Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (187)
  • Open Access

    ARTICLE

    GC-MS Profiling, In Vitro and In Silico Antibacterial and Antioxidant Potential of Origanum elongatum Essential Oil: Novel Source against Phytopathogenic Bacteria

    Amine Batbat1,2, Mohamed El Fadili3, Naoufal El Hachlafi4,*, Amine Elbouzidi5,*, Chaymae Hmimen6, Hiba Yahyaoui2,7, Samir Jeddi6, Abdellatif Benbouazza2, Kawtar Fikri-Benbrahim6, Mohamed Addi5, Samiah Hamad Al-Mijalli8, Khaoula Habbadi2, Hassane Greche1

    Phyton-International Journal of Experimental Botany, Vol.94, No.2, pp. 481-501, 2025, DOI:10.32604/phyton.2025.059841 - 06 March 2025

    Abstract This study highlights the regulatory potential antibacterial and antiradical of Origanum elongatum essential oil (EO), an endemic medicinal plant of Morocco used for its various properties. The chemical composition of the EO was characterized using gas chromatography-mass spectrometry (GC-MS). The antibacterial activity against different agricultural phytopathogens was determined by disc diffusion and microatmosphere methods, as well as by the determination of minimum inhibitory concentrations (MIC) and minimum bactericidal concentration (MBC), while the antioxidant activity was evaluated by DPPH and FRAP assays. To complement the experimental analyses, a molecular docking approach was used to predict and elucidate… More >

  • Open Access

    ARTICLE

    Prioritizing Network-On-Chip Routers for Countermeasure Techniques against Flooding Denial-of-Service Attacks: A Fuzzy Multi-Criteria Decision-Making Approach

    Ahmed Abbas Jasim Al-Hchaimi1, Yousif Raad Muhsen2,3,*, Wisam Hazim Gwad4, Entisar Soliman Alkayal5, Riyadh Rahef Nuiaa Al Ogaili6, Zaid Abdi Alkareem Alyasseri7,8, Alhamzah Alnoor9

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 2661-2689, 2025, DOI:10.32604/cmes.2025.061318 - 03 March 2025

    Abstract The implementation of Countermeasure Techniques (CTs) in the context of Network-On-Chip (NoC) based Multiprocessor System-On-Chip (MPSoC) routers against the Flooding Denial-of-Service Attack (F-DoSA) falls under Multi-Criteria Decision-Making (MCDM) due to the three main concerns, called: traffic variations, multiple evaluation criteria-based traffic features, and prioritization NoC routers as an alternative. In this study, we propose a comprehensive evaluation of various NoC traffic features to identify the most efficient routers under the F-DoSA scenarios. Consequently, an MCDM approach is essential to address these emerging challenges. While the recent MCDM approach has some issues, such as uncertainty, this… More >

  • Open Access

    ARTICLE

    Exploratory Research on Defense against Natural Adversarial Examples in Image Classification

    Yaoxuan Zhu, Hua Yang, Bin Zhu*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 1947-1968, 2025, DOI:10.32604/cmc.2024.057866 - 17 February 2025

    Abstract The emergence of adversarial examples has revealed the inadequacies in the robustness of image classification models based on Convolutional Neural Networks (CNNs). Particularly in recent years, the discovery of natural adversarial examples has posed significant challenges, as traditional defense methods against adversarial attacks have proven to be largely ineffective against these natural adversarial examples. This paper explores defenses against these natural adversarial examples from three perspectives: adversarial examples, model architecture, and dataset. First, it employs Class Activation Mapping (CAM) to visualize how models classify natural adversarial examples, identifying several typical attack patterns. Next, various common… More >

  • Open Access

    ARTICLE

    PIAFGNN: Property Inference Attacks against Federated Graph Neural Networks

    Jiewen Liu1, Bing Chen1,2,*, Baolu Xue1, Mengya Guo1, Yuntao Xu1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 1857-1877, 2025, DOI:10.32604/cmc.2024.057814 - 17 February 2025

    Abstract Federated Graph Neural Networks (FedGNNs) have achieved significant success in representation learning for graph data, enabling collaborative training among multiple parties without sharing their raw graph data and solving the data isolation problem faced by centralized GNNs in data-sensitive scenarios. Despite the plethora of prior work on inference attacks against centralized GNNs, the vulnerability of FedGNNs to inference attacks has not yet been widely explored. It is still unclear whether the privacy leakage risks of centralized GNNs will also be introduced in FedGNNs. To bridge this gap, we present PIAFGNN, the first property inference attack… More >

  • Open Access

    ARTICLE

    Hybrid DF and SIR Forwarding Strategy in Conventional and Distributed Alamouti Space-Time Coded Cooperative Networks

    Slim Chaoui1,*, Omar Alruwaili1, Faeiz Alserhani1, Haifa Harrouch2

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.2, pp. 1933-1954, 2025, DOI:10.32604/cmes.2025.059346 - 27 January 2025

