Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (10)
  • Open Access

    ARTICLE

    Fuzzy Risk Assessment Method for Airborne Network Security Based on AHP-TOPSIS

    Kenian Wang1,2,*, Yuan Hong1,2, Chunxiao Li2

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1123-1142, 2024, DOI:10.32604/cmc.2024.052088 - 18 July 2024

    Abstract With the exponential increase in information security risks, ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment. However, experts possess a limited understanding of fundamental security elements, such as assets, threats, and vulnerabilities, due to the confidentiality of airborne networks, resulting in cognitive uncertainty. Therefore, the Pythagorean fuzzy Analytic Hierarchy Process (AHP) Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) is proposed to address the expert cognitive uncertainty during information security risk assessment for airborne networks. First, Pythagorean fuzzy AHP is employed to construct an index system… More >

  • Open Access

    ARTICLE

    A Unified Decision-Making Technique for Analysing Treatments in Pandemic Context

    Fawaz Alsolami1, Abdullah Saad Al-Malaise Alghamdi2, Asif Irshad Khan1,*, Yoosef B. Abushark1, Abdulmohsen Almalawi1, Farrukh Saleem2, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2591-2618, 2022, DOI:10.32604/cmc.2022.025703 - 16 June 2022

    Abstract The COVID-19 pandemic has triggered a global humanitarian disaster that has never been seen before. Medical experts, on the other hand, are undecided on the most valuable treatments of therapy because people ill with this infection exhibit a wide range of illness indications at different phases of infection. Further, this project aims to undertake an experimental investigation to determine which treatments for COVID-19 disease is the most effective and preferable. The research analysis is based on vast data gathered from professionals and research journals, making this study a comprehensive reference. To solve this challenging task,… More >

  • Open Access

    ARTICLE

    Cyber Security Analysis and Evaluation for Intrusion Detection Systems

    Yoosef B. Abushark1, Asif Irshad Khan1,*, Fawaz Alsolami1, Abdulmohsen Almalawi1, Md Mottahir Alam2, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1765-1783, 2022, DOI:10.32604/cmc.2022.025604 - 24 February 2022

    Abstract Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the world. Machine learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and security issues. It is crucial in offering a proactive security system in the field of cybersecurity. In real time, cybersecurity protects information, information systems, and networks from intruders. In the recent decade, several assessments on security and privacy estimates have noted a rapid growth in both the incidence and quantity of cybersecurity breaches. At an increasing rate, intruders are breaching… More >

  • Open Access

    ARTICLE

    Sustainability Evaluation of Modern Photovoltaic Agriculture Based on Interval Type-2 Fuzzy AHP-TOPSIS and Least Squares Support Vector Machine Optimized by Fireworks Algorithm

    Yi Liang1,2, Haichao Wang3,*, Wei-Chiang Hong4

    Energy Engineering, Vol.119, No.1, pp. 163-188, 2022, DOI:10.32604/EE.2022.017396 - 22 November 2021

    Abstract Photovoltaics (PV) has been combined with many other industries, such as agriculture. But there are many problems for the sustainability of PV agriculture. Timely and accurate sustainability evaluation of modern photovoltaic agriculture is of great significance for accelerating the sustainable development of modern photovoltaic agriculture. In order to improve the timeliness and accuracy of evaluation, this paper proposes an evaluation model based on interval type-2 Fuzzy AHP-TOPSIS and least squares support vector machine optimized by fireworks algorithm. Firstly, the criteria system of modern photovoltaic agriculture sustainability is constructed from three dimensions including technology sustainability, economic… More >

  • Open Access

    ARTICLE

    Network Quality Assessment in Heterogeneous Wireless Settings: An Optimization Approach

    Sultan H. Almotiri*, Mohammed A. Al Ghamdi

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 439-455, 2022, DOI:10.32604/cmc.2022.021012 - 03 November 2021

    Abstract The identification of an effective network which can efficiently meet the service requirements of the target, while maintaining ultimate performance at an increased level is significant and challenging in a fully interconnected wireless medium. The wrong selection can contribute to unwanted situations like frustrated users, slow service, traffic congestion issues, missed and/or interrupted calls, and wastefulness of precious network components. Conventional schemes estimate the handoff need and cause the network screening process by a single metric. The strategies are not effective enough because traffic characteristics, user expectations, network terminology and other essential device metrics are… More >

