Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (34)
  • Open Access

    ARTICLE

    LINC complex independent perinuclear actin organization and cell migration

    ANDREA FRACCHIA1,2, GABI GERLITZ1,*

    BIOCELL, Vol.46, No.4, pp. 931-935, 2022, DOI:10.32604/biocell.2022.018179

    Abstract The link of the metazoan nucleus to the actin cytoskeleton is highly important for actin polymerization and migration of multiple cell types as well as for mechanotransduction and even affects the cellular transcriptome. Several mechanisms of organization of actin filaments next to the nuclear envelope have been identified. Among these mechanisms the most studied one is the Linker of nucleoskeleton and cytoskeleton (LINC) complex-dependent perinuclear actin organization. However, recently additional mechanisms have been identified: an Actin-related protein-2/3 (Arp2/3)-dependent perinuclear actin polymerization during migration of dendritic cells and a perinuclear actin rim that is formed in response to external force application… More >

  • Open Access

    ARTICLE

    Analysis of Critical Factors in Manufacturing by Adopting a Cloud Computing Service

    Hsin-Pin Fu1,*, Tsung-Sheng Chang2, Chien-Hung Liu3, Li-Chun Liu1

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 213-227, 2022, DOI:10.32604/csse.2022.021767

    Abstract The advantages of a cloud computing service are cost advantages, availability, scalability, flexibility, reduced time to market, and dynamic access to computing resources. Enterprises can improve the successful adoption rate of cloud computing services if they understand the critical factors. To find critical factors, this study first reviewed the literature and established a three-layer hierarchical factor table for adopting a cloud computing service based on the Technology-Organization-Environment framework. Then, a hybrid method that combines two multi-criteria decision-making tools—called the Fuzzy Analytic Network Process method and the concept of VlseKriterijumska Optimizacija I Kompromisno Resenje acceptable advantage—was used to objectively identify critical… More >

  • Open Access

    ARTICLE

    Organizational Data Breach: Building Conscious Care Behavior in Incident Response

    Adlyn Adam Teoh1, Norjihan Binti Abdul Ghani1,*, Muneer Ahmad1, Nz Jhanjhi2, Mohammed A. Alzain3, Mehedi Masud4

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 505-515, 2022, DOI:10.32604/csse.2022.018468

    Abstract Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses. This research study draws upon the literature in the areas of information security, incident response, theory of planned behaviour, and protection motivation theory to expand and empirically validate a modified framework of information security conscious care behaviour formation. The applicability of the theoretical framework is shown through a case study labelled as a cyber-attack of unprecedented scale and sophistication in Singapore’s history to-date, the 2018 SingHealth data breach. The single in-depth case study observed information security awareness, policy,… More >

  • Open Access

    ARTICLE

    RFID Adaption in Healthcare Organizations: An Integrative Framework

    Ahed Abugabah1,*, Louis Sanzogni2, Luke Houghton2, Ahmad Ali AlZubi3, Alaa Abuqabbeh4

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1335-1348, 2022, DOI:10.32604/cmc.2022.019097

    Abstract Radio frequency identification (RFID), also known as electronic label technology, is a non-contact automated identification technology that recognizes the target object and extracts relevant data and critical characteristics using radio frequency signals. Medical equipment information management is an important part of the construction of a modern hospital, as it is linked to the degree of diagnosis and care, as well as the hospital’s benefits and growth. The aim of this study is to create an integrated view of a theoretical framework to identify factors that influence RFID adoption in healthcare, as well as to conduct an empirical review of the… More >

  • Open Access

    ARTICLE

    Investigating the Role of Trust Dimension as a Mediator on CC-SaaS Adoption

    Hiba Jasim Hadi*, Mohd Adan Omar, Wan Rozaini Sheik Osman

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 373-386, 2021, DOI:10.32604/iasc.2021.018207

    Abstract The public sector of Iraq has been struggling from poor management of resources and numerous difficulties that affect its governmental organization’s development, such as financial issues resulting from corruption, insecurity, and the lack of IT resources and infrastructure. Thus, cloud computing Software as a Service (CC-SaaS) can be a useful solution to help governmental organizations increase their service efficiency through the adoption of low-cost technology and provision of better services. The adoption of CC-SaaS remains limited in Iraqi public organizations due to numerous challenges, including privacy and protection, legal policy, and trust. Trust was found to be an effective facilitator… More >

  • Open Access

    ARTICLE

    Effect of Perceived Organizational Support on Fatigue of Chinese Nurses during the COVID-19 Pandemic: Resilience as a Mediator

