Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (23,819)
  • Open Access

    ARTICLE

    Enterprise Cyberspace Threat Landscape: An Analysis

    Emmanuel U. Opara1,*, Oredola A. Soluade2

    Journal of Cyber Security, Vol.3, No.3, pp. 167-176, 2021, DOI:10.32604/jcs.2021.019158

    Abstract The ecosystem security platform described in this research is already impacting the threat spectrum in quantifiable ways. The global network has undergone a dramatic transformation over the course of 2020, with an unprecedented destabilization of events. Security breaches of all kinds are growing in complexity, sophistication, and impact. The bad actors are bypassing predictable security devices at will by breaching network systems at an escalating rate. This study will analyze these developments by creating awareness among security practitioners so they can be prepared to defend their enterprise systems. More >

  • Open Access

    ARTICLE

    Securing Fog Computing For E-Learning System Using Integration of Two Encryption Algorithms

    Hind A. Alshambri1,* Fawaz Alassery2

    Journal of Cyber Security, Vol.3, No.3, pp. 149-166, 2021, DOI:10.32604/jcs.2021.022112

    Abstract Currently, the majority of institutions have made use of information technologies to improve and develop their diverse educational methods to attract more learners. Through information technologies, e-learning and learning-on-the go have been adopted by the institutions to provide affordability and flexibility of educational services. Most of the educational institutes are offering online teaching classes using the technologies like cloud computing, networking, etc. Educational institutes have developed their e-learning platforms for the online learning process, through this way they have paved the way for distance learning. But e-learning platform has to face a lot of… More >

  • Open Access

    ARTICLE

    Awareness about the Online Security Threat and Ways to Secure the Youths

    Yeshi Nidup*

    Journal of Cyber Security, Vol.3, No.3, pp. 133-148, 2021, DOI:10.32604/jcs.2021.024136

    Abstract This study aimed to find out the awareness about the online security threat and understanding of the preventive measuresto secure the youthsfrom online risks. For this, a quantitative method was applied and the survey questionnaire was instituted to collect the data randomly from the youths studying in class eleven and higher. A total of 264 youths, 147 female and 117 male responded to the survey questionnaire. The data was organized and analyzed using Excel data analysis tool package, interpreted and represented in the form of graphs with some explanations. The awareness about the online security… More >

  • Open Access

    ARTICLE

    Design and Implementation of Enterprise Recruitment Mini Program

    Yu Xue1,2,*, Nan Wei1 , Junyang Han1,4, Chishe Wang2, Moayad Aloqaily3

    Journal of Cyber Security, Vol.3, No.3, pp. 125-132, 2021, DOI:10.32604/jcs.2021.016647

    Abstract Since the 21st century, the Internet has been updated and developed at an alarming speed. At the same time, WeChat applets are constantly improving and introducing new functions. Develop an enterprise recruitment system based on WeChat applets for the majority of job seekers and recruiter users, provide job seekers with easy-to-reach employment opportunities, and provide a convenient and clear screening environment for job seekers. The front-end part of the applet is developed using WeChat developer tools, and the back-end system is developed using MyEclipse. Use Spring Boot + Spring MVC framework, implemented in Java language. More >

  • Open Access

    ARTICLE

    Ground Nephogram Enhancement Algorithm Based on Improved Adaptive Fractional Differentiation

    Xiaoying Chen1,*, Jie Kang1, Cong Hu2

    Journal of New Media, Vol.3, No.4, pp. 151-180, 2021, DOI:10.32604/jnm.2021.024665

    Abstract The texture of ground-based nephogram is abundant and multiplicity. Many cloud textures are not as clear as artificial textures. A nephogram enhancement algorithm based on Adaptive Fractional Differential is established to extract the natural texture of visible ground-based cloud image. GrunwaldLentikov (G-L) and Grunwald-Lentikov (R-L) fractional differential operators are applied to the enhancement algorithm of ground-based nephogram. An operator mask based on adaptive differential order is designed. The corresponding mask template is used to process each pixel. The results show that this method can extract image texture and edge details and simplify the process of More >

  • Open Access

    ARTICLE

    Blockchain-Based Decentralized Reputation Management System for Internet of Everything in 6G-Enabled Cybertwin Architecture

