Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (888)
  • Open Access

    ARTICLE

    Antitumor effects of a novel photosensitizer-mediated photodynamic therapy and its influence on the cell transcriptome

    JINGJING CHEN1, DAN WANG2, ZEQUN WANG2, MENGYUAN HAN4, HOUQING YIN2, WENTING ZHOU4, RIBAI YAN5, YAN PAN2,3,*

    Oncology Research, Vol.32, No.5, pp. 911-923, 2024, DOI:10.32604/or.2023.042384

    Abstract Photodynamic therapy (PDT) is a promising cancer treatment. This study investigated the antitumor effects and mechanisms of a novel photosensitizer meso-5-[ρ-diethylene triamine pentaacetic acid-aminophenyl]−10,15,20-triphenyl-porphyrin (DTP) mediated PDT (DTP-PDT). Cell viability, reactive oxygen species (ROS), and apoptosis were measured with a Cell Counting Kit-8 assay, DCFH-DA fluorescent probe, and Hoechst staining, respectively. Cell apoptosis- and autophagy-related proteins were examined using western blotting. RNA sequencing was used to screen differentially expressed mRNAs (DERs), and bioinformatic analysis was performed to identify the major biological events after DTP-PDT. Our results show that DTP-PDT inhibited cell growth and induced ROS generation in MCF-7 and SGC7901… More > Graphic Abstract

    Antitumor effects of a novel photosensitizer-mediated photodynamic therapy and its influence on the cell transcriptome

  • Open Access

    ARTICLE

    A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information

    Hao Jiang1, Yuerong Liao1, Dongdong Zhao2, Wenjian Luo3, Xingyi Zhang1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 1045-1075, 2024, DOI:10.32604/cmes.2024.048653

    Abstract Due to the presence of a large amount of personal sensitive information in social networks, privacy preservation issues in social networks have attracted the attention of many scholars. Inspired by the self-nonself discrimination paradigm in the biological immune system, the negative representation of information indicates features such as simplicity and efficiency, which is very suitable for preserving social network privacy. Therefore, we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks, called AttNetNRI. Specifically, a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the… More >

  • Open Access

    ARTICLE

    Enhancing Ulcerative Colitis Diagnosis: A Multi-Level Classification Approach with Deep Learning

    Hasan J. Alyamani*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 1129-1142, 2024, DOI:10.32604/cmes.2024.047756

    Abstract The evaluation of disease severity through endoscopy is pivotal in managing patients with ulcerative colitis, a condition with significant clinical implications. However, endoscopic assessment is susceptible to inherent variations, both within and between observers, compromising the reliability of individual evaluations. This study addresses this challenge by harnessing deep learning to develop a robust model capable of discerning discrete levels of endoscopic disease severity. To initiate this endeavor, a multi-faceted approach is embarked upon. The dataset is meticulously preprocessed, enhancing the quality and discriminative features of the images through contrast limited adaptive histogram equalization (CLAHE). A diverse array of data augmentation… More > Graphic Abstract

    Enhancing Ulcerative Colitis Diagnosis: A Multi-Level Classification Approach with Deep Learning

  • Open Access

    ARTICLE

    Vers une transformation géométrique géocentrique des espaces urbains : la ville vue à partir du ou des centre(s)

    Cyril Enault*

    Revue Internationale de Géomatique, Vol.33, pp. 77-92, 2024, DOI:10.32604/rig.2024.046591

    Abstract La théorie égocentrée est aujourd’hui bien connue des éthologues et des psychologues mais moins diffusée chez les géographes car elle reste encore à l’état de théorie abstraite. Ce papier se propose dans un premier temps de rendre opérationnel cette approche dans le cadre de travaux géographiques à l’échelle de l’individu. Puis, elle envisage d’établir le lien entre l’échelle individu et l’échelle de la ville avec comme objectif de produire des cartes déformées de la ville. More > Graphic Abstract

    Vers une transformation géométrique géocentrique des espaces urbains : la ville vue à partir du ou des centre(s)

  • Open Access

    ARTICLE

    miR-30a-5p/PHTF2 axis regulates the tumorigenesis and metastasis of lung adenocarcinoma

    LIJUAN ZHANG1,#, QINGYIN MENG2,#, LI ZHUANG1, QUAN GONG1, XIANDA HUANG3, XUEQIN LI1, SHIJUAN LI1, GUOQIN WANG4, XICAI WANG5,*

