Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (127)
  • Open Access


    MicroRNAs in thyroid cancer with focus on medullary thyroid carcinoma: potential therapeutic targets and diagnostic/prognostic markers and web based tools


    Oncology Research, Vol.32, No.6, pp. 1011-1019, 2024, DOI:10.32604/or.2024.049235

    Abstract This review aimed to describe the inculpation of microRNAs (miRNAs) in thyroid cancer (TC) and its subtypes, mainly medullary thyroid carcinoma (MTC), and to outline web-based tools and databases for bioinformatics analysis of miRNAs in TC. Additionally, the capacity of miRNAs to serve as therapeutic targets and biomarkers in TC management will be discussed. This review is based on a literature search of relevant articles on the role of miRNAs in TC and its subtypes, mainly MTC. Additionally, web-based tools and databases for bioinformatics analysis of miRNAs in TC were identified and described. MiRNAs can… More > Graphic Abstract

    MicroRNAs in thyroid cancer with focus on medullary thyroid carcinoma: potential therapeutic targets and diagnostic/prognostic markers and web based tools

  • Open Access


    CMAES-WFD: Adversarial Website Fingerprinting Defense Based on Covariance Matrix Adaptation Evolution Strategy

    Di Wang, Yuefei Zhu, Jinlong Fei*, Maohua Guo

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2253-2276, 2024, DOI:10.32604/cmc.2024.049504

    Abstract Website fingerprinting, also known as WF, is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination, even when using the Tor anonymity network. While advanced attacks based on deep neural network (DNN) can perform feature engineering and attain accuracy rates of over 98%, research has demonstrated that DNN is vulnerable to adversarial samples. As a result, many researchers have explored using adversarial samples as a defense mechanism against DNN-based WF attacks and have achieved considerable success. However, these methods suffer from high bandwidth overhead or require access to the target… More >

  • Open Access


    FusionNN: A Semantic Feature Fusion Model Based on Multimodal for Web Anomaly Detection

    Li Wang1,2,3,*, Mingshan Xia1,2,*, Hao Hu1, Jianfang Li1,2, Fengyao Hou1,2, Gang Chen1,2,3

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2991-3006, 2024, DOI:10.32604/cmc.2024.048637

    Abstract With the rapid development of the mobile communication and the Internet, the previous web anomaly detection and identification models were built relying on security experts’ empirical knowledge and attack features. Although this approach can achieve higher detection performance, it requires huge human labor and resources to maintain the feature library. In contrast, semantic feature engineering can dynamically discover new semantic features and optimize feature selection by automatically analyzing the semantic information contained in the data itself, thus reducing dependence on prior knowledge. However, current semantic features still have the problem of semantic expression singularity, as… More >

  • Open Access


    A Web Application Fingerprint Recognition Method Based on Machine Learning

    Yanmei Shi1, Wei Yu2,*, Yanxia Zhao3,*, Yungang Jia4

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 887-906, 2024, DOI:10.32604/cmes.2024.046140

    Abstract Web application fingerprint recognition is an effective security technology designed to identify and classify web applications, thereby enhancing the detection of potential threats and attacks. Traditional fingerprint recognition methods, which rely on preannotated feature matching, face inherent limitations due to the ever-evolving nature and diverse landscape of web applications. In response to these challenges, this work proposes an innovative web application fingerprint recognition method founded on clustering techniques. The method involves extensive data collection from the Tranco List, employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction. The core… More >

  • Open Access


    WebFLex: A Framework for Web Browsers-Based Peer-to-Peer Federated Learning Systems Using WebRTC

    Mai Alzamel1,*, Hamza Ali Rizvi2, Najwa Altwaijry1, Isra Al-Turaiki1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4177-4204, 2024, DOI:10.32604/cmc.2024.048370