    Meimin Wang, Zhili Zhou*, Chun Ding

    Journal of New Media, Vol.3, No.4, pp. 137-150, 2021, DOI:10.32604/jnm.2021.024543

    Abstract Internet of Everything (IoE) has emerged as a promising paradigm for the purpose of connecting and exchanging data among physical objects and humans over the Internet, and it can be widely applied in the fields of industry, transportation, commerce, and education. Recently, the emergence of 6G-enabled cybertwin network architecture provides the technical and theoretical foundation for the realization of IoE paradigm. However, the IoE has three open issues in the 6G-enabled cybertwin architecture, i.e., data authenticity, data storage and node reliability. To address these issues, we propose a blockchain-based decentralized reputation management system (BC-DRMS)… More >

  • Open Access

    REVIEW

    Review of Unsupervised Person Re-Identification

    Yang Dai*, Zhiyuan Luo

    Journal of New Media, Vol.3, No.4, pp. 129-136, 2021, DOI:10.32604/jnm.2021.023981

    Abstract Person re-identification (re-ID) aims to match images of the same pedestrian across different cameras. It plays an important role in the field of security and surveillance. Although it has been studied for many years, it is still considered as an unsolved problem. Since the rise of deep learning, the accuracy of supervised person re-ID on public datasets has reached the highest level. However, these methods are difficult to apply to real-life scenarios because a large number of labeled training data is required in this situation. Pedestrian identity labeling, especially cross-camera pedestrian identity labeling, is heavy More >

  • Open Access

    ARTICLE

    Design of Hybrid Recommendation Algorithm in Online Shopping System

    Yingchao Wang1, Yuanhao Zhu1, Zongtian Zhang1, Huihuang Liu1,* , Peng Guo2

    Journal of New Media, Vol.3, No.4, pp. 119-128, 2021, DOI:10.32604/jnm.2021.016655

    Abstract In order to improve user satisfaction and loyalty on e-commerce websites, recommendation algorithms are used to recommend products that may be of interest to users. Therefore, the accuracy of the recommendation algorithm is a primary issue. So far, there are three mainstream recommendation algorithms, content-based recommendation algorithms, collaborative filtering algorithms and hybrid recommendation algorithms. Content-based recommendation algorithms and collaborative filtering algorithms have their own shortcomings. The contentbased recommendation algorithm has the problem of the diversity of recommended items, while the collaborative filtering algorithm has the problem of data sparsity and scalability. On the basis of More >

  • Open Access

    ARTICLE

    Protective Factors for Loneliness among Adolescents during COVID-19: Role of the Interpersonal Relationships and Sibling Status

    Sha Shen1, Saidi Wang2,*, Md Zahir Ahmed3, Fatema Akhter Hiramoni4, Jingrong Sha1, Xiangdong Yan5, Mary C. Jobe6 and Oli Ahmed7

    International Journal of Mental Health Promotion, Vol.23, No.4, pp. 499-511, 2021, DOI:10.32604/IJMHP.2021.018661

    Abstract This study examined the moderating effects of parent-child, same-sex, opposite-sex and teacher-student relationships between sibling status and loneliness during COVID-19. A total of 1,591 adolescents in China completed the study questionnaires which assessed the aforementioned variables. The results showed that same-sex and teacherstudent relationships moderated the association between sibling status and loneliness. The results indicated that among participants with good same-sex relationships during COVID-19, compared to non-only-children participants, the only-children participants were more likely to experience a lower level of loneliness. However, participants with poor same-sex relationships experienced similar level of loneliness regardless of whether More >

  • Open Access

    ARTICLE

    The Kazdin Method for Developing and Changing Behavior of Children and Adolescents

    Alan E. Kazdin*

    International Journal of Mental Health Promotion, Vol.23, No.4, pp. 429-442, 2021, DOI:10.32604/IJMHP.2021.019135

    Abstract The Kazdin Method™ is a version of parent management training in which parents are trained to alter the behaviors of their children. The method draws on the principles and techniques of applied behavior analysis. The techniques focus on antecedents (what comes before the behavior), behavior (crafting the precise behaviors one wishes to develop), and consequences (usually praise to increase the likelihood that the desired behaviors will be performed again). The key focus is repeated practice in changing parent and child behaviors. The article traces the evolution of my use of parent training to treat severe More >

Displaying 11381-11390 on page 1139 of 23819. Per Page