Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (77)
  • Open Access

    ARTICLE

    Multi-Step Detection of Simplex and Duplex Wormhole Attacks over Wireless Sensor Networks

    Abrar M. Alajlan*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4241-4259, 2022, DOI:10.32604/cmc.2022.020585

    Abstract Detection of the wormhole attacks is a cumbersome process, particularly simplex and duplex over the wireless sensor networks (WSNs). Wormhole attacks are characterized as distributed passive attacks that can destabilize or disable WSNs. The distributed passive nature of these attacks makes them enormously challenging to detect. The main objective is to find all the possible ways in which how the wireless sensor network’s broadcasting character and transmission medium allows the attacker to interrupt network within the distributed environment. And further to detect the serious routing-disruption attack “Wormhole Attack” step by step through the different network mechanisms. In this paper, a… More >

  • Open Access

    ARTICLE

    Construction and validation of prognostic model based on autophagy-related lncRNAs in gastric cancer

    MENGQIU CHENG1,2, WEI CAO2, GUODONG CAO1, XIN XU1,2,*, BO CHEN1,*

    BIOCELL, Vol.46, No.1, pp. 97-109, 2022, DOI:10.32604/biocell.2021.015608

    Abstract Gastric cancer (GC) is one of the most common cancer worldwide. Although emerging evidence indicates that autophagy-related long non-coding RNA (lncRNA) plays an important role in the progression of GC, the prognosis of GC based on autophagy is still deficient. The Cancer Genome of Atlas stomach adenocarcinoma (TCGA-STAD) dataset was downloaded and separated into a training set and a testing set randomly. Then, 24 autophagy-related lncRNAs were found strongly associated with the survival of the TCGA-STAD dataset. 11 lncRNAs were selected to build the risk score model through the least absolute shrinkage and selection operator (LASSO) regression. Every patient got… More >

  • Open Access

    ARTICLE

    Classification and Diagnosis of Lymphoma’s Histopathological Images Using Transfer Learning

    Schahrazad Soltane*, Sameer Alsharif , Salwa M.Serag Eldin

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 629-644, 2022, DOI:10.32604/csse.2022.019333

    Abstract Current cancer diagnosis procedure requires expert knowledge and is time-consuming, which raises the need to build an accurate diagnosis support system for lymphoma identification and classification. Many studies have shown promising results using Machine Learning and, recently, Deep Learning to detect malignancy in cancer cells. However, the diversity and complexity of the morphological structure of lymphoma make it a challenging classification problem. In literature, many attempts were made to classify up to four simple types of lymphoma. This paper presents an approach using a reliable model capable of diagnosing seven different categories of rare and aggressive lymphoma. These Lymphoma types… More >

  • Open Access

    ARTICLE

    Early Detection of Lung Carcinoma Using Machine Learning

    A. Sheryl Oliver1, T. Jayasankar2, K. R. Sekar3,*, T. Kalavathi Devi4, R. Shalini5, S. Poojalaxmi5, N. G. Viswesh5

    Intelligent Automation & Soft Computing, Vol.30, No.3, pp. 755-770, 2021, DOI:10.32604/iasc.2021.016242

    Abstract Lung cancer is a poorly understood disease. Smokers may develop lung cancer due to the inhalation of carcinogenic substances while smoking, but non-smokers may develop this disease as well. Lung cancer can spread to other parts of the body and this process is called metastasis. Because the lung cancer is difficult to identify in the initial stages. The objective of this work is to reduce the mortality rate of the disease by identifying it at an earlier stage based on the existing symptoms. Artificial intelligence plays active roles in tasks such as entropy extraction through preprocessing strategies, ordinal to cardinal… More >

  • Open Access

    ARTICLE

    Inverse Load Identification in Stiffened Plate Structure Based on in situ Strain Measurement

    Yihua Wang1, Zhenhuan Zhou1, Hao Xu1,*, Shuai Li2, Zhanjun Wu1

    Structural Durability & Health Monitoring, Vol.15, No.2, pp. 85-101, 2021, DOI:10.32604/sdhm.2021.014256

    Abstract For practical engineering structures, it is usually difficult to measure external load distribution in a direct manner, which makes inverse load identification important. Specifically, load identification is a typical inverse problem, for which the models (e.g., response matrix) are often ill-posed, resulting in degraded accuracy and impaired noise immunity of load identification. This study aims at identifying external loads in a stiffened plate structure, through comparing the effectiveness of different methods for parameter selection in regulation problems, including the Generalized Cross Validation (GCV) method, the Ordinary Cross Validation method and the truncated singular value decomposition method. With demonstrated high accuracy,… More >

