Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (93)
  • Open Access

    ARTICLE

    The correlation of miRNA expression and tumor mutational burden in uterine corpus endometrial carcinoma

    YANYA CHEN1,#, HONGYUAN WU2,#, RUISI ZHOU5,#, HELING DONG4, XUEFANG ZHANG2, XUEWEI WU1, WENSHAN CHEN1, YANTING YOU5,*, YIFEN WU3,*

    BIOCELL, Vol.47, No.6, pp. 1353-1364, 2023, DOI:10.32604/biocell.2023.027346

    Abstract Background: The relationship between microRNA (miRNA) expression patterns and tumor mutation burden (TMB) in uterine corpus endometrial carcinoma (UCEC) was investigated in this study. Methods: The UCEC dataset from The Cancer Genome Atlas (TCGA) database was used to identify the miRNAs that differ in expression between high TMB and low TMB sample sets. The total sample sets were divided into a training set and a test set. TMB levels were predicted using miRNA-based signature classifiers developed by Lasso Cox regression. Test sets were used to validate the classifier. This study investigated the relationship between a miRNA-based signature classifier and three… More >

  • Open Access

    ARTICLE

    Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network

    Lemei Da1, Hai Liang1,*, Yong Ding1,2, Yujue Wang1, Changsong Yang1, Huiyong Wang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 879-902, 2023, DOI:10.32604/cmes.2023.026309

    Abstract The unmanned aerial vehicle (UAV) self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale, which can quickly and accurately complete complex tasks such as path planning, situational awareness, and information transmission. Due to the openness of the network, the UAV cluster is more vulnerable to passive eavesdropping, active interference, and other attacks, which makes the system face serious security threats. This paper proposes a Blockchain-Based Data Acquisition (BDA) scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario. Each UAV cluster has an… More >

  • Open Access

    ARTICLE

    Solute carrier-related signature for assessing prognosis and immunity in patients with clear-cell renal cell carcinoma

    WEI BAO1,#, QIANGUANG HAN2,#, XIAO GUAN3, ZIJIE WANG2, MIN GU1,2,*

    Oncology Research, Vol.31, No.2, pp. 181-192, 2023, DOI:10.32604/or.2023.028051

    Abstract Background: Clear-cell renal cell carcinoma (ccRCC) is the most common malignant kidney cancer. However, the tumor microenvironment and crosstalk involved in metabolic reprogramming in ccRCC are not well-understood. Methods: We used The Cancer Genome Atlas to obtain ccRCC transcriptome data and clinical information. The E-MTAB-1980 cohort was used for external validation. The GENECARDS database contains the first 100 solute carrier (SLC)-related genes. The predictive value of SLC-related genes for ccRCC prognosis and treatment was assessed using univariate Cox regression analysis. An SLC-related predictive signature was developed through Lasso regression analysis and used to determine the risk profiles of patients with… More >

  • Open Access

    ARTICLE

    An inflammatory-related genes signature based model for prognosis prediction in breast cancer

    JINGYUE FU, RUI CHEN, ZHIZHENG ZHANG, JIANYI ZHAO, TIANSONG XIA*

    Oncology Research, Vol.31, No.2, pp. 157-167, 2023, DOI:10.32604/or.2023.027972

    Abstract Background: Breast cancer has become the most common malignant tumor in the world. It is vital to discover novel prognostic biomarkers despite the fact that the majority of breast cancer patients have a good prognosis because of the high heterogeneity of breast cancer, which causes the disparity in prognosis. Recently, inflammatory-related genes have been proven to play an important role in the development and progression of breast cancer, so we set out to investigate the predictive usefulness of inflammatory-related genes in breast malignancies. Methods: We assessed the connection between Inflammatory-Related Genes (IRGs) and breast cancer by studying the TCGA database.… More > Graphic Abstract

    An inflammatory-related genes signature based model for prognosis prediction in breast cancer

  • Open Access

    ARTICLE

    Quantum Secure Undeniable Signature for Blockchain-Enabled Cold-Chain Logistics System

    Chaoyang Li, Hongxue Shen, Xiayang Shi, Hui Liang*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3941-3956, 2023, DOI:10.32604/cmc.2023.037796

    Abstract Data security and user privacy are two main security concerns in the cold-chain logistics system (CCLS). Many security issues exist in traditional CCLS, destroying data security and user privacy. The digital signature can provide data verification and identity authentication based on the mathematical difficulty problem for logistics data sharing in CCLS. This paper first established a blockchain-enabled cold-chain logistics system (BCCLS) based on union blockchain technology, which can provide secure data sharing among different logistics nodes and guarantee logistics data security with the untampered blockchain ledger. Meanwhile, a lattice-based undeniable signature scheme is designed to strengthen the security of logistics… More >

