Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (203)
  • Open Access

    ARTICLE

    Performance-Oriented Layout Synthesis for Quantum Computing

    Chi-Chou Kao1,*, Hung-Yi Lin2

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1581-1594, 2024, DOI:10.32604/csse.2024.055073 - 22 November 2024

    Abstract Layout synthesis in quantum computing is crucial due to the physical constraints of quantum devices where quantum bits (qubits) can only interact effectively with their nearest neighbors. This constraint severely impacts the design and efficiency of quantum algorithms, as arranging qubits optimally can significantly reduce circuit depth and improve computational performance. To tackle the layout synthesis challenge, we propose an algorithm based on integer linear programming (ILP). ILP is well-suited for this problem as it can formulate the optimization objective of minimizing circuit depth while adhering to the nearest neighbor interaction constraint. The algorithm aims… More >

  • Open Access

    ARTICLE

    Trust Score-Based Malicious Vehicle Detection Scheme in Vehicular Network Environments

    Wenming Wang1,2,3,*, Zhiquan Liu1, Shumin Zhang1, Guijiang Liu1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2517-2545, 2024, DOI:10.32604/cmc.2024.055184 - 18 November 2024

    Abstract Advancements in the vehicular network technology enable real-time interconnection, data sharing, and intelligent cooperative driving among vehicles. However, malicious vehicles providing illegal and incorrect information can compromise the interests of vehicle users. Trust mechanisms serve as an effective solution to this issue. In recent years, many researchers have incorporated blockchain technology to manage and incentivize vehicle nodes, incurring significant overhead and storage requirements due to the frequent ingress and egress of vehicles within the area. In this paper, we propose a distributed vehicular network scheme based on trust scores. Specifically, the designed architecture partitions multiple More >

  • Open Access

    REVIEW

    Glutamine transporters as effective targets in digestive system malignant tumor treatment

    FEI CHU1, KAI TONG1, XIANG GU1, MEI BAO1, YANFEN CHEN1, BIN WANG2, YANHUA SHAO1, LING WEI1,*

    Oncology Research, Vol.32, No.10, pp. 1661-1671, 2024, DOI:10.32604/or.2024.048287 - 18 September 2024

    Abstract Glutamine is one of the most abundant non-essential amino acids in human plasma and plays a crucial role in many biological processes of the human body. Tumor cells take up a large amount of glutamine to meet their rapid proliferation requirements, which is supported by the upregulation of glutamine transporters. Targeted inhibition of glutamine transporters effectively inhibits cell growth and proliferation in tumors. Among all cancers, digestive system malignant tumors (DSMTs) have the highest incidence and mortality rates, and the current therapeutic strategies for DSMTs are mainly surgical resection and chemotherapy. Due to the relatively More > Graphic Abstract

    Glutamine transporters as effective targets in digestive system malignant tumor treatment

  • Open Access

    ARTICLE

    Exosomal microRNA let-7c-5p enhances cell malignant characteristics by inhibiting TAGLN in oral cancer

    YI LI1, TIANYI WANG1, HAORAN DING1, SHIYONG ZHUANG1, XIAOBO DAI1, BING YAN1,2,*

    Oncology Research, Vol.32, No.10, pp. 1623-1635, 2024, DOI:10.32604/or.2024.048191 - 18 September 2024

    Abstract Background: Oral cancer, a malignancy that is prevalent worldwide, is often diagnosed at an advanced stage. MicroRNAs (miRNAs) in circulating exosomes have emerged as promising cancer biomarkers. The role of miRNA let-7c-5p in oral cancer remains underexplored, and its potential involvement in tumorigenesis warrants comprehensive investigation. Methods: Serum samples from 30 patients with oral cancer and 20 healthy controls were used to isolate exosomes and quantify their RNA content. Isolation of the exosomes was confirmed through transmission electron microscopy. Quantitative PCR was used to assess the miRNA profiles. The effects of let-7c-5p and TAGLN overexpression… More >

  • Open Access

    RETRACTION

    Retraction: MicroRNA-940 Targets INPP4A or GSK3β and Activates the Wntβ-Catenin Pathway to Regulate the Malignant Behavior of Bladder Cancer Cells

    Oncology Research Editorial Office

    Oncology Research, Vol.32, No.9, pp. 1537-1537, 2024, DOI:10.32604/or.2024.056125 - 23 August 2024

