Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (23)
  • Open Access

    ARTICLE

    Comparative Analysis of Reaction to Fire and Flammability of Hemp Shives Insulation Boards with Incorporated Microencapsulated Phase Change Materials

    Inga Zotova1,*, Edgars Kirilovs1, Laura Ziemele2

    Journal of Renewable Materials, Vol.12, No.3, pp. 603-613, 2024, DOI:10.32604/jrm.2024.047607

    Abstract Nowadays buildings contain innovative materials, materials from local resources, production surpluses and rapidly renewable natural resources. Phase Change Materials (PCM) are one such group of novel materials which reduce building energy consumption. With the wider availability of microencapsulated PCM, there is an opportunity to develop a new type of insulating materials, combinate PCM with traditional insulation materials for latent heat energy storage. These materials are typically flammable and are located on the interior wall finishing yet there has been no detailed assessment of their fire performance. In this research work prototypes of low-density insulating boards for indoor spaces from hemp… More > Graphic Abstract

    Comparative Analysis of Reaction to Fire and Flammability of Hemp Shives Insulation Boards with Incorporated Microencapsulated Phase Change Materials

  • Open Access

    ARTICLE

    EduASAC: A Blockchain-Based Education Archive Sharing and Access Control System

    Ronglei Hu1, Chuce He1, Yaping Chi2, Xiaoyi Duan1, Xiaohong Fan1, Ping Xu1, Wenbin Gao1,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3387-3422, 2023, DOI:10.32604/cmc.2023.042000

    Abstract In the education archive sharing system, when performing homomorphic ciphertext retrieval on the storage server, there are problems such as low security of shared data, confusing parameter management, and weak access control. This paper proposes an Education Archives Sharing and Access Control (EduASAC) system to solve these problems. The system research goal is to realize the sharing of security parameters, the execution of access control, and the recording of system behaviors based on the blockchain network, ensuring the legitimacy of shared membership and the security of education archives. At the same time, the system can be combined with most homomorphic… More >

  • Open Access

    REVIEW

    Exosomes in viral infection: Effects for pathogenesis and treatment strategies

    FATEMEH HEIDARI1,2, REIHANEH SEYEDEBRAHIMI1,2, PIAO YANG3, MOHSEN ESLAMI FARSANI1,2, SHIMA ABABZADEH2,4, NASER KALHOR5, HAMED MANOOCHEHRI6, MOHSEN SHEYKHHASAN7,*, MARYAM AZIMZADEH8,9,*

    BIOCELL, Vol.47, No.12, pp. 2597-2608, 2023, DOI:10.32604/biocell.2023.043351

    Abstract Exosomes are small vesicles that carry molecules from one cell to another. They have many features that make them interesting for research, such as their stability, low immunogenicity, size of the nanoscale, toxicity, and selective delivery. Exosomes can also interact with viruses in diverse ways. Emerging research highlights the significant role of exosomes in viral infections, particularly in the context of diseases like COVID-19, HIV, HBV and HCV. Understanding the intricate interplay between exosomes and the human immune system holds great promise for the development of effective antiviral therapies. An important aspect is gaining clarity on how exosomes influence the… More >

  • Open Access

    ARTICLE

    Construction of a Computational Scheme for the Fuzzy HIV/AIDS Epidemic Model with a Nonlinear Saturated Incidence Rate

    Muhammad Shoaib Arif1,2,*, Kamaleldin Abodayeh1, Yasir Nawaz2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1405-1425, 2024, DOI:10.32604/cmes.2023.028946

    Abstract This work aimed to construct an epidemic model with fuzzy parameters. Since the classical epidemic model does not elaborate on the successful interaction of susceptible and infective people, the constructed fuzzy epidemic model discusses the more detailed versions of the interactions between infective and susceptible people. The next-generation matrix approach is employed to find the reproduction number of a deterministic model. The sensitivity analysis and local stability analysis of the system are also provided. For solving the fuzzy epidemic model, a numerical scheme is constructed which consists of three time levels. The numerical scheme has an advantage over the existing… More >

  • Open Access

    ARTICLE

    Research on Multi-Blockchain Electronic Archives Sharing Model

    Fang Yu1, Wenbin Bi2, Ning Cao3,*, Jun Luo4, Diantang An5, Liqiang Ding4, Russell Higgs6

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3921-3931, 2023, DOI:10.32604/cmc.2023.028330

    Abstract The purpose of introducing blockchain into electronic archives sharing and utilization is to break the information barrier between electronic archives sharing departments by relying on technologies such as smart contract and asymmetric encryption. Aiming at the problem of dynamic permission management in common access control methods, a new access control method based on smart contract under blockchain is proposed, which improves the intelligence level under blockchain technology. Firstly, the Internet attribute access control model based on smart contract is established. For the dynamic access of heterogeneous devices, the management contract, permission judgment contract and access control contract are designed; Secondly,… More >

