Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (54)
  • Open Access

    ARTICLE

    Efficient User Identity Linkage Based on Aligned Multimodal Features and Temporal Correlation

    Jiaqi Gao1, Kangfeng Zheng1,*, Xiujuan Wang2, Chunhua Wu1, Bin Wu2

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 251-270, 2024, DOI:10.32604/cmc.2024.055560 - 15 October 2024

    Abstract User identity linkage (UIL) refers to identifying user accounts belonging to the same identity across different social media platforms. Most of the current research is based on text analysis, which fails to fully explore the rich image resources generated by users, and the existing attempts touch on the multimodal domain, but still face the challenge of semantic differences between text and images. Given this, we investigate the UIL task across different social media platforms based on multimodal user-generated contents (UGCs). We innovatively introduce the efficient user identity linkage via aligned multi-modal features and temporal correlation… More >

  • Open Access

    ARTICLE

    Designing a Secure and Scalable Data Sharing Mechanism Using Decentralized Identifiers (DID)

    Iuon-Chang Lin1, I-Ling Yeh1, Ching-Chun Chang2, Jui-Chuan Liu3, Chin-Chen Chang3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 809-822, 2024, DOI:10.32604/cmes.2024.051612 - 20 August 2024

    Abstract Centralized storage and identity identification methods pose many risks, including hacker attacks, data misuse, and single points of failure. Additionally, existing centralized identity management methods face interoperability issues and rely on a single identity provider, leaving users without control over their identities. Therefore, this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers. The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity. Data is stored on InterPlanetary File System (IPFS) to avoid the risk of single More >

  • Open Access

    ARTICLE

    Impact of Exercise Atmosphere on Adolescents’ Exercise Behavior: Chain Mediating Effect of Exercise Identity and Exercise Habit

    Zhen Su1,*, Ziqiang Zhang2, Yonghao Zhou3

    International Journal of Mental Health Promotion, Vol.26, No.7, pp. 579-588, 2024, DOI:10.32604/ijmhp.2024.051842 - 30 July 2024

    Abstract Appropriate physical exercise has a positive impact on adolescents’ physical and mental health, but there is a serious lack of physical exercise among Chinese adolescents. How to shape their exercise behavior (EB) has become an important task in promoting their development. A questionnaire survey was conducted using stratified cluster random sampling on three middle schools by class in Zhejiang Province, China to investigate the impact of exercise atmosphere (EA) on adolescents’ exercise behavior and the mediating role of exercise identity (EI) and exercise habit (EH). 806 adolescents were investigated by the Exercise Atmosphere Scale (EAS),… More >

  • Open Access

    ARTICLE

    A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture

    Yi-Bo Cao1,*, Xiu-Bo Chen1, Yun-Feng He2, Lu-Xi Liu2, Yin-Mei Che2, Xiao Wang2, Ke Xiao3, Gang Xu3, Si-Yi Chen1

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2813-2827, 2024, DOI:10.32604/cmc.2024.046816 - 27 February 2024

    Abstract Due to the rapid advancements in network technology, blockchain is being employed for distributed data storage. In the Internet of Things (IoT) scenario, different participants manage multiple blockchains located in different trust domains, which has resulted in the extensive development of cross-domain authentication techniques. However, the emergence of many attackers equipped with quantum computers has the potential to launch quantum computing attacks against cross-domain authentication schemes based on traditional cryptography, posing a significant security threat. In response to the aforementioned challenges, our paper demonstrates a post-quantum cross-domain identity authentication scheme to negotiate the session key… More >

  • Open Access

    ARTICLE

    Enhancing Identity Protection in Metaverse-Based Psychological Counseling System

    Jun Lee1, Hanna Lee2, Seong Chan Lee2, Hyun Kwon3,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 617-632, 2024, DOI:10.32604/cmc.2023.045768 - 30 January 2024

    Abstract Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regarding client identity. However, these systems often face challenges concerning voice data leaks and the suboptimal communication of the client’s non-verbal expressions, such as facial cues, to the counselor. This study proposes a metaverse-based psychological counseling system designed to enhance client identity protection while ensuring efficient information delivery to counselors during non-face-to-face counseling. The proposed system incorporates a voice modulation function that instantly modifies/masks the client’s voice to safeguard their identity. Additionally, it employs real-time client facial expression recognition using an ensemble of decision… More >

  • Open Access

    REVIEW

    Soundscapes in Arab Cities: A Systematic Review and Research Agenda

    Tallal Abdel Karim Bouzir1,*, Djihed Berkouk2,3, Theodore S. Eisenman4, Dietrich Schwela5, Nader Azab2, Mohammed M. Gomma2,6, Samiha Boucherit7

