Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (49)
  • Open Access

    ARTICLE

    Three-Dimensional Trajectory Planning for Robotic Manipulators Using Model Predictive Control and Point Cloud Optimization

    Zeinel Momynkulov1,2, Azhar Tursynova1,2,*, Olzhas Olzhayev1,2, Akhanseri Ikramov1,2, Sayat Ibrayev1, Batyrkhan Omarov1,2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 891-918, 2025, DOI:10.32604/cmes.2025.068615 - 30 October 2025

    Abstract Robotic manipulators increasingly operate in complex three-dimensional workspaces where accuracy and strict limits on position, velocity, and acceleration must be satisfied. Conventional geometric planners emphasize path smoothness but often ignore dynamic feasibility, motivating control-aware trajectory generation. This study presents a novel model predictive control (MPC) framework for three-dimensional trajectory planning of robotic manipulators that integrates second-order dynamic modeling and multi-objective parameter optimization. Unlike conventional interpolation techniques such as cubic splines, B-splines, and linear interpolation, which neglect physical constraints and system dynamics, the proposed method generates dynamically feasible trajectories by directly optimizing over acceleration inputs while… More >

  • Open Access

    ARTICLE

    The Psychological Manipulation of Phishing Emails: A Cognitive Bias Approach

    Yulin Yao, Kangfeng Zheng, Bin Wu*, Chunhua Wu, Jiaqi Gao, Jvjie Wang, Minjiao Yang

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4753-4776, 2025, DOI:10.32604/cmc.2025.065059 - 23 October 2025

    Abstract Cognitive biases are commonly used by attackers to manipulate users’ psychology in phishing emails. This study systematically analyzes the exploitation of cognitive biases in phishing emails and addresses the following questions: (1) Which cognitive biases are frequently exploited in phishing emails? (2) How are cognitive biases exploited in phishing emails? (3) How effective are cognitive bias features in detecting phishing emails? (4) How can the exploitation of cognitive biases in phishing emails be modelled? To address these questions, this study constructed a cognitive processing model that explains how attackers manipulate users by leveraging cognitive biases More >

  • Open Access

    ARTICLE

    ETV1 transcriptional manipulation of KIFC1 regulates the progression of pancreatic cancer

    FANGFANG HU1, ZHIBIN BAI2, YANG WANG1, HAODONG TANG3, JIAHUA ZHOU1,*

    Oncology Research, Vol.33, No.7, pp. 1723-1737, 2025, DOI:10.32604/or.2025.059631 - 26 June 2025

    Abstract Background: Kinesin-14 family protein 1 (KIFC1) is abnormally overexpressed in various cancers, and the transcription factor ETS variant 1 (ETV1) is an oncogenic transcription factor in tumors. The potential binding sites on the KIFC1 promoter by ETV1 were observed; however, no evidence supports that ETV1 targets KIFC1. Aims: This study aimed to investigate the relationship between KIFC1 and ETV1, and their effects and mechanisms in pancreatic cancer. Methods: Pan-cancer analysis of KIFC1 expression was performed in GEPIA2 database. KIFC1 expression levels were determined by immunohistochemistry (IHC) in our pancreatic cancer cohort. The correlation between KIFC1… More >

  • Open Access

    ARTICLE

    DDT-Net: Deep Detail Tracking Network for Image Tampering Detection

    Jim Wong1,2, Zhaoxiang Zang3,*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3451-3469, 2025, DOI:10.32604/cmc.2025.061006 - 16 April 2025

    Abstract In the field of image forensics, image tampering detection is a critical and challenging task. Traditional methods based on manually designed feature extraction typically focus on a specific type of tampering operation, which limits their effectiveness in complex scenarios involving multiple forms of tampering. Although deep learning-based methods offer the advantage of automatic feature learning, current approaches still require further improvements in terms of detection accuracy and computational efficiency. To address these challenges, this study applies the U-Net 3+ model to image tampering detection and proposes a hybrid framework, referred to as DDT-Net (Deep Detail… More >

  • Open Access

    ARTICLE

    A Low-Collision and Efficient Grasping Method for Manipulator Based on Safe Reinforcement Learning

    Qinglei Zhang, Bai Hu*, Jiyun Qin, Jianguo Duan, Ying Zhou

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1257-1273, 2025, DOI:10.32604/cmc.2025.059955 - 26 March 2025

    Abstract Grasping is one of the most fundamental operations in modern robotics applications. While deep reinforcement learning (DRL) has demonstrated strong potential in robotics, there is too much emphasis on maximizing the cumulative reward in executing tasks, and the potential safety risks are often ignored. In this paper, an optimization method based on safe reinforcement learning (Safe RL) is proposed to address the robotic grasping problem under safety constraints. Specifically, considering the obstacle avoidance constraints of the system, the grasping problem of the manipulator is modeled as a Constrained Markov Decision Process (CMDP). The Lagrange multiplier… More >

