Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (169)
  • Open Access

    ARTICLE

    Phenolic Profiling and Bioactive Potential of Iris bucharica

    Olha Mykhailenko1,2,3,#,*, Zigmantas Gudžinskas4, Liudas Ivanauskas5, Victoriya Georgiyants1, Chia-Hung Yen6,7,8, Chung-Fan Hsieh9, Riong Seulina Panjaitan6, Tsong-Long Hwang10,11,12,13, Bing-Hung Chen14,15, Michal Korinek6,7,8,#,*

    Phyton-International Journal of Experimental Botany, Vol.95, No.1, 2026, DOI:10.32604/phyton.2026.074209 - 30 January 2026

    Abstract The sustainable sourcing of novel bioactive compounds from natural sources is crucial to the success of the pharmaceutical, food, and cosmetics industries. Iris bucharica Foster (syn. Juno bucharica (Foster) Vved.) is a promising source of novel bioactive molecules, particularly phenolic compounds, which are renowned for their antioxidant properties. In this study, we developed a reliable HPLC-UV-DAD method to identify and quantify phenolic compounds in the leaves and bulbs of I. bucharica, establishing the first set of quality control markers for this species. A total of 21 phenolic compounds were identified in the leaves, with flavonoids isoorientin, guaijaverin, hyperoside, More >

  • Open Access

    ARTICLE

    A Fractional-Order Study for Bicomplex Haemorrhagic Infection in Several Populations Conditions

    Muhammad Farman1,2,3,*, Muhammad Hashir Zubair4, Hua Li4, Kottakkaran Sooppy Nisar5,6, Mohamad Hafez7,8

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.1, 2026, DOI:10.32604/cmes.2025.074160 - 29 January 2026

    Abstract Lassa Fever (LF) is a viral hemorrhagic illness transmitted via rodents and is endemic in West Africa, causing thousands of deaths annually. This study develops a dynamic model of Lassa virus transmission, capturing the progression of the disease through susceptible, exposed, infected, and recovered populations. The focus is on simulating this model using the fractional Caputo derivative, allowing both qualitative and quantitative analyses of boundedness, positivity, and solution uniqueness. Fixed-point theory and Lipschitz conditions are employed to confirm the existence and uniqueness of solutions, while Lyapunov functions establish the global stability of both disease-free and… More >

  • Open Access

    ARTICLE

    ProRE: A Protocol Message Structure Reconstruction Method Based on Execution Slice Embedding

    Yuyao Huang, Hui Shu, Fei Kang*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.071552 - 12 January 2026

    Abstract Message structure reconstruction is a critical task in protocol reverse engineering, aiming to recover protocol field structures without access to source code. It enables important applications in network security, including malware analysis and protocol fuzzing. However, existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery, resulting in imprecise and incomplete reconstructions. In this paper, we propose ProRE, a novel method for reconstructing protocol field structures based on program execution slice embedding. ProRE extracts code slices from protocol parsing at runtime, converts them into embedding vectors using a data flow-sensitive assembly language model, More >

  • Open Access

    ARTICLE

    Advanced AI-Driven Cybersecurity Solutions: Intelligent Threat Detection, Explainability, and Adversarial Resilience

    Kirubavathi Ganapathiyappan1,*, Kiruba Marimuthu Eswaramoorthy1, Abi Thangamuthu Shanthamani1, Aksaya Venugopal1, Asita Pon Bhavya Iyyappan1, Thilaga Manickam1, Ateeq Ur Rehman2,*, Habib Hamam3,4,5,6

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-31, 2026, DOI:10.32604/cmc.2025.070067 - 09 December 2025

    Abstract The growing use of Portable Document Format (PDF) files across various sectors such as education, government, and business has inadvertently turned them into a major target for cyberattacks. Cybercriminals take advantage of the inherent flexibility and layered structure of PDFs to inject malicious content, often employing advanced obfuscation techniques to evade detection by traditional signature-based security systems. These conventional methods are no longer adequate, especially against sophisticated threats like zero-day exploits and polymorphic malware. In response to these challenges, this study introduces a machine learning-based detection framework specifically designed to combat such threats. Central to… More >

  • Open Access

    ARTICLE

    Efficient Arabic Essay Scoring with Hybrid Models: Feature Selection, Data Optimization, and Performance Trade-Offs

    Mohamed Ezz1, Meshrif Alruily1,*, Ayman Mohamed Mostafa2,*, Alaa S. Alaerjan1, Bader Aldughayfiq2, Hisham Allahem2, Abdulaziz Shehab2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-28, 2026, DOI:10.32604/cmc.2025.063189 - 10 November 2025

    Abstract Automated essay scoring (AES) systems have gained significant importance in educational settings, offering a scalable, efficient, and objective method for evaluating student essays. However, developing AES systems for Arabic poses distinct challenges due to the language’s complex morphology, diglossia, and the scarcity of annotated datasets. This paper presents a hybrid approach to Arabic AES by combining text-based, vector-based, and embedding-based similarity measures to improve essay scoring accuracy while minimizing the training data required. Using a large Arabic essay dataset categorized into thematic groups, the study conducted four experiments to evaluate the impact of feature selection,… More >

  • Open Access

    ARTICLE

    Serum interferon-beta level determined by an ultrasensitive electrochemiluminescence immunoassay is increased in clinically active and inactive systemic lupus erythematosus

