Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    ARTICLE

    Two-Stage Fuzzy MCDM for Green Supplier Selection in Steel Industry

    Chia-Nan Wang, Thi-Ly Nguyen*, Thanh-Tuan Dang

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 1245-1260, 2022, DOI:10.32604/iasc.2022.024548 - 08 February 2022

    Abstract Steel is one of the most powerful industries globally, and the associated products have a tremendous impact on nurturing a sustainable society. Considering environmental concerns within this industry's supply chain is highly successful in saving both energy and natural resources and lowering greenhouse gas emissions. In light of this, sustainable suppliers are considered input partners who play a specific role in the chain of business operations of every enterprise, maintaining them to achieve higher levels of customer satisfaction and thus gain more market share. Supplier selection can be characterized as a multi-criteria decision-making (MCDM) problem… More >

  • Open Access

    ARTICLE

    Quantitative Evaluation of Mental-Health in Type-2 Diabetes Patients Through Computational Model

    Fawaz Alassery1, Ahmed Alzahrani2, Asif Irshad Khan2, Ashi Khan3,*, Mohd Nadeem4, Md Tarique Jamal Ansari4

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1701-1715, 2022, DOI:10.32604/iasc.2022.023314 - 09 December 2021

    Abstract A large number of people live in diabetes worldwide. Type-2 Diabetes (D2) accounts for 92% of patients with D2 and puts a huge burden on the healthcare industry. This multi-criterion medical research is based on the data collected from the hospitals of Uttar Pradesh, India. In recent times there is a need for a web-based electronic system to determine the impact of mental health in D2 patients. This study will examine the impact assessment in D2 patients. This paper used the integrated methodology of Fuzzy Analytic Hierarchy (FAHP) and Fuzzy Technique for Order Performance by… More >

  • Open Access

    ARTICLE

    Suggestion of Maintenance Criteria for Electric Railroad Facilities Based on Fuzzy TOPSIS

    Sunwoo Hwang1, Joouk Kim1, Hagseoung Kim1, Hyungchul Kim2, Youngmin Kim3,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5453-5466, 2022, DOI:10.32604/cmc.2022.021057 - 11 October 2021

    Abstract This paper is on the suggestion of maintenance items for electric railway facility systems. With the recent increase in the use of electric locomotives, the utilization and importance of railroad electrical facility systems are also increasing, but the railroad electrical facility system in Korea is rapidly aging. To solve this problem, various methodologies are applied to ensure operational reliability and stability for railroad electrical facility systems, but there is a lack of detailed evaluation criteria for railroad electrical facility system maintenance. Also, maintenance items must be selected in a scientific and systematic method. Therefore, railroad More >

  • Open Access

    ARTICLE

    Managing Software Security Risks through an Integrated Computational Method

    Abdullah Alharbi1, Wael Alosaimi1, Hashem Alyami2, Mohd Nadeem3, Mohd Faizan3, Alka Agrawal3, Rajeev Kumar3,4,*, Raees Ahmad Khan3

    Intelligent Automation & Soft Computing, Vol.28, No.1, pp. 179-194, 2021, DOI:10.32604/iasc.2021.016646 - 17 March 2021

    Abstract Security risk evaluation of web-based healthcare applications is important from a design perspective. The developers as well as the users need to make sure that the applications must be secure. Citing the disastrous effects of unsecured web applications, Accuntix Online states that the IT industry has lost millions of dollars due to security theft and malware attacks. Protecting the integrity of patients’ health data is of utmost importance. Thus, assessing the security risk of web-based healthcare applications should be accorded the highest priority while developing the web applications. To fulfill the security requirements, the developers must… More >

  • Open Access

    ARTICLE

    Impact of Tools and Techniques for Securing Consultancy Services

    Wael Alosaimi1, Abdullah Alharbi1, Hashem Alyami2, Masood Ahmad3, Abhishek Kumar Pandey3, Rajeev Kumar3,4,*, Raees Ahmad Khan3

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 347-360, 2021, DOI:10.32604/csse.2021.015284 - 08 March 2021

    Abstract In a digital world moving at a breakneck speed, consultancy services have emerged as one of the prominent resources for seeking effective, sustainable and economically viable solutions to a given crisis. The present day consultancy services are aided by the use of multiple tools and techniques. However, ensuring the security of these tools and techniques is an important concern for the consultants because even a slight malfunction of any tool could alter the results drastically. Consultants usually tackle these functions after establishing the clients’ needs and developing the appropriate strategy. Nevertheless, most of the consultants… More >

  • Open Access

    ARTICLE

    Estimating Security Risk of Healthcare Web Applications: A Design Perspective

    Fahad A. Alzahrani*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 187-209, 2021, DOI:10.32604/cmc.2021.014007 - 12 January 2021

    Abstract In the recent years, the booming web-based applications have attracted the hackers’ community. The security risk of the web-based hospital management system (WBHMS) has been increasing rapidly. In the given context, the main goal of all security professionals and website developers is to maintain security divisions and improve on the user’s confidence and satisfaction. At this point, the different WBHMS tackle different types of security risks. In WBHMS, the security of the patients’ medical information is of utmost importance. All in all, there is an inherent security risk of data and assets in the field… More >

  • Open Access

    ARTICLE

    Evaluating the Impact of Software Security Tactics: A Design Perspective

    Mamdouh Alenezi1, Abhishek Kumar Pandey2, Richa Verma3, Mohd Faizan2, Shalini Chandra3, Alka Agrawal2, Rajeev Kumar2,4,*, Raees Ahmad Khan2

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2283-2299, 2021, DOI:10.32604/cmc.2021.013579 - 28 December 2020

    Abstract Design architecture is the edifice that strengthens the functionalities as well as the security of web applications. In order to facilitate architectural security from the web application’s design phase itself, practitioners are now adopting the novel mechanism of security tactics. With the intent to conduct a research from the perspective of security tactics, the present study employs a hybrid multi-criteria decision-making approach named fuzzy analytic hierarchy process-technique for order preference by similarity ideal solution (AHP-TOPSIS) method for selecting and assessing multi-criteria decisions. The adopted methodology is a blend of fuzzy analytic hierarchy process (fuzzy AHP)… More >

  • Open Access

    ARTICLE

    Fuzzy Based Decision-Making Approach for Estimating Usable-Security of Healthcare Web Applications

    Fahad A. Alzahrani*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2599-2625, 2021, DOI:10.32604/cmc.2021.013124 - 28 December 2020

    Abstract Usability and security are often considered contradictory in nature. One has a negative impact on the other. In order to satisfy the needs of users with the security perspective, the relationship and trade-offs among security and usability must be distinguished. Security practitioners are working on developing new approaches that would help to secure healthcare web applications as well increase usability of the web applications. In the same league, the present research endeavour is premised on the usable-security of healthcare web applications. For a compatible blend of usability and security that would fulfill the users’ requirments,… More >

Displaying 1-10 on page 1 of 8. Per Page