Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (382)
  • Open Access

    ARTICLE

    Blockchain-Empowered Token-Based Access Control System with User Reputation Evaluation

    Yuzheng Yang*, Zhe Tu, Ying Liu, Huachun Zhou

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3163-3184, 2023, DOI:10.32604/cmc.2023.043974

    Abstract Currently, data security and privacy protection are becoming more and more important. Access control is a method of authorization for users through predefined policies. Token-based access control (TBAC) enhances the manageability of authorization through the token. However, traditional access control policies lack the ability to dynamically adjust based on user access behavior. Incorporating user reputation evaluation into access control can provide valuable feedback to enhance system security and flexibility. As a result, this paper proposes a blockchain-empowered TBAC system and introduces a user reputation evaluation module to provide feedback on access control. The TBAC system divides the access control process… More >

  • Open Access

    ARTICLE

    Evaluation of combined detection of nuclear factor erythroid 2-related factor 2 and glutathione peroxidase 4 in primary hepatic carcinoma and preliminary exploration of pathogenesis

    JIE DUAN, AIDONG GU*, WEI CHEN, CHANGHAO CHEN, FANGNAN SONG, FAXI CHEN, FANGFANG JIANG, HUIWEN XING

    BIOCELL, Vol.47, No.12, pp. 2609-2615, 2023, DOI:10.32604/biocell.2023.042472

    Abstract Objective: This study aims to analyze the clinical significance and mechanism of nuclear factor erythroid 2-related factor 2 (NRF2) and glutathione peroxidase 4 (GPX4) in primary hepatic carcinoma (PHC). Methods: The expression of NRF2 and GPX4 in peripheral blood of patients with PHC was determined to analyze the diagnostic value of the two combined for PHC. The prognostic significance of NRF2 and GPX4 was evaluated by 3-year follow-up. Human liver epithelial cells THLE-2 and human hepatocellular carcinoma cells HepG2 were purchased, and the expression of NRF2 and GPX4 in the cells was determined. NRF2 and GPX4 aberrant expression vectors were… More > Graphic Abstract

    Evaluation of combined detection of nuclear factor erythroid 2-related factor 2 and glutathione peroxidase 4 in primary hepatic carcinoma and preliminary exploration of pathogenesis

  • Open Access

    ARTICLE

    Experimental Evaluation of Individual Hotspots of a Multicore Microprocessor Using Pulsating Heat Sources

    Rodrigo Vidonscky Pinto1, Flávio Augusto Sanzovo Fiorelli2,*

    Frontiers in Heat and Mass Transfer, Vol.21, pp. 427-443, 2023, DOI:10.32604/fhmt.2023.041917

    Abstract The present work provides an experimental and numerical procedure to obtain the geometrical position of the hotspots of a microprocessor using the thermal images obtained from the transient thermal response of this processor subject to pulsating stress tests. This is performed by the solution of the steady inverse heat transfer problem using these thermal images, resulting in qualitative heat source distributions; these are analyzed using the mean heat source gradients to identify the elements that can be considered hotspots. This procedure identified that the processor INTEL Core 2 Quad Q8400S contains one hotspot located in the center of its left… More >

  • Open Access

    ARTICLE

    Assessment of Dependent Performance Shaping Factors in SPAR-H Based on Pearson Correlation Coefficient

    Xiaoyan Su1,*, Shuwen Shang1, Zhihui Xu2, Hong Qian1, Xiaolei Pan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1813-1826, 2024, DOI:10.32604/cmes.2023.030957

    Abstract With the improvement of equipment reliability, human factors have become the most uncertain part in the system. The standardized Plant Analysis of Risk-Human Reliability Analysis (SPAR-H) method is a reliable method in the field of human reliability analysis (HRA) to evaluate human reliability and assess risk in large complex systems. However, the classical SPAR-H method does not consider the dependencies among performance shaping factors (PSFs), which may cause overestimation or underestimation of the risk of the actual situation. To address this issue, this paper proposes a new method to deal with the dependencies among PSFs in SPAR-H based on the… More > Graphic Abstract

    Assessment of Dependent Performance Shaping Factors in SPAR-H Based on Pearson Correlation Coefficient

  • Open Access

    ARTICLE

    A Robust Conformer-Based Speech Recognition Model for Mandarin Air Traffic Control

    Peiyuan Jiang1, Weijun Pan1,*, Jian Zhang1, Teng Wang1, Junxiang Huang2

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 911-940, 2023, DOI:10.32604/cmc.2023.041772

