Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (118)
  • Open Access


    Parental Overprotection in the Context of Pediatric Cancer: State of the Art

    La surprotection parentale dans le contexte du cancer pédiatrique : état de la question

    C. Eira Nunes, B. Mouton, S. Van Petegem

    Psycho-Oncologie, Vol.16, No.4, pp. 351-358, 2022, DOI:10.3166/pson-2022-0216

    Abstract This article, although not systematically, presents a state of the art of the existing theoretical and empirical literature on parental overprotection in families with a child suffering from cancer. We address the characteristics of overprotection as well as the question of whether this parenting behavior can be adaptive or deleterious for the child in this specific situation. This review also identifies some family and societal factors that may promote overprotection in mothers and fathers and highlights the importance of the broader family and societal context when studying parenting in pediatric oncology.

    Cet article, bien que non exhaustif, présente… More >

  • Open Access


    TianmaGouteng yin attenuates ischemic stroke-induced brain injury by inhibiting the AGE/RAGE pathway


    BIOCELL, Vol.47, No.6, pp. 1345-1352, 2023, DOI:10.32604/biocell.2023.028866

    Abstract Background: Ischemic stroke is characterized by permanent or transient obstruction of blood flow, leading to a growing risk factor and health burden. Tianmagouteng yin (TMG) is commonly used in Chinese medicine to treat cerebral ischemia. The aim of this study was to investigate the neuroprotective effects of TMG against ischemic stroke. Methods: Either permanent middle cerebral artery occlusion (pMCAO) or sham operation was performed on anesthetized Wistar male rats (n = 36). Results: Results demonstrated that TMG administration reduced the infarction volume and mitigated the neurobehavioral deficits. Hematoxylin and eosin (HE) staining and Prussian blue staining revealed that TMG attenuated… More >

  • Open Access


    Secure Blockchain-Enabled Internet of Vehicles Scheme with Privacy Protection

    Jiansheng Zhang1, Yang Xin1,*, Yuyan Wang2, Xiaohui Lei2, Yixian Yang1

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6185-6199, 2023, DOI:10.32604/cmc.2023.038029

    Abstract The car-hailing platform based on Internet of Vehicles (IoV) technology greatly facilitates passengers’ daily car-hailing, enabling drivers to obtain orders more efficiently and obtain more significant benefits. However, to match the driver closest to the passenger, it is often necessary to process the location information of the passenger and driver, which poses a considerable threat to privacy disclosure to the passenger and driver. Targeting these issues, in this paper, by combining blockchain and Paillier homomorphic encryption algorithm, we design a secure blockchain-enabled IoV scheme with privacy protection for online car-hailing. In this scheme, firstly, we propose an encryption scheme based… More >

  • Open Access


    Residential Energy Consumption Forecasting Based on Federated Reinforcement Learning with Data Privacy Protection

    You Lu1,2,#,*, Linqian Cui1,2,#,*, Yunzhe Wang1,2, Jiacheng Sun1,2, Lanhui Liu3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 717-732, 2023, DOI:10.32604/cmes.2023.027032

    Abstract Most studies have conducted experiments on predicting energy consumption by integrating data for model training. However, the process of centralizing data can cause problems of data leakage. Meanwhile, many laws and regulations on data security and privacy have been enacted, making it difficult to centralize data, which can lead to a data silo problem. Thus, to train the model while maintaining user privacy, we adopt a federated learning framework. However, in all classical federated learning frameworks secure aggregation, the Federated Averaging (FedAvg) method is used to directly weight the model parameters on average, which may have an adverse effect on… More >

  • Open Access


    Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network

    Lemei Da1, Hai Liang1,*, Yong Ding1,2, Yujue Wang1, Changsong Yang1, Huiyong Wang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 879-902, 2023, DOI:10.32604/cmes.2023.026309

    Abstract The unmanned aerial vehicle (UAV) self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale, which can quickly and accurately complete complex tasks such as path planning, situational awareness, and information transmission. Due to the openness of the network, the UAV cluster is more vulnerable to passive eavesdropping, active interference, and other attacks, which makes the system face serious security threats. This paper proposes a Blockchain-Based Data Acquisition (BDA) scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario. Each UAV cluster has an… More >

  • Open Access


    A Survey of Privacy Preservation for Deep Learning Applications

    Ling Zhang1,*, Lina Nie1, Leyan Yu2

    Journal of Information Hiding and Privacy Protection, Vol.4, No.2, pp. 69-78, 2022, DOI:10.32604/jihpp.2022.039284

