Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,804)
  • Open Access

    ARTICLE

    LDAS&ET-AD: Learnable Distillation Attack Strategies and Evolvable Teachers Adversarial Distillation

    Shuyi Li, Hongchao Hu*, Xiaohan Yang, Guozhen Cheng, Wenyan Liu, Wei Guo

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.047275

    Abstract Adversarial distillation (AD) has emerged as a potential solution to tackle the challenging optimization problem of loss with hard labels in adversarial training. However, fixed sample-agnostic and student-egocentric attack strategies are unsuitable for distillation. Additionally, the reliability of guidance from static teachers diminishes as target models become more robust. This paper proposes an AD method called Learnable Distillation Attack Strategies and Evolvable Teachers Adversarial Distillation (LDAS&ET-AD). Firstly, a learnable distillation attack strategies generating mechanism is developed to automatically generate sample-dependent attack strategies tailored for distillation. A strategy model is introduced to produce attack strategies that enable adversarial examples (AEs) to… More >

  • Open Access

    ARTICLE

    Cluster Detection Method of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network

    Ruchun Jia1, Jianwei Zhang1,*, Lin Yi1, Yunxiang Han1, Feike Yang2

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.047543

    Abstract In order to enhance the accuracy of Air Traffic Control (ATC) cybersecurity attack detection, in this paper, a new clustering detection method is designed for air traffic control network security attacks. The feature set for ATC cybersecurity attacks is constructed by setting the feature states, adding recursive features, and determining the feature criticality. The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data. An autoencoder is introduced into the AI (artificial intelligence) algorithm to encode and decode the characteristics of ATC… More >

  • Open Access

    ARTICLE

    LA-D-B1, a novel Abemaciclib derivative, exerts anti-breast cancer effects through CDK4/6

    LING MA1,#, ZIRUI JIANG1,#, XIAO HOU1, YUTING XU1, ZIYUN CHEN1, SIYI ZHANG1, HANXUE LI1, SHAOJIE MA1, GENG ZHANG2, XIUJUN WANG1,*, JING JI1,*

    BIOCELL, Vol., , DOI:10.32604/biocell.2024.050868

    Abstract Background: Regulatory proteins involved in human cellular division and proliferation, cyclin-dependent kinases 4 and 6 (CDK4/6) are overexpressed in numerous cancers, including triple-negative breast cancer (TNBC). TNBC is a common pathological subtype of breast cancer that is prone to recurrence and metastasis, and has a single treatment method. As one of the CDK4/6 inhibitors, abemaciclib can effectively inhibit the growth of breast tumors. In this study, we synthesized LA-D-B1, a derivative of Abemaciclib, and investigated its anti-tumor effects in breast cancer. Methods: Cellular viability was assessed using the 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT) assay. Cell cloning and migration abilities were determined by… More >

  • Open Access

    ARTICLE

    Revealing the role of honokiol in human glioma cells by RNA-seq analysis

    YUNBAO GUO1,#, XU LIU1,#, QI XU2, XIAOTONG ZHOU3, JIAWEI LIU3, YANYAN XU2, YAN LU2,*, HAIYAN LIU2,*

    BIOCELL, Vol., , DOI:10.32604/biocell.2024.049748

    Abstract Background: Glioma is a kind of tumor that easily deteriorates and originates from glial cells in nerve tissue. Honokiol is a bisphenol compound that is an essential monomeric compound extracted from the roots and bark of Magnoliaceae plants. It also has anti-infection, antitumor, and immunomodulatory effects. In this study, we found that honokiol induces cell apoptosis in the human glioma cell lines U87-MG and U251-MG. However, the mechanism through which honokiol regulates glioma cell apoptosis is still unknown. Methods: We performed RNA-seq analysis of U251-MG cells treated with honokiol and control cells. Protein-protein interaction (PPI) network analysis was performed, and… More > Graphic Abstract

    Revealing the role of honokiol in human glioma cells by RNA-seq analysis

  • Open Access

    ARTICLE

    OPA3 overexpression modulates lipid droplet production and sensitizes colorectal cancer cells to bevacizumab treatment

    HONGBIAO WU*, DONGFANG LIU

    BIOCELL, Vol., , DOI:10.32604/biocell.2024.049466

    Abstract Background: Colorectal cancer (CRC) represents a substantial risk to public health. Bevacizumab, the first US FDA-approved antiangiogenic drug (AAD) for human CRC treatment, faces resistance in patients. The role of lipid metabolism, particularly through OPA3-regulated lipid droplet production, in overcoming this resistance is under investigation. Methods: The protein expression pattern of OPA3 in CRC primary/normal tissues was evaluated by bioinformatics analysis. OPA3-overexpressed SW-480 and HCT-116 cell lines were established, and bevacizumab resistance and OPA3 effects on cell malignancy were examined. OPA3 protein/mRNA expression and lipid droplet-related genes were measured with Western blot and qRT-PCR. OPA3 subcellular localization was detected using… More > Graphic Abstract

