Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (23)
  • Open Access

    ARTICLE

    WebFLex: A Framework for Web Browsers-Based Peer-to-Peer Federated Learning Systems Using WebRTC

    Mai Alzamel1,*, Hamza Ali Rizvi2, Najwa Altwaijry1, Isra Al-Turaiki1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4177-4204, 2024, DOI:10.32604/cmc.2024.048370

    Abstract Scalability and information personal privacy are vital for training and deploying large-scale deep learning models. Federated learning trains models on exclusive information by aggregating weights from various devices and taking advantage of the device-agnostic environment of web browsers. Nevertheless, relying on a main central server for internet browser-based federated systems can prohibit scalability and interfere with the training process as a result of growing client numbers. Additionally, information relating to the training dataset can possibly be extracted from the distributed weights, potentially reducing the privacy of the local data used for training. In this research paper, we aim to investigate… More >

  • Open Access

    ARTICLE

    Peer-Support in Oncology: A Qualitative Study of Caregivers Perception in a Cancer Center

    Pair-aidance en Oncologie : Etude Qualitative de la Perception des Soignants dans un Centre de Lutte Contre le Cancer

    Guilhem Paillard-Brunet*, Audrey Couillet

    Psycho-Oncologie, Vol.18, No.1, pp. 23-31, 2024, DOI:10.32604/po.2023.047888

    Abstract This study aimed to gather healthcare professionals’ expectations and reluctance toward peer support in a cancer center. Semistructured interviews were conducted among 12 professionals, recruited in different professions. The interviews were fully transcribed, and a thematic analysis was then conducted. Of the data analysis, three main themes about professionals’ expectations emerged: the need for the strongest support of the patients, to break the isolation in the sickness, and to enhance the care system. Three main themes also emerged from the data analysis about professionals’ reluctances: the limitations related to the intervention of the peer-workers, the psychological issues of the relationship,… More >

  • Open Access

    ARTICLE

    The Relationship between Father-Love Absence and Loneliness: Based on the Perspective of the Social Functionalist Theory and the Social Needs Theory

    Yaping Zhou1,2,5,#, He Zhong3,#, Xiaojun Li4,*, Yanhui Xiang1,2,5,*

    International Journal of Mental Health Promotion, Vol.26, No.2, pp. 139-148, 2024, DOI:10.32604/ijmhp.2023.046598

    Abstract Fathers play an important role in adolescents’ development, which is significant for their development and influences their mental health, including feeling of loneliness. However, the effects and mechanisms of father-love absence on individual loneliness are not clear. Based on the social functionalist theory and the social needs theory, this study examines the influence of individual father-love absence on loneliness and its underlying mechanisms. A questionnaire survey was administered to 319 junior high school students and 1,476 high school students. The results showed that adolescents with father-love absence had higher levels of loneliness, and that father-love absence affected loneliness levels through… More >

  • Open Access

    ARTICLE

    “Half of the Node Records Are Forged?”: The Problem of Node Records Forgery in Ethereum Network

    Yang Liu1,2,*, Zhiyuan Lin1, Yuxi Zhang1, Lin Jiang1,*, Xuan Wang1,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1713-1729, 2024, DOI:10.32604/cmes.2023.030468

    Abstract Ethereum, currently the most widely utilized smart contracts platform, anchors the security of myriad smart contracts upon its own robustness. Its foundational peer-to-peer network facilitates a dependable node connection mechanism, whereas an efficient data-sharing protocol constitutes as the bedrock of Blockchain network security. In this paper, we propose NodeHunter, an Ethereum network detector implemented through the application of simulation technology, which is capable of aggregating all node records within the network and the interconnectedness between them. Utilizing this connection information, NodeHunter can procure more comprehensive insights for network status analysis compared to preceding detection methodologies. Throughout a three-month period of… More >

  • Open Access

    ARTICLE

    How Do Young Children Manage Their Reputation among Peers?

    Jingmiao Zhang1,2, Yuning Zhu2, Xiuli Liu2,*

    International Journal of Mental Health Promotion, Vol.25, No.7, pp. 847-854, 2023, DOI:10.32604/ijmhp.2023.028166

    Abstract Young children’s reputation management is closely related to their social development. The purpose of our study is to examine the interaction between theory of mind and partner choice on children’s reputation management. Participants consisted of 270 children who were 3 to 5 years old. First, we measured participants’ theory of mind capabilities using the unexpected location task and unexpected content task and then randomly divided the participants into the control group, non-partner–choice group, and partner-choice group. We measured reputation management by comparing children’s willingness to share and sharing behavior between these groups. The findings are as follows: (1) Children from… More > Graphic Abstract

    How Do Young Children Manage Their Reputation among Peers?

