Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (55)
  • Open Access

    ARTICLE

    Two-Stage PLS-SEM and Fuzzy AHP Approach to Investigate Vietnamese SMEs’ Export Competitiveness

    Phi-Hung Nguyen1,2,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4107-4123, 2022, DOI:10.32604/cmc.2022.026286

    Abstract Vietnam is paying great to the seafood exporting sector, offering various significant production advantages, concluding that it is critical to understand the competitiveness of the target market and implement effective strategies. However, due to COVID 19, the value of Vietnamese pangasius exports resulted in low and unpredictable profits for pangasius farmers. It is obvious to recognize competitiveness as Multi-Criteria Decision Making (MCDM) problem in the uncertain business environment. Therefore, this study is the first to propose a two-staged Partial Least Squares-Structural Equation Modeling (PLS-SEM) and Fuzzy Analytic Hierarchy Process (FAHP) analysis to identify potential criteria and comprehensively investigate the competitiveness… More >

  • Open Access

    ARTICLE

    An Integrated Framework for Cloud Service Selection Based on BOM and TOPSIS

    Ahmed M. Mostafa*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4125-4142, 2022, DOI:10.32604/cmc.2022.024676

    Abstract Many businesses have experienced difficulties in selecting a cloud service provider (CSP) due to the rapid advancement of cloud computing services and the proliferation of CSPs. Many independent criteria should be considered when evaluating the services provided by different CSPs. It is a case of multi-criteria decision-making (MCDM). This paper presents an integrated MCDM cloud service selection framework for determining the most appropriate service provider based on the best only method (BOM) and technique for order of preference by similarity to ideal solution (TOPSIS). To obtain the weights of criteria and the relative importance of CSPs based on each criterion,… More >

  • Open Access

    ARTICLE

    Cyber Security Analysis and Evaluation for Intrusion Detection Systems

    Yoosef B. Abushark1, Asif Irshad Khan1,*, Fawaz Alsolami1, Abdulmohsen Almalawi1, Md Mottahir Alam2, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1765-1783, 2022, DOI:10.32604/cmc.2022.025604

    Abstract Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the world. Machine learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and security issues. It is crucial in offering a proactive security system in the field of cybersecurity. In real time, cybersecurity protects information, information systems, and networks from intruders. In the recent decade, several assessments on security and privacy estimates have noted a rapid growth in both the incidence and quantity of cybersecurity breaches. At an increasing rate, intruders are breaching information security. Anomaly detection, software… More >

  • Open Access

    ARTICLE

    Regulation Relatedness Map Creation Method with Latent Semantic Analysis

    Mehmet Murat Huyut1,*, Batuhan Kocaoğlu2, Ünzile Meram3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2093-2107, 2022, DOI:10.32604/cmc.2022.024190

    Abstract Regulatory authorities create a lot of legislation that must be followed. These create complex compliance requirements and time-consuming processes to find regulatory non-compliance. While the regulations establish rules in the relevant areas, recommendations and best practices for compliance are not generally mentioned. Best practices are often used to find a solution to this problem. There are numerous governance, management, and security frameworks in Information Technology (IT) area to guide businesses to run their processes at a much more mature level. Best practice maps can used to map another best practice, and users can adapt themselves by the help of this… More >

  • Open Access

    ARTICLE

    Two-Stage Fuzzy MCDM for Green Supplier Selection in Steel Industry

    Chia-Nan Wang, Thi-Ly Nguyen*, Thanh-Tuan Dang

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 1245-1260, 2022, DOI:10.32604/iasc.2022.024548

    Abstract Steel is one of the most powerful industries globally, and the associated products have a tremendous impact on nurturing a sustainable society. Considering environmental concerns within this industry's supply chain is highly successful in saving both energy and natural resources and lowering greenhouse gas emissions. In light of this, sustainable suppliers are considered input partners who play a specific role in the chain of business operations of every enterprise, maintaining them to achieve higher levels of customer satisfaction and thus gain more market share. Supplier selection can be characterized as a multi-criteria decision-making (MCDM) problem under a vague and uncertain… More >

  • Open Access

    ARTICLE

    Quantitative Evaluation of Mental-Health in Type-2 Diabetes Patients Through Computational Model

    Fawaz Alassery1, Ahmed Alzahrani2, Asif Irshad Khan2, Ashi Khan3,*, Mohd Nadeem4, Md Tarique Jamal Ansari4

