Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access


    A Game-Theoretic Approach to Safe Crowd Evacuation in Emergencies

    Maria Gul1, Imran Ali Khan1, Gohar Zaman2, Atta Rahman3,*, Jamaluddin Mir2, Sardar Asad Ali Biabani4,5, May Issa Aldossary6, Mustafa Youldash7, Ashraf Saadeldeen8, Maqsood Mahmud9, Asiya Abdus Salam6, Dania Alkhulaifi3, Abdullah AlTurkey3

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1631-1657, 2024, DOI:10.32604/cmc.2024.048289

    Abstract Obstacle removal in crowd evacuation is critical to safety and the evacuation system efficiency. Recently, many researchers proposed game theoretic models to avoid and remove obstacles for crowd evacuation. Game theoretical models aim to study and analyze the strategic behaviors of individuals within a crowd and their interactions during the evacuation. Game theoretical models have some limitations in the context of crowd evacuation. These models consider a group of individuals as homogeneous objects with the same goals, involve complex mathematical formulation, and cannot model real-world scenarios such as panic, environmental information, crowds that move dynamically,… More >

  • Open Access


    Reliable Data Collection Model and Transmission Framework in Large-Scale Wireless Medical Sensor Networks

    Haosong Gou1, Gaoyi Zhang1, Renê Ripardo Calixto2, Senthil Kumar Jagatheesaperumal3, Victor Hugo C. de Albuquerque2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 1077-1102, 2024, DOI:10.32604/cmes.2024.047806

    Abstract Large-scale wireless sensor networks (WSNs) play a critical role in monitoring dangerous scenarios and responding to medical emergencies. However, the inherent instability and error-prone nature of wireless links present significant challenges, necessitating efficient data collection and reliable transmission services. This paper addresses the limitations of existing data transmission and recovery protocols by proposing a systematic end-to-end design tailored for medical event-driven cluster-based large-scale WSNs. The primary goal is to enhance the reliability of data collection and transmission services, ensuring a comprehensive and practical approach. Our approach focuses on refining the hop-count-based routing scheme to achieve… More >

  • Open Access


    Characteristics of In-Hospital Patients with Congenital Heart Disease Requiring Rapid Response System Activations: A Japanese Database Study

    Taiki Haga1,*, Tomoyuki Masuyama2, Yoshiro Hayashi3, Takahiro Atsumi4, Kenzo Ishii5, Shinsuke Fujiwara6

    Congenital Heart Disease, Vol.17, No.1, pp. 31-43, 2022, DOI:10.32604/CHD.2022.017407

    Abstract Objectives: This study aimed to study the characteristics of in-hospital deterioration in patients with congenital heart disease who required rapid response system activation and identify risk factors associated with 1-month mortality. Methods: We retrospectively analysed data from a Japanese rapid response system registry with 35 participating hospitals. We included consecutive patients with congenital heart disease who required rapid response system activation between January 2014 and March 2018. Logistic regression analyses were performed to examine the associations between 1-month mortality and other patient-specific variables. Results: Among 9,607 patients for whom the rapid response system was activated, only 82… More >

  • Open Access


    A Distributed Privacy Preservation Approach for Big Data in Public Health Emergencies Using Smart Contract and SGX

    Jun Li1, 2, Jieren Cheng2, *, Naixue Xiong3, Lougao Zhan4, Yuan Zhang1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 723-741, 2020, DOI:10.32604/cmc.2020.011272

    Abstract Security and privacy issues have become a rapidly growing problem with the fast development of big data in public health. However, big data faces many ongoing serious challenges in the process of collection, storage, and use. Among them, data security and privacy problems have attracted extensive interest. In an effort to overcome this challenge, this article aims to present a distributed privacy preservation approach based on smart contracts and Intel Software Guard Extensions (SGX). First of all, we define SGX as a trusted edge computing node, design data access module, data protection module, and data… More >

Displaying 1-10 on page 1 of 4. Per Page