    Abstract Scalability and information personal privacy are vital for training and deploying large-scale deep learning models. Federated learning trains models on exclusive information by aggregating weights from various devices and taking advantage of the device-agnostic environment of web browsers. Nevertheless, relying on a main central server for internet browser-based federated systems can prohibit scalability and interfere with the training process as a result of growing client numbers. Additionally, information relating to the training dataset can possibly be extracted from the distributed weights, potentially reducing the privacy of the local data used for training. In this research… More >

  • Open Access


    NAMO Géoweb

    Une plateforme pour valoriser la narration et la modélisation de l’espace géographique et des territoires

    Jean-Pierre Chery1, Marie Gradeler1, Vincent Bonnal2,3,4

    Revue Internationale de Géomatique, Vol.31, No.2, pp. 355-376, 2022, DOI:10.3166/RIG.31.355-376©2022

    Abstract Les besoins de valoriser et de partager des informations génériques et originales de différents projets de recherche, ont conduit à concevoir une plateforme géoweb dédiée, dénommée NAMO. Sa conception utilise des fonctionnalités ouvertes, libres et gratuites qui montrent leur souplesse dans une démarche agile et itérative. C’est en particulier le développement de deux dimensions de valorisation et de positionnement en géoweb 2.0 qui est souligné : la cartographie narrative et la modélisation systémique. Les dispositifs d’usage de l’information géographique, en particulier dans les démarches de co-construction et de science ouverte, peuvent ainsi être mieux outillés. More >

  • Open Access



    Frontiers in Heat and Mass Transfer, Vol.2, No.2, pp. 1-1, 2011, DOI:10.5098/hmt.v2.2.1001

    Abstract This article has no abstract. More >

  • Open Access


    Dynamic Response Impact of Vehicle Braking on Simply Supported Beam Bridges with Corrugated Steel Webs Based on Vehicle-Bridge Coupled Vibration Analysis

    Yan Wang*, Siwen Li, Na Wei

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3467-3493, 2024, DOI:10.32604/cmes.2024.046454

    Abstract A novel approach for analyzing coupled vibrations between vehicles and bridges is presented, taking into account spatiotemporal effects and mechanical phenomena resulting from vehicle braking. Efficient modeling and solution of bridge vibrations induced by vehicle deceleration are realized using this method. The method’s validity and reliability are substantiated through numerical examples. A simply supported beam bridge with a corrugated steel web is taken as an example and the effects of parameters such as the initial vehicle speed, braking acceleration, braking location, and road surface roughness on the mid-span displacement and impact factor of the bridge… More >

  • Open Access


    A Measurement Study of the Ethereum Underlying P2P Network

    Mohammad Z. Masoud1, Yousef Jaradat1, Ahmad Manasrah2, Mohammad Alia3, Khaled Suwais4,*, Sally Almanasra4

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 515-532, 2024, DOI:10.32604/cmc.2023.044504

    Abstract This work carried out a measurement study of the Ethereum Peer-to-Peer (P2P) network to gain a better understanding of the underlying nodes. Ethereum was applied because it pioneered distributed applications, smart contracts, and Web3. Moreover, its application layer language “Solidity” is widely used in smart contracts across different public and private blockchains. To this end, we wrote a new Ethereum client based on Geth to collect Ethereum node information. Moreover, various web scrapers have been written to collect nodes’ historical data from the Internet Archive and the Wayback Machine project. The collected data has been… More >

  • Open Access


    Weber Law Based Approach for Multi-Class Image Forgery Detection

    Arslan Akram1,3, Javed Rashid2,3,4, Arfan Jaffar1, Fahima Hajjej5, Waseem Iqbal6, Nadeem Sarwar7,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 145-166, 2024, DOI:10.32604/cmc.2023.041074

    Abstract Today’s forensic science introduces a new research area for digital image analysis for multimedia security. So, Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegitimate benefit or create misleading publicity by using tempered images. Exiting forgery detection methods can classify only one of the most widely used Copy-Move and splicing forgeries. However, an image can contain one or more types of forgeries. This study has proposed a hybrid method for classifying Copy-Move and splicing images using texture information of images in the spatial domain. Firstly, More >

Displaying 1-10 on page 1 of 127. Per Page