Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (53)
  • Open Access

    REVIEW

    Research on Career Identity in China: A Literature Review

    Huaruo Chen1,2, Ya Wen3,*, Fei Liu4,5, Yihong Zhao6, Zhiyao Xie7, Xuehui Zhang4

    International Journal of Mental Health Promotion, Vol.25, No.2, pp. 153-172, 2023, DOI:10.32604/ijmhp.2022.025546 - 02 February 2023

    Abstract Career identity is one of the important topics to study the psychological problems of employees, especially after the outbreak of CoV-19. Being a populous country in the world, China has a large number of employees from all walks of life, and its research on career identity has attracted more and more attention. Thus, this study aims to sort out the history, characteristics, and trends of the research on career identity in China through a literature review, which can help more scholars pay attention to China’s career identity research. In this study, Citespace is used to… More > Graphic Abstract

    Research on Career Identity in China: A Literature Review

  • Open Access

    ARTICLE

    Identity-Based Edge Computing Anonymous Authentication Protocol

    Naixin Kang1, Zhenhu Ning1,*, Shiqiang Zhang1, Sadaqat ur Rehman2, Muhammad Waqas1,3

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3931-3943, 2023, DOI:10.32604/cmc.2023.029711 - 31 October 2022

    Abstract With the development of sensor technology and wireless communication technology, edge computing has a wider range of applications. The privacy protection of edge computing is of great significance. In the edge computing system, in order to ensure the credibility of the source of terminal data, mobile edge computing (MEC) needs to verify the signature of the terminal node on the data. During the signature process, the computing power of edge devices such as wireless terminals can easily become the bottleneck of system performance. Therefore, it is very necessary to improve efficiency through computational offloading. Therefore,… More >

  • Open Access

    ARTICLE

    B Class Floral Homeotic Genes are Involved in the Petal Identity and Flower Meristem Determinations in Chrysanthemum morifolium

    Jiayou Liu, Lian Ding, Xue Zhang, Song Li, Yunxiao Guan, Diwen Jia, Aiping Song, Jiafu Jiang, Fadi Chen*

    Phyton-International Journal of Experimental Botany, Vol.92, No.2, pp. 311-331, 2023, DOI:10.32604/phyton.2022.023896 - 12 October 2022

    Abstract Chrysanthemum morifolium, an ornamental crop with diverse forms of inflorescence, is a good model for studying flower development in Asteraceae. However, the genetic background is complex and the mechanisms of regulating flower development are still unclear. Here, we identified two natural mutant lines of chrysanthemum and named them M1 and M2 according to the severity of the phenotype. Both lines showed defects in petal identity, and the petals of the M1 line had a mild phenotype: partially loss of petal identity and conversion of petals into green, leaf-like organs. The M2 line had severe phenotypes: in… More >

  • Open Access

    ARTICLE

    A Novel Fusion System Based on Iris and Ear Biometrics for E-exams

    S. A. Shaban*, Hosnia M. M. Ahmed, D. L. Elsheweikh

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3295-3315, 2023, DOI:10.32604/iasc.2023.030237 - 17 August 2022

    Abstract With the rapid spread of the coronavirus epidemic all over the world, educational and other institutions are heading towards digitization. In the era of digitization, identifying educational e-platform users using ear and iris based multimodal biometric systems constitutes an urgent and interesting research topic to preserve enterprise security, particularly with wearing a face mask as a precaution against the new coronavirus epidemic. This study proposes a multimodal system based on ear and iris biometrics at the feature fusion level to identify students in electronic examinations (E-exams) during the COVID-19 pandemic. The proposed system comprises four… More >

  • Open Access

    ARTICLE

    Phishing Scam Detection on Ethereum via Mining Trading Information

    Yanyu Chen1, Zhangjie Fu1,2,*

    Journal of Cyber Security, Vol.4, No.3, pp. 189-200, 2022, DOI:10.32604/jcs.2022.038401 - 01 February 2023

    Abstract As a typical representative of web 2.0, Ethereum has significantly boosted the development of blockchain finance. However, due to the anonymity and financial attributes of Ethereum, the number of phishing scams is increasing rapidly and causing massive losses, which poses a serious threat to blockchain financial security. Phishing scam address identification enables to detect phishing scam addresses and alerts users to reduce losses. However, there are three primary challenges in phishing scam address recognition task: 1) the lack of publicly available large datasets of phishing scam address transactions; 2) the use of multi-order transaction information… More >

