Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (55)
  • Open Access

    ARTICLE

    Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective

    Yoosef B. Abushark1, Asif Irshad Khan1,*, Fawaz Jaber Alsolami1, Abdulmohsen Almalawi1, Md Mottahir Alam2, Alka Agrawal3, Rajeev Kumar3,4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1203-1218, 2021, DOI:10.32604/cmc.2021.016610

    Abstract Most of the security strategies today are primarily designed to provide security protection, rather than to solve one of the basic security issues related to adequate software product architecture. Several models, frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life cycle. Therefore it is important to assess the usability of the popular security requirements engineering (SRE) approaches. A significant factor in the management and handling of successful security requirements is the assessment of security requirements engineering method performance. This assessment will allow changes to the engineering process of security requirements. The consistency… More >

  • Open Access

    ARTICLE

    Managing Software Security Risks through an Integrated Computational Method

    Abdullah Alharbi1, Wael Alosaimi1, Hashem Alyami2, Mohd Nadeem3, Mohd Faizan3, Alka Agrawal3, Rajeev Kumar3,4,*, Raees Ahmad Khan3

    Intelligent Automation & Soft Computing, Vol.28, No.1, pp. 179-194, 2021, DOI:10.32604/iasc.2021.016646

    Abstract Security risk evaluation of web-based healthcare applications is important from a design perspective. The developers as well as the users need to make sure that the applications must be secure. Citing the disastrous effects of unsecured web applications, Accuntix Online states that the IT industry has lost millions of dollars due to security theft and malware attacks. Protecting the integrity of patients’ health data is of utmost importance. Thus, assessing the security risk of web-based healthcare applications should be accorded the highest priority while developing the web applications. To fulfill the security requirements, the developers must meticulously follow the Multi-Criteria… More >

  • Open Access

    ARTICLE

    Impact of Tools and Techniques for Securing Consultancy Services

    Wael Alosaimi1, Abdullah Alharbi1, Hashem Alyami2, Masood Ahmad3, Abhishek Kumar Pandey3, Rajeev Kumar3,4,*, Raees Ahmad Khan3

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 347-360, 2021, DOI:10.32604/csse.2021.015284

    Abstract In a digital world moving at a breakneck speed, consultancy services have emerged as one of the prominent resources for seeking effective, sustainable and economically viable solutions to a given crisis. The present day consultancy services are aided by the use of multiple tools and techniques. However, ensuring the security of these tools and techniques is an important concern for the consultants because even a slight malfunction of any tool could alter the results drastically. Consultants usually tackle these functions after establishing the clients’ needs and developing the appropriate strategy. Nevertheless, most of the consultants tend to focus more on… More >

  • Open Access

    ARTICLE

    Efficient MCDM Model for Evaluating the Performance of Commercial Banks: A Case Study

    Mohamed Abdel-Basset1, Rehab Mohamed1, Mohamed Elhoseny2, Mohamed Abouhawash2,3, Yunyoung Nam4,*, Nabil M. AbdelAziz1

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2729-2746, 2021, DOI:10.32604/cmc.2021.015316

    Abstract Evaluation of commercial banks (CBs) performance has been a significant issue in the financial world and deemed as a multi-criteria decision making (MCDM) model. Numerous research assesses CB performance according to different metrics and standers. As a result of uncertainty in decision-making problems and large economic variations in Egypt, this research proposes a plithogenic based model to evaluate Egyptian commercial banks’ performance based on a set of criteria. The proposed model evaluates the top ten Egyptian commercial banks based on three main metrics including financial, customer satisfaction, and qualitative evaluation, and 19 sub-criteria. The proportional importance of the selected criteria… More >

  • Open Access

    ARTICLE

    Conceptual Design and Selection of Natural Fibre Reinforced Biopolymer Composite (NFBC) Takeout Food Container

    H. N. Salwa1, S. M. Sapuan1,2,*, M. T. Mastura3, M. Y. M. Zuhri2

    Journal of Renewable Materials, Vol.9, No.4, pp. 803-827, 2021, DOI:10.32604/jrm.2021.013977

    Abstract Biopolymer composite has gained huge attention for its beneficial properties such as biodegradable and less impact to the environment. This consequently would diminish the dependency on the petroleum-based polymer. Abundance of studies have been done on the development and characterization of biopolymer composite materials for food packaging application, but work on the conceptual design of biopolymer composite packaging product is hardly found. Using the Kano Model, Quality Function Deployment for Environment (QFDE), morphological map, and Analytic Hierarchy Method (AHP) framework combination, this paper presents the conceptual design of a natural fibre reinforced biopolymer composites take-out food container. To understand customer… More >

