Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,939)
  • Open Access

    ARTICLE

    The Influence of Internet Use on Women’s Depression and Its Countermeasures—Empirical Analysis Based on Data from CFPS

    Dengke Xu1, Linlin Shen1, Fangzhong Xu2,*

    International Journal of Mental Health Promotion, Vol., , DOI:10.32604/ijmhp.2024.046023

    Abstract Based on China Family Panel Studies (CFPS) 2018 data, the multiple linear regression model is used to analyze the effects of Internet use on women’s depression, and to test the robustness of the regression results. At the same time, the effects of Internet use on mental health of women with different residence, age, marital status and physical health status are analyzed. Then, we can obtain that Internet use has a significant promoting effect on women’s mental health, while the degree of Internet use has a significant inhibitory effect on women’s mental health. In addition, the study found that women’s age,… More >

  • Open Access

    ARTICLE

    Research on Demand Response Potential of Adjustable Loads in Demand Response Scenarios

    Zhishuo Zhang, Xinhui Du*, Yaoke Shang, Jingshu Zhang, Wei Zhao, Jia Su

    Energy Engineering, Vol., , DOI:10.32604/ee.2024.047706

    Abstract To address the issues of limited demand response data, low generalization of demand response potential evaluation, and poor demand response effect, the article proposes a demand response potential feature extraction and prediction model based on data mining and a demand response potential assessment model for adjustable loads in demand response scenarios based on subjective and objective weight analysis. Firstly, based on the demand response process and demand response behavior, obtain demand response characteristics that characterize the process and behavior. Secondly, establish a feature extraction and prediction model based on data mining, including similar day clustering, time series decomposition, redundancy processing,… More >

  • Open Access

    ARTICLE

    A Multilayer Network Constructed for Herb and Prescription Efficacy Analysis

    Xindi Huang1, Liwei Liang1, Sakirin Tam2, Hao Liang3, Xiong Cai4, Changsong Ding1,5,*

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2022.029970

    Abstract Chinese Medicine (CM) has been widely used as an important avenue for disease prevention and treatment in China especially in the form of CM prescriptions combining sets of herbs to address patients’ symptoms and syndromes. However, the selection and compatibility of herbs are complex and abstract due to intrinsic relationships between herbal properties and their overall functions. Network analysis is applied to demonstrate the complex relationships between individual herbal efficacy and the overall function of CM prescriptions. To illustrate their connections and correlations, prescription function (PF), prescription herb (PH), and herbal efficacy (HE) intra-networks are proposed based on CM theory… More >

  • Open Access

    ARTICLE

    The Lambert-G Family: Properties, Inference, and Applications

    Jamal N. Al Abbasi1, Ahmed Z. Afify2,*, Badr Alnssyan3,*, Mustafa S. Shama4,5

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2024.046533

    Abstract This study proposes a new flexible family of distributions called the Lambert-G family. The Lambert family is very flexible and exhibits desirable properties. Its three-parameter special sub-models provide all significant monotonic and non-monotonic failure rates. A special sub-model of the Lambert family called the Lambert-Lomax (LL) distribution is investigated. General expressions for the LL statistical properties are established. Characterizations of the LL distribution are addressed mathematically based on its hazard function. The estimation of the LL parameters is discussed using six estimation methods. The performance of this estimation method is explored through simulation experiments. The usefulness and flexibility of the… More >

  • Open Access

    CASE REPORT

    A 63-Year-Old Male with D-Transposition of the Great Arteries Who Had an Early Form of the Arterial Switch Operation

    Michael A. Rebolledo1,*, Jane S. Yao2, Jason N. Johnson1, Umar S. Boston3, Benjamin R. Waller1

    Congenital Heart Disease, Vol., , DOI:10.32604/chd.2024.046638

    Abstract We describe a 63-year-old male who appears to have undergone an early form of the arterial switch operation for D-transposition of the great arteries performed in the mid-1960s. We review the clinical and imaging data that support our conclusion. He had a diagnostic cardiac catheterization which demonstrated severe pulmonary hypertension responsive to epoprostenol and oxygen. Our case may represent one example of the experimental surgical work done prior to Dr. Adibe Jatene’s description of the first successful arterial switch performed in 1975. More >

