Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,032)
  • Open Access

    ARTICLE

    Histone Acetyltransferase 1 Promotes Cell Proliferation and Induces Cisplatin Resistance in Hepatocellular Carcinoma

    Xin Jin*, Shenghua Tian, Pingping Li

    Oncology Research, Vol.25, No.6, pp. 939-946, 2017, DOI:10.3727/096504016X14809827856524

    Abstract Hepatocellular carcinoma (HCC) is one of the most common malignant diseases in the world. Mutations, overexpression, and improper recruitment of HATs can lead to tumorigenesis. HAT1 is the first histone acetyltransferase identified and is related with developing HCC, but the mechanism is still unclear. Interestingly, we found that HAT1 was upregulated in HCC patient specimens and showed that its upregulation facilitates HCC cell growth in vitro and in vivo. Moreover, we demonstrated that HAT1 promoted glycolysis in HCC cells and knockdown of HAT1 sensitized HCC cells to apoptotic death induced by cisplatin. Our results suggest More >

  • Open Access

    ARTICLE

    Optimal Configuration of Fault Location Measurement Points in DC Distribution Networks Based on Improved Particle Swarm Optimization Algorithm

    Huanan Yu, Hangyu Li, He Wang, Shiqiang Li*

    Energy Engineering, Vol.121, No.6, pp. 1535-1555, 2024, DOI:10.32604/ee.2024.046936

    Abstract The escalating deployment of distributed power sources and random loads in DC distribution networks has amplified the potential consequences of faults if left uncontrolled. To expedite the process of achieving an optimal configuration of measurement points, this paper presents an optimal configuration scheme for fault location measurement points in DC distribution networks based on an improved particle swarm optimization algorithm. Initially, a measurement point distribution optimization model is formulated, leveraging compressive sensing. The model aims to achieve the minimum number of measurement points while attaining the best compressive sensing reconstruction effect. It incorporates constraints from… More >

  • Open Access

    ARTICLE

    A Planning Method for Operational Test of UAV Swarm Based on Mission Reliability

    Jingyu Wang1, Ping Jiang1,*, Jianjun Qi2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1889-1918, 2024, DOI:10.32604/cmes.2024.049813

    Abstract The unmanned aerial vehicle (UAV) swarm plays an increasingly important role in the modern battlefield, and the UAV swarm operational test is a vital means to validate the combat effectiveness of the UAV swarm. Due to the high cost and long duration of operational tests, it is essential to plan the test in advance. To solve the problem of planning UAV swarm operational test, this study considers the multi-stage feature of a UAV swarm mission, composed of launch, flight and combat stages, and proposes a method to find test plans that can maximize mission reliability.… More >

  • Open Access

    ARTICLE

    Proactive Caching at the Wireless Edge: A Novel Predictive User Popularity-Aware Approach

    Yunye Wan1, Peng Chen2, Yunni Xia1,*, Yong Ma3, Dongge Zhu4, Xu Wang5, Hui Liu6, Weiling Li7, Xianhua Niu2, Lei Xu8, Yumin Dong9

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1997-2017, 2024, DOI:10.32604/cmes.2024.048723

    Abstract Mobile Edge Computing (MEC) is a promising technology that provides on-demand computing and efficient storage services as close to end users as possible. In an MEC environment, servers are deployed closer to mobile terminals to exploit storage infrastructure, improve content delivery efficiency, and enhance user experience. However, due to the limited capacity of edge servers, it remains a significant challenge to meet the changing, time-varying, and customized needs for highly diversified content of users. Recently, techniques for caching content at the edge are becoming popular for addressing the above challenges. It is capable of filling… More >

  • Open Access

    ARTICLE

    A New Malicious Code Classification Method for the Security of Financial Software

    Xiaonan Li1,2, Qiang Wang1, Conglai Fan2,3, Wei Zhan1, Mingliang Zhang4,*

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 773-792, 2024, DOI:10.32604/csse.2024.039849

    Abstract The field of finance heavily relies on cybersecurity to safeguard its systems and clients from harmful software. The identification of malevolent code within financial software is vital for protecting both the financial system and individual clients. Nevertheless, present detection models encounter limitations in their ability to identify malevolent code and its variations, all while encompassing a multitude of parameters. To overcome these obstacles, we introduce a lean model for classifying families of malevolent code, formulated on Ghost-DenseNet-SE. This model integrates the Ghost module, DenseNet, and the squeeze-and-excitation (SE) channel domain attention mechanism. It substitutes the… More >

