Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (158)
  • Open Access

    ARTICLE

    Puerarin mediated miR-30b-5p targeting fibroblast activation protein against oral submucous fibrosis

    SAIFEI XIE1,2,4, HUI XIE2,*, JINCAI GUO3, JIN TAN4, YULIN YU1, MINYI ZHANG1, SHANG WEN1

    BIOCELL, Vol.48, No.4, pp. 591-599, 2024, DOI:10.32604/biocell.2024.046691

    Abstract Background: Puerarin (Pue) has been reported to be a natural active ingredient with multiple antifibrotic properties. This work aimed at exploring the function of Pue in oral submucous fibrosis (OSF) treatment. Methods: Human oral mucosa fibroblasts (hOMF) were induced with transforming growth factor beta1 (TGF-β1) and intervened with Pue. Expressions of fibrosis-related markers were analyzed by Western blot and IF staining. Cell viability was characterized by the CCK-8 assay. Expressions of miR-30 family members were quantified by qRT-PCR. The correlation between fibroblast activation protein (FAP) and miR-30 family expression was evaluated by the Pearson correlation coefficient. Bioinformatics prediction and dual-luciferase… More > Graphic Abstract

    Puerarin mediated miR-30b-5p targeting fibroblast activation protein against oral submucous fibrosis

  • Open Access

    ARTICLE

    A Security Trade-Off Scheme of Anomaly Detection System in IoT to Defend against Data-Tampering Attacks

    Bing Liu1, Zhe Zhang1, Shengrong Hu2, Song Sun3,*, Dapeng Liu4, Zhenyu Qiu5

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4049-4069, 2024, DOI:10.32604/cmc.2024.048099

    Abstract Internet of Things (IoT) is vulnerable to data-tampering (DT) attacks. Due to resource limitations, many anomaly detection systems (ADSs) for IoT have high false positive rates when detecting DT attacks. This leads to the misreporting of normal data, which will impact the normal operation of IoT. To mitigate the impact caused by the high false positive rate of ADS, this paper proposes an ADS management scheme for clustered IoT. First, we model the data transmission and anomaly detection in clustered IoT. Then, the operation strategy of the clustered IoT is formulated as the running probabilities of all ADSs deployed on… More >

  • Open Access

    ARTICLE

    Enhancing IoT Security: Quantum-Level Resilience against Threats

    Hosam Alhakami*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 329-356, 2024, DOI:10.32604/cmc.2023.043439

    Abstract The rapid growth of the Internet of Things (IoT) operations has necessitated the incorporation of quantum computing technologies to meet its expanding needs. This integration is motivated by the need to solve the specific issues provided by the expansion of IoT and the potential benefits that quantum computing can offer in this scenario. The combination of IoT and quantum computing creates new privacy and security problems. This study examines the critical need to prevent potential security concerns from quantum computing in IoT applications. We investigate the incorporation of quantum computing approaches within IoT security frameworks, with a focus on developing… More >

  • Open Access

    ARTICLE

    A Novel Non-Isolated Cubic DC-DC Converter with High Voltage Gain for Renewable Energy Power Generation System

    Qin Yao, Yida Zeng*, Qingui Jia

    Energy Engineering, Vol.121, No.1, pp. 221-241, 2024, DOI:10.32604/ee.2023.041028

    Abstract In recent years, switched inductor (SL) technology, switched capacitor (SC) technology, and switched inductor-capacitor (SL-SC) technology have been widely applied to optimize and improve DC-DC boost converters, which can effectively enhance voltage gain and reduce device stress. To address the issue of low output voltage in current renewable energy power generation systems, this study proposes a novel non-isolated cubic high-gain DC-DC converter based on the traditional quadratic DC-DC boost converter by incorporating a SC and a SL-SC unit. Firstly, the proposed converter’s details are elaborated, including its topology structure, operating mode, voltage gain, device stress, and power loss. Subsequently, a… More >

  • Open Access

    REVIEW

    New perspectives on biology, disease progression, and therapy response of head and neck cancer gained from single cell RNA sequencing and spatial transcriptomics

    GERWIN HELLER1,*, THORSTEN FUEREDER1, ALEXANDER MICHAEL GRANDITS1, ROTRAUD WIESER1,2,*

    Oncology Research, Vol.32, No.1, pp. 1-17, 2024, DOI:10.32604/or.2023.044774

    Abstract Head and neck squamous cell carcinoma (HNSCC) is one of the most frequent cancers worldwide. The main risk factors are consumption of tobacco products and alcohol, as well as infection with human papilloma virus. Approved therapeutic options comprise surgery, radiation, chemotherapy, targeted therapy through epidermal growth factor receptor inhibition, and immunotherapy, but outcome has remained unsatisfactory due to recurrence rates of ~50% and the frequent occurrence of second primaries. The availability of the human genome sequence at the beginning of the millennium heralded the omics era, in which rapid technological progress has advanced our knowledge of the molecular biology of… More >

