Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (9)
  • Open Access

    ARTICLE

    Towards Improving the Quality of Requirement and Testing Process in Agile Software Development: An Empirical Study

    Irum Ilays1, Yaser Hafeez1,*, Nabil Almashfi2, Sadia Ali1, Mamoona Humayun3,*, Muhammad Aqib1, Ghadah Alwakid4

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3761-3784, 2024, DOI:10.32604/cmc.2024.053830 - 12 September 2024

    Abstract Software testing is a critical phase due to misconceptions about ambiguities in the requirements during specification, which affect the testing process. Therefore, it is difficult to identify all faults in software. As requirement changes continuously, it increases the irrelevancy and redundancy during testing. Due to these challenges; fault detection capability decreases and there arises a need to improve the testing process, which is based on changes in requirements specification. In this research, we have developed a model to resolve testing challenges through requirement prioritization and prediction in an agile-based environment. The research objective is to… More >

  • Open Access

    ARTICLE

    An Empirical Study on the Effectiveness of Adversarial Examples in Malware Detection

    Younghoon Ban, Myeonghyun Kim, Haehyun Cho*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3535-3563, 2024, DOI:10.32604/cmes.2023.046658 - 11 March 2024

    Abstract Antivirus vendors and the research community employ Machine Learning (ML) or Deep Learning (DL)-based static analysis techniques for efficient identification of new threats, given the continual emergence of novel malware variants. On the other hand, numerous researchers have reported that Adversarial Examples (AEs), generated by manipulating previously detected malware, can successfully evade ML/DL-based classifiers. Commercial antivirus systems, in particular, have been identified as vulnerable to such AEs. This paper firstly focuses on conducting black-box attacks to circumvent ML/DL-based malware classifiers. Our attack method utilizes seven different perturbations, including Overlay Append, Section Append, and Break Checksum,… More >

  • Open Access

    ARTICLE

    Parental Educational Expectations, Academic Pressure, and Adolescent Mental Health: An Empirical Study Based on CEPS Survey Data

    Tao Xu1,*, Fangqiang Zuo1, Kai Zheng2,*

    International Journal of Mental Health Promotion, Vol.26, No.2, pp. 93-103, 2024, DOI:10.32604/ijmhp.2023.043226 - 08 March 2024

    Abstract Background: This study aimed to investigate the relationship between parental educational expectations and adolescent mental health problems, with academic pressure as a moderating variable. Methods: This study was based on the baseline data of the China Education Panel Survey, which was collected within one school year during 2013–2014. It included 19,958 samples from seventh and ninth graders, who ranged from 11 to 18 years old. After removing missing values and conducting relevant data processing, the effective sample size for analysis was 16344. The OLS (Ordinary Least Squares) multiple linear regression analysis was used to examine… More >

  • Open Access

    ARTICLE

    Evaluating the Efficacy of Latent Variables in Mitigating Data Poisoning Attacks in the Context of Bayesian Networks: An Empirical Study

    Shahad Alzahrani1, Hatim Alsuwat2, Emad Alsuwat3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1635-1654, 2024, DOI:10.32604/cmes.2023.044718 - 29 January 2024

    Abstract Bayesian networks are a powerful class of graphical decision models used to represent causal relationships among variables. However, the reliability and integrity of learned Bayesian network models are highly dependent on the quality of incoming data streams. One of the primary challenges with Bayesian networks is their vulnerability to adversarial data poisoning attacks, wherein malicious data is injected into the training dataset to negatively influence the Bayesian network models and impair their performance. In this research paper, we propose an efficient framework for detecting data poisoning attacks against Bayesian network structure learning algorithms. Our framework… More >

  • Open Access

    ARTICLE

    Developing Transparent IDS for VANETs Using LIME and SHAP: An Empirical Study

    Fayaz Hassan1,*, Jianguo Yu1, Zafi Sherhan Syed2, Arif Hussain Magsi3, Nadeem Ahmed4

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3185-3208, 2023, DOI:10.32604/cmc.2023.044650 - 26 December 2023