  • Open Access

    REVIEW

    SCHOOL DIFFICULTIES in Children Cancer Survivors: A Narrative Review and a Teacher Point-of-View

    Fanny Delehaye1,2,3,*, Caroline Fayet2, Julien Lejeune4

    Psycho-Oncologie, Vol., , DOI:10.32604/po.2024.042737

    Abstract School difficulties are common in children cancer survivors and may be prognostic for the success of the patient social reintegration after the disease. Here, we carry out a narrative review of the literature from 2001 to 2022 to assess the school difficulties of these patients, the predictive factors of these difficulties, and the possible long-term consequences. We punctuate this review the practical point-of-view of a teacher dedicated to our hospital, who works with children with chronic diseases such as cancer. Therefore, we expose possible barriers and solutions to improve the scholar reintegration and limit the impact of cancer on the… More >

  • Open Access

    ARTICLE

    Transient Stability Preventive Control of Wind Farm Connected Power System Considering the Uncertainty

    Yuping Bian*, Xiu Wan, Xiaoyu Zhou

    Energy Engineering, Vol., , DOI:10.32604/ee.2024.047678

    Abstract To address uncertainty as well as transient stability constraints simultaneously in the preventive control of wind farm systems, a novel three-stage optimization strategy is established in this paper. In the first stage, the probabilistic multi-objective particle swarm optimization based on the point estimate method is employed to cope with the stochastic factors. The transient security region of the system is accurately ensured by the interior point method in the second stage. Finally, the verification of the final optimal objectives and satisfied constraints are enforced in the last stage. Furthermore, the proposed strategy is a general framework that can combine other… More >

  • Open Access

    ARTICLE

    VKFQ: A Verifiable Keyword Frequency Query Framework with Local Differential Privacy in Blockchain

    Youlin Ji, Bo Yin*, Ke Gu

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.049086

    Abstract With its untameable and traceable properties, blockchain technology has been widely used in the field of data sharing. How to preserve individual privacy while enabling efficient data queries is one of the primary issues with secure data sharing. In this paper, we study verifiable keyword frequency (KF) queries with local differential privacy in blockchain. Both the numerical and the keyword attributes are present in data objects; the latter are sensitive and require privacy protection. However, prior studies in blockchain have the problem of trilemma in privacy protection and are unable to handle KF queries. We propose an efficient framework that… More >

  • Open Access

    ARTICLE

    Unmanned Aerial Vehicles General Aerial Person-Vehicle Recognition Based on Improved YOLOv8s Algorithm

    Zhijian Liu*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.048998

    Abstract Considering the variations in imaging sizes of the unmanned aerial vehicles (UAV) at different aerial photography heights, as well as the influence of factors such as light and weather, which can result in missed detection and false detection of the model, this paper presents a comprehensive detection model based on the improved lightweight You Only Look Once version 8s (YOLOv8s) algorithm used in natural light and infrared scenes (L_YOLO). The algorithm proposes a special feature pyramid network (SFPN) structure and substitutes most of the neck feature extraction module with the Special deformable convolution feature extraction module (SDCN). Moreover, the model… More >

  • Open Access

    ARTICLE

    Enhancing PDF Malware Detection through Logistic Model Trees

    Muhammad Binsawad*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.048183

    Abstract Malware is an ever-present and dynamic threat to networks and computer systems in cybersecurity, and because of its complexity and evasiveness, it is challenging to identify using traditional signature-based detection approaches. The study article discusses the growing danger to cybersecurity that malware hidden in PDF files poses, highlighting the shortcomings of conventional detection techniques and the difficulties presented by adversarial methodologies. The article presents a new method that improves PDF virus detection by using document analysis and a Logistic Model Tree. Using a dataset from the Canadian Institute for Cybersecurity, a comparative analysis is carried out with well-known machine learning… More >

Displaying 541-550 on page 55 of 2939. Per Page