Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (47)
  • Open Access

    ARTICLE

    Towards Prevention of Sportsmen Burnout: Formal Analysis of Sub-Optimal Tournament Scheduling

    Syed Rameez Naqvi1, Adnan Ahmad1, S. M. Riazul Islam2,*, Tallha Akram1, M. Abdullah-Al-Wadud3, Atif Alamri4

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1509-1526, 2022, DOI:10.32604/cmc.2022.019653

    Abstract Scheduling a sports tournament is a complex optimization problem, which requires a large number of hard constraints to satisfy. Despite the availability of several such constraints in the literature, there remains a gap since most of the new sports events pose their own unique set of requirements, and demand novel constraints. Specifically talking of the strictly time bound events, ensuring fairness between the different teams in terms of their rest days, traveling, and the number of successive games they play, becomes a difficult task to resolve, and demands attention. In this work, we present a similar situation with a recently… More >

  • Open Access

    ARTICLE

    Numerical Solutions of a Novel Designed Prevention Class in the HIV Nonlinear Model

    Zulqurnain Sabir1, Muhammad Umar1, Muhammad Asif Zahoor Raja2,*, Dumitru Baleanu3,4

    CMES-Computer Modeling in Engineering & Sciences, Vol.129, No.1, pp. 227-251, 2021, DOI:10.32604/cmes.2021.016611

    Abstract The presented research aims to design a new prevention class (P) in the HIV nonlinear system, i.e., the HIPV model. Then numerical treatment of the newly formulated HIPV model is portrayed handled by using the strength of stochastic procedure based numerical computing schemes exploiting the artificial neural networks (ANNs) modeling legacy together with the optimization competence of the hybrid of global and local search schemes via genetic algorithms (GAs) and active-set approach (ASA), i.e., GA-ASA. The optimization performances through GA-ASA are accessed by presenting an error-based fitness function designed for all the classes of the HIPV model and its corresponding… More >

  • Open Access

    Management of Schemes and Threat Prevention in ICS Partner Companies Security

    Sangdo Lee1, Jun-Ho Huh2,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3659-3684, 2021, DOI:10.32604/cmc.2021.015632

    Abstract An analysis of the recent major security incidents related to industrial control systems, revealed that most had been caused by company employees. Therefore, enterprise security management systems have been developed to focus on companies’ personnel. Nonetheless, several hacking incidents, involving major companies and public/financial institutions, were actually attempted by the cooperative firms or the outsourced manpower undertaking maintenance work. Specifically, institutions that operate industrial control systems (ICSs) associated with critical national infrastructures, such as traffic or energy, have contracted several cooperative firms. Nonetheless, ICT's importance is gradually increasing, due to outsourcing, and is the most vulnerable factor in security. This… More >

  • Open Access

    ARTICLE

    Development of Mental Health Literacy Scale for Depression Affecting the Help-Seeking Process in Health Professional Students

    Soshi Kodama1,*, Koichi Shido2, Nozomu Ikeda3

    International Journal of Mental Health Promotion, Vol.23, No.3, pp. 331-352, 2021, DOI:10.32604/IJMHP.2021.016337

    Abstract Despite depression being a global mental health disorder, many people with depression do not seek psychiatric help. In particular, it has been reported that only 15.7% of medical students seek treatment. A longer duration of untreated illness (DUI) leads to clinically poor results. To shorten the DUI, the mental health literacy (MHL) with regard to depression needs to be improved, although it is unclear which MHL components will improve the help-seeking process. Additionally, the existing MHL scale for depression is poorly validated for structural validity. Therefore, the purpose of this study was to develop an MHL scale for depression with… More >

  • Open Access

    ARTICLE

    Trust Management-Based Service Recovery and Attack Prevention in MANET

    V. Nivedita1,*, N. Nandhagopal2

    Intelligent Automation & Soft Computing, Vol.29, No.3, pp. 771-786, 2021, DOI:10.32604/iasc.2021.017547

    Abstract The mobile ad-hoc network (MANET) output is critically impaired by the versatility and resource constraint of nodes. Node mobility affects connection reliability, and node resource constraints can lead to congestion, which makes the design of a routing MANET protocol with quality of service (QoS) very difficult. An adaptive clustering reputation model (ACRM) method is proposed to improve energy efficiency with a cluster-based framework. The proposed framework is employed to overcome the problems of data protection, privacy, and policy. The proposed ACRM-MRT approach that includes direct and indirect node trust computation is introduced along with the master recovery timer (MRT) for… More >