    Abstract Deep learning is widely used in artificial intelligence fields such as computer vision, natural language recognition, and intelligent robots. With the development of deep learning, people’s expectations for this technology are increasing daily. Enterprises and individuals usually need a lot of computing power to support the practical work of deep learning technology. Many cloud service providers provide and deploy cloud computing environments. However, there are severe risks of privacy leakage when transferring data to cloud service providers and using data for model training, which makes users unable to use deep learning technology in cloud computing environments confidently. This paper mainly… More >

  • Open Access


    Photoprotective Effects of D1 Protein Turnover and the Lutein Cycle on Three Ephemeral Plants under Heat Stress

    Minmin Xiao1, Moxiang Cheng1, Shuangquan Xie1, Xiushuang Wang1, Xingming Hao2, Li Zhuang1,*

    Phyton-International Journal of Experimental Botany, Vol.92, No.6, pp. 1841-1857, 2023, DOI:10.32604/phyton.2023.027369

    Abstract To clarify the characteristics of photoinhibition and the primary defense mechanisms of ephemeral plant leaves against photodestruction under high temperature stress, inhibitors and the technology to determine chlorophyll fluorescence were used to explore the protective effects of D1 protein turnover and the lutein cycle in the high temperature stress of the leaves of three ephemeral plants. The results showed that the maximum light conversion efficiency (Fv/Fm) of the ephemeral plant leaves decreased, and the initial fluorescence (Fo) increased under 35°C ± 1°C heat stress for 1–4 h or on sunny days in the summer. Both Fv/Fm and Fo could be… More >

  • Open Access


    A Privacy-Preserving System Design for Digital Presence Protection

    Eric Yocam1, Ahmad Alomari2, Amjad Gawanmeh3,*, Wathiq Mansoor3

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3091-3110, 2023, DOI:10.32604/cmc.2023.032826

    Abstract A person’s privacy has become a growing concern, given the nature of an expansive reliance on real-time video activities with video capture, stream, and storage. This paper presents an innovative system design based on a privacy-preserving model. The proposed system design is implemented by employing an enhanced capability that overcomes today’s single parameter-based access control protection mechanism for digital privacy preservation. The enhanced capability combines multiple access control parameters: facial expression, resource, environment, location, and time. The proposed system design demonstrated that a person’s facial expressions combined with a set of access control rules can achieve a person’s privacy-preserving preferences.… More >

  • Open Access


    Performance Analysis of a Profile Control Agent for Waste Drilling Fluid Treatment

    Xueyu Zhao*

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.7, pp. 1897-1905, 2023, DOI:10.32604/fdmp.2023.025247

    Abstract A method for the treatment of hazardous waste drilling fluids, potentially leading to environmental pollution, is considered. The waste drilling fluid is treated with an inorganic flocculant, an organic flocculant, and a pH regulator. The profile control agent consists of partially hydrolyzed polyacrylamide, formaldehyde, hexamethylenetetramine, resorcinol, phenol, and the treated waste drilling fluid itself. For a waste drilling fluid concentration of 2500 mg/L, the gelling time of the profile control agent is 25 h, and the gelling strength is 32,000 mPa.s. Compared with the profile control agent prepared by recirculated water under the same conditions, the present profile control agent displays better… More >

  • Open Access


    Application of the BASNEF Model in Safety Training in Automobile Manufacturing Plants

    Fereydoon Laal1,2, Amir Hossein Khoshakhlagh3, Esmaeil Zarei4,5, Rohollah Fallah Madvari6, Somayeh Farhang Dehghan7,*

    Sound & Vibration, Vol.56, No.4, pp. 297-306, 2022, DOI:10.32604/sv.2022.028255

    Abstract After controls, including engineering and management, the final way to control noise is to use hearing protection devices. Due to the lack of a standardized questionnaire regarding investigating workers’ use of hearing protection devices on the basis of the BASNEF behavioral model, the present study was conducted to investigate the effect of health education based on the BASNEF model on the use of hearing protection devices in workers of an automobile manufacturing plant in Iran. This quasi-experimental and prospective intervention study was performed on 80 workers at an automobile manufacturing plant who are exposed to noise levels above 85 decibels… More >

Displaying 1-10 on page 1 of 118. Per Page  

Share Link