  • Open Access

    ARTICLE

    Blockchain Mobile Wallet with Secure Offline Transactions

    Raed Saeed Rasheed1, Khalil Hamdi Ateyeh Al-Shqeerat2,*, Ahmed Salah Ghorab3, Fuad Salama AbuOwaimer4, Aiman Ahmed AbuSamra1

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2905-2919, 2023, DOI:10.32604/cmc.2023.036691

    Abstract There has been an increase in the adoption of mobile payment systems worldwide in the past few years. However, poor Internet connection in rural regions continues to be an obstacle to the widespread use of such technologies. On top of that, there are significant problems with the currently available offline wallets; for instance, the payee cannot verify the number of coins received without access to the Internet. Additionally, it has been demonstrated that some existing systems are susceptible to false token generation, and some do not even permit the user to divide the offline token into smaller portions to be… More >

  • Open Access

    ARTICLE

    Multi-Path Attention Inverse Discrimination Network for Offline Signature Verification

    Xiaorui Zhang1,2,3,4,*, Yingying Wang1, Wei Sun4,5, Qi Cui6, Xindong Wei7

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3057-3071, 2023, DOI:10.32604/iasc.2023.033578

    Abstract Signature verification, which is a method to distinguish the authenticity of signature images, is a biometric verification technique that can effectively reduce the risk of forged signatures in financial, legal, and other business environments. However, compared with ordinary images, signature images have the following characteristics: First, the strokes are slim, i.e., there is less effective information. Second, the signature changes slightly with the time, place, and mood of the signer, i.e., it has high intraclass differences. These challenges lead to the low accuracy of the existing methods based on convolutional neural networks (CNN). This study proposes an end-to-end multi-path attention… More >

  • Open Access

    ARTICLE

    A Linear Homomorphic Proxy Signature Scheme Based on Blockchain for Internet of Things

    Caifen Wang1,*, Bin Wu2

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1857-1878, 2023, DOI:10.32604/cmes.2023.026153

    Abstract The mushroom growth of IoT has been accompanied by the generation of massive amounts of data. Subject to the limited storage and computing capabilities of most IoT devices, a growing number of institutions and organizations outsource their data computing tasks to cloud servers to obtain efficient and accurate computation while avoiding the cost of local data computing. One of the most important challenges facing outsourcing computing is how to ensure the correctness of computation results. Linearly homomorphic proxy signature (LHPS) is a desirable solution to ensure the reliability of outsourcing computing in the case of authorized signing right. Blockchain has… More >

  • Open Access

    ARTICLE

    Accelerating Falcon Post-Quantum Digital Signature Algorithm on Graphic Processing Units

    Seog Chung Seo1, Sang Woo An2, Dooho Choi3,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1963-1980, 2023, DOI:10.32604/cmc.2023.033910

    Abstract Since 2016, the National Institute of Standards and Technology (NIST) has been performing a competition to standardize post-quantum cryptography (PQC). Although Falcon has been selected in the competition as one of the standard PQC algorithms because of its advantages in short key and signature sizes, its performance overhead is larger than that of other lattice-based cryptosystems. This study presents multiple methodologies to accelerate the performance of Falcon using graphics processing units (GPUs) for server-side use. Direct GPU porting significantly degrades performance because the Falcon reference codes require recursive functions in its sampling process. Thus, an iterative sampling approach for efficient… More >

  • Open Access

    ARTICLE

    One-Class Arabic Signature Verification: A Progressive Fusion of Optimal Features

    Ansam A. Abdulhussien1,2,*, Mohammad F. Nasrudin1, Saad M. Darwish3, Zaid A. Alyasseri1

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 219-242, 2023, DOI:10.32604/cmc.2023.033331

    Abstract Signature verification is regarded as the most beneficial behavioral characteristic-based biometric feature in security and fraud protection. It is also a popular biometric authentication technology in forensic and commercial transactions due to its various advantages, including noninvasiveness, user-friendliness, and social and legal acceptability. According to the literature, extensive research has been conducted on signature verification systems in a variety of languages, including English, Hindi, Bangla, and Chinese. However, the Arabic Offline Signature Verification (OSV) system is still a challenging issue that has not been investigated as much by researchers due to the Arabic script being distinguished by changing letter shapes,… More >

Displaying 21-30 on page 3 of 93. Per Page