Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (212)
  • Open Access

    ARTICLE

    Generalized Model of Blood Flow in a Vertical Tube with Suspension of Gold Nanomaterials: Applications in the Cancer Therapy

    Anees Imtiaz1, Oi-Mean Foong2, Aamina Aamina1, Nabeel Khan1, Farhad Ali3, 4, *, Ilyas Khan5

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 171-192, 2020, DOI:10.32604/cmc.2020.011397

    Abstract Gold metallic nanoparticles are generally used within a lab as a tracer, to uncover on the presence of specific proteins or DNA in a sample, as well as for the recognition of various antibiotics. They are bio companionable and have properties to carry thermal energy to tumor cells by utilizing different clinical approaches. As the cancer cells are very smaller so for the infiltration, the properly sized nanoparticles have been injected in the blood. For this reason, gold nanoparticles are very effective. Keeping in mind the above applications, in the present work a generalized model of blood flow containing gold… More >

  • Open Access

    ARTICLE

    A Distributed Covert Channel of the Packet Ordering Enhancement Model Based on Data Compression

    Lejun Zhang1, Tianwen Huang1, Xiaoyan Hu1, Zhijie Zhang1, Weizheng Wang2, Donghai Guan3, *, Chunhui Zhao1, 4, Seokhoon Kim5

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 2013-2030, 2020, DOI:10.32604/cmc.2020.011219

    Abstract Covert channel of the packet ordering is a hot research topic. Encryption technology is not enough to protect the security of both sides of communication. Covert channel needs to hide the transmission data and protect content of communication. The traditional methods are usually to use proxy technology such as tor anonymous tracking technology to achieve hiding from the communicator. However, because the establishment of proxy communication needs to consume traffic, the communication capacity will be reduced, and in recent years, the tor technology often has vulnerabilities that led to the leakage of secret information. In this paper, the covert channel… More >

  • Open Access

    ARTICLE

    Combined molecular docking, homology modeling and DFT method for the modification of bovine serum albumin (BSA) to improve fluorescence spectroscopy for phthalate acid esters chelated with BSA

    MINGHAO LI1, YOULI QIU2, WENHUI ZHANG1, RUIHAO SUN1, MEIJIN DU1, LUZE YANG3, YU LI1,*

    BIOCELL, Vol.44, No.2, pp. 247-255, 2020, DOI:10.32604/biocell.2020.08835

    Abstract While phthalate acid esters (PAEs) cannot fluoresce alone, they can be detected by fluorescence spectroscopy after chelation with bovine serum albumin (BSA). In this study, the types of amino acid residues at the active site of PAEs chelated with BSA were determined using molecular docking technology. A modification scheme of BSA with higher detection sensitivity fluorescence spectroscopy for PAEs was proposed based on the docking results and constructed for a novel BSA structure with a higher detection sensitivity of fluorescence spectroscopy using a homologous modeling method. Density functional theory (DFT) was employed to explore the influence before and after BSA… More >

  • Open Access

    ARTICLE

    Late gadolinium enhancement and adverse outcomes in a contemporary cohort of adult survivors of tetralogy of Fallot

    Richard J. Dobson1, Ify Mordi2, Mark H. Danton1, Niki L. Walker1, Hamish A. Walker1, Nikolaos Tzemos2

    Congenital Heart Disease, Vol.12, No.1, pp. 58-66, 2017

    Abstract Objective: Myocardial fibrosis has been associated with poorer outcomes in tetralogy of Fallot, however only a handful of studies have assessed its significance in the current era. Our aim was to quantify the amount of late gadolinium enhancement in both the LV and RV in a contemporary cohort of adults with surgically repaired tetralogy of Fallot, and assess the relationship with adverse clinical outcomes.
    Design: Single centre cohort study
    Setting: National tertiary referral center
    Patients: One hundred fourteen patients with surgically repaired tetralogy of Fallot with median age 29.5 years (range 17.5-64.2). Prospective follow-up for mean 2.4 years (SD 1.29).
    More >

  • Open Access

    ARTICLE

    Experimental Study on Flow and Heat Transfer Characteristics of Nanofluids in a Triangular Tube at Different Rotation Angles

    Cong Qi1,2,*, Chengchao Wang1,2, Jinghua Tang1,2, Dongtai Han2

    Energy Engineering, Vol.117, No.2, pp. 63-78, 2020, DOI:10.32604/EE.2020.010433

    Abstract Because of the poor thermal performance of ordinary tubes, a triangular tube was used to replace the smooth channel in the heat transfer system, and nanofluids were used to take the place of ordinary fluids as the heat transfer medium. High stability nanofluids were prepared, and an experimental set on flow and heat exchange was established. Effects of triangular tube rotation angles (α = 0°, 30°, 60°) as well as mass fractions of nanofluids (ω = 0.1%, 0.3%, 0.5%) on heat exchange and flow performance were experimentally considered at Reynolds numbers (Re = 800–8000). It was shown that the triangular… More >

