Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,887)
  • Open Access

    REVIEW

    Internet of Things Authentication Protocols: Comparative Study

    Souhayla Dargaoui1, Mourade Azrour1,*, Ahmad El Allaoui1, Azidine Guezzaz2, Abdulatif Alabdulatif3, Abdullah Alnajim4

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 65-91, 2024, DOI:10.32604/cmc.2024.047625

    Abstract Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 and smart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still the biggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services provided by an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures, data, and devices. Authentication, as the first line of defense against security threats, becomes the priority of everyone. It can either grant or deny users access to resources according… More >

  • Open Access

    ARTICLE

    Levels of evidence and grades of recommendation supporting European society for medical oncology clinical practice guidelines

    MARKO SKELIN1,2,3,*, BRUNA PERKOV-STIPIČIN1, SANJA VUŠKOVIĆ4, MARINA ŠANDRK PLEHAČEK5, ANE BAŠIĆ6, DAVID ŠARČEVIĆ7, MAJA ILIĆ8, IVAN KREČAK2,3,9

    Oncology Research, Vol.32, No.5, pp. 807-815, 2024, DOI:10.32604/or.2024.048948

    Abstract Background: The European Society for Medical Oncology (ESMO) guidelines are among the most comprehensive and widely used clinical practice guidelines (CPGs) globally. However, the level of scientific evidence supporting ESMO CPG recommendations has not been systematically investigated. This study assessed ESMO CPG levels of evidence (LOE) and grades of recommendations (GOR), as well as their trends over time across various cancer settings. Methods: We manually extracted every recommendation with the Infectious Diseases Society of America (IDSA) classification from each CPG. We examined the distribution of LOE and GOR in all available ESMO CPG guidelines across different topics and cancer types.… More >

  • Open Access

    ARTICLE

    Decoupling Algorithms for the Gravitational Wave Spacecraft

    Xue Wang1,2, Weizhou Zhu1,2, Zhao Cui2,3, Xingguang Qian2,3, Jinke Yang1,2, Jianjun Jia1,2,*, Yikun Wang2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 325-337, 2024, DOI:10.32604/cmes.2024.048804

    Abstract The gravitational wave spacecraft is a complex multi-input multi-output dynamic system. The gravitational wave detection mission requires the spacecraft to achieve single spacecraft with two laser links and high-precision control. Establishing one spacecraft with two laser links, compared to one spacecraft with a single laser link, requires an upgraded decoupling algorithm for the link establishment. The decoupling algorithm we designed reassigns the degrees of freedom and forces in the control loop to ensure sufficient degrees of freedom for optical axis control. In addressing the distinct dynamic characteristics of different degrees of freedom, a transfer function compensation method is used in… More >

  • Open Access

    ARTICLE

    NFHP-RN: A Method of Few-Shot Network Attack Detection Based on the Network Flow Holographic Picture-ResNet

    Tao Yi1,3, Xingshu Chen1,2,*, Mingdong Yang3, Qindong Li1, Yi Zhu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 929-955, 2024, DOI:10.32604/cmes.2024.048793

    Abstract Due to the rapid evolution of Advanced Persistent Threats (APTs) attacks, the emergence of new and rare attack samples, and even those never seen before, make it challenging for traditional rule-based detection methods to extract universal rules for effective detection. With the progress in techniques such as transfer learning and meta-learning, few-shot network attack detection has progressed. However, challenges in few-shot network attack detection arise from the inability of time sequence flow features to adapt to the fixed length input requirement of deep learning, difficulties in capturing rich information from original flow in the case of insufficient samples, and the… More >

  • Open Access

    ARTICLE

    Aggravation of Cancer, Heart Diseases and Diabetes Subsequent to COVID-19 Lockdown via Mathematical Modeling

    Fatma Nese Efil1, Sania Qureshi1,2,3, Nezihal Gokbulut1,4, Kamyar Hosseini1,3, Evren Hincal1,4,*, Amanullah Soomro2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 485-512, 2024, DOI:10.32604/cmes.2024.047907

    Abstract The global population has been and will continue to be severely impacted by the COVID-19 epidemic. The primary objective of this research is to demonstrate the future impact of COVID-19 on those who suffer from other fatal conditions such as cancer, heart disease, and diabetes. Here, using ordinary differential equations (ODEs), two mathematical models are developed to explain the association between COVID-19 and cancer and between COVID-19 and diabetes and heart disease. After that, we highlight the stability assessments that can be applied to these models. Sensitivity analysis is used to examine how changes in certain factors impact different aspects… More >