  • Open Access

    ARTICLE

    Web Attack Detection Using the Input Validation Method: DPDA Theory

    Osamah Ibrahim Khalaf1, Munsif Sokiyna2,*, Youseef Alotaibi3, Abdulmajeed Alsufyani4, Saleh Alghamdi5

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3167-3184, 2021, DOI:10.32604/cmc.2021.016099

    Abstract A major issue while building web applications is proper input validation and sanitization. Attackers can quickly exploit errors and vulnerabilities that lead to malicious behavior in web application validation operations. Attackers are rapidly improving their capabilities and technologies and now focus on exploiting vulnerabilities in web applications and compromising confidentiality. Cross-site scripting (XSS) and SQL injection attack (SQLIA) are attacks in which a hacker sends malicious inputs (cheat codes) to confuse a web application, to access or disable the application’s back-end without user awareness. In this paper, we explore the problem of detecting and removing bugs from both client-side and… More >

  • Open Access

    ARTICLE

    Slime Mold Optimizer for Transformer Parameters Identification with Experimental Validation

    Salah K. Elsayed1,*, Ahmed M. Agwa2,3, Mahmoud A. El-Dabbah2, Ehab E. Elattar1

    Intelligent Automation & Soft Computing, Vol.28, No.3, pp. 639-651, 2021, DOI:10.32604/iasc.2021.016464

    Abstract The problem of parameters identification for transformer equivalent circuit can be solved by optimizing a nonlinear formula. The objective function attempts to minimize the sum of squared relative errors amongst the accompanying calculated and actual points of currents, powers, and secondary voltage during the load test of the transformer subject to a set of parameters constraints. The authors of this paper propose applying a new and efficient stochastic optimizer called the slime mold optimization algorithm (SMOA) to identify parameters of the transformer equivalent circuit. The experimental measurements of load test of single- and three-phase transformers are entered to MATLAB code… More >

  • Open Access

    ARTICLE

    Mathematical Model Validation of Search Protocols in MP2P Networks

    Ajay Arunachalam1,*, Vinayakumar Ravi2, Moez Krichen3, Roobaea Alroobaea4, Saeed Rubaiee5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1807-1829, 2021, DOI:10.32604/cmc.2021.016692

    Abstract Broadcasting is a basic technique in Mobile ad-hoc network (MANET), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique, floods the network with query messages, while the random walk technique operates by contacting the subsets of every node’s neighbors at each step, thereby restricting the search space. One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about locating the queried resource. Many… More >

  • Open Access

    ARTICLE

    Alcoholism Detection by Wavelet Energy Entropy and Linear Regression Classifier

    Xianqing Chen1,2, Yan Yan3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.1, pp. 325-343, 2021, DOI:10.32604/cmes.2021.014489

    Abstract Alcoholism is an unhealthy lifestyle associated with alcohol dependence. Not only does drinking for a long time leads to poor mental health and loss of self-control, but alcohol seeps into the bloodstream and shortens the lifespan of the body’s internal organs. Alcoholics often think of alcohol as an everyday drink and see it as a way to reduce stress in their lives because they cannot see the damage in their bodies and they believe it does not affect their physical health. As their drinking increases, they become dependent on alcohol and it affects their daily lives. Therefore, it is important… More >

  • Open Access

    ARTICLE

    Exploration and Validation of the Potential Downstream Genes Underlying ipa1-2D Locus for Rice Panicle Branching

    Lin Zhang1,2,*, Dong Xie1, Zhong Bian1, Yiting Zou1, Han Zhou1, Wenlu Cai1, Hadi Yeilaghi1, Xiaolei Fan1,2, Changquan Zhang1,2, Qiaoquan Liu1,2,*

    Phyton-International Journal of Experimental Botany, Vol.90, No.3, pp. 773-787, 2021, DOI:10.32604/phyton.2021.015229

    Abstract In recent years, some super hybrid rice varieties were bred with strong culms and large panicles, which are mainly contributed by the ipa1-2D locus. A gain-of-function allele of OsSPL14 is the ipa1-2D and it can greatly increase the panicle primary branch number. However, the key downstream genes mediating this trait variation are not fully explored. In this study, we developed high-quality near-isogenic lines (NILs) with a difference of only 30 kb chromosomal segment covering the ipa1-2D locus. Using the NILs, we explored the impact of ipa1-2D on five sequential stages of early inflorescence development, and found that the locus can… More >

Displaying 41-50 on page 5 of 77. Per Page