Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21,887)
  • Open Access

    ARTICLE

    Self-Compassion as a Mediator in the Effect of Dispositional Mindfulness on Anxiety and Aggressiveness in College Students with Left-Behind Experience

    Si Yu1, Chunyang Zhang2, Yijun Lin1, Qian Zhang3, Wei Xu1,*

    International Journal of Mental Health Promotion, Vol.22, No.2, pp. 71-81, 2020, DOI:10.32604/IJMHP.2020.011194

    Abstract Few studies have comprehensively explored the mechanism of the association between dispositional mindfulness and the process of internalization and externalization. Given that dispositional mindfulness can enhance the level of self-acceptance, the present study investigated the role of self-compassion in the effect of dispositional mindfulness on anxiety and aggressiveness among college students with left-behind experience (LBE). A total of 385 Chinese college students with LBE reported their level of dispositional mindfulness, anxiety symptoms, aggressiveness, and self-compassion. Dispositional mindfulness was negatively associated with anxiety and aggressiveness after controlling for gender, age, and whether they are the only child in family. Additionally, self-compassion… More >

  • Open Access

    ARTICLE

    Translation and Validation of the Family-Focused Mental Health Practice Questionnaire-Japanese Version

    Rie Ueno1,*, Darryl Maybery2, Andrea Reupert3, Hirokazu Osada4

    International Journal of Mental Health Promotion, Vol.22, No.2, pp. 59-69, 2020, DOI:10.32604/IJMHP.2020.011180

    Abstract Children of parents with mental illness are more likely to experience mental health concerns, compared to other children in the community. Thus, it is important mental health professionals identify and intervene appropriately in these families. To develop professional development activities, practice guidelines and organizational supports, it is important to first identify those practices that professionals employ and do not employ. Accordingly, a Japanese version of the Family-Focused Mental Health Practice Questionnaire was developed. In the first instance, the Questionnaire was translated into Japanese and disseminated to mental health workers in various Japanese settings. Based on 212 participants’ data, exploratory factor… More >

  • Open Access

    ARTICLE

    Validation of a Self-Assessment Scale for Therapists’ Perception of Cognitive Behavioural Therapy Skills in China: A Mixed Method

    Yan Liu1,#, Zhihua Guo1,#, Yun Ma1, Hongyan Song1, Xiaoqi Li1, Ling Tan1, Zhanjiang Li1,*, Jing Sun2,*

    International Journal of Mental Health Promotion, Vol.22, No.2, pp. 39-57, 2020, DOI:10.32604/IJMHP.2020.011438

    Abstract Cognitive behavioural therapy (CBT) is a first-line psychotherapy in Western countries, yet there have been limited studies examined the required skills based on perception of CBT therapists in the context of Western countries, and there has been no such research in China. Currently, there is no exist of a selfassessment scale to evaluate the required competence perceived by CBT therapists in China. This study used both qualitative and quantitative method to develop a self-assessment tool by CBT therapist to provide their perception about required skills in the treatment of mental disorders in China. Qualitative research used semistructured behavioural event interviews… More >

  • Open Access

    ARTICLE

    Deer Body Adaptive Threshold Segmentation Algorithm Based on Color Space

    Yuheng Sun1, Ye Mu1, 2, 3, 4, *, Qin Feng5, Tianli Hu1, 2, 3, 4, He Gong1, 2, 3, 4, Shijun Li1, 2, 3, 4, Jing Zhou6

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1317-1328, 2020, DOI:10.32604/cmc.2020.010510

    Abstract In large-scale deer farming image analysis, K-means or maximum betweenclass variance (Otsu) algorithms can be used to distinguish the deer from the background. However, in an actual breeding environment, the barbed wire or chain-link fencing has a certain isolating effect on the deer which greatly interferes with the identification of the individual deer. Also, when the target and background grey values are similar, the multiple background targets cannot be completely separated. To better identify the posture and behaviour of deer in a deer shed, we used digital image processing to separate the deer from the background. To address the problems… More >

  • Open Access

    ARTICLE

    A Hybrid Method of Coreference Resolution in Information Security

    Yongjin Hu1, Yuanbo Guo1, Junxiu Liu2, Han Zhang3, *

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1297-1315, 2020, DOI:10.32604/cmc.2020.010855

