Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (27)
  • Open Access

    ARTICLE

    Engineering Amorphous Solid Dispersions of Abiraterone Acetate via HPMC HME: A Polymer-Centric Hot-Melt Extrusion Strategy for Formulation-Driven Bioavailability Improvement

    Manisha Choudhari1, Shantanu Damle2, Rajat Vashist1, Ranendra Narayan Saha3, Sunil Kumar Dubey4, Gautam Singhvi1,*

    Journal of Polymer Materials, Vol.42, No.4, pp. 1199-1229, 2025, DOI:10.32604/jpm.2025.072987 - 26 December 2025

    Abstract Abiraterone acetate (ABTA) was approved by the USFDA in 2011 for treating metastatic castration-resistant prostate cancer (mCRPC). ABTA exhibits poor aqueous solubility, inadequate dissolution, low oral bioavailability (<10%), and significant positive food effects. To overcome these limitations, in the present work, ABTA solid dispersions (SDs) were developed by using hot melt extrusion technology (HME) with various grades of hydroxypropyl methylcellulose HME (HPMC HME 15LV and 100LV) at different extrusion temperatures. HPMC HME demonstrated the ability to prevent drug precipitation for up to 120 min compared to the free drug (10 min), sustaining the supersaturation state… More > Graphic Abstract

    Engineering Amorphous Solid Dispersions of Abiraterone Acetate via HPMC HME: A Polymer-Centric Hot-Melt Extrusion Strategy for Formulation-Driven Bioavailability Improvement

  • Open Access

    ARTICLE

    Future-Proofing CIA Triad with Authentication for Healthcare: Integrating Hybrid Architecture of ML & DL with IDPS for Robust IoMT Security

    Saad Awadh Alanazi1, Fahad Ahmad2,3,*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 769-800, 2025, DOI:10.32604/cmc.2025.066753 - 29 August 2025

    Abstract This study presents a comprehensive and secure architectural framework for the Internet of Medical Things (IoMT), integrating the foundational principles of the Confidentiality, Integrity, and Availability (CIA) triad along with authentication mechanisms. Leveraging advanced Machine Learning (ML) and Deep Learning (DL) techniques, the proposed system is designed to safeguard Patient-Generated Health Data (PGHD) across interconnected medical devices. Given the increasing complexity and scale of cyber threats in IoMT environments, the integration of Intrusion Detection and Prevention Systems (IDPS) with intelligent analytics is critical. Our methodology employs both standalone and hybrid ML & DL models to… More >

  • Open Access

    ARTICLE

    Effect of Organic Waste and Inorganic Additives on Organic Matter Transformation and Mineral Availability in Composting Green Waste

    Abderrahim Boutasknit1,2,3, Mohamed Anli3, Rachid Lahlali4,*, Abdelilah Meddich2,3,5,*

    Phyton-International Journal of Experimental Botany, Vol.93, No.9, pp. 2227-2249, 2024, DOI:10.32604/phyton.2024.055629 - 30 September 2024

    Abstract Applying organic waste and inorganic additives during composting can be an effective and easy-to-control strategy for optimizing humification, maturation, and the availability of essential mineral elements in compost. In this respect, this study aims to evaluate the effect of organic (olive-mill waste and horse manure) and inorganic (phosphogypsum) additives on the evolution of maturity indices, aromatic compounds, and nutrient availability during composting. Four mixtures [horse manure + green waste (M1), olive-mill + green waste (M2), sewage-sludge + phos-phogypsum + green waste (M3), and green waste (M4)] were carried out. Physicochemical (temperature, pH, phosphorus, nitrogen, and… More >

  • Open Access

    ARTICLE

    Improving Network Availability through Optimized Multipath Routing and Incremental Deployment Strategies

    Wei Zhang1, Haijun Geng2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 427-448, 2024, DOI:10.32604/cmc.2024.051871 - 18 July 2024

    Abstract Currently, distributed routing protocols are constrained by offering a single path between any pair of nodes, thereby limiting the potential throughput and overall network performance. This approach not only restricts the flow of data but also makes the network susceptible to failures in case the primary path is disrupted. In contrast, routing protocols that leverage multiple paths within the network offer a more resilient and efficient solution. Multipath routing, as a fundamental concept, surpasses the limitations of traditional shortest path first protocols. It not only redirects traffic to unused resources, effectively mitigating network congestion, but… More >

  • Open Access

    ARTICLE

    Belowground Bud Bank Is Insensitive to Short-Term Nutrient Addition in the Meadow Steppe of Inner Mongolia

    Jin Tao1, Jiatai Tian1, Dongmei Li1, Jinlei Zhu2, Qun Ma3, Zhiming Zhang1, Jungang Chen4, Yipeng Liu5, Jianqiang Qian1,*

    Phyton-International Journal of Experimental Botany, Vol.93, No.6, pp. 1129-1141, 2024, DOI:10.32604/phyton.2024.051405 - 27 June 2024

