Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (55)
  • Open Access

    ARTICLE

    Healthcare Device Security Assessment through Computational Methodology

    Masood Ahmad1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Sabita Khatri2, Adil Hussain Seh1, Mohd Nadeem1, Alka Agrawal1,*

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 811-828, 2022, DOI:10.32604/csse.2022.020097

    Abstract The current study discusses the different methods used to secure healthcare devices and proposes a quantitative framework to list them in order of significances. The study uses the Hesitant Fuzzy (HF), Analytic Hierarchy Process (AHP) integrated with Fuzzy Technical for Order Preference by Similarities to Ideal Solution (TOPSIS) to classify the best alternatives to security techniques for healthcare devices to securing the devices. The technique is enlisted to rate the alternatives based on the degree of satisfaction of their weights. The ranks of the alternatives consequently decide the order of priority for the techniques. A1 was the most probable alternative… More >

  • Open Access

    ARTICLE

    Integrating Blockchain Technology into Healthcare Through an Intelligent Computing Technique

    Asif Irshad Khan1,*, Abdullah Saad Al-Malaise ALGhamdi2, Fawaz Jaber Alsolami1, Yoosef B. Abushark1, Abdulmohsen Almalawi1, Abdullah Marish Ali1, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2835-2860, 2022, DOI:10.32604/cmc.2022.020342

    Abstract The blockchain technology plays a significant role in the present era of information technology. In the last few years, this technology has been used effectively in several domains. It has already made significant differences in human life, as well as is intended to have noticeable impact in many other domains in the forthcoming years. The rapid growth in blockchain technology has created numerous new possibilities for use, especially for healthcare applications. The digital healthcare services require highly effective security methodologies that can integrate data security with the available management strategies. To test and understand this goal of security management in… More >

  • Open Access

    ARTICLE

    Sustainable Supplier Selection Model in Supply Chains During the COVID-19 Pandemic

    Chia-Nan Wang1, Chao-Fen Pan1,*, Viet Tinh Nguyen2, Syed Tam Husain2

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3005-3019, 2022, DOI:10.32604/cmc.2022.020206

    Abstract As global supply chains become more developed and complicated, supplier quality has become increasingly influential on the competitiveness of businesses during the Covid-19 pandemic. Consequently, supplier selection is an increasingly important process for any business around the globe. Choosing a supplier is a complex decision that can result in lower procurement costs and increased profits without increasing the cost or lowering the quality of the product. However, these decision-making problems can be complicated in cases with multiple potential suppliers. Vietnam's textile and garment industry, for example, has made rapid progress in recent years but is still facing great difficulties as… More >

  • Open Access

    ARTICLE

    Hybrid Computational Modeling for Web Application Security Assessment

    Adil Hussain Seh1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Md Tarique Jamal Ansari1, Rajeev Kumar4,*, Mohammad Ubaidullah Bokhari5, Raees Ahmad Khan1

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 469-489, 2022, DOI:10.32604/cmc.2022.019593

    Abstract Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry play a significant role However, from the beginning, software security remains a serious issue for all levels of stakeholders. Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data, compromising the organizations’ reputation that translates into, financial losses as well. Most of the data breaches are financially motivated, especially in the healthcare sector. The cyber invaders continuously penetrate the… More >

  • Open Access

    ARTICLE

    Optimization Model for Selecting Temporary Hospital Locations During COVID-19 Pandemic

    Chia-Nan Wang1, Chien-Chang Chou2,*, Hsien-Pin Hsu3, Van Thanh Nguyen4, Viet Tinh Nguyen4

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 397-412, 2022, DOI:10.32604/cmc.2022.019470

    Abstract The two main approaches that countries are using to ease the strain on healthcare infrastructure is building temporary hospitals that are specialized in treating COVID-19 patients and promoting preventive measures. As such, the selection of the optimal location for a temporary hospital and the calculation of the prioritization of preventive measures are two of the most critical decisions during the pandemic, especially in densely populated areas where the risk of transmission of the virus is highest. If the location selection process or the prioritization of measures is poor, healthcare workers and patients can be harmed, and unnecessary costs may come… More >

  • Open Access

    ARTICLE

    Multi-Level Hesitant Fuzzy Based Model for Usable-Security Assessment

    Mohd Nadeem1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Adil Hussain Seh1, Suhel Ahmad Khan4, Alka Agrawal1, Raees Ahmad Khan1,*

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 61-82, 2022, DOI:10.32604/iasc.2022.019624

