Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (226)
  • Open Access

    RETRACTION

    Retraction notice to “Long Noncoding RNA LINC01133 Functions as an miR-422a Sponge to Aggravate the Tumorigenesis of Human Osteosarcoma” [Oncology Research 26(3) (2018) 335–343]

    Hai-Feng Zeng*, Hai-Yan Qiu, Fa-Bo Feng*

    Oncology Research, Vol.29, No.1, pp. 75-75, 2021, DOI:10.3727/096504022X16420719767471

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Distributed Timestamp Mechanism Based on Verifiable Delay Functions

    Qiang Wu1, Zhaoyang Han2, Ghulam Mohiuddin3, Yongjun Ren1,*

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1633-1646, 2023, DOI:10.32604/csse.2023.030646

    Abstract In the data communication system, the real-time information interaction of communication device increases the risk of privacy sensitive data being tampered with. Therefore, maintaining data security is one of the most important issues in network data communication. Because the timestamp is the most important way to authenticate data in information interaction, it is very necessary to provide timestamp service in the data communication system. However, the existing centralized timestamp mechanism is difficult to provide credible timestamp service, and users can conspire with timestamping servers to forge timestamps. Therefore, this paper designs a distributed timestamp mechanism based on continuous verifiable delay… More >

  • Open Access

    ARTICLE

    Performance Evaluation of Electromagnetic Shield Constructed from Open-Cell Metal Foam Based on Sphere Functions

    Yuya Hanaoka1,*, Taku Itoh2, Kohei Tateyama3, Susumu Nakata4, Keiko Watanabe3

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 43-53, 2022, DOI:10.32604/cmes.2022.016831

    Abstract This study evaluates the performance of a model of open-cell metal foams generated by sphere functions. To this end, an electromagnetic shield constructed from the model was inserted between two horn antennas in an electromagnetic wave propagation simulation. The foam-hole diameter in the electromagnetic shield model was varied as d = 2.5 and 5.0 mm, and the frequency of the electromagnetic waves was varied from 3 to 13 GHz. In the numerical experiments of shield effectiveness, the shields with foam holes of both diameters attenuated the electromagnetic waves across the studied frequency range. The shield effectiveness was enhanced at low… More >

  • Open Access

    ARTICLE

    Asymptotic Approximations of Apostol-Tangent Polynomials in Terms of Hyperbolic Functions

    Cristina B. Corcino1,2, Wilson D. Castañeda Jr.3, Roberto B. Corcino1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 133-151, 2022, DOI:10.32604/cmes.2022.019965

    Abstract The tangent polynomials Tn (z) are generalization of tangent numbers or the Euler zigzag numbers Tn. In particular, Tn (0) = Tn. These polynomials are closely related to Bernoulli, Euler and Genocchi polynomials. One of the extensions and analogues of special polynomials that attract the attention of several mathematicians is the Apostoltype polynomials. One of these Apostol-type polynomials is the Apostol-tangent polynomials Tn(z, λ). When λ = 1, Tn (z, 1) = Tn(z). The use of hyperbolic functions to derive asymptotic approximations of polynomials together with saddle point method was applied to the Bernoulli and Euler polynomials by Lopez and… More >

  • Open Access

    REVIEW

    Papaya Ring Spot Virus: An Understanding of a Severe Positive-Sense Single Stranded RNA Viral Disease and Its Management

    Muhammad Umer1, Mustansar Mubeen2, Yasir Iftikhar2,*, Haider Ali3, Muhammad Zafar-ul-Hye4, Rafia Asghar5, Mazhar Abbas6, Malik Abdul Rehman7, Ernesto A. Moya-Elizondo8, Yuejun He1,*

    Phyton-International Journal of Experimental Botany, Vol.91, No.10, pp. 2099-2110, 2022, DOI:10.32604/phyton.2022.022013

    Abstract Viral diseases have been studied in-depth for reducing quality, yield, health and longevity of the fruit, to highlight the economic losses. Positive-sense single-stranded RNA viruses are more devastating among all viruses that infect fruit trees. One of the best examples is papaya ringspot virus (PRSV). It belongs to the genus Potyvirus and it is limited to cause diseases on the family Chenopodiaceae, Cucurbitaceae and Caricaceae. This virus has a serious threat to the production of papaya, which is famous for its high nutritional and pharmaceutical values. The plant parts such as leaves, latex, seeds, fruits, bark, peel and roots may… More >

