Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (48)
  • Open Access


    Relationship between Interaction Anxiousness, Academic Resilience, Cultural Intelligence and Ego-Identity among Chinese Vocational Pathway University Students: A Conditional Process Analysis Model

    Wenxin Chen1,#, Jie Wu1,2,#, Long Li3,*, Shiyong Wu4,*

    International Journal of Mental Health Promotion, Vol.25, No.8, pp. 949-959, 2023, DOI:10.32604/ijmhp.2023.030072

    Abstract Background: University students’ ego-identity, an essential component of their psychological development and mental health, has widely attracted the attention of policymakers, schools, and parents. Method: A total of 298 Chinese vocational pathway undergraduates were recruited, and a conditional process analysis model was adopted to explore the interaction mechanism of ego-identity. Results: The results suggest that the ego-identity of Chinese vocational pathway undergraduates is significantly affected by interaction anxiousness, academic resilience, and cultural intelligence. (1) Interaction anxiousness significantly and positively predicts ego-identity. (2) Academic resilience positively and partially mediates the effect of interaction anxiousness on ego-identity. (3) Cultural intelligence significantly and… More >

  • Open Access


    Novel Framework for Generating Criminals Images Based on Textual Data Using Identity GANs

    Mohamed Fathallah1,*, Mohamed Sakr2, Sherif Eletriby2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 383-396, 2023, DOI:10.32604/cmc.2023.039824

    Abstract Text-to-image generation is a vital task in different fields, such as combating crime and terrorism and quickly arresting lawbreakers. For several years, due to a lack of deep learning and machine learning resources, police officials required artists to draw the face of a criminal. Traditional methods of identifying criminals are inefficient and time-consuming. This paper presented a new proposed hybrid model for converting the text into the nearest images, then ranking the produced images according to the available data. The framework contains two main steps: generation of the image using an Identity Generative Adversarial Network (IGAN) and ranking of the… More >

  • Open Access


    FSA-Net: A Cost-efficient Face Swapping Attention Network with Occlusion-Aware Normalization

    Zhipeng Bin1, Huihuang Zhao1,2,*, Xiaoman Liang1,2, Wenli Chen1

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 971-983, 2023, DOI:10.32604/iasc.2023.037270

    Abstract The main challenges in face swapping are the preservation and adaptive superimposition of attributes of two images. In this study, the Face Swapping Attention Network (FSA-Net) is proposed to generate photorealistic face swapping. The existing face-swapping methods ignore the blending attributes or mismatch the facial keypoint (cheek, mouth, eye, nose, etc.), which causes artifacts and makes the generated face silhouette non-realistic. To address this problem, a novel reinforced multi-aware attention module, referred to as RMAA, is proposed for handling facial fusion and expression occlusion flaws. The framework includes two stages. In the first stage, a novel attribute encoder is proposed… More >

  • Open Access


    A Privacy-Preserving System Design for Digital Presence Protection

    Eric Yocam1, Ahmad Alomari2, Amjad Gawanmeh3,*, Wathiq Mansoor3

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3091-3110, 2023, DOI:10.32604/cmc.2023.032826

    Abstract A person’s privacy has become a growing concern, given the nature of an expansive reliance on real-time video activities with video capture, stream, and storage. This paper presents an innovative system design based on a privacy-preserving model. The proposed system design is implemented by employing an enhanced capability that overcomes today’s single parameter-based access control protection mechanism for digital privacy preservation. The enhanced capability combines multiple access control parameters: facial expression, resource, environment, location, and time. The proposed system design demonstrated that a person’s facial expressions combined with a set of access control rules can achieve a person’s privacy-preserving preferences.… More >

  • Open Access


    Relationship between Moral Elevation and Prosocial Behavior among College Students: The Mediating Role of Perceived Social Support and Moderating Role of Moral Identity

    Shuanghu Fang*, Mingjie Huang

    International Journal of Mental Health Promotion, Vol.25, No.3, pp. 343-356, 2023, DOI:10.32604/ijmhp.2023.027442

    Abstract Objectives: The present study examined the relationship between college student’s moral elevation and prosocial behavior. As well as the mediating role of perceived social support and the moderating role of moral identity. Methods: A sample of 489 college students was recruited for the study. They were asked to complete a series of questionnaires, including Moral Elevation Scale (MES), Perceived Social Support Scale (PSSS), Moral Identity Scale (MIS) and Prosocial Tendency Measure (PTM). As part of the data analysis, we used correlation analysis and the method of constructing latent variable structural equation model to explore the mechanism of action among variables.… More >