    Sound & Vibration, Vol.58, pp. 1-24, 2024, DOI:10.32604/sv.2024.046723 - 31 January 2024

    Abstract In the context of Arab cities, this study explores the intricate interplay between cultural, historical, and environmental elements that shape their unique soundscapes. The paper aims to shed light on this underrepresented field of study by employing a three-fold research approach: systematic review, a comprehensive literature review, and the formulation of a future research agenda. The first part of the investigation focuses on research productivity in the Arab world regarding soundscape studies. An analysis of publication trends reveals that soundscape research in Arab cities is still an emerging area of interest. Critical gaps in the… More >

  • Open Access

    ARTICLE

    Relationship between Interaction Anxiousness, Academic Resilience, Cultural Intelligence and Ego-Identity among Chinese Vocational Pathway University Students: A Conditional Process Analysis Model

    Wenxin Chen1,#, Jie Wu1,2,#, Long Li3,*, Shiyong Wu4,*

    International Journal of Mental Health Promotion, Vol.25, No.8, pp. 949-959, 2023, DOI:10.32604/ijmhp.2023.030072 - 06 July 2023

    Abstract Background: University students’ ego-identity, an essential component of their psychological development and mental health, has widely attracted the attention of policymakers, schools, and parents. Method: A total of 298 Chinese vocational pathway undergraduates were recruited, and a conditional process analysis model was adopted to explore the interaction mechanism of ego-identity. Results: The results suggest that the ego-identity of Chinese vocational pathway undergraduates is significantly affected by interaction anxiousness, academic resilience, and cultural intelligence. (1) Interaction anxiousness significantly and positively predicts ego-identity. (2) Academic resilience positively and partially mediates the effect of interaction anxiousness on ego-identity. (3) Cultural intelligence… More >

  • Open Access

    ARTICLE

    Novel Framework for Generating Criminals Images Based on Textual Data Using Identity GANs

    Mohamed Fathallah1,*, Mohamed Sakr2, Sherif Eletriby2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 383-396, 2023, DOI:10.32604/cmc.2023.039824 - 08 June 2023

    Abstract Text-to-image generation is a vital task in different fields, such as combating crime and terrorism and quickly arresting lawbreakers. For several years, due to a lack of deep learning and machine learning resources, police officials required artists to draw the face of a criminal. Traditional methods of identifying criminals are inefficient and time-consuming. This paper presented a new proposed hybrid model for converting the text into the nearest images, then ranking the produced images according to the available data. The framework contains two main steps: generation of the image using an Identity Generative Adversarial Network… More >

  • Open Access

    ARTICLE

    FSA-Net: A Cost-efficient Face Swapping Attention Network with Occlusion-Aware Normalization

    Zhipeng Bin1, Huihuang Zhao1,2,*, Xiaoman Liang1,2, Wenli Chen1

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 971-983, 2023, DOI:10.32604/iasc.2023.037270 - 29 April 2023

    Abstract The main challenges in face swapping are the preservation and adaptive superimposition of attributes of two images. In this study, the Face Swapping Attention Network (FSA-Net) is proposed to generate photorealistic face swapping. The existing face-swapping methods ignore the blending attributes or mismatch the facial keypoint (cheek, mouth, eye, nose, etc.), which causes artifacts and makes the generated face silhouette non-realistic. To address this problem, a novel reinforced multi-aware attention module, referred to as RMAA, is proposed for handling facial fusion and expression occlusion flaws. The framework includes two stages. In the first stage, a More >

  • Open Access

    ARTICLE

    A Privacy-Preserving System Design for Digital Presence Protection

    Eric Yocam1, Ahmad Alomari2, Amjad Gawanmeh3,*, Wathiq Mansoor3

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3091-3110, 2023, DOI:10.32604/cmc.2023.032826 - 31 March 2023

    Abstract A person’s privacy has become a growing concern, given the nature of an expansive reliance on real-time video activities with video capture, stream, and storage. This paper presents an innovative system design based on a privacy-preserving model. The proposed system design is implemented by employing an enhanced capability that overcomes today’s single parameter-based access control protection mechanism for digital privacy preservation. The enhanced capability combines multiple access control parameters: facial expression, resource, environment, location, and time. The proposed system design demonstrated that a person’s facial expressions combined with a set of access control rules can More >

Displaying 1-10 on page 1 of 54. Per Page