Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (38)
  • Open Access


    Parents of Children Suffering from Cancer or in Remission from Cancer: a Need to Accompany Them!

    Parents d’un enfant atteint de cancer ou en rémission de cancer : une nécessité de les accompagner !

    M. Vander Haegen, C. Flahault, K. Lamore

    Psycho-Oncologie, Vol.16, No.4, pp. 339-341, 2022, DOI:10.3166/pson-2022-0215

    Abstract When cancer strikes a child, parents (and family) find themselves involved at many levels in the trajectory of the disease and treatment. This trajectory of care varies from family to family. For several years, the psycho-medical world has been implementing actions in the field to support parents of a child with cancer or in remission from cancer. As health professionals, we must continue these actions and develop a strong and harmonious partnership with parents because they are the first relays for the medical care of the child.

    Résumé Lorsqu’un cancer touche un enfant, les parents (et la famille) se retrouvent… More >

  • Open Access


    Bioinformatic analysis of lncRNA-associated competing endogenous RNA regulatory networks in synovial tissue of temporomandibular joint osteoarthritis


    BIOCELL, Vol.47, No.6, pp. 1293-1306, 2023, DOI:10.32604/biocell.2023.028199

    Abstract Background: Temporomandibular joint osteoarthritis (TMJOA) is an end-stage disease that seriously affects the patients’ quality of life. Molecular insights in advancing our understanding of TMJOA are the need of the hour. Methods: We performed RNA high-throughput sequencing and bioinformatics analysis of differentially expressed (DE) long non-coding RNA (lncRNAs), microRNAs (miRNAs), and messenger RNA (mRNAs) in human synovial TMJOA tissues. Firstly, synovium samples of TMJOA patients and non-TMJOA controls were collected for highthroughput sequencing of lncRNAs, miRNAs, and mRNAs. We then performed biological function analysis of the top 100 mRNAs with more than 2-fold differential expression, and their upstream regulated miRNAs… More >

  • Open Access


    Methods Used to Reduce Bullying in Kindergarten from Teachers’ Perspectives

    Lina Bashatah*, Duaa Al-fifi

    International Journal of Mental Health Promotion, Vol.25, No.5, pp. 639-653, 2023, DOI:10.32604/ijmhp.2023.025878

    Abstract This study identified the methods used by kindergarten teachers to reduce bullying among their students in and out of the classroom and examined differences based on the teachers’ years of experience and the number of courses on bullying they had taken. A descriptive survey using a questionnaire tool collected responses from 208 public kindergarten teachers in Riyadh, Kingdom of Saudi Arabia. The participants agreed with using such methods to reduce bullying among children as responding to parents’ reports and following up on the reasons for a child’s absence. They also agreed that bullying in the classroom could be reduced by… More >

  • Open Access


    The Evidenced Effects of Early Childhood Interventions to Promote Mental Health and Parenting in the Nordic Countries: A Systematic Review

    Maria Dahlberg1,*, Johanna Nordmyr1, Hrafnhildur Gunnarsdottir2, Anna K. Forsman1

    International Journal of Mental Health Promotion, Vol.25, No.4, pp. 505-537, 2023, DOI:10.32604/ijmhp.2023.020833

    Abstract The first years of life and the family context are key to the promotion and protection of children’s health and wellbeing, emphasizing the need for interventions aimed to support families with young children. This review aimed to explore the effectiveness of early childhood interventions developed for promoting mental health and parenting among families with young children in the Nordic countries. Six electronic databases were systematically searched, and 20 articles covering 16 studies applying various quantitative and qualitative methods met the study inclusion criteria. The studied interventions were assessed as universal health-promoting interventions and health-promoting interventions with elements of prevention. Outcomes… More >

  • Open Access


    Epidemiology of Breast Cancer

    Chao Shang, Dongkui Xu*

    Oncologie, Vol.24, No.4, pp. 649-663, 2022, DOI:10.32604/oncologie.2022.027640

    Abstract All over the world, the most common malignancy in women is breast cancer. Breast cancer is also a significant factor of death in women. In 2020, approximately 2.3 million cases of breast cancer were newly diagnosed in women globally, and approximately 685,000 people died. Breast cancer incidence varies by region around the world, but it is all increasing. According to the current morbidity and mortality trend of breast cancer, it is estimated that by 2030, the number of incidence and deaths of breast cancer will reach 2.64 million and 1.7 million, respectively. The age-standardized incidence rate was 66.4/100,000 in developed… More >