    Abstract Present day healthcare sector is frequently victimized by the intruders. Healthcare data industry has borne the brunt of the highest number of data breach episodes in the last few years. The key reason for this is attributed to the sensitivity of healthcare data and the high costs entailed in trading the data over the dark web. Hence, usable-security evaluation of healthcare information systems is the need of hour so as to identify the vulnerabilities and provide preventive measures as a shield against the breaches. Usable-security assessment will help the software designers and developers to prioritize usable-security attributes according to the… More >

  • Open Access

    ARTICLE

    A Model for Selecting a Biomass Furnace Supplier Based on Qualitative and Quantitative Factors

    Chia-Nan Wang1, Hsin-Pin Fu2, Hsien-Pin Hsu3,*, Van Thanh Nguyen4, Viet Tinh Nguyen4, Ansari Saleh Ahmar5

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2339-2353, 2021, DOI:10.32604/cmc.2021.016284

    Abstract In developing countries, solar energy is the largest source of energy, accounting for 35%–45% of the total energy supply. This energy resource plays a vital role in meeting the energy needs of the world, especially in Vietnam. Vietnam has favorable natural conditions for this energy production. Because it is hot and humid, and it has much rainfall and fertile soil, biomass develops very quickly. Therefore, byproducts from agriculture and forestry are abundant and continuously increasing. However, byproducts that are considered natural waste have become the cause of environmental pollution; these include burning forests, straw, and sawdust in the North; and… More >

  • Open Access

    ARTICLE

    Evaluation Model of Farmer Training Effect Based on AHP–A Case Study of Hainan Province

    Shengjie Li, Chaosheng Tang*

    Journal on Artificial Intelligence, Vol.3, No.2, pp. 55-62, 2021, DOI:10.32604/jai.2021.017408

    Abstract On the basis of studying the influencing factors of training effect evaluation, this paper constructs an AHP-fuzzy comprehensive evaluation model for farmers’ vocational training activities in Hainan Province to evaluate farmers’ training effect, which overcomes the limitations of traditional methods. Firstly, the content and index system of farmer training effect evaluation are established by analytic hierarchy process, and the weight value of each index is determined. Then, the fuzzy comprehensive evaluation (FCE) of farmer training effect is carried out by using multi-level FCE. The joint use of AHP and FCE improves the reliability and effectiveness of the evaluation process and… More >

  • Open Access

    ARTICLE

    Impact Assessment of COVID-19 Pandemic Through Machine Learning Models

    Fawaz Jaber Alsolami1, Abdullah Saad Al-Malaise ALGhamdi2, Asif Irshad Khan1,*, Yoosef B. Abushark1, Abdulmohsen Almalawi1, Farrukh Saleem2, Alka Agrawal3, Rajeev Kumar3,4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 2895-2912, 2021, DOI:10.32604/cmc.2021.017469

    Abstract Ever since its outbreak in the Wuhan city of China, COVID-19 pandemic has engulfed more than 211 countries in the world, leaving a trail of unprecedented fatalities. Even more debilitating than the infection itself, were the restrictions like lockdowns and quarantine measures taken to contain the spread of Coronavirus. Such enforced alienation affected both the mental and social condition of people significantly. Social interactions and congregations are not only integral part of work life but also form the basis of human evolvement. However, COVID-19 brought all such communication to a grinding halt. Digital interactions have failed to enthuse the fervor… More >

  • Open Access

    ARTICLE

    Computational Technique for Effectiveness of Treatments Used in Curing SARS-CoV-2

    Wael Alosaimi1, Rajeev Kumar2,*, Abdullah Alharbi1, Hashem Alyami3, Alka Agrawal4, Gaurav Kaithwas5, Sanjay Singh6, Raees Ahmad Khan4

    Intelligent Automation & Soft Computing, Vol.28, No.3, pp. 617-628, 2021, DOI:10.32604/iasc.2021.016703

    Abstract COVID-19 pandemic has unleashed an unprecedented humanitarian crisis in the world at present. With each passing day, the number of patients afflicted with Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) is rising at an alarming pace, so much so that some countries are now combating the second wave of the contagion. As the death ratio due to the Virus increases, the medical fraternity and pharmacologists are working relentlessly to identify and prescribe a standardized and effective course of treatment for treating COVID-19 patients. However, medical specialists are confused about opting for the most efficacious course of treatment because the patients… More >

Displaying 31-40 on page 4 of 55. Per Page