Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (194)
  • Open Access

    REVIEW

    Molecular and cellular mechanisms of neuroprotection by oligopeptides from snake venoms

    CARLOS ALBERTO-SILVA*, BRENDA RUFINO DA SILVA

    BIOCELL, Vol.48, No.6, pp. 897-904, 2024, DOI:10.32604/biocell.2024.050443 - 10 June 2024

    Abstract Venom snake-derived peptides have multiple biochemical, pharmacological, and toxicological profiles, allowing for the discovery of new medicinal products and therapeutic applications. This review specifically examines the fundamental elements of neuroprotection offered by different oligopeptides derived from snake venom. It also includes a brief evaluation of short peptides that are being considered as potential therapeutic agents. Proline-rich peptides and tryptophyllin family peptides isolated from the crude venom of Viperidae family snakes, specifically Bothrops atrox, Bothrops jararaca, and Bothrops moojeni, have been shown to have pro-survival properties, the ability to reduce oxidative stress, and the ability to promote cell viability More >

  • Open Access

    ARTICLE

    Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies

    Muhammad Ahmad Nawaz Ul Ghani1, Kun She1,*, Muhammad Arslan Rauf1, Shumaila Khan2, Javed Ali Khan3, Eman Abdullah Aldakheel4, Doaa Sami Khafaga4

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2609-2623, 2024, DOI:10.32604/cmc.2024.049611 - 15 May 2024

    Abstract The use of privacy-enhanced facial recognition has increased in response to growing concerns about data security and privacy in the digital age. This trend is spurred by rising demand for face recognition technology in a variety of industries, including access control, law enforcement, surveillance, and internet communication. However, the growing usage of face recognition technology has created serious concerns about data monitoring and user privacy preferences, especially in context-aware systems. In response to these problems, this study provides a novel framework that integrates sophisticated approaches such as Generative Adversarial Networks (GANs), Blockchain, and distributed computing… More >

  • Open Access

    ARTICLE

    VKFQ: A Verifiable Keyword Frequency Query Framework with Local Differential Privacy in Blockchain

    Youlin Ji, Bo Yin*, Ke Gu

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4205-4223, 2024, DOI:10.32604/cmc.2024.049086 - 26 March 2024

    Abstract With its untameable and traceable properties, blockchain technology has been widely used in the field of data sharing. How to preserve individual privacy while enabling efficient data queries is one of the primary issues with secure data sharing. In this paper, we study verifiable keyword frequency (KF) queries with local differential privacy in blockchain. Both the numerical and the keyword attributes are present in data objects; the latter are sensitive and require privacy protection. However, prior studies in blockchain have the problem of trilemma in privacy protection and are unable to handle KF queries. We… More >

  • Open Access

    ARTICLE

    A Cover-Independent Deep Image Hiding Method Based on Domain Attention Mechanism

    Nannan Wu1, Xianyi Chen1,*, James Msughter Adeke2, Junjie Zhao2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3001-3019, 2024, DOI:10.32604/cmc.2023.045311 - 26 March 2024

    Abstract Recently, deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding. However, these approaches have some limitations. For example, a cover image lacks self-adaptability, information leakage, or weak concealment. To address these issues, this study proposes a universal and adaptable image-hiding method. First, a domain attention mechanism is designed by combining the Atrous convolution, which makes better use of the relationship between the secret image domain and the cover image domain. Second, to improve perceived human similarity, perceptual loss is incorporated into the training process. The experimental results are promising, with More >

  • Open Access

    ARTICLE

    Enhancing Identity Protection in Metaverse-Based Psychological Counseling System

    Jun Lee1, Hanna Lee2, Seong Chan Lee2, Hyun Kwon3,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 617-632, 2024, DOI:10.32604/cmc.2023.045768 - 30 January 2024

    Abstract Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regarding client identity. However, these systems often face challenges concerning voice data leaks and the suboptimal communication of the client’s non-verbal expressions, such as facial cues, to the counselor. This study proposes a metaverse-based psychological counseling system designed to enhance client identity protection while ensuring efficient information delivery to counselors during non-face-to-face counseling. The proposed system incorporates a voice modulation function that instantly modifies/masks the client’s voice to safeguard their identity. Additionally, it employs real-time client facial expression recognition using an ensemble of decision… More >

  • Open Access

    ARTICLE

    Multi-Scale Design and Optimization of Composite Material Structure for Heavy-Duty Truck Protection Device

    Yanhui Zhang1, Lianhua Ma1, Hailiang Su1,2,3,*, Jirong Qin2, Zhining Chen2, Kaibiao Deng1