  • Open Access

    ARTICLE

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

    Laila M. Halman, Mohammed J. F. Alenazi*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1469-1483, 2024, DOI:10.32604/cmes.2023.028077

    Abstract The healthcare sector holds valuable and sensitive data. The amount of this data and the need to handle, exchange, and protect it, has been increasing at a fast pace. Due to their nature, software-defined networks (SDNs) are widely used in healthcare systems, as they ensure effective resource utilization, safety, great network management, and monitoring. In this sector, due to the value of the data, SDNs face a major challenge posed by a wide range of attacks, such as distributed denial of service (DDoS) and probe attacks. These attacks reduce network performance, causing the degradation of different key performance indicators (KPIs)… More > Graphic Abstract

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

  • Open Access

    ARTICLE

    Collaborative Detection and Prevention of Sybil Attacks against RPL-Based Internet of Things

    Muhammad Ali Khan1, Rao Naveed Bin Rais2,*, Osman Khalid1

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 827-843, 2023, DOI:10.32604/cmc.2023.040756

    Abstract The Internet of Things (IoT) comprises numerous resource-constrained devices that generate large volumes of data. The inherent vulnerabilities in IoT infrastructure, such as easily spoofed IP and MAC addresses, pose significant security challenges. Traditional routing protocols designed for wired or wireless networks may not be suitable for IoT networks due to their limitations. Therefore, the Routing Protocol for Low-Power and Lossy Networks (RPL) is widely used in IoT systems. However, the built-in security mechanism of RPL is inadequate in defending against sophisticated routing attacks, including Sybil attacks. To address these issues, this paper proposes a centralized and collaborative approach for… More >

  • Open Access

    ARTICLE

    Honeypot Game Theory against DoS Attack in UAV Cyber

    Shangting Miao1, Yang Li2,*, Quan Pan2

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2745-2762, 2023, DOI:10.32604/cmc.2023.037257

    Abstract A space called Unmanned Aerial Vehicle (UAV) cyber is a new environment where UAV, Ground Control Station (GCS) and business processes are integrated. Denial of service (DoS) attack is a standard network attack method, especially suitable for attacking the UAV cyber. It is a robust security risk for UAV cyber and has recently become an active research area. Game theory is typically used to simulate the existing offensive and defensive mechanisms for DoS attacks in a traditional network. In addition, the honeypot, an effective security vulnerability defense mechanism, has not been widely adopted or modeled for defense against DoS attack… More >

  • Open Access

    ARTICLE

    VeriFace: Defending against Adversarial Attacks in Face Verification Systems

    Awny Sayed1, Sohair Kinlany2, Alaa Zaki2, Ahmed Mahfouz2,3,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3151-3166, 2023, DOI:10.32604/cmc.2023.040256

    Abstract Face verification systems are critical in a wide range of applications, such as security systems and biometric authentication. However, these systems are vulnerable to adversarial attacks, which can significantly compromise their accuracy and reliability. Adversarial attacks are designed to deceive the face verification system by adding subtle perturbations to the input images. These perturbations can be imperceptible to the human eye but can cause the system to misclassify or fail to recognize the person in the image. To address this issue, we propose a novel system called VeriFace that comprises two defense mechanisms, adversarial detection, and adversarial removal. The first… More >

  • Open Access

    ARTICLE

    Comparative transcriptome analysis provides insights into the molecular mechanism of the anti-nematode role of Arachis hypogaea (Fabales: Fabaceae) against Meloidogyne incognita (Tylenchida: Heteroderidae)

    XUEJIN YANG1,2,#, YUANYUAN ZHOU1,#, XINYI PENG1, XIAOHONG FU1, JIANQING MA1, JIANFENG LIU1,*, DANDAN CAO1,2,*

    BIOCELL, Vol.47, No.9, pp. 2101-2113, 2023, DOI:10.32604/biocell.2023.029581

    Abstract Background: Plant root-knot nematode (RKN) disease is a serious threat to agricultural production across the world. Meloidogyne incognita is the most prominent pathogen to the vegetables and cash crops cultivated. Arachis hypogaea can effectively inhibit M. incognita, but the underlying defense mechanism is still unclear. Methods: In our study, the chemotaxis and infestation of the second-stage juveniles (J2s) of M. incognita to A. hypogaea root tips were observed by the Pluronic F-127 system and stained with sodium hypochlorite acid fuchsin, respectively. The transcriptome data of A. hypogaea roots with non-infected or infected by J2s were analyzed. Results: The J2s could… More >

Displaying 1-10 on page 1 of 158. Per Page