  • Open Access

    ARTICLE

    An AYA with Cancer Confronted with the Grief of a Peer: an Interpretative Phenomenological Analysis

    La confrontation au deuil d’un pair chez une AJA atteinte de cancer. Une analyse phénoménologique interprétative

    J. Phan, V. Laurence, P. Marec-Berard, C. Cordero, C. Riberon, C. Flahault

    Psycho-Oncologie, Vol.16, No.2, pp. 243-252, 2022, DOI:10.3166/pson-2022-0197

    Abstract Aims: Adolescents and Young Adults (AYAs) with cancer facing the loss of another AYA with cancer may face a “triple task”: the process of adolescence, psychological adjustment to cancer, and the bereavement process of a sick peer. The aim of this study was to explore the processes underlying the loss of a sick peer in AYAs with cancer.
    Procedure: A single interview was submitted to an Interpretative Phenomenological Analysis (IPA), designed to understand the system of meanings attached to a subjective and intimate phenomenon such as bereavement.
    Results: Six major themes emerge from the IPA: the life course; the care… More >

  • Open Access

    ARTICLE

    Peer Pressure and Harmful Use of Alcohol in Thailand: A Spatial Autoregressive Model Application

    Ravikan Nonkhuntod, Suchuan Yu*

    International Journal of Mental Health Promotion, Vol.25, No.5, pp. 613-626, 2023, DOI:10.32604/ijmhp.2023.025648

    Abstract Due to peer pressure playing a crucial role in the decision to drink, people who have a more fragile temperament might be expected to be at higher risk. Moreover, many studies have investigated the influence of peer pressure on alcohol consumption, but few have examined the relationship between heavy drinking and peer pressure via a spatial autoregressive model (SAR) in low/middle-income countries, such as Thailand. This paper investigated the connection between heavy drinkers over the age of 15 years who drink more than or equal to 60 grams of unmixed alcohol at least once per month based on the Thai… More >

  • Open Access

    ARTICLE

    Monitoring Peer-to-Peer Botnets: Requirements, Challenges, and Future Works

    Arkan Hammoodi Hasan Kabla, Mohammed Anbar, Selvakumar Manickam, Alwan Ahmed Abdulrahman Alwan, Shankar Karuppayah*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3375-3398, 2023, DOI:10.32604/cmc.2023.036587

    Abstract The cyber-criminal compromises end-hosts (bots) to configure a network of bots (botnet). The cyber-criminals are also looking for an evolved architecture that makes their techniques more resilient and stealthier such as Peer-to-Peer (P2P) networks. The P2P botnets leverage the privileges of the decentralized nature of P2P networks. Consequently, the P2P botnets exploit the resilience of this architecture to be arduous against take-down procedures. Some P2P botnets are smarter to be stealthy in their Command-and-Control mechanisms (C2) and elude the standard discovery mechanisms. Therefore, the other side of this cyberwar is the monitor. The P2P botnet monitoring is an exacting mission… More >

  • Open Access

    ARTICLE

    Can Social Support be Protective against Depressive Symptoms in Adolescents from 24 Low- and Middle-Income Countries?

    Haowen Wu1, Zhanli Yi1, Tianyou Guo2,*

    International Journal of Mental Health Promotion, Vol.25, No.3, pp. 375-387, 2023, DOI:10.32604/ijmhp.2022.021505

    Abstract Background: Adolescents are highly vulnerable to depressive symptoms worldwide partially because of limited social supports. However, it still remains largely unknown regarding the associations between social support(s) and depressive symptoms among adolescents living in low- and middle-income countries (LMICs). The aim of this study aimed to explore the associations between different types of social support and depressive symptoms in adolescents from LMICs. Methods: Data were retrieved from the Global School-based Health Survey (GSHS) in which 92,551 adolescents (50.6% females) were included with mean of 15.6 years. Depressive symptoms in the past one month as the dependent variable were measured in… More >

  • Open Access

    ARTICLE

    Peer-to-Peer Energy Trading Method of Multi-Virtual Power Plants Based on Non-Cooperative Game

    Jingjing Bai*, Hongyi Zhou, Zheng Xu, Yu Zhong

    Energy Engineering, Vol.120, No.5, pp. 1163-1183, 2023, DOI:10.32604/ee.2023.025553

    Abstract The current electricity market fails to consider the energy consumption characteristics of transaction subjects such as virtual power plants. Besides, the game relationship between transaction subjects needs to be further explored. This paper proposes a Peer-to-Peer energy trading method for multi-virtual power plants based on a non-cooperative game. Firstly, a coordinated control model of public buildings is incorporated into the scheduling framework of the virtual power plant, considering the energy consumption characteristics of users. Secondly, the utility functions of multiple virtual power plants are analyzed, and a non-cooperative game model is established to explore the game relationship between electricity sellers… More >

Displaying 1-10 on page 1 of 23. Per Page