Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (93)
  • Open Access

    ARTICLE

    A novel nine gene signature integrates stemness characteristics associated with prognosis in hepatocellular carcinoma

    XINGHONG YAO1,2,#, CHENGQUAN LU3,#, JUNYI SHEN1, WENLI JIANG1, YAN QIU1, YE ZENG1,*, LIANG LI1,*

    BIOCELL, Vol.45, No.6, pp. 1425-1448, 2021, DOI:10.32604/biocell.2021.017289

    Abstract Cancer stem cells (CSCs) are heterogeneous with self-renewal and differentiation ability. The mRNA expression-based stemness index (mRNAsi) described the similarity between tumor cells and CSCs, which is positively associated with the poor prognosis of cancer patients. However, the key prognostic genes related to mRNAsi in hepatocellular carcinoma (HCC) remains unclear. A 9-gene signature related to mRNAsi and HCC prognosis including PSMG3, SNRPD1, DTYMK, PIGU, NME1, TXNL4A, IPO4, PES1, and REXO4 was obtained. High expression of this signature indicates poor prognosis of HCC. PIGU was an independent prognostic factor of HCC, which was significantly associated with progression of HCC. Among them,… More >

  • Open Access

    ARTICLE

    Immune prognostic implications of PSMD14 and its associated genes signatures in hepatocellular carcinoma

    CHUAN TIAN1, MUBALAKE ABUDOUREYIMU1, XINRONG LIN1, HAO ZHOU2, XIAOYUAN CHU1, RUI WANG1,*

    BIOCELL, Vol.45, No.6, pp. 1527-1541, 2021, DOI:10.32604/biocell.2021.016203

    Abstract PSMD14 played a vital role in initiation and progression of hepatocellular carcinoma (HCC). However, PSMD14 and its-related genes for the immune prognostic implications of HCC patients have rarely been analyzed. Messenger RNA expression profiles and clinicopathological data were downloaded from The Cancer Genome Atlas (TCGA) and International Cancer Genome Consortium (ICGC) database-Liver Hepatocellular Carcinoma (LIHC). Additionally, we used multi-dimensional bioinformatics analysis to construct and validate a PSMD14-based immune prognostic signature (including RBM45, PSMD1, OLA1, CCT6A, LCAT and IVD) for HCC prognosis prediction. Patients in the high-risk group shown significantly poorer survival than patients in the low-risk group. Calibration curves confirmed… More >

  • Open Access

    ARTICLE

    Blockchain: Secured Solution for Signature Transfer in Distributed Intrusion Detection System

    Shraddha R. Khonde1,2,*, Venugopal Ulagamuthalvi1

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 37-51, 2022, DOI:10.32604/csse.2022.017130

    Abstract Exchange of data in networks necessitates provision of security and confidentiality. Most networks compromised by intruders are those where the exchange of data is at high risk. The main objective of this paper is to present a solution for secure exchange of attack signatures between the nodes of a distributed network. Malicious activities are monitored and detected by the Intrusion Detection System (IDS) that operates with nodes connected to a distributed network. The IDS operates in two phases, where the first phase consists of detection of anomaly attacks using an ensemble of classifiers such as Random forest, Convolutional neural network,… More >

  • Open Access

    ARTICLE

    Cryptanalysis of an Online/Offline Certificateless Signature Scheme for Internet of Health Things

    Saddam Hussain1, Syed Sajid Ullah2,*, Mohammad Shorfuzzaman3, Mueen Uddin4, Mohammed Kaosar5

    Intelligent Automation & Soft Computing, Vol.30, No.3, pp. 983-993, 2021, DOI:10.32604/iasc.2021.019486

    Abstract Recently, Khan et al. [An online-offline certificateless signature scheme for internet of health things,” Journal of Healthcare Engineering, vol. 2020] presented a new certificateless offline/online signature scheme for Internet of Health Things (IoHT) to fulfill the authenticity requirements of the resource-constrained environment of (IoHT) devices. The authors claimed that the newly proposed scheme is formally secured against Type-I adversary under the Random Oracle Model (ROM). Unfortunately, their scheme is insecure against adaptive chosen message attacks. It is demonstrated that an adversary can forge a valid signature on a message by replacing the public key. Furthermore, we performed a comparative analysis… More >

  • Open Access

    ARTICLE

    A Lightweight Certificate-Based Aggregate Signature Scheme Providing Key Insulation

    Yong-Woon Hwang, Im-Yeong Lee*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1747-1764, 2021, DOI:10.32604/cmc.2021.018549

    Abstract Recently, with the advancement of Information and Communications Technology (ICT), Internet of Things (IoT) has been connected to the cloud and used in industrial sectors, medical environments, and smart grids. However, if data is transmitted in plain text when collecting data in an IoT-cloud environment, it can be exposed to various security threats such as replay attacks and data forgery. Thus, digital signatures are required. Data integrity is ensured when a user (or a device) transmits data using a signature. In addition, the concept of data aggregation is important to efficiently collect data transmitted from multiple users (or a devices)… More >