    Na Zhang1, Dingxin Xu2, Jingjing Li3,*, Zhenxing Gong4

    International Journal of Mental Health Promotion, Vol.23, No.2, pp. 243-254, 2021, DOI:10.32604/IJMHP.2021.015487

    Abstract As working for the nurse is believed to be one of the most stressful professions, nurses are particularly at risk of experiencing fatigue. Especially during the COVID-19 pandemic, fatigue among nurses may affect physical and mental health seriously, which is attracting increasing attention of researchers and clinical practitioners to find effective prevention measures to alleviate nurses’ fatigue. This study aims to investigate the mediational effect of resilience on the relationship between nurses’ perceived organizational support and fatigue. A total of 476 nurses from secondary and above hospitals in Hebei province, China during March and April in 2020, were investigated with… More >

  • Open Access

    ARTICLE

    Thermodynamics Inspired Co-operative Self-Organization of Multiple Autonomous Vehicles

    Ayesha Maqbool1,*, Farkhanda Afzal2, Tauseef Rana3, Alina Mirza4

    Intelligent Automation & Soft Computing, Vol.28, No.3, pp. 653-667, 2021, DOI:10.32604/iasc.2021.017506

    Abstract This paper presents a co-operative, self-organisation method for Multiple Autonomous Vehicles aiming to share surveillance responsibilities. Spatial organization or formation configuration of multiple vehicles/agents’ systems is crucial for a team of agents to achieve their mission objectives. In this paper we present simple yet efficient thermodynamic inspired formation control framework. The proposed method autonomously allocates region of surveillance to each vehicle and also re-adjusts the area of their responsibilities during the mission. It provides framework for heterogeneous UAVs to scatter themselves optimally in order to provide maximum coverage of a given area. The method is inspired from a natural phenomenon… More >

  • Open Access

    ARTICLE

    Professional Ethical Concerns and Recommendations on Psychological Interventions during the COVID-19 Pandemic in China

    Qin An1, Jun Gao2, Zhiqin Sang3, Mingyi Qian4,*

    International Journal of Mental Health Promotion, Vol.23, No.1, pp. 87-98, 2021, DOI:10.32604/IJMHP.2021.014422

    Abstract When COVID-19 pandemic hit China, Chinese clinical psychologists, counselors and other practitioners reacted quickly to provide psychological interventions for different target groups. Different professional ethical concerns and potential transgressions arose during different stages of pandemic. This paper aimed to summarize different ethical concerns and transgressions during different stages of pandemic in China, as well as how the professional ethical workgroup in the registration system of clinical psychologists and professional organizations of Chinese Psychological Society (CPS) to publish a series of documents as recommendations on ethical practice. It is hoped by providing a picture of “problems vs. solutions” in terms of… More >

  • Open Access

    ARTICLE

    Coronavirus: A “Mild” Virus Turned Deadly Infection

    Rizwan Ali Naqvi1, Muhammad Faheem Mushtaq2, Natash Ali Mian3, Muhammad Adnan Khan4,*, Atta-ur-Rahman5, Muhammad Ali Yousaf6, Muhammad Umair6, Rizwan Majeed7

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2631-2646, 2021, DOI:10.32604/cmc.2021.012167

    Abstract Coronaviruses are a family of viruses that can be transmitted from one person to another. Earlier strains have only been mild viruses, but the current form, known as coronavirus disease 2019 (COVID-19), has become a deadly infection. The outbreak originated in Wuhan, China, and has since spread worldwide. The symptoms of COVID-19 include a dry cough, sore throat, fever, and nasal congestion. Antimicrobial drugs, pathogen–host interaction, and 2 weeks of isolation have been recommended for the treatment of the infection. Safe operating procedures, such as the use of face masks, hand sanitizer, handwashing with soap, and social distancing, are also… More >

  • Open Access

    ARTICLE

    An Efficient Sound and Data Steganography Based Secure Authentication System

    Debajit Datta1, Lalit Garg2,*, Kathiravan Srinivasan3, Atsushi Inoue4, G. Thippa Reddy3, M. Praveen Kumar Reddy3, K. Ramesh5, Nidal Nasser6

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 723-751, 2021, DOI:10.32604/cmc.2021.014802

    Abstract The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks. Further, the pin-based security system is an inadequate mechanism for handling such a scenario. The reason is that hackers use multiple strategies for evading security systems and thereby gaining access to private data. This research proposes to deploy diverse approaches for authenticating and securing a connection amongst two devices/gadgets via sound, thereby disregarding the pins’ manual verification. Further, the results demonstrate that the proposed approaches outperform conventional pin-based authentication or QR authentication approaches. Firstly, a random signal is encrypted, and then it is transformed into… More >

Displaying 11-20 on page 2 of 34. Per Page