Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (70)
  • Open Access

    ARTICLE

    Cloning and Functional Validation of Mung Bean VrPR Gene

    Xiaokui Huang1, Yingbin Xue1, Aaqil Khan1, Hanqiao Hu1, Naijie Feng1,2,*, Dianfeng Zheng1,2,*

    Phyton-International Journal of Experimental Botany, Vol.92, No.8, pp. 2369-2382, 2023, DOI:10.32604/phyton.2023.027457

    Abstract For the purpose of functional validation, the mung bean (Vigna radiata) VrPR gene was cloned and overexpressed in Arabidopsis thaliana. The findings revealed that the ORF of VrPR contained 1200 bp, in which 399 amino acids were encoded. Bioinformatics analysis showed that the VrPR protein belonged to the NADB Rossmann superfamily, which was one of the non-transmembrane hydrophilic proteins. VrPR was assumed to have 44 amino acid phosphorylation sites and be contained in chloroplasts. The VrPR secondary structure comprised of random coil, α helix, β angle, and extended chain, all of which were quite compatible with the anticipated tertiary structure.… More >

  • Open Access

    ARTICLE

    OffSig-SinGAN: A Deep Learning-Based Image Augmentation Model for Offline Signature Verification

    M. Muzaffar Hameed1,2, Rodina Ahmad1,*, Laiha Mat Kiah1, Ghulam Murtaza3, Noman Mazhar1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1267-1289, 2023, DOI:10.32604/cmc.2023.035063

    Abstract Offline signature verification (OfSV) is essential in preventing the falsification of documents. Deep learning (DL) based OfSVs require a high number of signature images to attain acceptable performance. However, a limited number of signature samples are available to train these models in a real-world scenario. Several researchers have proposed models to augment new signature images by applying various transformations. Others, on the other hand, have used human neuromotor and cognitive-inspired augmentation models to address the demand for more signature samples. Hence, augmenting a sufficient number of signatures with variations is still a challenging task. This study proposed OffSig-SinGAN: a deep… More >

  • Open Access

    ARTICLE

    Process Monitoring and Terminal Verification of Cable-Stayed Bridges with Corrugated Steel Webs under Contruction

    Kexin Zhang, Xinyuan Shen, Longsheng Bao, He Liu*

    Structural Durability & Health Monitoring, Vol.17, No.2, pp. 131-158, 2023, DOI:10.32604/sdhm.2023.023431

    Abstract In this paper, the construction process of a cable-stayed bridge with corrugated steel webs was monitored. Moreover, the end performance of the bridge was verified by load test. Owing to the consideration of the bridge structure safety, it is necessary to monitor the main girder deflection, stress, construction error and safety state during construction. Furthermore, to verify whether the bridge can meet the design requirements, the static and dynamic load tests are carried out after the completion of the bridge. The results of construction monitoring show that the stress state of the structure during construction is basically consistent with the… More >

  • Open Access

    ARTICLE

    Fair-News: Digital Journalism Model to Prevent Information Pollution and Manipulation

    Savaş Takan1,*, Duygu Ergün2,*, Gökmen Katipoğlu3

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6059-6082, 2023, DOI:10.32604/cmc.2023.039505

    Abstract As digital data circulation increases, information pollution and manipulation in journalism have become more prevalent. In this study, a new digital journalism model is designed to contribute to the solution of the main current problems, such as information pollution, manipulation, and accountability in digital journalism. The model uses blockchain technology due to its transparency, immutability, and traceability. However, it is tough to provide the mechanisms necessary for journalism, such as updating one piece of information, instantly updating all other information affected by the updated information, establishing logical relationships between news, making quick comparisons, sorting and indexing news, and keeping the… More >

  • Open Access

    ARTICLE

    Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network

    Lemei Da1, Hai Liang1,*, Yong Ding1,2, Yujue Wang1, Changsong Yang1, Huiyong Wang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 879-902, 2023, DOI:10.32604/cmes.2023.026309

    Abstract The unmanned aerial vehicle (UAV) self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale, which can quickly and accurately complete complex tasks such as path planning, situational awareness, and information transmission. Due to the openness of the network, the UAV cluster is more vulnerable to passive eavesdropping, active interference, and other attacks, which makes the system face serious security threats. This paper proposes a Blockchain-Based Data Acquisition (BDA) scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario. Each UAV cluster has an… More >

  • Open Access

    PROCEEDINGS

    Dynamic Behavior of a Historic Metallic Bridge under Metro Vehicles Based on Advanced Interaction Models

