Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (289)
  • Open Access

    ARTICLE

    Failure to Rescue as a Quality Metric in Congenital Heart Surgeries in a High-Complexity Service Provider Institution Located in a Middle-Income Country

    Gustavo Cruz1,*, Santiago Pedroza2, Juan F. Vélez3, Jessica Largo2, Juan F. Tejada4, Jorge H. Mejía-Mantilla5

    Congenital Heart Disease, Vol.19, No.2, pp. 207-218, 2024, DOI:10.32604/chd.2024.044244

    Abstract Background: Failure to rescue has been an effective quality metric in congenital heart surgery. Conversely, morbidity and mortality depend greatly on non-modifiable individual factors and have a weak correlation with better-quality performance. We aim to measure the complications, mortality, and risk factors in pediatric patients undergoing congenital heart surgery in a high-complexity institution located in a middle-income country and compare it with other institutions that have conducted a similar study. Methods: A retrospective observational study was conducted in a high-complexity service provider institution, in Cali, Colombia. All pediatric patients undergoing any congenital heart surgery between… More >

  • Open Access

    ARTICLE

    Experience of Mental Health Professionals Collaborating with Peer Supporters in a Community Mental Health Service Team

    Sowon Lee1, Boyoung Kim1,*, Chung Kil Park2,*

    International Journal of Mental Health Promotion, Vol.26, No.4, pp. 251-260, 2024, DOI:10.32604/ijmhp.2024.048803

    Abstract This study explored how mental health professionals collaborate with peer supporters with mental disabilities in a community mental health institution. From January 19 to February 23, 2021, three 60 min interviews were conducted with six mental health professionals working at a Korean community center. The results were qualitatively analyzed and divided into four themes and eight categories. The four themes were the perceptions of and challenges in working with peer supporters with mental disabilities, conflict and confusion about working with peer supporters, forming partnerships with peer supporters, and policy support for peer supporters’ job security.… More >

  • Open Access

    ARTICLE

    Securing Cloud-Encrypted Data: Detecting Ransomware-as-a-Service (RaaS) Attacks through Deep Learning Ensemble

    Amardeep Singh1, Hamad Ali Abosaq2, Saad Arif3, Zohaib Mushtaq4,*, Muhammad Irfan5, Ghulam Abbas6, Arshad Ali7, Alanoud Al Mazroa8

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 857-873, 2024, DOI:10.32604/cmc.2024.048036

    Abstract Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries, especially in light of the growing number of cybersecurity threats. A major and ever-present threat is Ransomware-as-a-Service (RaaS) assaults, which enable even individuals with minimal technical knowledge to conduct ransomware operations. This study provides a new approach for RaaS attack detection which uses an ensemble of deep learning models. For this purpose, the network intrusion detection dataset “UNSW-NB15” from the Intelligent Security Group of the University of New South Wales, Australia is analyzed. In the… More >

  • Open Access

    ARTICLE

    A Hybrid Machine Learning Approach for Improvised QoE in Video Services over 5G Wireless Networks

    K. B. Ajeyprasaath, P. Vetrivelan*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3195-3213, 2024, DOI:10.32604/cmc.2023.046911

    Abstract Video streaming applications have grown considerably in recent years. As a result, this becomes one of the most significant contributors to global internet traffic. According to recent studies, the telecommunications industry loses millions of dollars due to poor video Quality of Experience (QoE) for users. Among the standard proposals for standardizing the quality of video streaming over internet service providers (ISPs) is the Mean Opinion Score (MOS). However, the accurate finding of QoE by MOS is subjective and laborious, and it varies depending on the user. A fully automated data analytics framework is required to… More >

  • Open Access

    ARTICLE

    Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques

    Nasser Alshammari1, Shumaila Shahzadi2, Saad Awadh Alanazi1,*, Shahid Naseem3, Muhammad Anwar3, Madallah Alruwaili4, Muhammad Rizwan Abid5, Omar Alruwaili4, Ahmed Alsayat1, Fahad Ahmad6,7

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 363-394, 2024, DOI:10.32604/csse.2023.040721

    Abstract Software Defined Network (SDN) and Network Function Virtualization (NFV) technology promote several benefits to network operators, including reduced maintenance costs, increased network operational performance, simplified network lifecycle, and policies management. Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration (NFV MANO), and malicious attacks in different scenarios disrupt the NFV Orchestrator (NFVO) and Virtualized Infrastructure Manager (VIM) lifecycle management related to network services or individual Virtualized Network Function (VNF). This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and… More >