    OPA3 overexpression modulates lipid droplet production and sensitizes colorectal cancer cells to bevacizumab treatment

  • Open Access

    ARTICLE

    A Hybrid Machine Learning Framework for Security Intrusion Detection

    Fatimah Mudhhi Alanazi*, Bothina Abdelmeneem Elsobky, Shaimaa Aly Elmorsy

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2024.042401

    Abstract Proliferation of technology, coupled with networking growth, has catapulted cybersecurity to the forefront of modern security concerns. In this landscape, the precise detection of cyberattacks and anomalies within networks is crucial, necessitating the development of efficient intrusion detection systems (IDS). This article introduces a framework utilizing the fusion of fuzzy sets with support vector machines (SVM), named FSVM. The core strategy of FSVM lies in calculating the significance of network features to determine their relative importance. Features with minimal significance are prudently disregarded, a method akin to feature selection. This process not only curtails the computational burden of the classification… More >

  • Open Access

    ARTICLE

    Enhanced Transmission Tower Foundation Reliability Assessment: A Fuzzy Comprehensive Evaluation Framework

    Yang Li1, Zikang Zheng1,*, Jiangkun Zhang2

    Structural Durability & Health Monitoring, Vol., , DOI:10.32604/sdhm.2024.046584

    Abstract Due to the lack of a quantitative basis for the inspection, evaluation, and identification of existing transmission tower foundations, a new fuzzy comprehensive evaluation method is proposed to assess the reliability of transmission tower foundation bearing capacity. This method is based on the reliability analysis of the transmission tower foundation bearing capacity by analyzing the sensitivity of degradation of detection indexes on the reliability of transmission tower foundation bearing capacity, the weighting coefficient matrix is established about the influencing factors in the evaluation model. Through the correlation analysis between the bearing capacity degradation of the transmission tower foundation and its… More >

  • Open Access

    COMMENTARY

    Se situer dans la continuité d’un dialogue interdisciplinaire de recherche : entre transmission et renégociation du « commun »

    Cassandra Patinet*

    Psycho-Oncologie, Vol., , DOI:10.32604/po.2024.049526

    Abstract Cet article vise à éclairer les enjeux de continuité et de reprise du dialogue interdisciplinaire entre médecins et psychologues d’orientation psychanalytique sur le terrain de la recherche, après que cette collaboration se soit institutionnalisée et pérennisée sur le plan institutionnel. A partir de la mise en regard de deux dispositifs de recherche se situant dans le prolongement l’un de l’autre sur un même terrain de recherche, nous questionnerons les modalités de négociation du dialogue interdisciplinaire et les voies par lesquelles il se manifeste sur le terrain de la recherche, médié par la rencontre entre soignants et chercheurs. More >

  • Open Access

    ARTICLE

    Experimental and Numerical Investigation of the Performance of Turbulent Heat Transfer in Tubes with Different Cross-Sectioned Wire Coils

    Ali Shokor Golam*

    Frontiers in Heat and Mass Transfer, Vol., , DOI:10.32604/fhmt.2024.050218

    Abstract The thermal-hydraulic performance of plain tubes with and without wire coils in turbulent regimes is investigated experimentally and numerically. The effects of wire coil distribution (circular cross section) within the tube were explored experimentally, and water was employed as the working fluid. The numerical simulation was carried out using software programmer ANSYS Fluent 2019 R3 using the finite-volume approach. In the turbulent regime, six cross-sectioned wire coils were analyzed, including: circular, rectangular, hexagonal, square, star shape, and triangle. The utilization of a tube with a wire coil has been shown to increase heat transfer rate and pump consumption. The results… More >

  • Open Access

    ARTICLE

    Exploring Capillary Fringe Flow: Quasilinear Modeling with Kirchhoff Transforms and Gardner Model

    Rachid Karra1,*, Abdelatif Maslouhi2

    FDMP-Fluid Dynamics & Materials Processing, Vol., , DOI:10.32604/fdmp.2024.048447

    Abstract Recent studies have underscored the significance of the capillary fringe in hydrological and biochemical processes. Moreover, its role in shallow waters is expected to be considerable. Traditionally, the study of groundwater flow has centered on unsaturated-saturated zones, often overlooking the impact of the capillary fringe. In this study, we introduce a steady-state two-dimensional model that integrates the capillary fringe into a 2-D numerical solution. Our novel approach employs the potential form of the Richards equation, facilitating the determination of boundaries, pressures, and velocities across different ground surface zones. We utilized a two-dimensional Freefem++ finite element model to compute the stationary… More >

Displaying 51-60 on page 6 of 2804. Per Page