Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,589)
  • Open Access

    ARTICLE

    Tumor-Associated Macrophages Facilitate the Proliferation and Migration of Cervical Cancer Cells

    Yi Zheng1, Youyou Wang2, Chen Zou1, Bicheng Hu2, Min Zhao2, Xinxing Wu2,*

    Oncologie, Vol.24, No.1, pp. 147-161, 2022, DOI:10.32604/oncologie.2022.019236 - 31 March 2022

    Abstract Tumor-associated macrophages (TAMs) are important components in tumor microenvironment. This study intended to explore the influence of TAMs on cervical cancer cells proliferation and migration. The expression levels of TAMs markers, CD68 and CD163, in tissues were examined by immunohistochemistry and increased with the progression of cervical lesions (p < 0.05). TAMs with M2-like phenotype (PMA(Polymethacrylate) induced THP-1 cells) were noticed to promote the proliferation of cervical cancer cells and improve the migration ability of tumor cells. These enhancements were attributed to secreting soluble components and the physical contact between macrophages and tumor cells. The tumor More >

  • Open Access

    ARTICLE

    Competitive Swarm Optimization with Encryption Based Steganography for Digital Image Security

    Ala’ A. Eshmawi1, Suliman A. Alsuhibany2, Sayed Abdel-Khalek3, Romany F. Mansour4,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4173-4184, 2022, DOI:10.32604/cmc.2022.028008 - 29 March 2022

    Abstract Digital image security is a fundamental and tedious process on shared communication channels. Several methods have been employed for accomplishing security on digital image transmission, such as encryption, steganography, and watermarking. Image stenography and encryption are commonly used models to achieve improved security. Besides, optimal pixel selection process (OPSP) acts as a vital role in the encryption process. With this motivation, this study designs a new competitive swarm optimization with encryption based stenographic technique for digital image security, named CSOES-DIS technique. The proposed CSOES-DIS model aims to encrypt the secret image prior to the embedding More >

  • Open Access

    ARTICLE

    Hybrid Deep Learning Enabled Intrusion Detection in Clustered IIoT Environment

    Radwa Marzouk1, Fadwa Alrowais2, Noha Negm3, Mimouna Abdullah Alkhonaini4, Manar Ahmed Hamza5,*, Mohammed Rizwanullah5, Ishfaq Yaseen5, Abdelwahed Motwakel5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3763-3775, 2022, DOI:10.32604/cmc.2022.027483 - 29 March 2022

    Abstract Industrial Internet of Things (IIoT) is an emerging field which connects digital equipment as well as services to physical systems. Intrusion detection systems (IDS) can be designed to protect the system from intrusions or attacks. In this view, this paper presents a novel hybrid deep learning with metaheuristics enabled intrusion detection (HDL-MEID) technique for clustered IIoT environments. The HDL-MEID model mainly intends to organize the IIoT devices into clusters and enabled secure communication. Primarily, the HDL-MEID technique designs a new chaotic mayfly optimization (CMFO) based clustering approach for the effective choice of the Cluster Heads More >

  • Open Access

    ARTICLE

    Spider Monkey Optimization with Statistical Analysis for Robust Rainfall Prediction

    Mahmoud Ragab1,2,3,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4143-4155, 2022, DOI:10.32604/cmc.2022.027075 - 29 March 2022

    Abstract Rainfall prediction becomes popular in real time environment due to the developments of recent technologies. Accurate and fast rainfall predictive models can be designed by the use of machine learning (ML), statistical models, etc. Besides, feature selection approaches can be derived for eliminating the curse of dimensionality problems. In this aspect, this paper presents a novel chaotic spider money optimization with optimal kernel ridge regression (CSMO-OKRR) model for accurate rainfall prediction. The goal of the CSMO-OKRR technique is to properly predict the rainfall using the weather data. The proposed CSMO-OKRR technique encompasses three major processes More >

  • Open Access

    ARTICLE

    Fuzzy Logic with Archimedes Optimization Based Biomedical Data Classification Model

    Mahmoud Ragab1,2,3,*, Diaa Hamed4,5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4185-4200, 2022, DOI:10.32604/cmc.2022.027074 - 29 March 2022

    Abstract Medical data classification becomes a hot research topic in the healthcare sector to aid physicians in the healthcare sector for decision making. Besides, the advances of machine learning (ML) techniques assist to perform the effective classification task. With this motivation, this paper presents a Fuzzy Clustering Approach Based on Breadth-first Search Algorithm (FCA-BFS) with optimal support vector machine (OSVM) model, named FCABFS-OSVM for medical data classification. The proposed FCABFS-OSVM technique intends to classify the healthcare data by the use of clustering and classification models. Besides, the proposed FCABFS-OSVM technique involves the design of FCABFS technique More >

