Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (78)
  • Open Access

    ARTICLE

    Novel Methodologies for Preventing Crack Propagation in Steel Gas Pipelines Considering the Temperature Effect

    Nurlan Zhangabay1,*, Ulzhan Ibraimova2, Marco Bonopera3,*, Ulanbator Suleimenov1, Konstantin Avramov4, Maryna Chernobryvko4, Aigerim Yessengali1

    Structural Durability & Health Monitoring, Vol.19, No.1, pp. 1-23, 2025, DOI:10.32604/sdhm.2024.053391 - 15 November 2024

    Abstract Using the software ANSYS-19.2/Explicit Dynamics, this study performed finite-element modeling of the large-diameter steel pipeline cross-section for the Beineu-Bozoy-Shymkent gas pipeline with a non-through straight crack, strengthened by steel wire wrapping. The effects of the thread tensile force of the steel winding in the form of single rings at the crack edges and the wires with different winding diameters and pitches were also studied. The results showed that the strengthening was preferably executed at a minimum value of the thread tensile force, which was 6.4% more effective than that at its maximum value. The analysis… More >

  • Open Access

    ARTICLE

    A Secure Blockchain-Based Vehicular Collision Avoidance Protocol: Detecting and Preventing Blackhole Attacks

    Mosab Manaseer1, Maram Bani Younes2,*

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1699-1721, 2024, DOI:10.32604/csse.2024.055128 - 22 November 2024

    Abstract This work aims to examine the vulnerabilities and threats in the applications of intelligent transport systems, especially collision avoidance protocols. It focuses on achieving the availability of network communication among traveling vehicles. Finally, it aims to find a secure solution to prevent blackhole attacks on vehicular network communications. The proposed solution relies on authenticating vehicles by joining a blockchain network. This technology provides identification information and receives cryptography keys. Moreover, the ad hoc on-demand distance vector (AODV) protocol is used for route discovery and ensuring reliable node communication. The system activates an adaptive mode for monitoring More >

  • Open Access

    REVIEW

    mRNA vaccines: a new era in vaccine development

    SHUBHRA CHANDRA1,2, JENNIFER C. WILSON1,2, DAVID GOOD3, MING Q. WEI1,2,*

    Oncology Research, Vol.32, No.10, pp. 1543-1564, 2024, DOI:10.32604/or.2024.043987 - 18 September 2024

    Abstract The advent of RNA therapy, particularly through the development of mRNA cancer vaccines, has ushered in a new era in the field of oncology. This article provides a concise overview of the key principles, recent advancements, and potential implications of mRNA cancer vaccines as a groundbreaking modality in cancer treatment. mRNA cancer vaccines represent a revolutionary approach to combatting cancer by leveraging the body’s innate immune system. These vaccines are designed to deliver specific mRNA sequences encoding cancer-associated antigens, prompting the immune system to recognize and mount a targeted response against malignant cells. This personalized… More > Graphic Abstract

    mRNA vaccines: a new era in vaccine development

  • Open Access

    ARTICLE

    Modern Mobile Malware Detection Framework Using Machine Learning and Random Forest Algorithm

    Mohammad Ababneh*, Ayat Al-Droos, Ammar El-Hassan

    Computer Systems Science and Engineering, Vol.48, No.5, pp. 1171-1191, 2024, DOI:10.32604/csse.2024.052875 - 13 September 2024

    Abstract With the high level of proliferation of connected mobile devices, the risk of intrusion becomes higher. Artificial Intelligence (AI) and Machine Learning (ML) algorithms started to feature in protection software and showed effective results. These algorithms are nonetheless hindered by the lack of rich datasets and compounded by the appearance of new categories of malware such that the race between attackers’ malware, especially with the assistance of Artificial Intelligence tools and protection solutions makes these systems and frameworks lose effectiveness quickly. In this article, we present a framework for mobile malware detection based on a… More >

  • Open Access

    ARTICLE

    Machine Learning Enabled Novel Real-Time IoT Targeted DoS/DDoS Cyber Attack Detection System

    Abdullah Alabdulatif1, Navod Neranjan Thilakarathne2,*, Mohamed Aashiq3,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3655-3683, 2024, DOI:10.32604/cmc.2024.054610 - 12 September 2024