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1961-1980, 2024, DOI:10.32604/cmes.2023.045570 - 29 January 2024

    Abstract In this paper, to present a lightweight-developed front underrun protection device (FUPD) for heavy-duty trucks, plain weave carbon fiber reinforced plastic (CFRP) is used instead of the original high-strength steel. First, the mechanical and structural properties of plain carbon fiber composite anti-collision beams are comparatively analyzed from a multi-scale perspective. For studying the design capability of carbon fiber composite materials, we investigate the effects of TC-33 carbon fiber diameter (D), fiber yarn width (W) and height (H), and fiber yarn density (N) on the front underrun protective beam of carbon fiber composite materials. Based on… More >

  • Open Access

    ARTICLE

    Distribution Line Longitudinal Protection Method Based on Virtual Measurement Current Restraint

    Wei Wang1, Yang Yu1, Simin Luo2,*, Wenlin Liu2, Wei Tang1, Yuanbo Ye1

    Energy Engineering, Vol.121, No.2, pp. 315-337, 2024, DOI:10.32604/ee.2023.042082 - 25 January 2024

    Abstract As an effective approach to achieve the “dual-carbon” goal, the grid-connected capacity of renewable energy increases constantly. Photovoltaics are the most widely used renewable energy sources and have been applied on various occasions. However, the inherent randomness, intermittency, and weak support of grid-connected equipment not only cause changes in the original flow characteristics of the grid but also result in complex fault characteristics. Traditional overcurrent and differential protection methods cannot respond accurately due to the effects of unknown renewable energy sources. Therefore, a longitudinal protection method based on virtual measurement of current restraint is proposed More >

  • Open Access

    ARTICLE

    Wave Reflection by Rectangular Breakwaters for Coastal Protection

    Hasna Akarni*, Hamza Mabchour, Laila El Aarabi, Soumia Mordane

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.3, pp. 579-593, 2024, DOI:10.32604/fdmp.2023.043080 - 12 January 2024

    Abstract In this study, we focus on the numerical modelling of the interaction between waves and submerged structures in the presence of a uniform flow current. Both the same and opposite senses of wave propagation are considered. The main objective is an understanding of the effect of the current and various geometrical parameters on the reflection coefficient. The wave used in the study is based on potential theory, and the submerged structures consist of two rectangular breakwaters positioned at a fixed distance from each other and attached to the bottom of a wave flume. The numerical More >

  • Open Access

    ARTICLE

    Fractional Gradient Descent RBFNN for Active Fault-Tolerant Control of Plant Protection UAVs

    Lianghao Hua1,2, Jianfeng Zhang1,*, Dejie Li3, Xiaobo Xi1

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2129-2157, 2024, DOI:10.32604/cmes.2023.030535 - 15 December 2023

    Abstract With the increasing prevalence of high-order systems in engineering applications, these systems often exhibit significant disturbances and can be challenging to model accurately. As a result, the active disturbance rejection controller (ADRC) has been widely applied in various fields. However, in controlling plant protection unmanned aerial vehicles (UAVs), which are typically large and subject to significant disturbances, load disturbances and the possibility of multiple actuator faults during pesticide spraying pose significant challenges. To address these issues, this paper proposes a novel fault-tolerant control method that combines a radial basis function neural network (RBFNN) with a More > Graphic Abstract

    Fractional Gradient Descent RBFNN for Active Fault-Tolerant Control of Plant Protection UAVs

  • Open Access

    ARTICLE

    Parameters Optimization and Performance Evaluation of the Tuned Inerter Damper for the Seismic Protection of Adjacent Building Structures

    Xiaofang Kang1,*, Jian Wu1, Xinqi Wang1, Shancheng Lei2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 551-593, 2024, DOI:10.32604/cmes.2023.029044 - 22 September 2023

    Abstract In order to improve the seismic performance of adjacent buildings, two types of tuned inerter damper (TID) damping systems for adjacent buildings are proposed, which are composed of springs, inerter devices and dampers in serial or in parallel. The dynamic equations of TID adjacent building damping systems were derived, and the H2 norm criterion was used to optimize and adjust them, so that the system had the optimum damping performance under white noise random excitation. Taking TID frequency ratio and damping ratio as optimization parameters, the optimum analytical solutions of the displacement frequency response of the… More > Graphic Abstract

    Parameters Optimization and Performance Evaluation of the Tuned Inerter Damper for the Seismic Protection of Adjacent Building Structures

Displaying 51-60 on page 6 of 194. Per Page