Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,212)
  • Open Access

    ARTICLE

    Analysis and Design of University Teaching Equipment Management Information System

    Yu Xue1,2,*, Xiang Jiao1, Chishe Wang2 , Huanlun Chen1,4, Moayad Aloqaily3

    Journal of Cyber Security, Vol.3, No.3, pp. 177-185, 2021, DOI:10.32604/jcs.2021.016657

    Abstract Teaching equipment management is an important factor for colleges and universities to improve their teaching level, and its management level directly affects the service life and efficiency of teaching equipment. But in recent years, our university recruitment of students scale is increasing year by year, the size of the corresponding teaching equipment is also growing, therefore to develop a teaching equipment management information system is necessary, not only can help universities to effective use of the existing teaching resources, also can update scrap equipment, related equipment maintenance, and build a good learning environment to students and to the improvement of… More >

  • Open Access

    ARTICLE

    Enterprise Cyberspace Threat Landscape: An Analysis

    Emmanuel U. Opara1,*, Oredola A. Soluade2

    Journal of Cyber Security, Vol.3, No.3, pp. 167-176, 2021, DOI:10.32604/jcs.2021.019158

    Abstract The ecosystem security platform described in this research is already impacting the threat spectrum in quantifiable ways. The global network has undergone a dramatic transformation over the course of 2020, with an unprecedented destabilization of events. Security breaches of all kinds are growing in complexity, sophistication, and impact. The bad actors are bypassing predictable security devices at will by breaching network systems at an escalating rate. This study will analyze these developments by creating awareness among security practitioners so they can be prepared to defend their enterprise systems. More >

  • Open Access

    ARTICLE

    Securing Fog Computing For E-Learning System Using Integration of Two Encryption Algorithms

    Hind A. Alshambri1,* Fawaz Alassery2

    Journal of Cyber Security, Vol.3, No.3, pp. 149-166, 2021, DOI:10.32604/jcs.2021.022112

    Abstract Currently, the majority of institutions have made use of information technologies to improve and develop their diverse educational methods to attract more learners. Through information technologies, e-learning and learning-on-the go have been adopted by the institutions to provide affordability and flexibility of educational services. Most of the educational institutes are offering online teaching classes using the technologies like cloud computing, networking, etc. Educational institutes have developed their e-learning platforms for the online learning process, through this way they have paved the way for distance learning. But e-learning platform has to face a lot of security challenges in terms of cyberattacks… More >

  • Open Access

    ARTICLE

    Awareness about the Online Security Threat and Ways to Secure the Youths

    Yeshi Nidup*

    Journal of Cyber Security, Vol.3, No.3, pp. 133-148, 2021, DOI:10.32604/jcs.2021.024136

    Abstract This study aimed to find out the awareness about the online security threat and understanding of the preventive measuresto secure the youthsfrom online risks. For this, a quantitative method was applied and the survey questionnaire was instituted to collect the data randomly from the youths studying in class eleven and higher. A total of 264 youths, 147 female and 117 male responded to the survey questionnaire. The data was organized and analyzed using Excel data analysis tool package, interpreted and represented in the form of graphs with some explanations. The awareness about the online security threat was found to be… More >

  • Open Access

    ARTICLE

    Design and Implementation of Enterprise Recruitment Mini Program

    Yu Xue1,2,*, Nan Wei1 , Junyang Han1,4, Chishe Wang2, Moayad Aloqaily3

    Journal of Cyber Security, Vol.3, No.3, pp. 125-132, 2021, DOI:10.32604/jcs.2021.016647

    Abstract Since the 21st century, the Internet has been updated and developed at an alarming speed. At the same time, WeChat applets are constantly improving and introducing new functions. Develop an enterprise recruitment system based on WeChat applets for the majority of job seekers and recruiter users, provide job seekers with easy-to-reach employment opportunities, and provide a convenient and clear screening environment for job seekers. The front-end part of the applet is developed using WeChat developer tools, and the back-end system is developed using MyEclipse. Use Spring Boot + Spring MVC framework, implemented in Java language. Data is managed using MySql… More >

  • Open Access

    ARTICLE

    Fine-Grained Bandwidth Estimation for Smart Grid Communication Network

    Jingtang Luo1, Jingru Liao2, Chenlin Zhang3, Ziqi Wang4, Yuhang Zhang2, Jie Xu2,*, Zhengwen Huang5