  • Open Access

    ARTICLE

    Self-Certificating Root: A Root Zone Security Enhancement Mechanism for DNS

    Wenfeng Liu1, *, Yu Zhang1, Wenjia Zhang1, Lu Liu1, Hongli Zhang1, Binxing Fang1

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 521-536, 2020, DOI:10.32604/cmc.2020.07982

    Abstract As a critical Internet infrastructure, domain name system (DNS) protects the authenticity and integrity of domain resource records with the introduction of security extensions (DNSSEC). DNSSEC builds a single-center and hierarchical resource authentication architecture, which brings management convenience but places the DNS at risk from a single point of failure. When the root key suffers a leak or misconfiguration, top level domain (TLD) authority cannot independently protect the authenticity of TLD data in the root zone. In this paper, we propose self-certificating root, a lightweight security enhancement mechanism of root zone compatible with DNS/DNSSEC protocol. By adding the TLD public… More >

  • Open Access

    ARTICLE

    Thyme oil and thymol abrogate doxorubicin-induced nephrotoxicity and cardiotoxicity in Wistar rats via repression of oxidative stress and enhancement of antioxidant defense mechanisms

    Osama M. AHMED1,*, Sanaa R. GALALY2, Mai RASLAN3, Mennah-Allah M. A. MOSTAFA1,*

    BIOCELL, Vol.44, No.1, pp. 41-53, 2020, DOI:10.32604/biocell.2020.08157

    Abstract This study aimed to assess the preventive effects of thyme oil and thymol on doxorubicin (DOX)-induced renotoxicity, cardiotoxicity, and oxidative stress in Wistar rats. Thyme oil was subjected to GC-MS analysis, which indicated that thymol was the major constituent representing 33.896%. Rats intraperitoneally injected with DOX at a dose of 2 mg/kg b.w./one per week for 7 weeks were co-treated with thyme oil and its major constituent, thymol, at doses 250 and 100 mg/kg b.w./every other day, respectively, by oral gavage for the same period. Thyme oil and thymol markedly ameliorated the raised levels of serum urea, uric acid, and… More >

  • Open Access

    ARTICLE

    A Hybrid Encryption Algorithm for Security Enhancement of Wireless Sensor Networks: A Supervisory Approach to Pipelines

    Omid Mahdi Ebadati E.1, *, Farshad Eshghi2, Amin Zamani1

    CMES-Computer Modeling in Engineering & Sciences, Vol.122, No.1, pp. 323-349, 2020, DOI:10.32604/cmes.2020.08079

    Abstract Transmission pipelines are vulnerable to various accidents and acts of vandalism. Therefore, a reliable monitoring system is needed to secure the transmission pipelines. A wireless sensor network is a wireless network consisting of distributed devices distributed at various distances, which monitors the physical and environmental conditions using sensors. Wireless sensor networks have many uses, including the built-in sensor on the outside of the pipeline or installed to support bridge structures, robotics, healthcare, environmental monitoring, etc. Wireless Sensor networks could be used to monitor the temperature, pressure, leak detection and sabotage of transmission lines. Wireless sensor networks are vulnerable to various… More >

  • Open Access

    ARTICLE

    A General Framework of Reversible Data Hiding with Controlled Contrast Enhancement

    Shaowei Weng1, 2, *, Yiyun Liu1, Yunqing Shi3, Bo Ou4, Chunyu Zhang5, Cuiping Wang6

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 157-177, 2020, DOI:10.32604/cmc.2020.05681

    Abstract This paper proposes a two-step general framework for reversible data hiding (RDH) schemes with controllable contrast enhancement. The first step aims at preserving visual perception as much as possible on the basis of achieving high embedding capacity (EC), while the second step is used for increasing image contrast. In the second step, some peak-pairs are utilized so that the histogram of pixel values is modified to perform histogram equalization (HE), which would lead to the image contrast enhancement. However, for HE, the utilization of some peak-pairs easily leads to over-enhanced image contrast when a large number of bits are embedded.… More >

  • Open Access

    ARTICLE

    Applications of DTALE: Damage Tolerance Analysis and Life Enhancement [3-D Non-plannar Fatigue Crack Growth]

    S. N. Atluri1

    Structural Durability & Health Monitoring, Vol.1, No.1, pp. 1-20, 2005, DOI:10.3970/sdhm.2005.001.001

    Abstract The solution of three-dimensional cracks (arbitrary surfaces of discontinuity) in solids and structures is considered. The BEM, developed based on the symmetric Galerkin BIEs, is used for obtaining the fracture solutions at the arbitrary crack-front. The finite element method is used to model the uncracked global (built-up) structure for obtaining the stresses in an otherwise uncracked body. The solution for the cracked structural component is obtained in an iteration procedure, which alternates between FEM solution for the uncracked body, and the SGBEM solution for the crack in the local finite-sized subdomain. In addition, some crack growth models are used to… More >

Displaying 191-200 on page 20 of 212. Per Page