Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (518)
  • Open Access

    ARTICLE

    Associations between Mental Health Outcomes and Adverse Childhood Experiences and Character Strengths among University Students in Southern China

    Yulan Yu1,2, Rassamee Chotipanvithayakul3, Hujiao Kuang4, Wit Wichaidit3,*, Chonghua Wan1,2,*

    International Journal of Mental Health Promotion, Vol.25, No.12, pp. 1343-1351, 2023, DOI:10.32604/ijmhp.2023.043446

    Abstract Adverse childhood experiences (ACEs) can negatively affect mental health, whereas character strengths seem to be positively correlated with mental health. Detailed information on the history of ACEs among university students in China and the extent which mental health is associated with ACEs and character strengths can contribute to the needed empirical evidence for relevant stakeholders. Objectives of this study are 1) to estimate the prevalence of ACEs among undergraduate students in Southern China; and 2) to assess the extent which mental health outcomes (positive growth, well-being, and depression) are associated with ACEs and character strengths among undergraduate students in Southern… More >

  • Open Access

    ARTICLE

    Enhancing Healthcare Data Security and Disease Detection Using Crossover-Based Multilayer Perceptron in Smart Healthcare Systems

    Mustufa Haider Abidi*, Hisham Alkhalefah, Mohamed K. Aboudaif

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 977-997, 2024, DOI:10.32604/cmes.2023.044169

    Abstract The healthcare data requires accurate disease detection analysis, real-time monitoring, and advancements to ensure proper treatment for patients. Consequently, Machine Learning methods are widely utilized in Smart Healthcare Systems (SHS) to extract valuable features from heterogeneous and high-dimensional healthcare data for predicting various diseases and monitoring patient activities. These methods are employed across different domains that are susceptible to adversarial attacks, necessitating careful consideration. Hence, this paper proposes a crossover-based Multilayer Perceptron (CMLP) model. The collected samples are pre-processed and fed into the crossover-based multilayer perceptron neural network to detect adversarial attacks on the medical records of patients. Once an… More >

  • Open Access

    ARTICLE

    Research on Condenser Deterioration Evolution Trend Based on ANP-EWM Fusion Health Degree

    Hong Qian1,2, Haixin Wang1,*, Guangji Wang3, Qingyun Yan4

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 679-698, 2024, DOI:10.32604/cmes.2023.043377

    Abstract This study presents a proposed method for assessing the condition and predicting the future status of condensers operating in seawater over an extended period. The aim is to address the problems of scaling and corrosion, which lead to increased loss of cold resources. The method involves utilising a set of multivariate feature parameters associated with the condenser as input for evaluation and trend prediction. This methodology offers a precise means of determining the optimal timing for condenser cleaning, with the ultimate goal of improving its overall performance. The proposed approach involves the integration of the analytic network process with subjective… More >

  • Open Access

    REVIEW

    Evolutionary Neural Architecture Search and Its Applications in Healthcare

    Xin Liu1, Jie Li1,*, Jianwei Zhao2, Bin Cao2,*, Rongge Yan3, Zhihan Lyu4

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 143-185, 2024, DOI:10.32604/cmes.2023.030391

    Abstract Most of the neural network architectures are based on human experience, which requires a long and tedious trial-and-error process. Neural architecture search (NAS) attempts to detect effective architectures without human intervention. Evolutionary algorithms (EAs) for NAS can find better solutions than human-designed architectures by exploring a large search space for possible architectures. Using multiobjective EAs for NAS, optimal neural architectures that meet various performance criteria can be explored and discovered efficiently. Furthermore, hardware-accelerated NAS methods can improve the efficiency of the NAS. While existing reviews have mainly focused on different strategies to complete NAS, a few studies have explored the… More > Graphic Abstract

    Evolutionary Neural Architecture Search and Its Applications in Healthcare

  • Open Access

    ARTICLE

    Integration of Digital Twins and Artificial Intelligence for Classifying Cardiac Ischemia

    Mohamed Ammar1,*, Hamed Al-Raweshidy2,*

    Journal on Artificial Intelligence, Vol.5, pp. 195-218, 2023, DOI:10.32604/jai.2023.045199

    Abstract Despite advances in intelligent medical care, difficulties remain. Due to its complicated governance, designing, planning, improving, and managing the cardiac system remains difficult. Oversight, including intelligent monitoring, feedback systems, and management practises, is unsuccessful. Current platforms cannot deliver lifelong personal health management services. Insufficient accuracy in patient crisis warning programmes. No frequent, direct interaction between healthcare workers and patients is visible. Physical medical systems and intelligent information systems are not integrated. This study introduces the Advanced Cardiac Twin (ACT) model integrated with Artificial Neural Network (ANN) to handle real-time monitoring, decision-making, and crisis prediction. THINGSPEAK is used to create an… More >

