  • Open Access

    REVIEW

    The Roles of Plant-Derived Triptolide on Non-Small Cell Lung Cancer

    Jie Wei*†1, Yuanliang Yan*†1, Xi Chen*†, Long Qian*†, Shuangshuang Zeng*†, Zhi Li, Shuang Dai*†, Zhicheng Gong*†,Zhijie Xu§

    Oncology Research, Vol.27, No.7, pp. 849-858, 2019, DOI:10.3727/096504018X15447833065047

    Abstract Over the past decade, natural compounds have been proven to be effective against many human diseases, including cancers. Triptolide (TPL), a diterpenoid triepoxide from the Chinese herb Tripterygium wilfordii Hook F, has exhibited attractive cytotoxic activity on several cancer cells. An increasing number of studies have emphasized the antitumor effects of TPL on non-small cell lung cancer (NSCLC). Here we mainly focused on the key molecular signaling pathways that lead to the inhibitory effects of TPL on human NSCLC, such as mitogen-activated protein kinases (MAPKs) modulation, inhibition of NF- B activation, suppression of miRNA expression, etc. In addition, the effect… More >

  • Open Access

    ARTICLE

    Regorafenib-Induced Hand–Foot Skin Reaction Is More Severe on the Feet Than on the Hands

    Yuma Nonomiya*, Takashi Yokokawa, Kazuyoshi Kawakami, Kazuo Kobayashi, Takeshi Aoyama, Tomomi Takiguchi, Takahito Sugisaki, Kenichi Suzuki, Mitsukuni Suenaga, Takeru Wakatsuki, Kensei Yamaguchi, Yoshikazu Sugimoto*, Toshihiro Hama

    Oncology Research, Vol.27, No.5, pp. 551-556, 2019, DOI:10.3727/096504018X15291727589740

    Abstract Regorafenib is a multikinase inhibitor for the treatment of metastatic colorectal cancer. Regorafenib-induced hand–foot skin reaction (HFSR) is a common side effect during treatment. The reported frequency of HFSR was 80% (grade 3: 28%) in the Japanese subpopulation in the CORRECT trial; however, more detailed data regarding HFSR in terms of onset and sites of susceptibility are unclear. Additionally, the risk factors for regorafenib-induced severe HFSR are unknown. The aim of this study was to compare HFSR between the hands and feet and identify preexisting risk factors for severe HFSR in Japanese patients receiving regorafenib. We retrospectively examined the onset… More >

  • Open Access

    ARTICLE

    Eighteen-Element Antenna for Metal-Rimmed Smartphone Sub-6 GHz LTE42 Band Applications

    Saqer S. Alja’Afreh1,*, Mallak H. Alshamaileh1, Eqab Almajali2, Jawad Yousaf3, Amir Altaf4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3181-3198, 2022, DOI:10.32604/cmc.2022.029863

    Abstract Due to the limited space and large mutual coupling levels, the design of sub-6 GHz massive Multi-Input Multi-Output (m-MIMO) smartphone antenna system attracts antennas’ designers and engineers worldwide. Therefore, this paper presents 18-element m-MIMO antenna system that covers the long-term evolution 42 (LTE42) frequency band (3.4–3.6 GHz) for the fifth generation (5G) applications in metallic frame smartphones. The proposed array system is etched on the long sides of a metal rim of the mobile chassis symmetrically, which is electrically connected to the system ground plane with zero ground clearance. A low-profile frame of height 7 mm (λ/12.3) is symmetrically placed… More >

  • Open Access

    ARTICLE

    Root-Of-Trust for Continuous Integration and Continuous Deployment Pipeline in Cloud Computing

    Abdul Saboor1,*, Mohd Fadzil Hassan2, Rehan Akbar1, Erwin Susanto3, Syed Nasir Mehmood Shah4, Muhammad Aadil Siddiqui5, Saeed Ahmed Magsi5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2223-2239, 2022, DOI:10.32604/cmc.2022.028382

    Abstract Cloud computing has gained significant use over the last decade due to its several benefits, including cost savings associated with setup, deployments, delivery, physical resource sharing across virtual machines, and availability of on-demand cloud services. However, in addition to usual threats in almost every computing environment, cloud computing has also introduced a set of new threats as consumers share physical resources due to the physical co-location paradigm. Furthermore, since there are a growing number of attacks directed at cloud environments (including dictionary attacks, replay code attacks, denial of service attacks, rootkit attacks, code injection attacks, etc.), customers require additional assurances… More >

Displaying 51-60 on page 6 of 161. Per Page