Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (44)
  • Open Access

    ARTICLE

    Neuro-Symbolic Graph Learning for Causal Inference and Continual Learning in Mental-Health Risk Assessment

    Monalisa Jena1, Noman Khan2,*, Mi Young Lee3,*, Seungmin Rho3

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.1, 2026, DOI:10.32604/cmes.2025.075119 - 29 January 2026

    Abstract Mental-health risk detection seeks early signs of distress from social media posts and clinical transcripts to enable timely intervention before crises. When such risks go undetected, consequences can escalate to self-harm, long-term disability, reduced productivity, and significant societal and economic burden. Despite recent advances, detecting risk from online text remains challenging due to heterogeneous language, evolving semantics, and the sequential emergence of new datasets. Effective solutions must encode clinically meaningful cues, reason about causal relations, and adapt to new domains without forgetting prior knowledge. To address these challenges, this paper presents a Continual Neuro-Symbolic Graph… More >

  • Open Access

    ARTICLE

    Analysis and Defense of Attack Risks under High Penetration of Distributed Energy

    Boda Zhang1,*, Fuhua Luo1, Yunhao Yu1, Chameiling Di1, Ruibin Wen1, Fei Chen2

    Energy Engineering, Vol.123, No.2, 2026, DOI:10.32604/ee.2025.069323 - 27 January 2026

    Abstract The increasing intelligence of power systems is transforming distribution networks into Cyber-Physical Distribution Systems (CPDS). While enabling advanced functionalities, the tight interdependence between cyber and physical layers introduces significant security challenges and amplifies operational risks. To address these critical issues, this paper proposes a comprehensive risk assessment framework that explicitly incorporates the physical dependence of information systems. A Bayesian attack graph is employed to quantitatively evaluate the likelihood of successful cyber attacks. By analyzing the critical scenario of fault current path misjudgment, we define novel system-level and node-level risk coupling indices to precisely measure the… More >

  • Open Access

    ARTICLE

    Machine Learning Models for Predicting Smoking-Related Health Decline and Disease Risk

    Vaskar Chakma1,*, Md Jaheid Hasan Nerab1, Abdur Rouf1, Abu Sayed2, Hossem Md Saim3, Md. Nournabi Khan3

    Journal of Intelligent Medicine and Healthcare, Vol.4, pp. 1-35, 2026, DOI:10.32604/jimh.2026.074347 - 23 January 2026

    Abstract Smoking continues to be a major preventable cause of death worldwide, affecting millions through damage to the heart, metabolism, liver, and kidneys. However, current medical screening methods often miss the early warning signs of smoking-related health problems, leading to late-stage diagnoses when treatment options become limited. This study presents a systematic comparative evaluation of machine learning approaches for smoking-related health risk assessment, emphasizing clinical interpretability and practical deployment over algorithmic innovation. We analyzed health screening data from 55,691 individuals, examining various health indicators including body measurements, blood tests, and demographic information. We tested three advanced… More >

  • Open Access

    ARTICLE

    Artificial Neural Network-Based Risk Assessment for Cardiac Implantable Electronic Device Complications

    Chih-Yin Chien1,2, Tsae-Jyy Wang1, Pei-Hung Liao1, Ying-Hsiang Lee3,4,5,*, Wei-Sho Ho6,7,*

    Congenital Heart Disease, Vol.20, No.5, pp. 601-612, 2025, DOI:10.32604/chd.2025.072431 - 30 November 2025

    Abstract Background: Cardiac implantable electronic devices (CIEDs) are essential for preventing sudden cardiac death in patients with cardiovascular diseases, but implantation procedures carry risks of complications such as infection, hematoma, and bleeding, with incidence rates of 3–4%. Previous studies have examined individual risk factors separately, but integrated predictive models are lacking. We compared the predictive performance and interpretability of artificial neural network (ANN) and logistic regression models to evaluate their respective strengths in clinical risk assessment. Methods: This retrospective study analyzed data from 180 patients who underwent cardiac implantable electronic device (CIED) implantation in Taiwan between 2017… More >

  • Open Access

    ARTICLE

    MITRE ATT&CK-Driven Threat Analysis for Edge-IoT Environment and a Quantitative Risk Scoring Model

    Tae-hyeon Yun1, Moohong Min2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 2707-2731, 2025, DOI:10.32604/cmes.2025.072357 - 26 November 2025

    Abstract The dynamic, heterogeneous nature of Edge computing in the Internet of Things (Edge-IoT) and Industrial IoT (IIoT) networks brings unique and evolving cybersecurity challenges. This study maps cyber threats in Edge-IoT/IIoT environments to the Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) framework by MITRE and introduces a lightweight, data-driven scoring model that enables rapid identification and prioritization of attacks. Inspired by the Factor Analysis of Information Risk model, our proposed scoring model integrates four key metrics: Common Vulnerability Scoring System (CVSS)-based severity scoring, Cyber Kill Chain–based difficulty estimation, Deep Neural Networks-driven detection scoring, and frequency… More >