  • Open Access

    ARTICLE

    Neutrosophic Rule-Based Identity Verification System Based on Handwritten Dynamic Signature Analysis

    Amr Hefny1, Aboul Ella Hassanien2, Sameh H. Basha1,*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2367-2386, 2021, DOI:10.32604/cmc.2021.018017

    Abstract Identity verification using authenticity evaluation of handwritten signatures is an important issue. There have been several approaches for the verification of signatures using dynamics of the signing process. Most of these approaches extract only global characteristics. With the aim of capturing both dynamic global and local features, this paper introduces a novel model for verifying handwritten dynamic signatures using neutrosophic rule-based verification system (NRVS) and Genetic NRVS (GNRVS) models. The neutrosophic Logic is structured to reflect multiple types of knowledge and relations among all features using three values: truth, indeterminacy, and falsity. These three values are determined by neutrosophic membership… More >

  • Open Access

    A Novel PoW Scheme Implemented by Probabilistic Signature for Blockchain

    Bo Mi1, Yuan Weng1, Darong Huang1,*, Yang Liu1, Yuqing Gan2

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 265-274, 2021, DOI:10.32604/csse.2021.017507

    Abstract PoW (Proof of Work) plays a significant role in most blockchain systems to grant an accounting right over decentralized participants and ensure tamper resistance. Though hash functions are generally exploited for PoW due to their merits on summering, anti-collision, and irreversibility, they cannot certify that the bookkeeper is exactly the worker. Thereafter, such insistence may lead to abuse or even embezzlement of computing power for the benefit of malicious miners. To preserve the functionality of PoW but also bind the miners’ signing keys with their works, we build a post-quantum PoW scheme by changing the approximate closest vector norm for… More >

  • Open Access

    ARTICLE

    A Deletable and Modifiable Blockchain Scheme Based on Record Verification Trees and the Multisignature Mechanism

    Daojun Han1,2,3, Jinyu Chen3,4, Lei Zhang1,2,3,*, Yatian Shen1,2,3, Yihua Gao3,5, Xueheng Wang3,6

    CMES-Computer Modeling in Engineering & Sciences, Vol.128, No.1, pp. 223-245, 2021, DOI:10.32604/cmes.2021.016000

    Abstract As one of the most valuable technologies, blockchains have received extensive attention from researchers and industry circles and are widely applied in various scenarios. However, data on a blockchain cannot be deleted. As a result, it is impossible to clean invalid and sensitive data and correct erroneous data. This, to a certain extent, hinders the application of blockchains in supply chains and Internet of Things. To address this problem, this study presents a deletable and modifiable blockchain scheme (DMBlockChain) based on record verification trees (RVTrees) and the multisignature scheme. (1) In this scheme, an RVTree structure is designed and added… More >

  • Open Access

    ARTICLE

    A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks

    A. F. M. Suaib Akhter1,*, A. F. M. Shahen Shah2, Mohiuddin Ahmed3, Nour Moustafa4, Unal Çavuşoğlu1, Ahmet Zengin1

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 229-246, 2021, DOI:10.32604/cmc.2021.015447

    Abstract Vehicular Ad hoc Networks (VANETs) become a very crucial addition in the Intelligent Transportation System (ITS). It is challenging for a VANET system to provide security services and parallelly maintain high throughput by utilizing limited resources. To overcome these challenges, we propose a blockchain-based Secured Cluster-based MAC (SCB-MAC) protocol. The nearby vehicles heading towards the same direction will form a cluster and each of the clusters has its blockchain to store and distribute the safety messages. The message which contains emergency information and requires Strict Delay Requirement (SDR) for transmission are called safety messages (SM). Cluster Members (CMs) sign SMs… More >

  • Open Access

    ARTICLE

    Experimental Study of Effect of Temperature Variations on the Impedance Signature of PZT Sensors for Fatigue Crack Detection

    Saqlain Abbas1,2,*, Fucai Li1, Zulkarnain Abbas3,4, Taufeeq Ur Rehman Abbasi5, Xiaotong Tu6, Riffat Asim Pasha7

    Sound & Vibration, Vol.55, No.1, pp. 1-18, 2021, DOI:10.32604/sv.2021.013754

    Abstract Structural health monitoring (SHM) is recognized as an efficient tool to interpret the reliability of a wide variety of infrastructures. To identify the structural abnormality by utilizing the electromechanical coupling property of piezoelectric transducers, the electromechanical impedance (EMI) approach is preferred. However, in real-time SHM applications, the monitored structure is exposed to several varying environmental and operating conditions (EOCs). The previous study has recognized the temperature variations as one of the serious EOCs that affect the optimal performance of the damage inspection process. In this framework, an experimental setup is developed in current research to identify the presence of fatigue… More >

Displaying 71-80 on page 8 of 93. Per Page