    D. Ribeiro1,*, B. Costa2, P. Montenegro2, R. Calçada2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.24, No.1, pp. 1-1, 2022, DOI:10.32604/icces.2022.08682

    Abstract The present article focuses on the evaluation of the dynamic behaviour of a centenary steel arch bridge, located in Portugal, under light railway traffic loads. The work aims to assess the dynamic behaviour of the bridge subjected to an alternative type of railway vehicle, more specifically, a typical underground vehicle that is currently in service in the Lisbon Metro. The dynamic response of the system has been evaluated using two distinct methodologies, namely a moving loads model and a vehicle-bridge interaction model. To achieve this goal, finite element (FE) models from both the bridge and the vehicle have been developed… More >

  • Open Access

    ARTICLE

    Lightweight Storage Framework for Blockchain-Enabled Internet of Things Under Cloud Computing

    Xinyi Qing1,3, Baopeng Ye2, Yuanquan Shi1,3, Tao Li4,*, Yuling Chen4, Lei Liu1

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3607-3624, 2023, DOI:10.32604/cmc.2023.037532

    Abstract Due to its decentralized, tamper-proof, and trust-free characteristics, blockchain is used in the Internet of Things (IoT) to guarantee the reliability of data. However, some technical flaws in blockchain itself prevent the development of these applications, such as the issue with linearly growing storage capacity of blockchain systems. On the other hand, there is a lack of storage resources for sensor devices in IoT, and numerous sensor devices will generate massive data at ultra-high speed, which makes the storage problem of the IoT enabled by blockchain more prominent. There are various solutions to reduce the storage burden by modifying the… More >

  • Open Access

    ARTICLE

    Multiple Pedestrian Detection and Tracking in Night Vision Surveillance Systems

    Ali Raza1, Samia Allaoua Chelloug2,*, Mohammed Hamad Alatiyyah3, Ahmad Jalal1, Jeongmin Park4

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3275-3289, 2023, DOI:10.32604/cmc.2023.029719

    Abstract Pedestrian detection and tracking are vital elements of today’s surveillance systems, which make daily life safe for humans. Thus, human detection and visualization have become essential inventions in the field of computer vision. Hence, developing a surveillance system with multiple object recognition and tracking, especially in low light and night-time, is still challenging. Therefore, we propose a novel system based on machine learning and image processing to provide an efficient surveillance system for pedestrian detection and tracking at night. In particular, we propose a system that tackles a two-fold problem by detecting multiple pedestrians in infrared (IR) images using machine… More >

  • Open Access

    ARTICLE

    Multi-Path Attention Inverse Discrimination Network for Offline Signature Verification

    Xiaorui Zhang1,2,3,4,*, Yingying Wang1, Wei Sun4,5, Qi Cui6, Xindong Wei7

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3057-3071, 2023, DOI:10.32604/iasc.2023.033578

    Abstract Signature verification, which is a method to distinguish the authenticity of signature images, is a biometric verification technique that can effectively reduce the risk of forged signatures in financial, legal, and other business environments. However, compared with ordinary images, signature images have the following characteristics: First, the strokes are slim, i.e., there is less effective information. Second, the signature changes slightly with the time, place, and mood of the signer, i.e., it has high intraclass differences. These challenges lead to the low accuracy of the existing methods based on convolutional neural networks (CNN). This study proposes an end-to-end multi-path attention… More >

  • Open Access

    ARTICLE

    Identification and verification of aging-related lncRNAs for prognosis prediction and immune microenvironment in patients with head and neck squamous carcinoma

    QING GAO1,#, YUJING SHI2,#, YUANYUAN SUN1,#, SHU ZHOU1, ZEYUAN LIU3, XINCHEN SUN1,*, XIAOKE DI1,*

    Oncology Research, Vol.31, No.1, pp. 35-61, 2023, DOI:10.32604/or.2022.028193

    Abstract Aging is highly associated with tumor formation and progression. However, little research has explored the association of aging-related lncRNAs (ARLs) with the prognosis and tumor immune microenvironment (TIME) of head and neck squamous cell carcinoma (HNSCC). RNA sequences and clinicopathological data of HNSCC patients and normal subjects were downloaded from The Cancer Genome Atlas. In the training group, we used Pearson correlation, univariate Cox regression, least absolute shrinkage/selection operator regression analyses, and multivariate Cox regression to build a prognostic model. In the test group, we evaluated the model. Multivariate Cox regression was done to screen out independent prognostic factors, with… More >

Displaying 11-20 on page 2 of 70. Per Page