Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (61)
  • Open Access

    ARTICLE

    Variation in the Composition of the Essential Oil of Commercial Salvia officinalis L. Leaves Samples from Different Countries

    Ain Raal1,*, Anne Orav2, Tetiana Ilina3, Alla Kovalyova4, Taras Koliadzhyn3, Yuliia Avidzba5, Oleh Koshovyi1,4,*

    Phyton-International Journal of Experimental Botany, Vol.93, No.8, pp. 2051-2062, 2024, DOI:10.32604/phyton.2024.052790

    Abstract Salvia officinalis L. (Lamiaceae) leaves and its essential oil is used for mouth and throat disorders, skin disorders, minor wounds, and gastrointestinal disorders, and is widely used worldwide. The research aimed to conduct a comparative study of the composition of S. officinalis essential oils from commercial samples, and their main chemotypes. The volatile constituents from S. officinalis leaves were investigated using gas chromatography (GC). The commercial samples of sage leaves were obtained from retail pharmacies in nine mainly European countries. The yield of essential oil in S. officinalis commercial leaves was between 10.0 and 24.8 mL/kg. The principal components More > Graphic Abstract

    Variation in the Composition of the Essential Oil of Commercial <i>Salvia officinalis</i> L. Leaves Samples from Different Countries

  • Open Access

    ARTICLE

    Fake News Detection Based on Cross-Modal Message Aggregation and Gated Fusion Network

    Fangfang Shan1,2,*, Mengyao Liu1,2, Menghan Zhang1,2, Zhenyu Wang1,2

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1521-1542, 2024, DOI:10.32604/cmc.2024.053937

    Abstract Social media has become increasingly significant in modern society, but it has also turned into a breeding ground for the propagation of misleading information, potentially causing a detrimental impact on public opinion and daily life. Compared to pure text content, multmodal content significantly increases the visibility and share ability of posts. This has made the search for efficient modality representations and cross-modal information interaction methods a key focus in the field of multimodal fake news detection. To effectively address the critical challenge of accurately detecting fake news on social media, this paper proposes a fake… More >

  • Open Access

    ARTICLE

    A Multilayer Network Constructed for Herb and Prescription Efficacy Analysis

    Xindi Huang1, Liwei Liang1, Sakirin Tam2, Hao Liang3, Xiong Cai4, Changsong Ding1,5,*

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 691-704, 2024, DOI:10.32604/csse.2022.029970

    Abstract Chinese Medicine (CM) has been widely used as an important avenue for disease prevention and treatment in China especially in the form of CM prescriptions combining sets of herbs to address patients’ symptoms and syndromes. However, the selection and compatibility of herbs are complex and abstract due to intrinsic relationships between herbal properties and their overall functions. Network analysis is applied to demonstrate the complex relationships between individual herbal efficacy and the overall function of CM prescriptions. To illustrate their connections and correlations, prescription function (PF), prescription herb (PH), and herbal efficacy (HE) intra-networks are… More >

  • Open Access

    ARTICLE

    Static Analysis Techniques for Fixing Software Defects in MPI-Based Parallel Programs

    Norah Abdullah Al-Johany1,*, Sanaa Abdullah Sharaf1,2, Fathy Elbouraey Eassa1,2, Reem Abdulaziz Alnanih1,2,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3139-3173, 2024, DOI:10.32604/cmc.2024.047392

    Abstract The Message Passing Interface (MPI) is a widely accepted standard for parallel computing on distributed memory systems. However, MPI implementations can contain defects that impact the reliability and performance of parallel applications. Detecting and correcting these defects is crucial, yet there is a lack of published models specifically designed for correcting MPI defects. To address this, we propose a model for detecting and correcting MPI defects (DC_MPI), which aims to detect and correct defects in various types of MPI communication, including blocking point-to-point (BPTP), nonblocking point-to-point (NBPTP), and collective communication (CC). The defects addressed by… More >

  • Open Access

    ARTICLE

    Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells

    Chanumolu Kiran Kumar, Nandhakumar Ramachandran*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3151-3176, 2024, DOI:10.32604/cmc.2023.043534

