Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (9)
  • Open Access

    ARTICLE

    A Unified Decision-Making Technique for Analysing Treatments in Pandemic Context

    Fawaz Alsolami1, Abdullah Saad Al-Malaise Alghamdi2, Asif Irshad Khan1,*, Yoosef B. Abushark1, Abdulmohsen Almalawi1, Farrukh Saleem2, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2591-2618, 2022, DOI:10.32604/cmc.2022.025703

    Abstract The COVID-19 pandemic has triggered a global humanitarian disaster that has never been seen before. Medical experts, on the other hand, are undecided on the most valuable treatments of therapy because people ill with this infection exhibit a wide range of illness indications at different phases of infection. Further, this project aims to undertake an experimental investigation to determine which treatments for COVID-19 disease is the most effective and preferable. The research analysis is based on vast data gathered from professionals and research journals, making this study a comprehensive reference. To solve this challenging task, the researchers used the HF… More >

  • Open Access

    ARTICLE

    Cyber Security Analysis and Evaluation for Intrusion Detection Systems

    Yoosef B. Abushark1, Asif Irshad Khan1,*, Fawaz Alsolami1, Abdulmohsen Almalawi1, Md Mottahir Alam2, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1765-1783, 2022, DOI:10.32604/cmc.2022.025604

    Abstract Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the world. Machine learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and security issues. It is crucial in offering a proactive security system in the field of cybersecurity. In real time, cybersecurity protects information, information systems, and networks from intruders. In the recent decade, several assessments on security and privacy estimates have noted a rapid growth in both the incidence and quantity of cybersecurity breaches. At an increasing rate, intruders are breaching information security. Anomaly detection, software… More >

  • Open Access

    ARTICLE

    Sustainability Evaluation of Modern Photovoltaic Agriculture Based on Interval Type-2 Fuzzy AHP-TOPSIS and Least Squares Support Vector Machine Optimized by Fireworks Algorithm

    Yi Liang1,2, Haichao Wang3,*, Wei-Chiang Hong4

    Energy Engineering, Vol.119, No.1, pp. 163-188, 2022, DOI:10.32604/EE.2022.017396

    Abstract Photovoltaics (PV) has been combined with many other industries, such as agriculture. But there are many problems for the sustainability of PV agriculture. Timely and accurate sustainability evaluation of modern photovoltaic agriculture is of great significance for accelerating the sustainable development of modern photovoltaic agriculture. In order to improve the timeliness and accuracy of evaluation, this paper proposes an evaluation model based on interval type-2 Fuzzy AHP-TOPSIS and least squares support vector machine optimized by fireworks algorithm. Firstly, the criteria system of modern photovoltaic agriculture sustainability is constructed from three dimensions including technology sustainability, economic sustainability and social sustainability. Then,… More >

  • Open Access

    ARTICLE

    Network Quality Assessment in Heterogeneous Wireless Settings: An Optimization Approach

    Sultan H. Almotiri*, Mohammed A. Al Ghamdi

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 439-455, 2022, DOI:10.32604/cmc.2022.021012

    Abstract The identification of an effective network which can efficiently meet the service requirements of the target, while maintaining ultimate performance at an increased level is significant and challenging in a fully interconnected wireless medium. The wrong selection can contribute to unwanted situations like frustrated users, slow service, traffic congestion issues, missed and/or interrupted calls, and wastefulness of precious network components. Conventional schemes estimate the handoff need and cause the network screening process by a single metric. The strategies are not effective enough because traffic characteristics, user expectations, network terminology and other essential device metrics are not taken into account. This… More >

  • Open Access

    ARTICLE

    Hybrid Computational Modeling for Web Application Security Assessment

    Adil Hussain Seh1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Md Tarique Jamal Ansari1, Rajeev Kumar4,*, Mohammad Ubaidullah Bokhari5, Raees Ahmad Khan1

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 469-489, 2022, DOI:10.32604/cmc.2022.019593