  • Open Access

    ARTICLE

    Malware Attacks Detection in IoT Using Recurrent Neural Network (RNN)

    Abeer Abdullah Alsadhan1, Abdullah A. Al-Atawi2, Hanen karamti3, Abid Jameel4, Islam Zada5, Tan N. Nguyen6,*

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 135-155, 2024, DOI:10.32604/iasc.2023.041130

    Abstract IoT (Internet of Things) devices are being used more and more in a variety of businesses and for a variety of tasks, such as environmental data collection in both civilian and military situations. They are a desirable attack target for malware intended to infect specific IoT devices due to their growing use in a variety of applications and their increasing computational and processing power. In this study, we investigate the possibility of detecting IoT malware using recurrent neural networks (RNNs). RNN is used in the proposed method to investigate the execution operation codes of ARM-based More >

  • Open Access

    ARTICLE

    SCIRD: Revealing Infection of Malicious Software in Edge Computing-Enabled IoT Networks

    Jiehao Ye, Wen Cheng, Xiaolong Liu, Wenyi Zhu, Xuan’ang Wu, Shigen Shen*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2743-2769, 2024, DOI:10.32604/cmc.2024.049985

    Abstract The Internet of Things (IoT) has characteristics such as node mobility, node heterogeneity, link heterogeneity, and topology heterogeneity. In the face of the IoT characteristics and the explosive growth of IoT nodes, which brings about large-scale data processing requirements, edge computing architecture has become an emerging network architecture to support IoT applications due to its ability to provide powerful computing capabilities and good service functions. However, the defense mechanism of Edge Computing-enabled IoT Nodes (ECIoTNs) is still weak due to their limited resources, so that they are susceptible to malicious software spread, which can compromise… More >

  • Open Access

    REVIEW

    Towards Blockchain-Based Secure BGP Routing, Challenges and Future Research Directions

    Qiong Yang1, Li Ma1,2,*, Shanshan Tu1, Sami Ullah3, Muhammad Waqas4,5, Hisham Alasmary6

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2035-2062, 2024, DOI:10.32604/cmc.2024.049970

    Abstract Border Gateway Protocol (BGP) is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different destinations. The BGP protocol exhibits security design defects, such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes, easily triggering prefix hijacking, path forgery, route leakage, and other BGP security threats. Meanwhile, the traditional BGP security mechanism, relying on a public key infrastructure, faces issues like a single point of failure and a single point of trust. The decentralization, anti-tampering, and More >

  • Open Access

    ARTICLE

    MoBShield: A Novel XML Approach for Securing Mobile Banking

    Saeed Seraj1, Ali Safaa Sadiq1,*, Omprakash Kaiwartya1, Mohammad Aljaidi2, Alexandros Konios1, Mohammed Ali3, Mohammed Abazeed3

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2123-2149, 2024, DOI:10.32604/cmc.2024.048914

    Abstract Mobile banking security has witnessed significant R&D attention from both financial institutions and academia. This is due to the growing number of mobile baking applications and their reachability and usefulness to society. However, these applications are also attractive prey for cybercriminals, who use a variety of malware to steal personal banking information. Related literature in mobile banking security requires many permissions that are not necessary for the application’s intended security functionality. In this context, this paper presents a novel efficient permission identification approach for securing mobile banking (MoBShield) to detect and prevent malware. A permission-based… More >

  • Open Access

    ARTICLE

    Improved Particle Swarm Optimization for Parameter Identification of Permanent Magnet Synchronous Motor

    Shuai Zhou1, Dazhi Wang1,*, Yongliang Ni2, Keling Song2, Yanming Li2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2187-2207, 2024, DOI:10.32604/cmc.2024.048859

    Abstract In the process of identifying parameters for a permanent magnet synchronous motor, the particle swarm optimization method is prone to being stuck in local optima in the later stages of iteration, resulting in low parameter accuracy. This work proposes a fuzzy particle swarm optimization approach based on the transformation function and the filled function. This approach addresses the topic of particle swarm optimization in parameter identification from two perspectives. Firstly, the algorithm uses a transformation function to change the form of the fitness function without changing the position of the extreme point of the fitness… More >

Displaying 1-10 on page 1 of 1032. Per Page