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1225-1239, 2022, DOI:10.32604/iasc.2022.022812

    Abstract Accurate estimation of communication bandwidth is critical for the sensing and controlling applications of smart grid. Different from public network, the bandwidth requirements of smart grid communication network must be accurately estimated in prior to the deployment of applications or even the building of communication network. However, existing methods for smart grid usually model communication nodes in coarse-grained ways, so their estimations become inaccurate in scenarios where the same type of nodes have very different bandwidth requirements. To solve this issue, we propose a fine-grained estimation method based on multivariate nonlinear fitting. Firstly, we use linear fitting to calculate the… More >

  • Open Access

    ARTICLE

    Automatic Human Detection Using Reinforced Faster-RCNN for Electricity Conservation System

    S. Ushasukhanya*, M. Karthikeyan

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1261-1275, 2022, DOI:10.32604/iasc.2022.022654

    Abstract Electricity conservation systems are designed to conserve electricity to manage the bridge between the high raising demand and the production. Such systems have been so far using sensors to detect the necessity which adds an additional cost to the setup. Closed-circuit Television (CCTV) has been installed in almost everywhere around us especially in commercial places. Interpretation of these CCTV images is being carried out for various reasons to elicit the information from it. Hence a framework for electricity conservation that enables the electricity supply only when required, using existing resources would be a cost effective conservation system. Such a framework… More >

  • Open Access

    ARTICLE

    Modeling of Anthrax Disease via Efficient Computing Techniques

    Ali Raza1,2, Dumitru Baleanu3,4, Muhammad Yousaf2, Naeem Akhter2, Syed Kashif Mahmood2, Muhammad Rafiq5,*

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1109-1124, 2022, DOI:10.32604/iasc.2022.022643

    Abstract Computer methods have a significant role in the scientific literature. Nowadays, development in computational methods for solving highly complex and nonlinear systems is a hot issue in different disciplines like engineering, physics, biology, and many more. Anthrax is primarily a zoonotic disease in herbivores caused by a bacterium called Bacillus anthracis. Humans generally acquire the disease directly or indirectly from infected animals, or through occupational exposure to infected or contaminated animal products. The outbreak of human anthrax is reported in the Eastern Mediterranean regions like Pakistan, Iran, Iraq, Afghanistan, Morocco, and Sudan. Almost ninety-five percent chances are the transmission of… More >

  • Open Access

    ARTICLE

    Performance Analysis of Two-Stage Optimal Feature-Selection Techniques for Finger Knuckle Recognition

    P. Jayapriya*, K. Umamaheswari

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1293-1308, 2022, DOI:10.32604/iasc.2022.022583

    Abstract Automated biometric authentication attracts the attention of researchers to work on hand-based images to develop applications in forensics science. Finger Knuckle Print (FKP) is one of the hand-based biometrics used in the recognition of an individual. FKP is rich in texture, less in contact and known for its unique features. The dimensionality of the features, extracted from the image, is one of the main problems in pattern recognition. Since selecting the relevant features is an important but challenging task, the feature subset selection is an optimization problem. A reduced number of features results in enhanced classification accuracy. The proposed FKP… More >

  • Open Access

    ARTICLE

    Synovial Sarcoma Classification Technique Using Support Vector Machine and Structure Features

    P. Arunachalam1, N. Janakiraman1,*, Arun Kumar Sivaraman2, A. Balasundaram3, Rajiv Vincent2, Sita Rani4, Barnali Dey5, A. Muralidhar2, M. Rajesh2

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1241-1259, 2022, DOI:10.32604/iasc.2022.022573

    Abstract Digital clinical histopathology technique is used for accurately diagnosing cancer cells and achieving optimal results using Internet of Things (IoT) and blockchain technology. The cell pattern of Synovial Sarcoma (SS) cancer images always appeared as spindle shaped cell (SSC) structures. Identifying the SSC and its prognostic indicator are very crucial problems for computer aided diagnosis, especially in healthcare industry applications. A constructive framework has been proposed for the classification of SSC feature components using Support Vector Machine (SVM) with the assistance of relevant Support Vectors (SVs). This framework used the SS images, and it has been transformed into frequency sub-bands… More >

Displaying 9981-9990 on page 999 of 22212. Per Page