    Karim Dorgham1, Omaira Da Mata Jardin1, Clara Mellot1,2, Suzanne Mouries-Martin1,2, Maude Calixte1,2, Ngoc Khanh Nguyen1, Raphael Lhote2, Julien Haroche1,2, Fleur Cohen-Aubart1,2, Micheline Pha2, Miguel Hié2, Matthias Papo2, François Chasset1,2,3, Pascale Ghillani-Dalbin4, Hans Yssel1, Zahir Amoura1,2, Guy Gorochov1,4, Alexis Mathian1,2

    European Cytokine Network, Vol.36, No.2, pp. 15-23, 2025, DOI:10.1684/ecn.2025.0502 - 27 January 2026

    Abstract Background: Type I interferons, which play an important role in the pathogenesis of various autoimmune diseases such as systemic lupus erythematosus (SLE), are expressed at very low levels under physiological conditions. In this study, we focused on IFN-beta (IFN-β) for its potential use as a biomarker of SLE activity and compared three different technologies for its quantification in the serum of healthy donors and patients with SLE. Methods: A total of 93 serum samples from healthy donors and 463 serum samples from lupus patients were tested using either ELISA, digital ELISA based on Single Molecule Array… More >

  • Open Access

    ARTICLE

    High Expression of KRT6A in Cervical Cancer and Its Promoting Effects on Cell Proliferation and Invasion

    Min Ma1,2,3,#, Zhuxiu Wang4,#, Yan Cao4, Juanying Yang4, Zeliang Zhuang5, Linqian Shi4,*, Qian Gao4,*

    BIOCELL, Vol.49, No.12, pp. 2399-2413, 2025, DOI:10.32604/biocell.2025.071255 - 24 December 2025

    Abstract Objectives: Keratin 6A (KRT6A) has been implicated in the progression of multiple malignancies; however, its expression pattern and biological role in cervical cancer (CC) have not been elucidated. This study aims to investigate KRT6A expression in CC tissues and evaluate its effects on cellular proliferation, migration, and invasion, thereby assessing its potential as a biomarker and therapeutic target. Methods: Differentially expressed genes were screened from the Gene Expression Omnibus (GEO) dataset (GSE9750) using the thresholds |log2FC| > 2 and false discovery rate (FDR) < 0.05. Immunohistochemistry was performed to evaluate KRT6A protein expression in tumor… More >

  • Open Access

    ARTICLE

    Lightweight Multi-Layered Encryption and Steganography Model for Protecting Secret Messages in MPEG Video Frames

    Sara H. Elsayed1, Rodaina Abdelsalam1, Mahmoud A. Ismail Shoman2, Raed Alotaibi3,*, Omar Reyad4,5,*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4995-5013, 2025, DOI:10.32604/cmc.2025.068429 - 23 October 2025

    Abstract Ensuring the secure transmission of secret messages, particularly through video—one of the most widely used media formats—is a critical challenge in the field of information security. Relying on a single-layered security approach is often insufficient for safeguarding sensitive data. This study proposes a triple-lightweight cryptographic and steganographic model that integrates the Hill Cipher Technique (HCT), Rotation Left Digits (RLD), and Discrete Wavelet Transform (DWT) to embed secret messages within video frames securely. The approach begins with encrypting the secret text using a private key matrix (PK1) of size 2 × 2 up to 6 × 6… More >

  • Open Access

    ARTICLE

    SSANet-Based Lightweight and Efficient Crop Disease Detection

    Hao Sun1,2, Di Cai1, Dae-Ki Kang2,*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1675-1692, 2025, DOI:10.32604/cmc.2025.067675 - 29 August 2025

    Abstract Accurately identifying crop pests and diseases ensures agricultural productivity and safety. Although current YOLO-based detection models offer real-time capabilities, their conventional convolutional layers involve high computational redundancy and a fixed receptive field, making it challenging to capture local details and global semantics in complex scenarios simultaneously. This leads to significant issues like missed detections of small targets and heightened sensitivity to background interference. To address these challenges, this paper proposes a lightweight adaptive detection network—StarSpark-AdaptiveNet (SSANet), which optimizes features through a dual-module collaborative mechanism. Specifically, the StarNet module utilizes Depthwise separable convolutions (DW-Conv) and dynamic… More >

  • Open Access

    ARTICLE

    NTSSA: A Novel Multi-Strategy Enhanced Sparrow Search Algorithm with Northern Goshawk Optimization and Adaptive t-Distribution for Global Optimization

    Hui Lv1,#, Yuer Yang2,3,4,#, Yifeng Lin2,3,*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 925-953, 2025, DOI:10.32604/cmc.2025.065709 - 29 August 2025

    Abstract It is evident that complex optimization problems are becoming increasingly prominent, metaheuristic algorithms have demonstrated unique advantages in solving high-dimensional, nonlinear problems. However, the traditional Sparrow Search Algorithm (SSA) suffers from limited global search capability, insufficient population diversity, and slow convergence, which often leads to premature stagnation in local optima. Despite the proposal of various enhanced versions, the effective balancing of exploration and exploitation remains an unsolved challenge. To address the previously mentioned problems, this study proposes a multi-strategy collaborative improved SSA, which systematically integrates four complementary strategies: (1) the Northern Goshawk Optimization (NGO) mechanism… More >

Displaying 1-10 on page 1 of 169. Per Page