    Abstract In the field of information security, a gap exists in the study of coreference resolution of entities. A hybrid method is proposed to solve the problem of coreference resolution in information security. The work consists of two parts: the first extracts all candidates (including noun phrases, pronouns, entities, and nested phrases) from a given document and classifies them; the second is coreference resolution of the selected candidates. In the first part, a method combining rules with a deep learning model (Dictionary BiLSTM-Attention-CRF, or DBAC) is proposed to extract all candidates in the text and classify them. In the DBAC model,… More >

  • Open Access

    ARTICLE

    Coverless Image Steganography Based on Image Segmentation

    Yuanjing Luo1, Jiaohua Qin1, *, Xuyu Xiang1, Yun Tan1, Zhibin He1, Neal N. Xiong2

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1281-1295, 2020, DOI:10.32604/cmc.2020.010867

    Abstract To resist the risk of the stego-image being maliciously altered during transmission, we propose a coverless image steganography method based on image segmentation. Most existing coverless steganography methods are based on whole feature mapping, which has poor robustness when facing geometric attacks, because the contents in the image are easy to lost. To solve this problem, we use ResNet to extract semantic features, and segment the object areas from the image through Mask RCNN for information hiding. These selected object areas have ethical structural integrity and are not located in the visual center of the image, reducing the information loss… More >

  • Open Access

    ARTICLE

    PUF-Based Key Distribution in Wireless Sensor Networks

    Zheng Zhang1, Yanan Liu1, *, Qinyuan Zuo1, Lein Harn2, Shuo Qiu1, Yuan Cheng1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1261-1280, 2020, DOI:10.32604/cmc.2020.010034

    Abstract Physical Unclonable Functions (PUFs) can be seen as kind of hardware oneway functions, who are easily fabricated but difficult to clone, duplicate or predict. Therefore, PUFs with unclonable and unpredictable properties are welcome to be applied in designing lightweight cryptography protocols. In this paper, a Basic Key Distribution Scheme (Basic-KDS) based on PUFs is firstly proposed. Then, by employing different deployment modes, a Random Deployment Key Distribution Scheme (RD-KDS) and a Grouping Deployment Key Distribution Scheme (GD-KDS) are further proposed based on the Basic-KDS for large scale wireless sensor networks. In our proposals, a sensor is not pre-distributed with any… More >

  • Open Access

    ARTICLE

    A Controlled Quantum Dialogue Protocol Based on Quantum Walks

    Jinqiao Dai1, Shibin Zhang1, *, Yan Chang1, Xueyang Li1, Tao Zheng1, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1247-1260, 2020, DOI:10.32604/cmc.2020.010550

    Abstract In order to enable two parties to exchange their secret information equally, we propose a controlled quantum dialogue protocol based on quantum walks, which implements the equal exchange of secret information between the two parties with the help of the controller TP. The secret information is transmitted via quantum walks, by using this method, the previously required entangled particles do not need to be prepared in the initial phase, and the entangled particles can be produced spontaneously via quantum walks. Furthermore, to resist TP’s dishonest behavior, we use a hash function to verify the correctness of the secret information. The… More >

  • Open Access

    ARTICLE

    A Multi-Tenant Usage Access Model for Cloud Computing

    Zhengtao Liu1, *, Yun Yang1, Wen Gu1, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1233-1245, 2020, DOI:10.32604/cmc.2020.010846

    Abstract Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures. It offers tremendous advantages for enterprises and service providers. It is anticipated that this situation will evolve to foster cross-tenant collaboration supported by Authorization as a service. To realize access control in a multi-tenant cloud computing environment, this study proposes a multi-tenant cloud computing access control model based on the traditional usage access control model by building trust relations among tenants. The model consists of three submodels, which achieve trust relationships between tenants with different granularities and satisfy the requirements of different application scenarios.… More >

  • Open Access

    ARTICLE

    Image Denoising with Adaptive Weighted Graph Filtering

    Ying Chen1, 2, Yibin Tang3, Lin Zhou1, Yan Zhou3, 4, Jinxiu Zhu3, Li Zhao1, *

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1219-1232, 2020, DOI:10.32604/cmc.2020.010638

    Abstract Graph filtering, which is founded on the theory of graph signal processing, is proved as a useful tool for image denoising. Most graph filtering methods focus on learning an ideal lowpass filter to remove noise, where clean images are restored from noisy ones by retaining the image components in low graph frequency bands. However, this lowpass filter has limited ability to separate the low-frequency noise from clean images such that it makes the denoising procedure less effective. To address this issue, we propose an adaptive weighted graph filtering (AWGF) method to replace the design of traditional ideal lowpass filter. In… More >

Displaying 14381-14390 on page 1439 of 21887. Per Page