Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (13)
  • Open Access

    REVIEW

    Unraveling Immunotherapy Resistance in Solid Tumors: Decoding Mechanisms and Charting Future Therapeutic Landscapes

    Huan Wang1,#, Jindong Xie1,#, Na Li1, Qianwen Liu1, Wenqi Song1, Wenkuan Chen1, Cheng Peng2,*, Hailin Tang1,*

    Oncology Research, Vol.33, No.12, pp. 3789-3800, 2025, DOI:10.32604/or.2025.067592 - 27 November 2025

    Abstract Solid tumors comprise the majority of the global cancer burden, with their incidence and associated mortality posing considerable challenges to public health systems. With population growth and aging, the burden of these tumors is anticipated to increase further in the coming decades. The progression of solid tumors depends on dynamic interactions between malignantly transformed cells and the tumor microenvironment (TME). Immune checkpoint inhibitor therapy improves T cell-mediated antitumor activity by suppressing regulatory pathways, such as programmed cell death protein 1/programmed death-ligand 1. Nonetheless, its widespread application is constrained by drug resistance. In this comprehensive review, More >

  • Open Access

    ARTICLE

    An Optimization of Weak Key Attacks Based on the BGF Decoding Algorithm

    Bing Liu*, Ting Nie, Yansong Liu, Weibo Hu

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4583-4599, 2025, DOI:10.32604/cmc.2025.065296 - 30 July 2025

    Abstract Among the four candidate algorithms in the fourth round of NIST standardization, the BIKE (Bit Flipping Key Encapsulation) scheme has a small key size and high efficiency, showing good prospects for application. However, the BIKE scheme based on QC-MDPC (Quasi Cyclic Medium Density Parity Check) codes still faces challenges such as the GJS attack and weak key attacks targeting the decoding failure rate (DFR). This paper analyzes the BGF decoding algorithm of the BIKE scheme, revealing two deep factors that lead to DFR, and proposes a weak key optimization attack method for the BGF decoding More >

  • Open Access

    ARTICLE

    Deep Learning-Based Lip-Reading for Vocal Impaired Patient Rehabilitation

    Chiara Innocente1,*, Matteo Boemio2, Gianmarco Lorenzetti2, Ilaria Pulito2, Diego Romagnoli2, Valeria Saponaro2, Giorgia Marullo1, Luca Ulrich1, Enrico Vezzetti1

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.2, pp. 1355-1379, 2025, DOI:10.32604/cmes.2025.063186 - 30 May 2025

    Abstract Lip-reading technology, based on visual speech decoding and automatic speech recognition, offers a promising solution to overcoming communication barriers, particularly for individuals with temporary or permanent speech impairments. However, most Visual Speech Recognition (VSR) research has primarily focused on the English language and general-purpose applications, limiting its practical applicability in medical and rehabilitative settings. This study introduces the first Deep Learning (DL) based lip-reading system for the Italian language designed to assist individuals with vocal cord pathologies in daily interactions, facilitating communication for patients recovering from vocal cord surgeries, whether temporarily or permanently impaired. To… More >

  • Open Access

    REVIEW

    Decoding CD24: Roles of chemoradiotherapy resistance and potential as therapeutic targets

    YU HONG1,#, YUNXIANG TANG1,#, WENYAN ZHOU1, HANYUE LUO2, LINLIN BU2, HUI QIU3,*, QIUJI WU3,*

    Oncology Research, Vol.33, No.6, pp. 1347-1361, 2025, DOI:10.32604/or.2025.059327 - 29 May 2025

    Abstract As a rising immune checkpoint on tumor cells, CD24 is closely related to tumorigenesis and progression. CD24 can directly regulate the malignant behavior of tumor cells and indirectly inhibit the function of immune cells in the meantime, which promotes the immune escape of tumor cells, induces cancer invasion and causes poor prognosis. The basic principle of cancer treatment is to induce cell death and inhibit cell survival. Resistance to chemoradiotherapy is a critical challenge in oncology, which limits the effectiveness of anti-cancer treatments. Many studies have shown a strong association between CD24 and chemoradiotherapy More >

  • Open Access

    ARTICLE

    Efficient OpenMP Based Z-curve Encoding and Decoding Algorithms

    Zicheng Zhou1, Shaowen Sun2, Teng Liang3, Mengjuan Li4,*, Fengling Xia5,*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1313-1327, 2025, DOI:10.32604/cmc.2024.056880 - 03 January 2025