    Abstract Human activities and industrialization have significantly increased soil nutrients, such as nitrogen (N) and phosphorus (P), profoundly impacting the composition and structure of plant community, as well as the ecosystem functions, especially in nutrient-limited ecosystems. However, as the key propagule pool of perennial grasslands, how belowground bud bank and its relationship with aboveground vegetation respond to short-term changes in soil nutrients was still unclear. In this study, we conducted a short-term (2021–2022) soil fertilization experiment with N addition (10 g N m yr) and P addition (5 g N m yr) in the meadow steppe… More >

  • Open Access

    ARTICLE

    An Innovative K-Anonymity Privacy-Preserving Algorithm to Improve Data Availability in the Context of Big Data

    Linlin Yuan1,2, Tiantian Zhang1,3, Yuling Chen1,*, Yuxiang Yang1, Huang Li1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1561-1579, 2024, DOI:10.32604/cmc.2023.046907 - 25 April 2024

    Abstract The development of technologies such as big data and blockchain has brought convenience to life, but at the same time, privacy and security issues are becoming more and more prominent. The K-anonymity algorithm is an effective and low computational complexity privacy-preserving algorithm that can safeguard users’ privacy by anonymizing big data. However, the algorithm currently suffers from the problem of focusing only on improving user privacy while ignoring data availability. In addition, ignoring the impact of quasi-identified attributes on sensitive attributes causes the usability of the processed data on statistical analysis to be reduced. Based… More >

  • Open Access

    ARTICLE

    Reliability-Based Model for Incomplete Preventive Replacement Maintenance of Photovoltaic Power Systems

    Wei Chen, Ming Li*, Tingting Pei, Cunyu Sun, Huan Lei

    Energy Engineering, Vol.121, No.1, pp. 125-144, 2024, DOI:10.32604/ee.2023.042812 - 27 December 2023

    Abstract At present, the operation and maintenance of photovoltaic power generation systems mainly comprise regular maintenance, breakdown maintenance, and condition-based maintenance, which is very likely to lead to over- or under-repair of equipment. Therefore, a preventive maintenance and replacement strategy for PV power generation systems based on reliability as a constraint is proposed. First, a hybrid failure function with a decreasing service age factor and an increasing failure rate factor is introduced to describe the deterioration of PV power generation equipment, and the equipment is replaced when its reliability drops to the replacement threshold in the… More >

  • Open Access

    ARTICLE

    Performance Improvement through Novel Adaptive Node and Container Aware Scheduler with Resource Availability Control in Hadoop YARN

    J. S. Manjaly, T. Subbulakshmi*

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3083-3108, 2023, DOI:10.32604/csse.2023.036320 - 09 November 2023

    Abstract The default scheduler of Apache Hadoop demonstrates operational inefficiencies when connecting external sources and processing transformation jobs. This paper has proposed a novel scheduler for enhancement of the performance of the Hadoop Yet Another Resource Negotiator (YARN) scheduler, called the Adaptive Node and Container Aware Scheduler (ANACRAC), that aligns cluster resources to the demands of the applications in the real world. The approach performs to leverage the user-provided configurations as a unique design to apportion nodes, or containers within the nodes, to application thresholds. Additionally, it provides the flexibility to the applications for selecting and… More >

  • Open Access

    ARTICLE

    Intrusion Detection in 5G Cellular Network Using Machine Learning

    Ishtiaque Mahmood1, Tahir Alyas2, Sagheer Abbas3, Tariq Shahzad4, Qaiser Abbas5,6, Khmaies Ouahada7,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2439-2453, 2023, DOI:10.32604/csse.2023.033842 - 28 July 2023

    Abstract Attacks on fully integrated servers, apps, and communication networks via the Internet of Things (IoT) are growing exponentially. Sensitive devices’ effectiveness harms end users, increases cyber threats and identity theft, raises costs, and negatively impacts income as problems brought on by the Internet of Things network go unnoticed for extended periods. Attacks on Internet of Things interfaces must be closely monitored in real time for effective safety and security. Following the 1, 2, 3, and 4G cellular networks, the 5th generation wireless 5G network is indeed the great invasion of mankind and is known as… More >

  • Open Access

    ARTICLE

    Efficient Heuristic Replication Techniques for High Data Availability in Cloud

    H. L. Chandrakala1,*, R. Loganathan2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3151-3164, 2023, DOI:10.32604/csse.2022.027873 - 21 December 2022

    Abstract Most social networks allow connections amongst many people based on shared interests. Social networks have to offer shared data like videos, photos with minimum latency to the group, which could be challenging as the storage cost has to be minimized and hence entire data replication is not a solution. The replication of data across a network of read-intensive can potentially lead to increased savings in cost and energy and reduce the end-user’s response time. Though simple and adaptive replication strategies exist, the solution is non-deterministic; the replicas of the data need to be optimized to… More >

Displaying 1-10 on page 1 of 27. Per Page