  • Open Access

    ARTICLE

    RESTlogic: Detecting Logic Vulnerabilities in Cloud REST APIs

    Ziqi Wang*, Weihan Tian, Baojiang Cui

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1797-1820, 2024, DOI:10.32604/cmc.2023.047051

    Abstract The API used to access cloud services typically follows the Representational State Transfer (REST) architecture style. RESTful architecture, as a commonly used Application Programming Interface (API) architecture paradigm, not only brings convenience to platforms and tenants, but also brings logical security challenges. Security issues such as quota bypass and privilege escalation are closely related to the design and implementation of API logic. Traditional code level testing methods are difficult to construct a testing model for API logic and test samples for in-depth testing of API logic, making it difficult to detect such logical vulnerabilities. We… More >

  • Open Access

    ARTICLE

    Performance Prediction Based Workload Scheduling in Co-Located Cluster

    Dongyang Ou, Yongjian Ren, Congfeng Jiang*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 2043-2067, 2024, DOI:10.32604/cmes.2023.029987

    Abstract Cloud service providers generally co-locate online services and batch jobs onto the same computer cluster, where the resources can be pooled in order to maximize data center resource utilization. Due to resource competition between batch jobs and online services, co-location frequently impairs the performance of online services. This study presents a quality of service (QoS) prediction-based scheduling model (QPSM) for co-located workloads. The performance prediction of QPSM consists of two parts: the prediction of an online service’s QoS anomaly based on XGBoost and the prediction of the completion time of an offline batch job based… More >

  • Open Access

    CASE REPORT

    Implementation of a High-Risk Outpatient Clinic for Children with Complex Congenital Heart Disease in a Reference Service in Brazil

    Gustavo Foronda1,2, Vanessa Ferreira Amorim de Melo2,3,*, Claudia Regina Pinheiro de Castro Grau4, Ingrid Magatti Piva1, Glaucia Maria Penha Tavares4, Ana Cristina Sayuri Tanaka1, Nana Miura1

    Congenital Heart Disease, Vol.18, No.6, pp. 649-656, 2023, DOI:10.32604/chd.2023.027987

    Abstract Background: Children with congenital heart disease (CHD), even after surgical approaches, and especially those who undergo staged procedures in the first months of life, remain vulnerable to readmissions and complications, requiring very close monitoring and differentiated intervention strategies. Methods: Descriptive and exploratory study, of the experience report type, which presents the process of building the high-risk outpatient clinic for complex congenital heart diseases (AAR) at the Instituto do Coração (InCor). Results: Report of the path taken to structure the AAR, demonstrating the organization, interface with the multidisciplinary team, admission and discharge criteria, training, and patient profile.… More >

  • Open Access

    ARTICLE

    Models to Simulate Effective Coverage of Fire Station Based on Real-Time Travel Times

    Sicheng Zhu, Dingli Liu*, Weijun Liu, Ying Li, Tian Zhou

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 483-513, 2024, DOI:10.32604/cmes.2023.044809

    Abstract In recent years, frequent fire disasters have led to enormous damage in China. Effective firefighting rescues can minimize the losses caused by fires. During the rescue processes, the travel time of fire trucks can be severely affected by traffic conditions, changing the effective coverage of fire stations. However, it is still challenging to determine the effective coverage of fire stations considering dynamic traffic conditions. This paper addresses this issue by combining the traveling time calculation model with the effective coverage simulation model. In addition, it proposes a new index of total effective coverage area (TECA)… More >

  • Open Access

    REVIEW

    Cloud Datacenter Selection Using Service Broker Policies: A Survey

    Salam Al-E’mari1, Yousef Sanjalawe2,*, Ahmad Al-Daraiseh3, Mohammad Bany Taha4, Mohammad Aladaileh2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 1-41, 2024, DOI:10.32604/cmes.2023.043627

    Abstract Amid the landscape of Cloud Computing (CC), the Cloud Datacenter (DC) stands as a conglomerate of physical servers, whose performance can be hindered by bottlenecks within the realm of proliferating CC services. A linchpin in CC’s performance, the Cloud Service Broker (CSB), orchestrates DC selection. Failure to adroitly route user requests with suitable DCs transforms the CSB into a bottleneck, endangering service quality. To tackle this, deploying an efficient CSB policy becomes imperative, optimizing DC selection to meet stringent Quality-of-Service (QoS) demands. Amidst numerous CSB policies, their implementation grapples with challenges like costs and availability.… More >

Displaying 1-10 on page 1 of 289. Per Page