  • Open Access

    ARTICLE

    CNN-Based Voice Emotion Classification Model for Risk Detection

    Hyun Yoo1, Ji-Won Baek2, Kyungyong Chung3,*

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 319-334, 2021, DOI:10.32604/iasc.2021.018115

    Abstract With the convergence and development of the Internet of things (IoT) and artificial intelligence, closed-circuit television, wearable devices, and artificial neural networks have been combined and applied to crime prevention and follow-up measures against crimes. However, these IoT devices have various limitations based on the physical environment and face the fundamental problem of privacy violations. In this study, voice data are collected and emotions are classified based on an acoustic sensor that is free of privacy violations and is not sensitive to changes in external environments, to overcome these limitations. For the classification of emotions in the voice, the data… More >

  • Open Access

    ARTICLE

    Detecting Man-in-the-Middle Attack in Fog Computing for Social Media

    Farouq Aliyu1,*, Tarek Sheltami1, Ashraf Mahmoud1, Louai Al-Awami1, Ansar Yasar2

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1159-1181, 2021, DOI:10.32604/cmc.2021.016938

    Abstract Fog computing (FC) is a networking paradigm where wireless devices known as fog nodes are placed at the edge of the network (close to the Internet of Things (IoT) devices). Fog nodes provide services in lieu of the cloud. Thus, improving the performance of the network and making it attractive to social media-based systems. Security issues are one of the most challenges encountered in FC. In this paper, we propose an anomaly-based Intrusion Detection and Prevention System (IDPS) against Man-in-the-Middle (MITM) attack in the fog layer. The system uses special nodes known as Intrusion Detection System (IDS) nodes to detect… More >

  • Open Access

    ARTICLE

    Web Attack Detection Using the Input Validation Method: DPDA Theory

    Osamah Ibrahim Khalaf1, Munsif Sokiyna2,*, Youseef Alotaibi3, Abdulmajeed Alsufyani4, Saleh Alghamdi5

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3167-3184, 2021, DOI:10.32604/cmc.2021.016099

    Abstract A major issue while building web applications is proper input validation and sanitization. Attackers can quickly exploit errors and vulnerabilities that lead to malicious behavior in web application validation operations. Attackers are rapidly improving their capabilities and technologies and now focus on exploiting vulnerabilities in web applications and compromising confidentiality. Cross-site scripting (XSS) and SQL injection attack (SQLIA) are attacks in which a hacker sends malicious inputs (cheat codes) to confuse a web application, to access or disable the application’s back-end without user awareness. In this paper, we explore the problem of detecting and removing bugs from both client-side and… More >

  • Open Access

    ARTICLE

    Predicting the Type of Crime: Intelligence Gathering and Crime Analysis

    Saleh Albahli1, Anadil Alsaqabi1, Fatimah Aldhubayi1, Hafiz Tayyab Rauf2,*, Muhammad Arif3, Mazin Abed Mohammed4

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2317-2341, 2021, DOI:10.32604/cmc.2021.014113

    Abstract Crimes are expected to rise with an increase in population and the rising gap between society’s income levels. Crimes contribute to a significant portion of the socioeconomic loss to any society, not only through its indirect damage to the social fabric and peace but also the more direct negative impacts on the economy, social parameters, and reputation of a nation. Policing and other preventive resources are limited and have to be utilized. The conventional methods are being superseded by more modern approaches of machine learning algorithms capable of making predictions where the relationships between the features and the outcomes are… More >

  • Open Access

    ARTICLE

    Research on Prevention of Citrus Anthracnose Based on Image Retrieval Technology

    Xuefei Du*, Xuyu Xiang

    Journal of Information Hiding and Privacy Protection, Vol.2, No.1, pp. 11-19, 2020, DOI:10.32604/jihpp.2020.010114

    Abstract Citrus anthracnose is a common fungal disease in citrus-growing areas in China, which causes very serious damage. At present, the manual management method is time-consuming and labor-consuming, which reduces the control effect of citrus anthracnose. Therefore, by designing and running the image retrieval system of citrus anthracnose, the automatic recognition and analysis of citrus anthracnose control were realized, and the control effect of citrus anthracnose was improved. In this paper, based on the self-collected and collated citrus anthracnose image database, we use three image features to realize an image retrieval system based on citrus anthracnose through SMV, AP clustering optimization.… More >

Displaying 31-40 on page 4 of 47. Per Page