  • Open Access

    ARTICLE

    Partial Bell Polynomials, Falling and Rising Factorials, Stirling Numbers, and Combinatorial Identities

    Siqintuya Jin1, Bai-Ni Guo2,*, Feng Qi3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.3, pp. 781-799, 2022, DOI:10.32604/cmes.2022.019941 - 27 June 2022

    Abstract In the paper, the authors collect, discuss, and find out several connections, equivalences, closed-form formulas, and combinatorial identities concerning partial Bell polynomials, falling factorials, rising factorials, extended binomial coefficients, and the Stirling numbers of the first and second kinds. These results are new, interesting, important, useful, and applicable in combinatorial number theory. More >

  • Open Access

    ARTICLE

    College Students’ Academic Stressors on Mental Health during the COVID-19 Pandemic: A Comparison between Graduating Students and Non-Graduating Students

    Jiaqi Yang1, Yanwen Zhang2, Peng Li2,3,4, Huan Zhang2,3,4, Tour Liu2,3,4,*

    International Journal of Mental Health Promotion, Vol.24, No.4, pp. 603-618, 2022, DOI:10.32604/ijmhp.2022.019406 - 27 May 2022

    Abstract The study aimed to investigate the influence of academic stressors on mental health and the mediating effect of social support and self-identity among college students and further studied the difference between the graduating students and non-graduating students during the COVID-19 Pandemic. Recruiting 900 college students as subjects, used the college students’ academic stressors questionnaire, social support questionnaire, self-identity scale and depression anxiety stress scales (DASS-21). The results showed that: (1) The college students’ academic stressor positively predicted mental health; (2) Social support and self-identity mediated the relationship; (3) The model also held when academic stressors More >

  • Open Access

    ARTICLE

    Fog-based Self-Sovereign Identity with RSA in Securing IoMT Data

    A. Jameer Basha1, N. Rajkumar2, Mohammed A. AlZain3, Mehedi Masud4, Mohamed Abouhawwash5,6,*

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1693-1706, 2022, DOI:10.32604/iasc.2022.024714 - 25 May 2022

    Abstract In the healthcare applications, Internet of Medical Things (IoMT) comforts the communication processes between the medical devices and the humans via wireless network. Moreover, this communication helps both the physicians and the patients to contact remotely for the diagnosis of the disease’s wearable devices sensor signals. However, IoMT system violates the privacy preserving of Patient’s Health Record (PHR) as well as self-sovereign identity of patient. In this regard, security action should be taken. Previous techniques used in IoMT are in lack of data consistency, confidentiality, and inaccessible of data. To overcome these issues, the fog computing-based… More >

  • Open Access

    ARTICLE

    FPGA Implementation of 5G NR Primary and Secondary Synchronization

    Aytha Ramesh Kumar1,*, K. Lal Kishore2

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1585-1600, 2022, DOI:10.32604/cmc.2022.021573 - 18 May 2022

    Abstract The 5G communication systems are widely established for high-speed data processing to meet users demands. The 5G New Radio (NR) communications comprise a network of ultra-low latency, high processing speeds, high throughput and rapid synchronization with a time frame of 10 ms. Synchronization between User Equipment (UE) and 5G base station known as gNB is a fundamental procedure in a cellular system and it is performed by a synchronization signal. In 5G NR system, Primary Synchronization Signal (PSS) and Secondary Synchronization Signal (SSS) are used to detect the best serving base station with the help… More >

  • Open Access

    ARTICLE

    Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing

    Amjad Alsirhani, Mohamed Ezz, Ayman Mohamed Mostafa*

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 967-984, 2022, DOI:10.32604/csse.2022.024854 - 09 May 2022

    Abstract Identity management is based on the creation and management of user identities for granting access to the cloud resources based on the user attributes. The cloud identity and access management (IAM) grants the authorization to the end-users to perform different actions on the specified cloud resources. The authorizations in the IAM are grouped into roles instead of granting them directly to the end-users. Due to the multiplicity of cloud locations where data resides and due to the lack of a centralized user authority for granting or denying cloud user requests, there must be several security… More >

Displaying 11-20 on page 2 of 53. Per Page