    Abstract Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions, vulnerabilities, and assaults. Complex security systems, such as Intrusion Detection Systems (IDS), are essential due to the limitations of simpler security measures, such as cryptography and firewalls. Due to their compact nature and low energy reserves, wireless networks present a significant challenge for security procedures. The features of small cells can cause threats to the network. Network Coding (NC) enabled small cells are vulnerable to various types of attacks. Avoiding attacks and performing secure “peer” to “peer” data transmission is… More >

  • Open Access

    EDITORIAL

    Editorial: Welcome Message from Editor-in-Chief, Xuming Mo

    Xuming Mo*

    Congenital Heart Disease, Vol.19, No.1, pp. 1-3, 2024, DOI:10.32604/chd.2024.051192

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault

    Syeda Wajiha Zahra1, Muhammad Nadeem2, Ali Arshad3,*, Saman Riaz3, Muhammad Abu Bakr4, Ashit Kumar Dutta5, Zaid Alzaid6, Badr Almutairi7, Sultan Almotairi8

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 589-616, 2024, DOI:10.32604/cmc.2023.042386

    Abstract Various organizations store data online rather than on physical servers. As the number of user’s data stored in cloud servers increases, the attack rate to access data from cloud servers also increases. Different researchers worked on different algorithms to protect cloud data from replay attacks. None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack. This study presents the development of a TKN (Text, Key and Name) cryptographic algorithm aimed at protecting data from replay attacks. The program employs distinct ways to encrypt plain text [P], a user-defined Key… More >

  • Open Access

    ARTICLE

    An End-To-End Hyperbolic Deep Graph Convolutional Neural Network Framework

    Yuchen Zhou1, Hongtao Huo1, Zhiwen Hou1, Lingbin Bu1, Yifan Wang1, Jingyi Mao1, Xiaojun Lv2, Fanliang Bu1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 537-563, 2024, DOI:10.32604/cmes.2023.044895

    Abstract Graph Convolutional Neural Networks (GCNs) have been widely used in various fields due to their powerful capabilities in processing graph-structured data. However, GCNs encounter significant challenges when applied to scale-free graphs with power-law distributions, resulting in substantial distortions. Moreover, most of the existing GCN models are shallow structures, which restricts their ability to capture dependencies among distant nodes and more refined high-order node features in scale-free graphs with hierarchical structures. To more broadly and precisely apply GCNs to real-world graphs exhibiting scale-free or hierarchical structures and utilize multi-level aggregation of GCNs for capturing high-level information… More >

  • Open Access

    ARTICLE

    Analytical and Numerical Methods to Study the MFPT and SR of a Stochastic Tumor-Immune Model

    Ying Zhang1, Wei Li1,*, Guidong Yang1, Snezana Kirin2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2177-2199, 2024, DOI:10.32604/cmes.2023.030728

    Abstract The Mean First-Passage Time (MFPT) and Stochastic Resonance (SR) of a stochastic tumor-immune model with noise perturbation are discussed in this paper. Firstly, considering environmental perturbation, Gaussian white noise and Gaussian colored noise are introduced into a tumor growth model under immune surveillance. As follows, the long-time evolution of the tumor characterized by the Stationary Probability Density (SPD) and MFPT is obtained in theory on the basis of the Approximated Fokker-Planck Equation (AFPE). Herein the recurrence of the tumor from the extinction state to the tumor-present state is more concerned in this paper. A more… More >

  • Open Access

    ARTICLE

    Addressing the Issues and Developments Correlated with Envisaged 5G Mobile Technologies: Comprehensive Solutions

    Idrees Sarhan Kocher*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2205-2223, 2023, DOI:10.32604/cmc.2023.039392

    Abstract Fifth Generation (5G) communications are regarded as the cornerstone to household consumer experience improvements and smart manufacturing revolution from the standpoint of industries' objectives. It is anticipated that Envisaged 5G (E5G) mobile technology would be operational in certain developed countries by 2023. The Internet of Things (IoTs) will transform how humans live when combined with smart and integrated sensing devices, such as in-home sensing devices. Recent research is being carried out all over the world to produce a new technique that can be crucial in the success of the anticipated 5G mobile technology. High output,… More >

Displaying 1-10 on page 1 of 61. Per Page