    BIOCELL, Vol.48, No.4, pp. 581-590, 2024, DOI:10.32604/biocell.2024.047260

    Abstract Background: Lung adenocarcinoma is a very pervasive histological form of lung cancers, and inhibiting metastasis is crucial for effective treatment. In this investigation, we explored the functional interaction of miR-30a-5p and the putative transcription factor 2 of the homeodomain (PHTF2) in dictating the aggressiveness and metastasis of lung adenocarcinoma. Method: We collected clinical samples to evaluate the expression patterns of miR-30a-5p and PHTF2 in lung adenocarcinoma along with normal tissues. Cellular experiments including cell count kit (CCK)-8 growth assay, apoptosis analysis, migration and invasion examinations were performed to assess the aggressiveness of lung adenocarcinoma cells. Furthermore, we examined tumorigenesis and… More > Graphic Abstract

    miR-30a-5p/PHTF2 axis regulates the tumorigenesis and metastasis of lung adenocarcinoma

  • Open Access

    ARTICLE

    Machine learning and bioinformatics to identify biomarkers in response to Burkholderia pseudomallei infection in mice

    YAO FANG1,2,#, FEI XIA1,#, FEIFEI TIAN3, LEI QU1, FANG YANG1, JUAN FANG1,2, ZHENHONG HU1,*, HAICHAO LIU1,*

    BIOCELL, Vol.48, No.4, pp. 613-621, 2024, DOI:10.32604/biocell.2024.031539

    Abstract Objective: In the realm of Class I pathogens, Burkholderia pseudomallei (BP) stands out for its propensity to induce severe pathogenicity. Investigating the intricate interactions between BP and host cells is imperative for comprehending the dynamics of BP infection and discerning biomarkers indicative of the host cell response process. Methods: mRNA extraction from BP-infected mouse macrophages constituted the initial step of our study. Employing gene expression arrays, the extracted RNA underwent conversion into digital signals. The percentile shift method facilitated data processing, with the identification of genes manifesting significant differences accomplished through the application of the t-test. Subsequently, a comprehensive analysis… More >

  • Open Access

    ARTICLE

    Formation of Water Quality of Surface Water Bodies Used in the Material Processing

    Tatyana Lyubimova1,*, Anatoly Lepikhin2, Yanina Parshakova1, Irina Zayakina3, Alibek Issakhov4

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.4, pp. 815-828, 2024, DOI:10.32604/fdmp.2024.048463

    Abstract In the process of production or processing of materials by various methods, there is a need for a large volume of water of the required quality. Today in many regions of the world, there is an acute problem of providing industry with water of a required quality. Its solution is an urgent and difficult task. The water quality of surface water bodies is formed by a combination of a large number of both natural and anthropogenic factors, and is often significantly heterogeneous not only in the water area, but also in depth. As a rule, the water supply of large… More >

  • Open Access

    ARTICLE

    Computation Tree Logic Model Checking of Multi-Agent Systems Based on Fuzzy Epistemic Interpreted Systems

    Xia Li1, Zhanyou Ma1,*, Zhibao Mian2, Ziyuan Liu1, Ruiqi Huang1, Nana He1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4129-4152, 2024, DOI:10.32604/cmc.2024.047168

    Abstract Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications. Although there is an extensive literature on qualitative properties such as safety and liveness, there is still a lack of quantitative and uncertain property verifications for these systems. In uncertain environments, agents must make judicious decisions based on subjective epistemic. To verify epistemic and measurable properties in multi-agent systems, this paper extends fuzzy computation tree logic by introducing epistemic modalities and proposing a new Fuzzy Computation Tree Logic of Knowledge (FCTLK). We represent fuzzy multi-agent systems as distributed knowledge bases with fuzzy… More >

  • Open Access

    REVIEW

    A Review on the Recent Trends of Image Steganography for VANET Applications

    Arshiya S. Ansari*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 2865-2892, 2024, DOI:10.32604/cmc.2024.045908

    Abstract Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look. Whereas vehicular ad hoc networks (VANETs), which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services, as they are an essential component of modern smart transportation systems. VANETs steganography has been suggested by many authors for secure, reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection. This paper aims to determine whether using steganography is possible to improve data security… More >

  • Open Access

    ARTICLE

    Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust

    Xiaoyan Zhu1, Ruchun Jia2, Tingrui Zhang3, Song Yao4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4363-4377, 2024, DOI:10.32604/cmc.2023.045615

    Abstract The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect, which is easy to leads to the problem that the data is usurped. Starting from the application of the ATC (automatic train control) network, this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data. Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation, this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the… More >

Displaying 1-10 on page 1 of 888. Per Page