Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems

    Mohammed Amin Almaiah1,*, Leen Mohammad Saqr1, Leen Ahmad Al-Rawwash1, Layan Ahmed Altellawi1, Romel Al-Ali2,*, Omar Almomani3

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3189-3220, 2024, DOI:10.32604/cmc.2024.057673 - 18 November 2024

    Abstract Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store. Despite the increasing reliance on database management systems, this field continues to face numerous cyber-attacks. Database management systems serve as the foundation of any information system or application. Any cyber-attack can result in significant damage to the database system and loss of sensitive data. Consequently, cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats. Risk assessment aids in understanding… More >

  • Open Access

    ARTICLE

    The Influence of Internet Use on Women’s Depression and Its Countermeasures—Empirical Analysis Based on Data from CFPS

    Dengke Xu1, Linlin Shen1, Fangzhong Xu2,*

    International Journal of Mental Health Promotion, Vol.26, No.3, pp. 229-238, 2024, DOI:10.32604/ijmhp.2024.046023 - 08 April 2024

    Abstract Based on China Family Panel Studies (CFPS) 2018 data, the multiple linear regression model is used to analyze the effects of Internet use on women’s depression, and to test the robustness of the regression results. At the same time, the effects of Internet use on mental health of women with different residence, age, marital status and physical health status are analyzed. Then, we can obtain that Internet use has a significant promoting effect on women’s mental health, while the degree of Internet use has a significant inhibitory effect on women’s mental health. In addition, the… More >

  • Open Access

    ARTICLE

    Modeling Target Detection and Performance Analysis of Electronic Countermeasures for Phased Radar

    T. Jagadesh1,2, B. Sheela Rani3,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 449-463, 2023, DOI:10.32604/iasc.2023.026868 - 06 June 2022

    Abstract Interference is a key factor in radar return misdetection. Strong interference might make it difficult to detect the signal or targets. When interference occurs in the sidelobes of the antenna pattern, Sidelobe Cancellation (SLC) and Sidelobe Blanking are two unique solutions to solve this problem (SLB). Aside from this approach, the probability of false alert and likelihood of detection are the most essential parameters in radar. The chance of a false alarm for any radar system should be minimal, and as a result, the probability of detection should be high. There are several interference cancellation… More >

  • Open Access

    ARTICLE

    Analysis of Water Pollution Causes and Control Countermeasures in Liaohe Estuary via Support Vector Machine Particle Swarm Optimization under Deep Learning

    Guize Liu1,2, Jinqing Ye2, Yuan Chen2, Xiaolong Yang2, Yanbin Gu2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.1, pp. 315-329, 2022, DOI:10.32604/cmes.2022.016224 - 29 November 2021

    Abstract This study explores the loss or degradation of the ecosystem and its service function in the Liaohe estuary coastal zone due to the deterioration of water quality. A prediction system based on support vector machine (SVM)-particle swarm optimization (PSO) (SVM-PSO) algorithm is proposed under the background of deep learning. SVM-PSO algorithm is employed to analyze the pollution status of the Liaohe estuary, so is the difference in water pollution of different sea consuming types. Based on the analysis results for causes of pollution, the control countermeasures of water pollution in Liaohe estuary are put forward.… More >

  • Open Access

    ARTICLE

    Impact of Tactical Parameters of Aircraft on Jamming Effectiveness of Surface-Source IR Decoy

    Shenbo Li1,*, Qi Tong1, Chaozhe Wang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.118, No.2, pp. 425-446, 2019, DOI:10.31614/cmes.2019.03936

    Abstract As the platform for surface-source infrared decoys, the target aircraft is the aim of attacks in air-to-air combat. It can quickly and accurately evaluate the jamming effectiveness of the surface-source IR decoy in various states of motion is important for enhancing the security of the aircraft. This paper proposes a model of surface-source IR decoy, and compares and analyzes simulated and measured infrared images of diffusion. A system to assess the effectiveness of the jamming of the surface-source IR decoy, target aircraft, and infrared guided missile called “Trinity” is established. Simulations were conducted to assess… More >

Displaying 1-10 on page 1 of 5. Per Page