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1701-1715, 2022, DOI:10.32604/iasc.2022.023314

    Abstract A large number of people live in diabetes worldwide. Type-2 Diabetes (D2) accounts for 92% of patients with D2 and puts a huge burden on the healthcare industry. This multi-criterion medical research is based on the data collected from the hospitals of Uttar Pradesh, India. In recent times there is a need for a web-based electronic system to determine the impact of mental health in D2 patients. This study will examine the impact assessment in D2 patients. This paper used the integrated methodology of Fuzzy Analytic Hierarchy (FAHP) and Fuzzy Technique for Order Performance by Similarity to Ideal Solution (FTOPSIS).… More >

  • Open Access

    ARTICLE

    Sustainability Evaluation of Modern Photovoltaic Agriculture Based on Interval Type-2 Fuzzy AHP-TOPSIS and Least Squares Support Vector Machine Optimized by Fireworks Algorithm

    Yi Liang1,2, Haichao Wang3,*, Wei-Chiang Hong4

    Energy Engineering, Vol.119, No.1, pp. 163-188, 2022, DOI:10.32604/EE.2022.017396

    Abstract Photovoltaics (PV) has been combined with many other industries, such as agriculture. But there are many problems for the sustainability of PV agriculture. Timely and accurate sustainability evaluation of modern photovoltaic agriculture is of great significance for accelerating the sustainable development of modern photovoltaic agriculture. In order to improve the timeliness and accuracy of evaluation, this paper proposes an evaluation model based on interval type-2 Fuzzy AHP-TOPSIS and least squares support vector machine optimized by fireworks algorithm. Firstly, the criteria system of modern photovoltaic agriculture sustainability is constructed from three dimensions including technology sustainability, economic sustainability and social sustainability. Then,… More >

  • Open Access

    ARTICLE

    Analyzing the Big Data Security Through a Unified Decision-Making Approach

    Abdulaziz Attaallah1, Hassan Alsuhabi2, Sarita Shukla3, Rajeev Kumar3,*, Bineet Kumar Gupta3, Raees Ahmad Khan4

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1071-1088, 2022, DOI:10.32604/iasc.2022.022569

    Abstract The use of cloud services, web-based software systems, the Internet of Things (IoT), Machine Learning (ML), Artificial Intelligence (AI), and other wireless sensor devices in the health sector has resulted in significant advancements and benefits. Early disease detection, increased accessibility, and high diagnostic reach have all been made possible by digital healthcare. Despite this remarkable achievement, healthcare data protection has become a serious issue for all parties involved. According to data breach statistics, the healthcare data industry is one of the major threats to cyber criminals. In reality, healthcare data breaches have increased at an alarming rate in recent years.… More >

  • Open Access

    ARTICLE

    Analyzing the Implications of COVID-19 Pandemic through an Intelligent-Computing Technique

    Abhishek Kumar Pandey1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Rajeev Kumar4,*, Raees Ahmad Khan1

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 959-974, 2022, DOI:10.32604/csse.2022.021443

    Abstract The outbreak of Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2 virus or COVID-19) disease was declared pandemic by the World Health Organization (WHO) on March 11, 2020. COVID-19 has already affected more than 211 nations. In such a bleak scenario, it becomes imperative to analyze and identify those regions in Saudi Arabia that are at high risk. A preemptive study done in the context of predicting the possible COVID-19 hotspots would facilitate in the implementation of prompt and targeted countermeasures against SARS-CoV-2, thus saving many lives. Working towards this intent, the present study adopts a decision making based methodology of… More >

  • Open Access

    ARTICLE

    Network Quality Assessment in Heterogeneous Wireless Settings: An Optimization Approach

    Sultan H. Almotiri*, Mohammed A. Al Ghamdi

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 439-455, 2022, DOI:10.32604/cmc.2022.021012

    Abstract The identification of an effective network which can efficiently meet the service requirements of the target, while maintaining ultimate performance at an increased level is significant and challenging in a fully interconnected wireless medium. The wrong selection can contribute to unwanted situations like frustrated users, slow service, traffic congestion issues, missed and/or interrupted calls, and wastefulness of precious network components. Conventional schemes estimate the handoff need and cause the network screening process by a single metric. The strategies are not effective enough because traffic characteristics, user expectations, network terminology and other essential device metrics are not taken into account. This… More >

Displaying 21-30 on page 3 of 55. Per Page