  • Open Access


    Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN

    Muhammad Nadeem1, Ali Arshad2, Saman Riaz2, SyedaWajiha Zahra1, Muhammad Rashid2, Shahab S. Band3,*, Amir Mosavi4,5,6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2641-2659, 2023, DOI:10.32604/cmc.2023.028796

    Abstract Cloud computing is one of the most attractive and cost-saving models, which provides online services to end-users. Cloud computing allows the user to access data directly from any node. But nowadays, cloud security is one of the biggest issues that arise. Different types of malware are wreaking havoc on the clouds. Attacks on the cloud server are happening from both internal and external sides. This paper has developed a tool to prevent the cloud server from spamming attacks. When an attacker attempts to use different spamming techniques on a cloud server, the attacker will be intercepted through two effective techniques:… More >

  • Open Access


    Multi-Zone-Wise Blockchain Based Intrusion Detection and Prevention System for IoT Environment

    Salaheddine Kably1,2,*, Tajeddine Benbarrad1, Nabih Alaoui2, Mounir Arioua1

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 253-278, 2023, DOI:10.32604/cmc.2023.032220

    Abstract Blockchain merges technology with the Internet of Things (IoT) for addressing security and privacy-related issues. However, conventional blockchain suffers from scalability issues due to its linear structure, which increases the storage overhead, and Intrusion detection performed was limited with attack severity, leading to performance degradation. To overcome these issues, we proposed MZWB (Multi-Zone-Wise Blockchain) model. Initially, all the authenticated IoT nodes in the network ensure their legitimacy by using the Enhanced Blowfish Algorithm (EBA), considering several metrics. Then, the legitimately considered nodes for network construction for managing the network using Bayesian-Direct Acyclic Graph (B-DAG), which considers several metrics. The intrusion… More >

  • Open Access


    Face Mask Recognition for Covid-19 Prevention

    Trong Hieu Luu1, Phan Nguyen Ky Phuc2,*, Zhiqiu Yu3, Duy Dung Pham1, Huu Trong Cao1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3251-3262, 2022, DOI:10.32604/cmc.2022.029663

    Abstract In recent years, the COVID-19 pandemic has negatively impacted all aspects of social life. Due to ease in the infected method, i.e., through small liquid particles from the mouth or the nose when people cough, sneeze, speak, sing, or breathe, the virus can quickly spread and create severe problems for people’s health. According to some research as well as World Health Organization (WHO) recommendation, one of the most economical and effective methods to prevent the spread of the pandemic is to ask people to wear the face mask in the public space. A face mask will help prevent the droplet… More >

  • Open Access


    HDLIDP: A Hybrid Deep Learning Intrusion Detection and Prevention Framework

    Magdy M. Fadel1,*, Sally M. El-Ghamrawy2, Amr M. T. Ali-Eldin1, Mohammed K. Hassan3, Ali I. El-Desoky1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2293-2312, 2022, DOI:10.32604/cmc.2022.028287

    Abstract Distributed denial-of-service (DDoS) attacks are designed to interrupt network services such as email servers and webpages in traditional computer networks. Furthermore, the enormous number of connected devices makes it difficult to operate such a network effectively. Software defined networks (SDN) are networks that are managed through a centralized control system, according to researchers. This controller is the brain of any SDN, composing the forwarding table of all data plane network switches. Despite the advantages of SDN controllers, DDoS attacks are easier to perpetrate than on traditional networks. Because the controller is a single point of failure, if it fails, the… More >

  • Open Access


    Early DDoS Detection and Prevention with Traced-Back Blocking in SDN Environment

    Sriramulu Bojjagani1, D. R. Denslin Brabin2,*, K. Saravanan2

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 805-819, 2022, DOI:10.32604/iasc.2022.023771

    Abstract The flow of information is a valuable asset for every company and its consumers, and Distributed Denial-of-Service (DDoS) assaults pose a substantial danger to this flow. If we do not secure security, hackers may steal information flowing across a network, posing a danger to a business and society. As a result, the most effective ways are necessary to deal with the dangers. A DDoS attack is a well-known network infrastructure assault that prevents servers from servicing genuine customers. It is necessary to identify and block a DDoS assault before it reaches the server in order to avoid being refused services.… More >

Displaying 1-10 on page 1 of 38. Per Page  

Share Link