    Abstract Vehicular Ad-hoc Networks (VANETs) are mobile ad-hoc networks that use vehicles as nodes to create a wireless network. Whereas VANETs offer many advantages over traditional transportation networks, ensuring security in VANETs remains a significant challenge due to the potential for malicious attacks. This study addresses the critical issue of security in VANETs by introducing an intelligent Intrusion Detection System (IDS) that merges Machine Learning (ML)–based attack detection with Explainable AI (XAI) explanations. This study ML pipeline involves utilizing correlation-based feature selection followed by a Random Forest (RF) classifier that achieves a classification accuracy of 100%… More >

  • Open Access

    ARTICLE

    Neurodevelopmental in Relation to Breastfeeding–Experiences among Hungarian Preterm Infants at 12 Months of Corrected Age: Empirical Study

    Anna Szabina Szele1,*, Beáta Erika Nagy2

    International Journal of Mental Health Promotion, Vol.24, No.5, pp. 699-709, 2022, DOI:10.32604/ijmhp.2022.021809 - 27 July 2022

    Abstract Preterm and low birth weight infants are at higher risk of neurodevelopmental outcomes; breastfeeding offers several beneficial aspects for them. This study aimed to describe the average neurodevelopmental outcomes of preterm infants and examine the associations between neurodevelopment and breastfeeding among Hungarian preterm infants at 12 months of corrected age. 154 preterm infants with low birth weight (<2500 g) and their mothers were participated in this study. Bayley-III Screening Test (Bayley Scales of Infant and Toddler Development Screening Test, Third Edition) was administered to measure the cognitive, language and motor skills of infants; breastfeeding data was… More >

  • Open Access

    ARTICLE

    Green Measurements for Software Product Based on Sustainability Dimensions

    Komeil Raisian1, Jamaiah Yahaya2,*, Aziz Deraman3

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 271-288, 2022, DOI:10.32604/csse.2022.020496 - 08 October 2021

    Abstract Software is a central component in the modern world and vastly affects the environment’s sustainability. The demand for energy and resource requirements is rising when producing hardware and software units. Literature study reveals that many studies focused on green hardware; however, limited efforts were made in the greenness of software products. Green software products are necessary to solve the issues and problems related to the long-term use of software, especially from a sustainability perspective. Without a proper mechanism for measuring the greenness of a particular software product executed in a specific environment, the mentioned benefits… More >

  • Open Access

    ARTICLE

    The Relationship between Urbanization and Domestic Energy Consumption: An Empirical Study of Shandong Province, China

    Doudou Liu1,*, Liang Qiao2,3, Feng Zhang4, Xueliang Yuan2

    Energy Engineering, Vol.118, No.5, pp. 1395-1409, 2021, DOI:10.32604/EE.2021.014697 - 16 July 2021

    Abstract The rapid development of urbanization has led to a rapid increase in total energy consumption. The proportion of domestic energy consumption to total energy consumption has gradually increased and has become the major driving force for energy consumption. With the pressure from urbanization and domestic energy consumption, it is necessary to study the impact of urbanization on domestic energy consumption of the regional level and to explore the function paths of these two factors. The findings are helpful to realize sustainable development based on the actual situation analysis, horizontal survey data and statistical yearbook panel… More >

  • Open Access

    ARTICLE

    Ordering Method and Empirical Study on Multiple Factor Sensitivity of Group Social Attitudes Based on Entropy Theory

    Qin He1, Shuang Dong1,*, Yaxin Cheng1

    Computer Systems Science and Engineering, Vol.34, No.4, pp. 225-230, 2019, DOI:10.32604/csse.2019.34.225

    Abstract When studying the various factors affecting a group’s social attitudes, minor changes in a factor will easily cause changes to other factors due to their association and relevance to each other; therefore, such a factor is more sensitive, although there is a difference between sensitivity and importance. In order to comprehensively learn about the influence of multiple factors, explorations based on entropy theory have been conducted to determine the sensitivity of each factor, to specify the difference between the frequency and sensitivity priority of entropy theory, and to provide a method, a way of thinking, More >

Displaying 1-10 on page 1 of 9. Per Page