    Abstract Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry play a significant role However, from the beginning, software security remains a serious issue for all levels of stakeholders. Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data, compromising the organizations’ reputation that translates into, financial losses as well. Most of the data breaches are financially motivated, especially in the healthcare sector. The cyber invaders continuously penetrate the… More >

  • Open Access

    ARTICLE

    Multi-Level Hesitant Fuzzy Based Model for Usable-Security Assessment

    Mohd Nadeem1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Adil Hussain Seh1, Suhel Ahmad Khan4, Alka Agrawal1, Raees Ahmad Khan1,*

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 61-82, 2022, DOI:10.32604/iasc.2022.019624

    Abstract Present day healthcare sector is frequently victimized by the intruders. Healthcare data industry has borne the brunt of the highest number of data breach episodes in the last few years. The key reason for this is attributed to the sensitivity of healthcare data and the high costs entailed in trading the data over the dark web. Hence, usable-security evaluation of healthcare information systems is the need of hour so as to identify the vulnerabilities and provide preventive measures as a shield against the breaches. Usable-security assessment will help the software designers and developers to prioritize usable-security attributes according to the… More >

  • Open Access

    ARTICLE

    Impact Assessment of COVID-19 Pandemic Through Machine Learning Models

    Fawaz Jaber Alsolami1, Abdullah Saad Al-Malaise ALGhamdi2, Asif Irshad Khan1,*, Yoosef B. Abushark1, Abdulmohsen Almalawi1, Farrukh Saleem2, Alka Agrawal3, Rajeev Kumar3,4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 2895-2912, 2021, DOI:10.32604/cmc.2021.017469

    Abstract Ever since its outbreak in the Wuhan city of China, COVID-19 pandemic has engulfed more than 211 countries in the world, leaving a trail of unprecedented fatalities. Even more debilitating than the infection itself, were the restrictions like lockdowns and quarantine measures taken to contain the spread of Coronavirus. Such enforced alienation affected both the mental and social condition of people significantly. Social interactions and congregations are not only integral part of work life but also form the basis of human evolvement. However, COVID-19 brought all such communication to a grinding halt. Digital interactions have failed to enthuse the fervor… More >

  • Open Access

    ARTICLE

    Computational Technique for Effectiveness of Treatments Used in Curing SARS-CoV-2

    Wael Alosaimi1, Rajeev Kumar2,*, Abdullah Alharbi1, Hashem Alyami3, Alka Agrawal4, Gaurav Kaithwas5, Sanjay Singh6, Raees Ahmad Khan4

    Intelligent Automation & Soft Computing, Vol.28, No.3, pp. 617-628, 2021, DOI:10.32604/iasc.2021.016703

    Abstract COVID-19 pandemic has unleashed an unprecedented humanitarian crisis in the world at present. With each passing day, the number of patients afflicted with Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) is rising at an alarming pace, so much so that some countries are now combating the second wave of the contagion. As the death ratio due to the Virus increases, the medical fraternity and pharmacologists are working relentlessly to identify and prescribe a standardized and effective course of treatment for treating COVID-19 patients. However, medical specialists are confused about opting for the most efficacious course of treatment because the patients… More >

  • Open Access

    ARTICLE

    Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective

    Yoosef B. Abushark1, Asif Irshad Khan1,*, Fawaz Jaber Alsolami1, Abdulmohsen Almalawi1, Md Mottahir Alam2, Alka Agrawal3, Rajeev Kumar3,4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1203-1218, 2021, DOI:10.32604/cmc.2021.016610

    Abstract Most of the security strategies today are primarily designed to provide security protection, rather than to solve one of the basic security issues related to adequate software product architecture. Several models, frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life cycle. Therefore it is important to assess the usability of the popular security requirements engineering (SRE) approaches. A significant factor in the management and handling of successful security requirements is the assessment of security requirements engineering method performance. This assessment will allow changes to the engineering process of security requirements. The consistency… More >

Displaying 1-10 on page 1 of 9. Per Page