  • Open Access

    ARTICLE

    A Novel Collaborative Evolutionary Algorithm with Two-Population for Multi-Objective Flexible Job Shop Scheduling

    Cuiyu Wang, Xinyu Li, Yiping Gao*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 1849-1870, 2023, DOI:10.32604/cmes.2023.028098

    Abstract Job shop scheduling (JS) is an important technology for modern manufacturing. Flexible job shop scheduling (FJS) is critical in JS, and it has been widely employed in many industries, including aerospace and energy. FJS enables any machine from a certain set to handle an operation, and this is an NP-hard problem. Furthermore, due to the requirements in real-world cases, multi-objective FJS is increasingly widespread, thus increasing the challenge of solving the FJS problems. As a result, it is necessary to develop a novel method to address this challenge. To achieve this goal, a novel collaborative evolutionary algorithm with two-population based… More >

  • Open Access

    ARTICLE

    Construction of Intelligent Recommendation Retrieval Model of FuJian Intangible Cultural Heritage Digital Archives Resources

    Xueqing Liao*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 677-690, 2023, DOI:10.32604/iasc.2023.037219

    Abstract In order to improve the consistency between the recommended retrieval results and user needs, improve the recommendation efficiency, and reduce the average absolute deviation of resource retrieval, a design method of intelligent recommendation retrieval model for Fujian intangible cultural heritage digital archive resources based on knowledge atlas is proposed. The TG-LDA (Tag-granularity LDA) model is proposed on the basis of the standard LDA (Linear Discriminant Analysis) model. The model is used to mine archive resource topics. The Pearson correlation coefficient is used to measure the relevance between topics. Based on the measurement results, the FastText deep learning model is used… More >

  • Open Access

    ARTICLE

    Research on the Development Model of University Archives Cultural Products Based on Deep Learning

    Qiong Luo*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3141-3158, 2023, DOI:10.32604/csse.2023.038017

    Abstract The products of an archival culture in colleges and universities are the final result of the development of archival cultural resources, and the development of archival cultural effects in colleges and universities should be an important part of improving the artistic level of libraries. The existing RippleNet model doesn’t consider the influence of key nodes on recommendation results, and the recommendation accuracy is not high. Therefore, based on the RippleNet model, this paper introduces the influence of complex network nodes into the model and puts forward the Cn RippleNet model. The performance of the model is verified by experiments, which… More >

  • Open Access

    ARTICLE

    The Influence of Saturated and Bilinear Incidence Functions on the Dynamical Behavior of HIV Model Using Galerkin Scheme Having a Polynomial of Order Two

    Attaullah1,*, Kamil Zeb1, Abdullah Mohamed2

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1661-1685, 2023, DOI:10.32604/cmes.2023.023059

    Abstract Mathematical modelling has been extensively used to measure intervention strategies for the control of contagious conditions. Alignment between different models is pivotal for furnishing strong substantiation for policymakers because the differences in model features can impact their prognostications. Mathematical modelling has been widely used in order to better understand the transmission, treatment, and prevention of infectious diseases. Herein, we study the dynamics of a human immunodeficiency virus (HIV) infection model with four variables: S (t), I (t), C (t), and A (t) the susceptible individuals; HIV infected individuals (with no clinical symptoms of AIDS); HIV infected individuals (under ART with… More >

  • Open Access

    ARTICLE

    Numerical Analysis for the Effect of Irresponsible Immigrants on HIV/AIDS Dynamics

    Muhammad Tariq Ali1, Dumitru Baleanu2,3,4, Muhammad Rafiq5, Jan Awrejcewicz6, Nauman Ahmed7, Ali Raza8,*, Muhammad Sajid Iqbal9, Muhammad Ozair Ahmad7

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1479-1496, 2023, DOI:10.32604/iasc.2023.033157

    Abstract The human immunodeficiency viruses are two species of Lentivirus that infect humans. Over time, they cause acquired immunodeficiency syndrome, a condition in which progressive immune system failure allows life-threatening opportunistic infections and cancers to thrive. Human immunodeficiency virus infection came from a type of chimpanzee in Central Africa. Studies show that immunodeficiency viruses may have jumped from chimpanzees to humans as far back as the late 1800s. Over decades, human immunodeficiency viruses slowly spread across Africa and later into other parts of the world. The Susceptible-Infected-Recovered (SIR) models are significant in studying disease dynamics. In this paper, we have studied… More >

Displaying 1-10 on page 1 of 23. Per Page