    Abstract The increasing prevalence of Internet of Things (IoT) devices has introduced a new phase of connectivity in recent years and, concurrently, has opened the floodgates for growing cyber threats. Among the myriad of potential attacks, Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks remain a dominant concern due to their capability to render services inoperable by overwhelming systems with an influx of traffic. As IoT devices often lack the inherent security measures found in more mature computing platforms, the need for robust DoS/DDoS detection systems tailored to IoT is paramount for… More >

  • Open Access

    REVIEW

    Immunomodulatory and chemopreventive effects of resveratrol on the digestive system cancers

    MEIR DJALDETTI*

    Oncology Research, Vol.32, No.9, pp. 1389-1399, 2024, DOI:10.32604/or.2024.049745 - 23 August 2024

    Abstract Resveratrol (RSV), the primary polyphenol found in grapes, has been revealed to have anti-inflammatory properties by reducing the capacity of the peripheral blood mononuclear cells to produce pro-inflammatory cytokines, including IL-1β, IL-6, IL-1ra and TNFα. Considering the close association between chronic inflammation and cancer development, RSV’s immunomodulatory properties are one way by which the polyphenol may inhibit cancer initiation, proliferation, neovascularization, and migration. Resveratrol influences the generation of microtumor environment which is one of the key factors in cancer progress. In addition to immunomodulation, RSV inhibits cancer development by expressing anti-oxidant effects, causing cell cycle… More > Graphic Abstract

    Immunomodulatory and chemopreventive effects of resveratrol on the digestive system cancers

  • Open Access

    ARTICLE

    LSTM Based Neural Network Model for Anomaly Event Detection in Care-Independent Smart Homes

    Brij B. Gupta1,2,3,*, Akshat Gaurav4, Razaz Waheeb Attar5, Varsha Arya6,7, Ahmed Alhomoud8, Kwok Tai Chui9

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2689-2706, 2024, DOI:10.32604/cmes.2024.050825 - 08 July 2024

    Abstract This study introduces a long-short-term memory (LSTM)-based neural network model developed for detecting anomaly events in care-independent smart homes, focusing on the critical application of elderly fall detection. It balances the dataset using the Synthetic Minority Over-sampling Technique (SMOTE), effectively neutralizing bias to address the challenge of unbalanced datasets prevalent in time-series classification tasks. The proposed LSTM model is trained on the enriched dataset, capturing the temporal dependencies essential for anomaly recognition. The model demonstrated a significant improvement in anomaly detection, with an accuracy of 84%. The results, detailed in the comprehensive classification and confusion More >

  • Open Access

    ARTICLE

    Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Applications

    Ibraheem Al-Hejri1, Farag Azzedin1,*, Sultan Almuhammadi1, Naeem Firdous Syed2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4197-4218, 2024, DOI:10.32604/cmc.2024.047117 - 20 June 2024

    Abstract The use of the Internet of Things (IoT) is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices. In critical infrastructure domains like oil and gas supply, intelligent transportation, power grids, and autonomous agriculture, it is essential to guarantee the confidentiality, integrity, and authenticity of data collected and exchanged. However, the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques. Consequently, designing a lightweight secure More >

  • Open Access

    ARTICLE

    Transient Stability Preventive Control of Wind Farm Connected Power System Considering the Uncertainty

    Yuping Bian*, Xiu Wan, Xiaoyu Zhou

    Energy Engineering, Vol.121, No.6, pp. 1637-1656, 2024, DOI:10.32604/ee.2024.047678 - 21 May 2024

    Abstract To address uncertainty as well as transient stability constraints simultaneously in the preventive control of wind farm systems, a novel three-stage optimization strategy is established in this paper. In the first stage, the probabilistic multi-objective particle swarm optimization based on the point estimate method is employed to cope with the stochastic factors. The transient security region of the system is accurately ensured by the interior point method in the second stage. Finally, the verification of the final optimal objectives and satisfied constraints are enforced in the last stage. Furthermore, the proposed strategy is a general More >

  • Open Access

    ARTICLE

    Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust

    Xiaoyan Zhu1, Ruchun Jia2, Tingrui Zhang3, Song Yao4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4363-4377, 2024, DOI:10.32604/cmc.2023.045615 - 26 March 2024

    Abstract The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect, which is easy to leads to the problem that the data is usurped. Starting from the application of the ATC (automatic train control) network, this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data. Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation, this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of… More >

Displaying 1-10 on page 1 of 78. Per Page