  • Open Access

    ARTICLE

    Could Military Commanders’ Good Leadership Influence Subordinates’ Smartphone Overdependence? A Serial Mediation Analysis

    Seungju Hyun1, Xyle Ku1,2, Sungrok Kang1, Yoonyoung Choi1, Jaewon Ko1, Hyunyup Lee1,*

    International Journal of Mental Health Promotion, Vol.25, No.11, pp. 1187-1195, 2023, DOI:10.32604/ijmhp.2023.030745

    Abstract Owing to the ubiquitous use of smartphones by soldiers, military researchers have an increasing interest in potentially problematic side effects such as smartphone overdependence. This raises a question regarding the psychological mechanisms underlying the potentially self-damaging use of smartphones. Here, we address this question by analyzing how heterogeneity in commander’s good leadership explains subordinate soldiers’ differences in self-control and smartphone use. Specifically, we found that subordinate soldiers who thought their commander's leadership was good were self-regulated, less dependent on smartphones, less stressed, and finally had good mental health. This result indicates that commander’s good leadership can be used to estimate… More >

  • Open Access

    ARTICLE

    Real-Time Prediction Algorithm for Intelligent Edge Networks with Federated Learning-Based Modeling

    Seungwoo Kang1, Seyha Ros1, Inseok Song1, Prohim Tam1, Sa Math2, Seokhoon Kim1,3,*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1967-1983, 2023, DOI:10.32604/cmc.2023.045020

    Abstract Intelligent healthcare networks represent a significant component in digital applications, where the requirements hold within quality-of-service (QoS) reliability and safeguarding privacy. This paper addresses these requirements through the integration of enabler paradigms, including federated learning (FL), cloud/edge computing, software-defined/virtualized networking infrastructure, and converged prediction algorithms. The study focuses on achieving reliability and efficiency in real-time prediction models, which depend on the interaction flows and network topology. In response to these challenges, we introduce a modified version of federated logistic regression (FLR) that takes into account convergence latencies and the accuracy of the final FL model within healthcare networks. To establish… More >

  • Open Access

    ARTICLE

    Shadow Extraction and Elimination of Moving Vehicles for Tracking Vehicles

    Kalpesh Jadav1, Vishal Sorathiya1,*, Walid El-Shafai2, Torki Altameem3, Moustafa H. Aly4, Vipul Vekariya5, Kawsar Ahmed6, Francis M. Bui6

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2009-2030, 2023, DOI:10.32604/cmc.2023.043168

    Abstract Shadow extraction and elimination is essential for intelligent transportation systems (ITS) in vehicle tracking application. The shadow is the source of error for vehicle detection, which causes misclassification of vehicles and a high false alarm rate in the research of vehicle counting, vehicle detection, vehicle tracking, and classification. Most of the existing research is on shadow extraction of moving vehicles in high intensity and on standard datasets, but the process of extracting shadows from moving vehicles in low light of real scenes is difficult. The real scenes of vehicles dataset are generated by self on the Vadodara–Mumbai highway during periods… More >

  • Open Access

    ARTICLE

    Towards Cache-Assisted Hierarchical Detection for Real-Time Health Data Monitoring in IoHT

    Muhammad Tahir1,2,*, Mingchu Li1,2, Irfan Khan1,2, Salman A. Al Qahtani3, Rubia Fatima4, Javed Ali Khan5, Muhammad Shahid Anwar6

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2529-2544, 2023, DOI:10.32604/cmc.2023.042403

    Abstract Real-time health data monitoring is pivotal for bolstering road services’ safety, intelligence, and efficiency within the Internet of Health Things (IoHT) framework. Yet, delays in data retrieval can markedly hinder the efficacy of big data awareness detection systems. We advocate for a collaborative caching approach involving edge devices and cloud networks to combat this. This strategy is devised to streamline the data retrieval path, subsequently diminishing network strain. Crafting an adept cache processing scheme poses its own set of challenges, especially given the transient nature of monitoring data and the imperative for swift data transmission, intertwined with resource allocation tactics.… More >

  • Open Access

    ARTICLE

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

    Laila M. Halman, Mohammed J. F. Alenazi*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1469-1483, 2024, DOI:10.32604/cmes.2023.028077

    Abstract The healthcare sector holds valuable and sensitive data. The amount of this data and the need to handle, exchange, and protect it, has been increasing at a fast pace. Due to their nature, software-defined networks (SDNs) are widely used in healthcare systems, as they ensure effective resource utilization, safety, great network management, and monitoring. In this sector, due to the value of the data, SDNs face a major challenge posed by a wide range of attacks, such as distributed denial of service (DDoS) and probe attacks. These attacks reduce network performance, causing the degradation of different key performance indicators (KPIs)… More > Graphic Abstract

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

Displaying 41-50 on page 5 of 518. Per Page