  • Open Access

    ARTICLE

    Underwater Terrain Image Stitching Based on Spatial Gradient Feature Block

    Zhenzhou Wang1, Jiashuo Li1, Xiang Wang1,*, Xuanhao Niu2

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4157-4171, 2022, DOI:10.32604/cmc.2022.027017 - 29 March 2022

    Abstract At present, underwater terrain images are all strip-shaped small fragment images preprocessed by the side-scan sonar imaging system. However, the processed underwater terrain images have inconspicuous and few feature points. In order to better realize the stitching of underwater terrain images and solve the problems of slow traditional image stitching speed, we proposed an improved algorithm for underwater terrain image stitching based on spatial gradient feature block. First, the spatial gradient fuzzy C-Means algorithm is used to divide the underwater terrain image into feature blocks with the fusion of spatial gradient information. The accelerated-KAZE (A-KAZE)… More >

  • Open Access

    ARTICLE

    Policy-Based Group Signature Scheme from Lattice

    Yongli Tang1, Yuanhong Li1, Qing Ye1,*, Ying Li1, Xiaojun Wang2

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4069-4085, 2022, DOI:10.32604/cmc.2022.026820 - 29 March 2022

    Abstract Although the existing group signature schemes from lattice have been optimized for efficiency, the signing abilities of each member in the group are relatively single. It may not be suitable for complex applications. Inspired by the pioneering work of Bellare and Fuchsbauer, we present a primitive called policy-based group signature. In policy-based group signatures, group members can on behalf of the group to sign documents that meet their own policies, and the generated signatures will not leak the identity and policies of the signer. Moreover, the group administrator is allowed to reveal the identity of… More >

  • Open Access

    ARTICLE

    Interest Points Analysis for Internet Forum Based on Long-Short Windows Similarity

    Xinghai Ju1, Jicang Lu1,*, Xiangyang Luo1, Gang Zhou1, Shiyu Wang1, Shunhang Li1, Yang Yang2,3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3247-3267, 2022, DOI:10.32604/cmc.2022.026698 - 29 March 2022

    Abstract For Internet forum Points of Interest (PoI), existing analysis methods are usually lack of usability analysis under different conditions and ignore the long-term variation, which lead to blindness in method selection. To address this problem, this paper proposed a PoI variation prediction framework based on similarity analysis between long and short windows. Based on the framework, this paper presented 5 PoI analysis algorithms which can be categorized into 2 types, i.e., the traditional sequence analysis methods such as autoregressive integrated moving average model (ARIMA), support vector regressor (SVR), and the deep learning methods such as… More >

  • Open Access

    ARTICLE

    Safety Helmet Wearing Detection in Aerial Images Using Improved YOLOv4

    Wei Chen1, Mi Liu1,*, Xuhong Zhou2, Jiandong Pan3, Haozhi Tan4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3159-3174, 2022, DOI:10.32604/cmc.2022.026664 - 29 March 2022

    Abstract In construction, it is important to check whether workers wear safety helmets in real time. We proposed using an unmanned aerial vehicle (UAV) to monitor construction workers in real time. As the small target of aerial photography poses challenges to safety-helmet-wearing detection, we proposed an improved YOLOv4 model to detect the helmet-wearing condition in aerial photography: (1) By increasing the dimension of the effective feature layer of the backbone network, the model's receptive field is reduced, and the utilization rate of fine-grained features is improved. (2) By introducing the cross stage partial (CSP) structure into… More >

  • Open Access

    ARTICLE

    Early Rehabilitation After Craniosynostosis Surgery

    Dan Wang1, Lanzheng Bian2, Xiaoyan Hao3, Yiming Liu1,*, Jinyue Xia4, Jing Hu5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3899-3912, 2022, DOI:10.32604/cmc.2022.026660 - 29 March 2022

    Abstract Craniosynostosis is a common congenital craniofacial deformity caused by premature ossification and closure of one or more cranial sutures. Craniosynostosis will not only affect the normal development of the skull, but also may cause a variety of complications, damage the nervous system, and cause long-term effects on the development of physical and mental health. Therefore, it is particularly important to provide new ideas for clinical treatment by studying the rehabilitation methods of craniosynostosis, and to improve the cure rate. To this end, this paper studies the early rehabilitation methods after craniosynostosis surgery and designs a… More >

Displaying 14361-14370 on page 1437 of 31589. Per Page