    Abstract

    This study aims to address the deviation in downstream tasks caused by inaccurate recognition results when applying Automatic Speech Recognition (ASR) technology in the Air Traffic Control (ATC) field. This paper presents a novel cascaded model architecture, namely Conformer-CTC/Attention-T5 (CCAT), to build a highly accurate and robust ATC speech recognition model. To tackle the challenges posed by noise and fast speech rate in ATC, the Conformer model is employed to extract robust and discriminative speech representations from raw waveforms. On the decoding side, the Attention mechanism is integrated to facilitate precise alignment between input features and output characters. The Text-To-Text… More >

  • Open Access

    ARTICLE

    Information Security Evaluation of Industrial Control Systems Using Probabilistic Linguistic MCDM Method

    Wenshu Xu, Mingwei Lin*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 199-222, 2023, DOI:10.32604/cmc.2023.041475

    Abstract Industrial control systems (ICSs) are widely used in various fields, and the information security problems of ICSs are increasingly serious. The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts. Thus, this paper introduces the probabilistic linguistic term sets (PLTSs) to model the evaluation information of experts. Meanwhile, we propose a probabilistic linguistic multi-criteria decision-making (PL-MCDM) method to solve the information security assessment problem of ICSs. Firstly, we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods. Secondly, we use the Best Worst Method (BWM) method and Criteria… More >

  • Open Access

    ARTICLE

    Comparative Evaluation of Data Mining Algorithms in Breast Cancer

    Fuad A. M. Al-Yarimi*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 633-645, 2023, DOI:10.32604/cmc.2023.038858

    Abstract Unchecked breast cell growth is one of the leading causes of death in women globally and is the cause of breast cancer. The only method to avoid breast cancer-related deaths is through early detection and treatment. The proper classification of malignancies is one of the most significant challenges in the medical industry. Due to their high precision and accuracy, machine learning techniques are extensively employed for identifying and classifying various forms of cancer. Several data mining algorithms were studied and implemented by the author of this review and compared them to the present parameters and accuracy of various algorithms for… More >

  • Open Access

    ARTICLE

    Preventing Health Anxiety: The Role of Self-Evaluation, Sense of Coherence, Self-Rated Health and Perceived Social Support

    Sándor Csibi1, Mónika Csibi2,*, József Bognár1

    International Journal of Mental Health Promotion, Vol.25, No.10, pp. 1081-1088, 2023, DOI:10.32604/ijmhp.2023.029390

    Abstract Background: Components of Self, completed with the perceived social support determine the individual differences in the evaluation of a stressor and the behavioral responses toward it, such as health-related anxiety. The study set as a goal the analysis of associations between the components of Self, such as self-evaluation, sense of coherence, perceived social support, and reported health-related anxiety in an adult sample. Methods: 147 adults from the 18–73 age group (mean age 37.5) voluntarily completed the questionnaire through Qualtrics online platform containing the Short Health Anxiety Inventory, Core Self-Evaluation Scale, Social Support Assessing Scale, and one Health Self-Evaluation Item. Results:More >

  • Open Access

    REVIEW

    Blockchain Security Threats and Collaborative Defense: A Literature Review

    Xiulai Li1,2,3,4, Jieren Cheng1,3,*, Zhaoxin Shi2,3, Jingxin Liu2,3, Bin Zhang1,3, Xinbing Xu2,3, Xiangyan Tang1,3, Victor S. Sheng5

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2597-2629, 2023, DOI:10.32604/cmc.2023.040596

    Abstract As a distributed database, the system security of the blockchain is of great significance to prevent tampering, protect privacy, prevent double spending, and improve credibility. Due to the decentralized and trustless nature of blockchain, the security defense of the blockchain system has become one of the most important measures. This paper comprehensively reviews the research progress of blockchain security threats and collaborative defense, and we first introduce the overview, classification, and threat assessment process of blockchain security threats. Then, we investigate the research status of single-node defense technology and multi-node collaborative defense technology and summarize the blockchain security evaluation indicators… More >

  • Open Access

    ARTICLE

    Research on Multi-Blockchain Electronic Archives Sharing Model

    Fang Yu1, Wenbin Bi2, Ning Cao3,*, Jun Luo4, Diantang An5, Liqiang Ding4, Russell Higgs6

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3921-3931, 2023, DOI:10.32604/cmc.2023.028330

    Abstract The purpose of introducing blockchain into electronic archives sharing and utilization is to break the information barrier between electronic archives sharing departments by relying on technologies such as smart contract and asymmetric encryption. Aiming at the problem of dynamic permission management in common access control methods, a new access control method based on smart contract under blockchain is proposed, which improves the intelligence level under blockchain technology. Firstly, the Internet attribute access control model based on smart contract is established. For the dynamic access of heterogeneous devices, the management contract, permission judgment contract and access control contract are designed; Secondly,… More >

Displaying 21-30 on page 3 of 382. Per Page