  • Open Access

    ARTICLE

    Evaluating the Impact of Prediction Techniques: Software Reliability Perspective

    Kavita Sahu1, Fahad A. Alzahrani2, R. K. Srivastava1, Rajeev Kumar3,4,*

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1471-1488, 2021, DOI:10.32604/cmc.2021.014868

    Abstract Maintaining software reliability is the key idea for conducting quality research. This can be done by having less complex applications. While developers and other experts have made significant efforts in this context, the level of reliability is not the same as it should be. Therefore, further research into the most detailed mechanisms for evaluating and increasing software reliability is essential. A significant aspect of growing the degree of reliable applications is the quantitative assessment of reliability. There are multiple statistical as well as soft computing methods available in literature for predicting reliability of software. However, none of these mechanisms are… More >

  • Open Access

    ARTICLE

    Estimating Security Risk of Healthcare Web Applications: A Design Perspective

    Fahad A. Alzahrani*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 187-209, 2021, DOI:10.32604/cmc.2021.014007

    Abstract In the recent years, the booming web-based applications have attracted the hackers’ community. The security risk of the web-based hospital management system (WBHMS) has been increasing rapidly. In the given context, the main goal of all security professionals and website developers is to maintain security divisions and improve on the user’s confidence and satisfaction. At this point, the different WBHMS tackle different types of security risks. In WBHMS, the security of the patients’ medical information is of utmost importance. All in all, there is an inherent security risk of data and assets in the field of the medical industry as… More >

  • Open Access

    ARTICLE

    Evaluating the Impact of Software Security Tactics: A Design Perspective

    Mamdouh Alenezi1, Abhishek Kumar Pandey2, Richa Verma3, Mohd Faizan2, Shalini Chandra3, Alka Agrawal2, Rajeev Kumar2,4,*, Raees Ahmad Khan2

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2283-2299, 2021, DOI:10.32604/cmc.2021.013579

    Abstract Design architecture is the edifice that strengthens the functionalities as well as the security of web applications. In order to facilitate architectural security from the web application’s design phase itself, practitioners are now adopting the novel mechanism of security tactics. With the intent to conduct a research from the perspective of security tactics, the present study employs a hybrid multi-criteria decision-making approach named fuzzy analytic hierarchy process-technique for order preference by similarity ideal solution (AHP-TOPSIS) method for selecting and assessing multi-criteria decisions. The adopted methodology is a blend of fuzzy analytic hierarchy process (fuzzy AHP) and fuzzy technique for order… More >

  • Open Access

    ARTICLE

    Fuzzy Based Decision-Making Approach for Estimating Usable-Security of Healthcare Web Applications

    Fahad A. Alzahrani*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2599-2625, 2021, DOI:10.32604/cmc.2021.013124

    Abstract Usability and security are often considered contradictory in nature. One has a negative impact on the other. In order to satisfy the needs of users with the security perspective, the relationship and trade-offs among security and usability must be distinguished. Security practitioners are working on developing new approaches that would help to secure healthcare web applications as well increase usability of the web applications. In the same league, the present research endeavour is premised on the usable-security of healthcare web applications. For a compatible blend of usability and security that would fulfill the users’ requirments, this research proposes an integration… More >

  • Open Access

    ARTICLE

    Estimating the Impact of COVID-19 Pandemic on the Research Community in the Kingdom of Saudi Arabia

    Abdulaziz Attaallah1, Masood Ahmad2, Adil Hussain Seh2, Alka Agrawal2, Rajeev Kumar2,3,*, Raees Ahmad Khan2

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.1, pp. 419-436, 2021, DOI:10.32604/cmes.2021.014263

    Abstract Ever since its outbreak in Wuhan, COVID-19 has cloaked the entire world in a pall of despondency and uncertainty. The present study describes the exploratory analysis of all COVID cases in Saudi Arabia. Besides, the study has executed the forecasting model for predicting the possible number of COVID-19 cases in Saudi Arabia till a defined period. Towards this intent, the study analyzed different age groups of patients (child, adult, elderly) who were affected by COVID-19. The analysis was done city-wise and also included the number of recoveries recorded in different cities. Furthermore, the study also discusses the impact of COVID-19… More >

Displaying 41-50 on page 5 of 55. Per Page