  • Open Access

    ARTICLE

    Deep Learning Social Network Access Control Model Based on User Preferences

    Fangfang Shan1,2,*, Fuyang Li1, Zhenyu Wang1, Peiyu Ji1, Mengyi Wang1, Huifang Sun1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 1029-1044, 2024, DOI:10.32604/cmes.2024.047665

    Abstract A deep learning access control model based on user preferences is proposed to address the issue of personal privacy leakage in social networks. Firstly, social users and social data entities are extracted from the social network and used to construct homogeneous and heterogeneous graphs. Secondly, a graph neural network model is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network. Then, high-order neighbor nodes, hidden neighbor nodes, displayed neighbor nodes, and social data nodes are used to update user nodes… More >

  • Open Access

    ARTICLE

    Perception Enhanced Deep Deterministic Policy Gradient for Autonomous Driving in Complex Scenarios

    Lyuchao Liao1,2, Hankun Xiao2,*, Pengqi Xing2, Zhenhua Gan1,2, Youpeng He2, Jiajun Wang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 557-576, 2024, DOI:10.32604/cmes.2024.047452

    Abstract Autonomous driving has witnessed rapid advancement; however, ensuring safe and efficient driving in intricate scenarios remains a critical challenge. In particular, traffic roundabouts bring a set of challenges to autonomous driving due to the unpredictable entry and exit of vehicles, susceptibility to traffic flow bottlenecks, and imperfect data in perceiving environmental information, rendering them a vital issue in the practical application of autonomous driving. To address the traffic challenges, this work focused on complex roundabouts with multi-lane and proposed a Perception Enhanced Deep Deterministic Policy Gradient (PE-DDPG) for Autonomous Driving in the Roundabouts. Specifically, the model incorporates an enhanced variational… More >

  • Open Access

    ARTICLE

    Scheme Based on Multi-Level Patch Attention and Lesion Localization for Diabetic Retinopathy Grading

    Zhuoqun Xia1, Hangyu Hu1, Wenjing Li2,3, Qisheng Jiang1, Lan Pu1, Yicong Shu1, Arun Kumar Sangaiah4,5,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 409-430, 2024, DOI:10.32604/cmes.2024.030052

    Abstract Early screening of diabetes retinopathy (DR) plays an important role in preventing irreversible blindness. Existing research has failed to fully explore effective DR lesion information in fundus maps. Besides, traditional attention schemes have not considered the impact of lesion type differences on grading, resulting in unreasonable extraction of important lesion features. Therefore, this paper proposes a DR diagnosis scheme that integrates a multi-level patch attention generator (MPAG) and a lesion localization module (LLM). Firstly, MPAG is used to predict patches of different sizes and generate a weighted attention map based on the prediction score and the types of lesions contained… More >

  • Open Access

    ARTICLE

    Vers une transformation géométrique géocentrique des espaces urbains : la ville vue à partir du ou des centre(s)

    Cyril Enault*

    Revue Internationale de Géomatique, Vol.33, pp. 77-92, 2024, DOI:10.32604/rig.2024.046591

    Abstract La théorie égocentrée est aujourd’hui bien connue des éthologues et des psychologues mais moins diffusée chez les géographes car elle reste encore à l’état de théorie abstraite. Ce papier se propose dans un premier temps de rendre opérationnel cette approche dans le cadre de travaux géographiques à l’échelle de l’individu. Puis, elle envisage d’établir le lien entre l’échelle individu et l’échelle de la ville avec comme objectif de produire des cartes déformées de la ville. More > Graphic Abstract

    Vers une transformation géométrique géocentrique des espaces urbains : la ville vue à partir du ou des centre(s)

  • Open Access

    ARTICLE

    Securing Mobile Cloud-Based Electronic Health Records: A Blockchain-Powered Cryptographic Solution with Enhanced Privacy and Efficiency

    Umer Nauman1, Yuhong Zhang2, Zhihui Li3, Tong Zhen1,3,*

    Journal of Intelligent Medicine and Healthcare, Vol.2, pp. 15-34, 2024, DOI:10.32604/jimh.2024.048784

    Abstract The convergence of handheld devices and cloud-based computing has transformed how Electronic Health Records (EHRs) are stored in mobile cloud paradigms, offering benefits such as affordability, adaptability, and portability. However, it also introduces challenges regarding network security and data confidentiality, as it aims to exchange EHRs among mobile users while maintaining high levels of security. This study proposes an innovative blockchain-based solution to these issues and presents secure cloud storage for healthcare data. To provide enhanced cryptography, the proposed method combines an enhanced Blowfish encryption method with a new key generation technique called Elephant Herding Optimization with Resistance-Based Training (EHO-RBT).… More >

Displaying 11-20 on page 2 of 2887. Per Page