  • Open Access

    PROCEEDINGS

    CO2 Migration Monitoring and Leakage Risk Assessment in Deep Saline Aquifers for Geological Sequestration

    Mingyu Cai1,2, Xingchun Li1,2, Kunfeng Zhang1,2,*, Shugang Yang1,2, Shuangxing Liu1,2, Ming Xue1,2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.33, No.3, pp. 1-2, 2025, DOI:10.32604/icces.2025.010490

    Abstract Deep saline aquifers account for more than 90% of the global theoretical geological CO2 sequestration capacity, making them the dominant choice for large-scale CO2 storage. These aquifers offer vast storage potential, especially in comparison to oil and gas reservoirs, which are often considered for CO2 geological sequestration. Despite their significant storage capacity, deep saline aquifers face several challenges that hinder their practical application. In particular, the lack of adequate geological infrastructure and exploration conditions for deep saline aquifers presents major obstacles to the effective monitoring of CO2 migration and predicting leakage risks. These challenges are compounded by… More >

  • Open Access

    ARTICLE

    An Improved Interval-Valued Picture Fuzzy TOPSIS Approach Based on New Divergence Measures for Risk Assessment

    Sijia Zhu1, Yuhan Li2, Prasanalakshmi Balaji3,*, Akila Thiyagarajan3, Rajanikanth Aluvalu4, Zhe Liu5,6,7,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2099-2121, 2025, DOI:10.32604/cmes.2025.068734 - 31 August 2025

    Abstract While interval-valued picture fuzzy sets (IvPFSs) provide a powerful tool for modeling uncertainty and ambiguity in various fields, existing divergence measures for IvPFSs remain limited and often produce counterintuitive results. To address these shortcomings, this paper introduces two novel divergence measures for IvPFSs, inspired by the Jensen-Shannon divergence. The fundamental properties of the proposed measures—non-degeneracy, symmetry, triangular inequality, and boundedness—are rigorously proven. Comparative analyses with existing measures are conducted through specific cases and numerical examples, clearly demonstrating the advantages of our approach. Furthermore, we apply the new divergence measures to develop an enhanced interval-valued picture More >

  • Open Access

    ARTICLE

    Comprehensive Black-Box Fuzzing of Electric Vehicle Charging Firmware via a Vehicle to Grid Network Protocol Based on State Machine Path

    Yu-Bin Kim, Dong-Hyuk Shin, Ieck-Chae Euom*

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2217-2243, 2025, DOI:10.32604/cmc.2025.063289 - 03 July 2025

    Abstract The global surge in electric vehicle (EV) adoption is proportionally expanding the EV charging station (EVCS) infrastructure, thereby increasing the attack surface and potential impact of security breaches within this critical ecosystem. While ISO 15118 standardizes EV-EVCS communication, its underspecified security guidelines and the variability in manufacturers’ implementations frequently result in vulnerabilities that can disrupt charging services, compromise user data, or affect power grid stability. This research introduces a systematic black-box fuzzing methodology, accompanied by an open-source tool, to proactively identify and mitigate such security flaws in EVCS firmware operating under ISO 15118. The proposed… More >

  • Open Access

    ARTICLE

    Optimizing outcomes in men with prostate cancer: the cardiovascular event lowering (CaELo) pathways

    E. David Crawford1, David Albala2, Marc B. Garnick3, Andrew W. Hahn4, Paul Maroni5, Rana R. McKay6, Martin Miner7, Peter Orio III8, Kshitij Pandit1, Scott Sellinger9, Evan Y. Yu10, Robert H. Eckel11

    Canadian Journal of Urology, Vol.31, No.2, pp. 11820-11825, 2024

    Abstract Introduction: Risk of cardiovascular disease is higher among men with prostate cancer than men without, and prostate cancer treatments (especially those that are hormonally based) are associated with increased cardiovascular risk.
    Materials and methods: An 11-member panel of urologic, medical, and radiation oncologists (along with a men’s health specialist and an endocrinologist/ preventive cardiologist) met to discuss current practices and challenges in the management of cardiovascular risk in prostate cancer patients who are taking androgen deprivation therapies (ADT) including LHRH analogues, alone and in combination with androgen-targeted therapies (ATTs).
    Results: The panel developed an assessment algorithm to categorize… More >

  • Open Access

    ARTICLE

    Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems

    Mohammed Amin Almaiah1,*, Leen Mohammad Saqr1, Leen Ahmad Al-Rawwash1, Layan Ahmed Altellawi1, Romel Al-Ali2,*, Omar Almomani3

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3189-3220, 2024, DOI:10.32604/cmc.2024.057673 - 18 November 2024

    Abstract Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store. Despite the increasing reliance on database management systems, this field continues to face numerous cyber-attacks. Database management systems serve as the foundation of any information system or application. Any cyber-attack can result in significant damage to the database system and loss of sensitive data. Consequently, cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats. Risk assessment aids in understanding… More >

Displaying 1-10 on page 1 of 44. Per Page