  • Open Access

    REVIEW

    Recent Developments in Bioadhesives and Binders

    Hong Lei1, Xiaojian Zhou2, Antonio Pizzi3,*, Guanben Du2,*, Xuedong Xi2

    Journal of Renewable Materials, Vol.13, No.2, pp. 199-249, 2025, DOI:10.32604/jrm.2025.02024-0048 - 20 February 2025

    Abstract This review is composed of three main parts each of which is written by well-known top specialists that have been, in a way or other, also the main participants of the majority of the developments reported. Thus, after a general part covering the grand lines and more in-depth views of more recent tannin, lignin, carbohydrate and soy bioadhesives, some mix of the other bio raw materials with soy protein and soy flour and some other differently sourced bioadhesives for wood, this review presents a more in-depth part on starch-based wood adhesives and a more in-depth… More > Graphic Abstract

    Recent Developments in Bioadhesives and Binders

  • Open Access

    PROCEEDINGS

    Multi-Scale Microstructure Manipulation of an Additively Manufactured CoCrNi Medium Entropy Alloy for Superior Mechanical Properties and Tunable Mechanical Anisotropy

    Chenze Li1, Manish Jain1,2, Qian Liu1, Zhuohan Cao1, Michael Ferry3, Jamie J. Kruzic1, Bernd Gludovatz1, Xiaopeng Li1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.31, No.4, pp. 1-2, 2024, DOI:10.32604/icces.2024.011290

    Abstract Laser powder bed fusion (LPBF) additive manufacturing (AM) technology has become a versatile tool for producing new microstructures in metal components, offering novel mechanical properties for different applications. In this work, enhanced ductility (~55% elongation) and tunable mechanical anisotropy (ratio of ductility along vertical to horizontal orientation from ~0.2 to ~1) were achieved for a CoCrNi medium entropy alloy (MEA) by multi-scale synergistic microstructure manipulation (i.e., melt pool boundary, grain morphology and crystallographic texture) through adjusting key LPBF processing parameters (e.g., laser power and scan speed). By increasing the volumetric energy density (VED) from 68.3… More >

  • Open Access

    PROCEEDINGS

    Wave and Particle Manipulation by Acoustic and Electromagnetic Metamaterials

    Xiaobing Cai1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.30, No.4, pp. 1-1, 2024, DOI:10.32604/icces.2024.012376

    Abstract Acoustic and Electromagnetic Metamaterials/Metasurface have demonstrated various fascinating functionalities in wave manipulation. However, further employment of the manipulated wave for controlling the movement of discrete particle matter is not so widely investigated. Particle matter, also known as granular matter, granular material etc, is the most common form of matter in nature, and so the effective control of granular matter is closely related to engineering and daily life. The use of sound waves and electromagnetic waves to manipulate the granular matter has been widely used in printing, environmental protection, pharmaceuticals and many other fields. However, in… More >

  • Open Access

    PROCEEDINGS

    Mechanism, Manipulation and Application of the Bubble Micromotor

    Leilei Wang1, Li Chen2, Haihang Cui2, Xu Zheng1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.30, No.2, pp. 1-2, 2024, DOI:10.32604/icces.2024.011434

    Abstract The emerging technique of artificial micro/nano-motors [1] provides a vivid example of the idea using tiny machines to finish jobs in microscopic world. Among many micro/nano-motors, microbubble driven micromotor is a unique type that can reach the highest propulsion speed [2, 3], owing to the high surface energy of the bubble and the focused hydrodynamic jet during bubble collapse that can significantly enhance micromotor’s propulsion. Recent progress has demonstrated that the microbubble itself can implement new functions for the micromotor based on bubble dynamics and induced hydrodynamic flow, rather than merely providing energy. For instance,… More >

  • Open Access

    REVIEW

    Survey on Video Security: Examining Threats, Challenges, and Future Trends

    Ali Asghar1,#, Amna Shifa2,#, Mamoona Naveed Asghar2,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3591-3635, 2024, DOI:10.32604/cmc.2024.054654 - 12 September 2024

    Abstract Videos represent the most prevailing form of digital media for communication, information dissemination, and monitoring. However, their widespread use has increased the risks of unauthorised access and manipulation, posing significant challenges. In response, various protection approaches have been developed to secure, authenticate, and ensure the integrity of digital videos. This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality, integrity, and availability of video content, and examining how it can be manipulated. It then investigates current developments in the field of video security by exploring two critical research questions. First, it… More >

Displaying 1-10 on page 1 of 49. Per Page