  • Open Access

    ARTICLE

    Hybrid Computational Modeling for Web Application Security Assessment

    Adil Hussain Seh1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Md Tarique Jamal Ansari1, Rajeev Kumar4,*, Mohammad Ubaidullah Bokhari5, Raees Ahmad Khan1

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 469-489, 2022, DOI:10.32604/cmc.2022.019593 - 07 September 2021

    Abstract Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry play a significant role However, from the beginning, software security remains a serious issue for all levels of stakeholders. Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data, compromising the organizations’ reputation that translates into, financial losses as well. Most of the data breaches are financially motivated, especially in the healthcare sector. The… More >

  • Open Access

    ARTICLE

    Multi-Level Hesitant Fuzzy Based Model for Usable-Security Assessment

    Mohd Nadeem1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Adil Hussain Seh1, Suhel Ahmad Khan4, Alka Agrawal1, Raees Ahmad Khan1,*

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 61-82, 2022, DOI:10.32604/iasc.2022.019624 - 03 September 2021

    Abstract Present day healthcare sector is frequently victimized by the intruders. Healthcare data industry has borne the brunt of the highest number of data breach episodes in the last few years. The key reason for this is attributed to the sensitivity of healthcare data and the high costs entailed in trading the data over the dark web. Hence, usable-security evaluation of healthcare information systems is the need of hour so as to identify the vulnerabilities and provide preventive measures as a shield against the breaches. Usable-security assessment will help the software designers and developers to prioritize… More >

  • Open Access

    ARTICLE

    Impact Assessment of COVID-19 Pandemic Through Machine Learning Models

    Fawaz Jaber Alsolami1, Abdullah Saad Al-Malaise ALGhamdi2, Asif Irshad Khan1,*, Yoosef B. Abushark1, Abdulmohsen Almalawi1, Farrukh Saleem2, Alka Agrawal3, Rajeev Kumar3,4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 2895-2912, 2021, DOI:10.32604/cmc.2021.017469 - 06 May 2021

    Abstract Ever since its outbreak in the Wuhan city of China, COVID-19 pandemic has engulfed more than 211 countries in the world, leaving a trail of unprecedented fatalities. Even more debilitating than the infection itself, were the restrictions like lockdowns and quarantine measures taken to contain the spread of Coronavirus. Such enforced alienation affected both the mental and social condition of people significantly. Social interactions and congregations are not only integral part of work life but also form the basis of human evolvement. However, COVID-19 brought all such communication to a grinding halt. Digital interactions have… More >

  • Open Access

    ARTICLE

    Computational Technique for Effectiveness of Treatments Used in Curing SARS-CoV-2

    Wael Alosaimi1, Rajeev Kumar2,*, Abdullah Alharbi1, Hashem Alyami3, Alka Agrawal4, Gaurav Kaithwas5, Sanjay Singh6, Raees Ahmad Khan4

    Intelligent Automation & Soft Computing, Vol.28, No.3, pp. 617-628, 2021, DOI:10.32604/iasc.2021.016703 - 20 April 2021

    Abstract COVID-19 pandemic has unleashed an unprecedented humanitarian crisis in the world at present. With each passing day, the number of patients afflicted with Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) is rising at an alarming pace, so much so that some countries are now combating the second wave of the contagion. As the death ratio due to the Virus increases, the medical fraternity and pharmacologists are working relentlessly to identify and prescribe a standardized and effective course of treatment for treating COVID-19 patients. However, medical specialists are confused about opting for the most efficacious course… More >

  • Open Access

    ARTICLE

    Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective

    Yoosef B. Abushark1, Asif Irshad Khan1,*, Fawaz Jaber Alsolami1, Abdulmohsen Almalawi1, Md Mottahir Alam2, Alka Agrawal3, Rajeev Kumar3,4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1203-1218, 2021, DOI:10.32604/cmc.2021.016610 - 22 March 2021

    Abstract Most of the security strategies today are primarily designed to provide security protection, rather than to solve one of the basic security issues related to adequate software product architecture. Several models, frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life cycle. Therefore it is important to assess the usability of the popular security requirements engineering (SRE) approaches. A significant factor in the management and handling of successful security requirements is the assessment of security requirements engineering method performance. This assessment will allow changes to the engineering process… More >

Displaying 1-10 on page 1 of 10. Per Page