  • Open Access


    Research on Career Identity in China: A Literature Review

    Huaruo Chen1,2, Ya Wen3,*, Fei Liu4,5, Yihong Zhao6, Zhiyao Xie7, Xuehui Zhang4

    International Journal of Mental Health Promotion, Vol.25, No.2, pp. 153-172, 2023, DOI:10.32604/ijmhp.2022.025546

    Abstract Career identity is one of the important topics to study the psychological problems of employees, especially after the outbreak of CoV-19. Being a populous country in the world, China has a large number of employees from all walks of life, and its research on career identity has attracted more and more attention. Thus, this study aims to sort out the history, characteristics, and trends of the research on career identity in China through a literature review, which can help more scholars pay attention to China’s career identity research. In this study, Citespace is used to statistically analyze the selected literature… More > Graphic Abstract

    Research on Career Identity in China: A Literature Review

  • Open Access


    Phishing Scam Detection on Ethereum via Mining Trading Information

    Yanyu Chen1, Zhangjie Fu1,2,*

    Journal of Cyber Security, Vol.4, No.3, pp. 189-200, 2022, DOI:10.32604/jcs.2022.038401

    Abstract As a typical representative of web 2.0, Ethereum has significantly boosted the development of blockchain finance. However, due to the anonymity and financial attributes of Ethereum, the number of phishing scams is increasing rapidly and causing massive losses, which poses a serious threat to blockchain financial security. Phishing scam address identification enables to detect phishing scam addresses and alerts users to reduce losses. However, there are three primary challenges in phishing scam address recognition task: 1) the lack of publicly available large datasets of phishing scam address transactions; 2) the use of multi-order transaction information requires a large number of… More >

  • Open Access


    Identity-Based Edge Computing Anonymous Authentication Protocol

    Naixin Kang1, Zhenhu Ning1,*, Shiqiang Zhang1, Sadaqat ur Rehman2, Waqas1,3

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3931-3943, 2023, DOI:10.32604/cmc.2023.029711

    Abstract With the development of sensor technology and wireless communication technology, edge computing has a wider range of applications. The privacy protection of edge computing is of great significance. In the edge computing system, in order to ensure the credibility of the source of terminal data, mobile edge computing (MEC) needs to verify the signature of the terminal node on the data. During the signature process, the computing power of edge devices such as wireless terminals can easily become the bottleneck of system performance. Therefore, it is very necessary to improve efficiency through computational offloading. Therefore, this paper proposes an identity-based… More >

  • Open Access


    B Class Floral Homeotic Genes are Involved in the Petal Identity and Flower Meristem Determinations in Chrysanthemum morifolium

    Jiayou Liu, Lian Ding, Xue Zhang, Song Li, Yunxiao Guan, Diwen Jia, Aiping Song, Jiafu Jiang, Fadi Chen*

    Phyton-International Journal of Experimental Botany, Vol.92, No.2, pp. 311-331, 2023, DOI:10.32604/phyton.2022.023896

    Abstract Chrysanthemum morifolium, an ornamental crop with diverse forms of inflorescence, is a good model for studying flower development in Asteraceae. However, the genetic background is complex and the mechanisms of regulating flower development are still unclear. Here, we identified two natural mutant lines of chrysanthemum and named them M1 and M2 according to the severity of the phenotype. Both lines showed defects in petal identity, and the petals of the M1 line had a mild phenotype: partially loss of petal identity and conversion of petals into green, leaf-like organs. The M2 line had severe phenotypes: in addition to severe petal… More >

  • Open Access


    A Novel Fusion System Based on Iris and Ear Biometrics for E-exams

    S. A. Shaban*, Hosnia M. M. Ahmed, D. L. Elsheweikh

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3295-3315, 2023, DOI:10.32604/iasc.2023.030237

    Abstract With the rapid spread of the coronavirus epidemic all over the world, educational and other institutions are heading towards digitization. In the era of digitization, identifying educational e-platform users using ear and iris based multimodal biometric systems constitutes an urgent and interesting research topic to preserve enterprise security, particularly with wearing a face mask as a precaution against the new coronavirus epidemic. This study proposes a multimodal system based on ear and iris biometrics at the feature fusion level to identify students in electronic examinations (E-exams) during the COVID-19 pandemic. The proposed system comprises four steps. The first step is… More >

Displaying 1-10 on page 1 of 48. Per Page