    Abstract This article has no abstract. More >

  • Open Access

    CORRECTION

    Correction: Long non-coding RNA LINC02163 accelerates malignant tumor behaviors in breast cancer by regulating the microRNA-511-3p/HMGA2 axis as a competing endogenous RNA

    CHENGLIN QIN1,2, LINFANG JIN1,3, JIA LI1,4, WENZHANG ZHA2, HUIMING DING2, XIAORONG LIU1,5, XUN ZHU1,*

    Oncology Research, Vol.32, No.9, pp. 1517-1522, 2024, DOI:10.32604/or.2024.051893 - 23 August 2024

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    A Probabilistic Trust Model and Control Algorithm to Protect 6G Networks against Malicious Data Injection Attacks in Edge Computing Environments

    Borja Bordel Sánchez1,*, Ramón Alcarria2, Tomás Robles1

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 631-654, 2024, DOI:10.32604/cmes.2024.050349 - 20 August 2024

    Abstract Future 6G communications are envisioned to enable a large catalogue of pioneering applications. These will range from networked Cyber-Physical Systems to edge computing devices, establishing real-time feedback control loops critical for managing Industry 5.0 deployments, digital agriculture systems, and essential infrastructures. The provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and unsupervised. While full automation will enhance industrial efficiency significantly, it concurrently introduces new cyber risks and vulnerabilities. In particular, unattended systems are highly susceptible to trust issues: malicious nodes and false information can be easily introduced into… More >

  • Open Access

    ARTICLE

    PKHD1L1 blocks the malignant behavior of lung adenocarcinoma cells and restricts tumor growth by regulating CBX7

    KEWEI CHENG1, LEI SHI1, CAIWEN SHI1, SHUANSHUAN XIE2, CHANGHUI WANG2,*

    BIOCELL, Vol.48, No.8, pp. 1209-1221, 2024, DOI:10.32604/biocell.2024.049626 - 02 August 2024

    Abstract Objective: To explore the role of polycystic kidney and hepatic disease 1-like 1 (PKHD1L1) in lung adenocarcinoma (LUAD). Methods: Bioinformatics tools were utilized to examine the clinical profile of PKHD1L1 and chromobox protein homolog 7 (CBX7) in LUAD. The Cell Counting Kit-8, colony formation, terminal deoxynucleotidyl transferase dUTP nick end labeling, Transwell, and wound-healing assays were carried out to assess the proliferative, apoptotic, invasive, and migrative capacities of the cells. Furthermore, the interrelation between PKHD1L1 and CBX7 was validated using a co-immunoprecipitation assay. A LUAD mice model was constructed by subcutaneous injection of A549 cells.… More >

  • Open Access

    ARTICLE

    A GAN-EfficientNet-Based Traceability Method for Malicious Code Variant Families

    Li Li*, Qing Zhang, Youran Kong

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 801-818, 2024, DOI:10.32604/cmc.2024.051916 - 18 July 2024

    Abstract Due to the diversity and unpredictability of changes in malicious code, studying the traceability of variant families remains challenging. In this paper, we propose a GAN-EfficientNetV2-based method for tracing families of malicious code variants. This method leverages the similarity in layouts and textures between images of malicious code variants from the same source and their original family of malicious code images. The method includes a lightweight classifier and a simulator. The classifier utilizes the enhanced EfficientNetV2 to categorize malicious code images and can be easily deployed on mobile, embedded, and other devices. The simulator utilizes… More >

  • Open Access

    ARTICLE

    Mesures d’accessibilité géographique aux soins de santé dans le district sanitaire de Bougouni au Mali

    Sidiki Traoré1,2,*

    Revue Internationale de Géomatique, Vol.33, pp. 167-182, 2024, DOI:10.32604/rig.2024.052696 - 27 June 2024

    Abstract Au Mali, l’accès à la santé est une préoccupation majeure. Il est devenu une priorité nationale depuis la déclaration d’Alma-Ata en 1978. Dès lors, des efforts importants ont été consentis par l’État et ses partenaires pour atteindre cet objectif. Ces efforts semblent insuffisants dans le district sanitaire de Bougouni, car, plus de la moitié de la population reste très loin des services de santé de base. Face à ce constat, évaluer l’accessibilité géographique aux soins de santé est essentiel pour identifier les localités qui ont été laissées pour compte, d’’où l’objet de cette recherche dans… More >

Displaying 1-10 on page 1 of 203. Per Page