    Abstract In this paper, we propose a hybrid decode-and-forward and soft information relaying (HDFSIR) strategy to mitigate error propagation in coded cooperative communications. In the HDFSIR approach, the relay operates in decode-and-forward (DF) mode when it successfully decodes the received message; otherwise, it switches to soft information relaying (SIR) mode. The benefits of the DF and SIR forwarding strategies are combined to achieve better performance than deploying the DF or SIR strategy alone. Closed-form expressions for the outage probability and symbol error rate (SER) are derived for coded cooperative communication with HDFSIR and energy-harvesting relays. Additionally,… More >

  • Open Access

    ARTICLE

    Protective Effects of Probiotics against Methotrexate-Induced Intestinal Toxicity in the Mice Model

    KSENIA S. STAFEEVA1, NATALIA A. SAMOYLOVA1, OLGA A. KARANDEEVA1, VERONIKA V. NESTEROVA1, KIRILL A. STARODUBTSEV1, EVGENY V. MIKHAILOV2, ILYA O. KRUTOV2, EVGENY S. POPOV3, NATALIA S. RODIONOVA4, ANASTASIA V. KOKINA1,5, ARTEM P. GUREEV1,5,*

    BIOCELL, Vol.49, No.1, pp. 7-20, 2025, DOI:10.32604/biocell.2024.058339 - 24 January 2025

    Abstract Objective: The objective of this study was to determine the level of methotrexate (MTX) toxicity in the intestines of mice and to evaluate the protective effect of probiotics composed of Streptococcus, Bifidobacterium, and Lactobacillus species on intestinal cells during MTX treatment. Methods: Mice were divided into three groups: control, MTX group (received MTX injections), and MTX + probiotics group (received MTX injections along with a diet containing probiotics). Morphological and histological changes, the level of mitochondrial DNA (mtDNA) damage, the level of lipid peroxidation products, and gene expression in the mice’s small intestine were assessed. Results: We… More > Graphic Abstract

    Protective Effects of Probiotics against Methotrexate-Induced Intestinal Toxicity in the Mice Model

  • Open Access

    ARTICLE

    Anomaly Detection of Controllable Electric Vehicles through Node Equation against Aggregation Attack

    Jing Guo*, Ziying Wang, Yajuan Guo, Haitao Jiang

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 427-442, 2025, DOI:10.32604/cmc.2024.057045 - 03 January 2025

    Abstract The rapid proliferation of electric vehicle (EV) charging infrastructure introduces critical cybersecurity vulnerabilities to power grids system. This study presents an innovative anomaly detection framework for EV charging stations, addressing the unique challenges posed by third-party aggregation platforms. Our approach integrates node equations-based on the parameter identification with a novel deep learning model, xDeepCIN, to detect abnormal data reporting indicative of aggregation attacks. We employ a graph-theoretic approach to model EV charging networks and utilize Markov Chain Monte Carlo techniques for accurate parameter estimation. The xDeepCIN model, incorporating a Compressed Interaction Network, has the ability… More >

  • Open Access

    ARTICLE

    SBL-JP-0004: A promising dual inhibitor of JAK2 and PI3KCD against gastric cancer

    HASSAN M. OTIFI*

    Oncology Research, Vol.33, No.1, pp. 235-243, 2025, DOI:10.32604/or.2024.055677 - 20 December 2024

    Abstract Background: Gastric cancer (GC) remains a global health burden and is often characterized by heterogeneous molecular profiles and resistance to conventional therapies. The phosphoinositide 3-kinase and PI3K and Janus kinase (JAK) signal transducer and activator of transcription (JAK-STAT) pathways play pivotal roles in GC progression, making them attractive targets for therapeutic interventions. Methods: This study applied a computational and molecular dynamics simulation approach to identify and characterize SBL-JP-0004 as a potential dual inhibitor of JAK2 and PI3KCD kinases. KATOIII and SNU-5 GC cells were used for in vitro evaluation. Results: SBL-JP-0004 exhibited a robust binding affinity for… More >

  • Open Access

    CORRECTION

    CORRECTION: Ameliorative effects of melatonin and zinc oxide nanoparticles treatment against adverse effects of busulfan induced infertility in male albino mice

    AMOURA M. ABOU-EL-NAGA1, SHAKER A. MOUSA2, FAYEZ ALTHOBAITI3, EMAN FAYAD3,*, ENGY S. FAHIM1

    BIOCELL, Vol.48, No.12, pp. 1835-1837, 2024, DOI:10.32604/biocell.2024.054569 - 30 December 2024

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    ML-SPAs: Fortifying Healthcare Cybersecurity Leveraging Varied Machine Learning Approaches against Spear Phishing Attacks

    Saad Awadh Alanazi*

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4049-4080, 2024, DOI:10.32604/cmc.2024.057211 - 19 December 2024

    Abstract Spear Phishing Attacks (SPAs) pose a significant threat to the healthcare sector, resulting in data breaches, financial losses, and compromised patient confidentiality. Traditional defenses, such as firewalls and antivirus software, often fail to counter these sophisticated attacks, which target human vulnerabilities. To strengthen defenses, healthcare organizations are increasingly adopting Machine Learning (ML) techniques. ML-based SPA defenses use advanced algorithms to analyze various features, including email content, sender behavior, and attachments, to detect potential threats. This capability enables proactive security measures that address risks in real-time. The interpretability of ML models fosters trust and allows security… More >

Displaying 1-10 on page 1 of 187. Per Page