    Abstract Z-curve’s encoding and decoding algorithms are primely important in many Z-curve-based applications. The bit interleaving algorithm is the current state-of-the-art algorithm for encoding and decoding Z-curve. Although simple, its efficiency is hindered by the step-by-step coordinate shifting and bitwise operations. To tackle this problem, we first propose the efficient encoding algorithm LTFe and the corresponding decoding algorithm LTFd, which adopt two optimization methods to boost the algorithm’s efficiency: 1) we design efficient lookup tables (LT) that convert encoding and decoding operations into table-lookup operations; 2) we design a bit detection mechanism that skips partial order More >

  • Open Access

    ARTICLE

    Infrared and Visible Image Fusion Based on Res2Net-Transformer Automatic Encoding and Decoding

    Chunming Wu1, Wukai Liu2,*, Xin Ma3

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1441-1461, 2024, DOI:10.32604/cmc.2024.048136 - 25 April 2024

    Abstract A novel image fusion network framework with an autonomous encoder and decoder is suggested to increase the visual impression of fused images by improving the quality of infrared and visible light picture fusion. The network comprises an encoder module, fusion layer, decoder module, and edge improvement module. The encoder module utilizes an enhanced Inception module for shallow feature extraction, then combines Res2Net and Transformer to achieve deep-level co-extraction of local and global features from the original picture. An edge enhancement module (EEM) is created to extract significant edge features. A modal maximum difference fusion strategy More >

  • Open Access

    ARTICLE

    A Video Captioning Method by Semantic Topic-Guided Generation

    Ou Ye, Xinli Wei, Zhenhua Yu*, Yan Fu, Ying Yang

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1071-1093, 2024, DOI:10.32604/cmc.2023.046418 - 30 January 2024

    Abstract In the video captioning methods based on an encoder-decoder, limited visual features are extracted by an encoder, and a natural sentence of the video content is generated using a decoder. However, this kind of method is dependent on a single video input source and few visual labels, and there is a problem with semantic alignment between video contents and generated natural sentences, which are not suitable for accurately comprehending and describing the video contents. To address this issue, this paper proposes a video captioning method by semantic topic-guided generation. First, a 3D convolutional neural network… More >

  • Open Access

    ARTICLE

    Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality

    Ali Arshad1,*, Muhammad Nadeem2, Saman Riaz1, Syeda Wajiha Zahra2, Ashit Kumar Dutta3, Zaid Alzaid4, Rana Alabdan5, Badr Almutairi6, Sultan Almotairi4,7

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3065-3089, 2023, DOI:10.32604/cmc.2023.035695 - 31 March 2023

    Abstract There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data, but these techniques and algorithms cannot be used to protect data from an attacker. Cloud cryptography is the best way to transmit data in a secure and reliable format. Various researchers have developed various mechanisms to transfer data securely, which can convert data from readable to unreadable, but these algorithms are not sufficient to provide complete data security. Each algorithm has some data security issues. If some effective data protection techniques are used, the attacker… More >

  • Open Access

    ARTICLE

    Quaternion Integers Based Higher Length Cyclic Codes and Their Decoding Algorithm

    Muhammad Sajjad1, Tariq Shah1,*, Mohammad Mazyad Hazzazi2, Adel R. Alharbi3, Iqtadar Hussain4

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1177-1194, 2022, DOI:10.32604/cmc.2022.025245 - 18 May 2022

    Abstract The decoding algorithm for the correction of errors of arbitrary Mannheim weight has discussed for Lattice constellations and codes from quadratic number fields. Following these lines, the decoding algorithms for the correction of errors of length cyclic codes over quaternion integers of Quaternion Mannheim weight one up to two coordinates have considered. In continuation, the case of cyclic codes of lengths and has studied to improve the error correction efficiency. In this study, we present the decoding of cyclic codes of length and length 2 (where is prime integer and is Euler phi function) over More >

  • Open Access

    ARTICLE

    Decoding of Factorial Experimental Design Models Implemented in Production Process

    Borislav Savkovic1, Pavel Kovac1, Branislav Dudic2,3,*, Michal Gregus2

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1661-1675, 2022, DOI:10.32604/cmc.2022.021642 - 03 November 2021

    Abstract The paper deals with factorial experimental design models decoding. For the ease of calculation of the experimental mathematical models, it is convenient first to code the independent variables. When selecting independent variables, it is necessary to take into account the range covered by each. A wide range of choices of different variables is presented in this paper. After calculating the regression model, its variables must be returned to their original values for the model to be easy recognized and represented. In the paper, the procedures of simple first order models, with interactions and with second… More >

Displaying 1-10 on page 1 of 13. Per Page