  • Open Access

    ARTICLE

    Energy Price Forecasting Through Novel Fuzzy Type-1 Membership Functions

    Muhammad Hamza Azam1, Mohd Hilmi Hasan1,*, Azlinda A Malik2, Saima Hassan3, Said Jadid Abdulkadir1

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1799-1815, 2022, DOI:10.32604/cmc.2022.028292

    Abstract Electricity price forecasting is a subset of energy and power forecasting that focuses on projecting commercial electricity market present and future prices. Electricity price forecasting have been a critical input to energy corporations’ strategic decision-making systems over the last 15 years. Many strategies have been utilized for price forecasting in the past, however Artificial Intelligence Techniques (Fuzzy Logic and ANN) have proven to be more efficient than traditional techniques (Regression and Time Series). Fuzzy logic is an approach that uses membership functions (MF) and fuzzy inference model to forecast future electricity prices. Fuzzy c-means (FCM) is one of the popular… More >

  • Open Access

    ARTICLE

    A Meshless Method for Retrieving Nonlinear Large External Forces on Euler-Bernoulli Beams

    Chih-Wen Chang*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 433-451, 2022, DOI:10.32604/cmc.2022.027021

    Abstract We retrieve unknown nonlinear large space-time dependent forces burdened with the vibrating nonlinear Euler-Bernoulli beams under varied boundary data, comprising two-end fixed, cantilevered, clamped-hinged, and simply supported conditions in this study. Even though some researchers used several schemes to overcome these forward problems of Euler-Bernoulli beams; however, an effective numerical algorithm to solve these inverse problems is still not available. We cope with the homogeneous boundary conditions, initial data, and final time datum for each type of nonlinear beam by employing a variety of boundary shape functions. The unknown nonlinear large external force can be recuperated via back-substitution of the… More >

  • Open Access

    ARTICLE

    Transcriptome analysis combined with metabolome analysis reveals the significant functions of CesA genes in cotton (Gossypium hirsutum) fiber length development

    ZHENKUI CUI1,#,*, GUIQIN SUN2,#,*, QUANZHI ZHAO1

    BIOCELL, Vol.46, No.9, pp. 2133-2144, 2022, DOI:10.32604/biocell.2022.020512

    Abstract Cotton is widely distributed worldwide, and improving the quality of its fiber is one of the most important tasks in cotton breeding. Cotton fibers are primarily composed of cellulose, which is synthesized by CesA complexes (CSCs). However, the functions of CesA genes in cotton fiber development have not been comprehensively analysed. In this study, the cotton transcriptome and metabolome were used to investigate the function of CesA genes in fiber development. Finally, 321 metabolites were obtained, 84 of which were associated with the corresponding genes. Interestingly, a target gene named Gh_A08G144300, one of the CesA gene family members, was closely… More >

  • Open Access

    ARTICLE

    Lightweight Authentication Protocol Based on Physical Unclonable Function

    Hanguang Luo1, Tao Zou1,*, Chunming Wu2, Dan Li3, Shunbin Li1, Chu Chu4

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5031-5040, 2022, DOI:10.32604/cmc.2022.027118

    Abstract In the emerging Industrial Internet of Things (IIoT), authentication problems have become an urgent issue for massive resource-constrained devices because traditional costly security mechanisms are not suitable for them. The security protocol designed for resource-constrained systems should not only be secure but also efficient in terms of usage of energy, storage, and processing. Although recently many lightweight schemes have been proposed, to the best of our knowledge, they are unable to address the problem of privacy preservation with the resistance of Denial of Service (DoS) attacks in a practical way. In this paper, we propose a lightweight authentication protocol based… More >

  • Open Access

    ARTICLE

    Properties of Certain Subclasses of Analytic Functions Involving q-Poisson Distribution

    Bilal Khan1,*, Zhi-Guo Liu1, Nazar Khan2, Aftab Hussain3, Nasir Khan4, Muhammad Tahir2

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.3, pp. 1465-1477, 2022, DOI:10.32604/cmes.2022.016940

    Abstract By using the basic (or q)-Calculus many subclasses of analytic and univalent functions have been generalized and studied from different viewpoints and perspectives. In this paper, we aim to define certain new subclasses of an analytic function. We then give necessary and sufficient conditions for each of the defined function classes. We also study necessary and sufficient conditions for a function whose coefficients are probabilities of q-Poisson distribution. To validate our results, some known consequences are also given in the form of Remarks and Corollaries. More >

Displaying 31-40 on page 4 of 226. Per Page