Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (420)
  • Open Access

    ARTICLE

    Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective

    Yoosef B. Abushark1, Asif Irshad Khan1,*, Fawaz Jaber Alsolami1, Abdulmohsen Almalawi1, Md Mottahir Alam2, Alka Agrawal3, Rajeev Kumar3,4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1203-1218, 2021, DOI:10.32604/cmc.2021.016610 - 22 March 2021

    Abstract Most of the security strategies today are primarily designed to provide security protection, rather than to solve one of the basic security issues related to adequate software product architecture. Several models, frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life cycle. Therefore it is important to assess the usability of the popular security requirements engineering (SRE) approaches. A significant factor in the management and handling of successful security requirements is the assessment of security requirements engineering method performance. This assessment will allow changes to the engineering process… More >

  • Open Access

    ARTICLE

    Traffic Engineering in Dynamic Hybrid Segment Routing Networks

    Yingya Guo1,2,3,7, Kai Huang1, Cheng Hu4,*, Jiangyuan Yao5, Siyu Zhou6

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 655-670, 2021, DOI:10.32604/cmc.2021.016364 - 22 March 2021

    Abstract The emergence of Segment Routing (SR) provides a novel routing paradigm that uses a routing technique called source packet routing. In SR architecture, the paths that the packets choose to route on are indicated at the ingress router. Compared with shortest-path-based routing in traditional distributed routing protocols, SR can realize a flexible routing by implementing an arbitrary flow splitting at the ingress router. Despite the advantages of SR, it may be difficult to update the existing IP network to a full SR deployed network, for economical and technical reasons. Updating partial of the traditional IP… More >

  • Open Access

    ARTICLE

    Analytical Comparison of Resource Search Algorithms in Non-DHT Mobile Peer-to-Peer Networks

    Ajay Arunachalam1,*, Vinayakumar Ravi2, Moez Krichen3, Roobaea Alroobaea4, Jehad Saad Alqurni5

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 983-1001, 2021, DOI:10.32604/cmc.2021.015371 - 22 March 2021

    Abstract One of the key challenges in ad-hoc networks is the resource discovery problem. How efficiently & quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question? Broadcasting is a basic technique in the Mobile Ad-hoc Networks (MANETs), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique floods the network with query messages, while the random walk scheme operates… More >

  • Open Access

    ARTICLE

    COVID-19 and Learning Styles: GCET as Case Study

    Mazhar Hussain Malik1,*, Amjed Sid Ahmed1, Sulaiman Al Hasani2

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 103-115, 2021, DOI:10.32604/cmc.2021.014562 - 22 March 2021

    Abstract The COVID-19 pandemic has caused higher educational institutions around the world to close campus-based activities and move to online delivery. The aim of this paper is to present the case of Global College of Engineering and Technology (GCET) and how its practices including teaching, students/staff support, assessments, and exam policies were affected. The paper investigates the mediating role of no detriment policy impact on students’ result along with the challenges faced by the higher educational institution, recommendations and suggestions. The investigation concludes that the strategies adopted for online delivery, student support, assessments and exam policies… More >

  • Open Access

    ARTICLE

    Selection and Optimization of Software Development Life Cycles Using a Genetic Algorithm

    Fatimah O. Albalawi, Mashael S. Maashi*

    Intelligent Automation & Soft Computing, Vol.28, No.1, pp. 39-52, 2021, DOI:10.32604/iasc.2021.015657 - 17 March 2021

    Abstract In the software field, a large number of projects fail, and billions of dollars are spent on these failed projects. Many software projects are also produced with poor quality or they do not exactly meet customers’ expectations. Moreover, these projects may exceed project budget and/or time. The complexity of managing software development projects and the poor selection of software development life cycle (SDLC) models are among the top reasons for such failure. Various SDLC models are available, but no model is considered the best or worst. In this work, we propose a new methodology that… More >

  • Open Access

    ARTICLE

    Mechanical-Hydraulic Co-Simulation of Full Hydraulic Articulated Steering System

    Jiayi Wang, Xinhui Liu, Jinshi Chen*, Tongjian Wang, Xin Wang

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 381-398, 2021, DOI:10.32604/csse.2021.014011 - 08 March 2021

    Abstract

    With the development and improvement of the hydraulic steering system, the articulated steering system became the research focus of numerous domestic and foreign scholars. The full hydraulic steering system with a compact structure and ease of operation, is widely used in articulated steering mode. Furthermore, its performance can directly impact the steering sensitivity and stability. This paper studies the working principle and actual structure of the priority valve and the steering control valve, which are very important. By setting up a mathematic model, the system’s load-sensing characteristics and the impact of steering control valve bypass

    More >

  • Open Access

    ARTICLE

    Intelligent Real-Time IoT Traffic Steering in 5G Edge Networks

    Sa Math1, Prohim Tam1, Seokhoon Kim2,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3433-3450, 2021, DOI:10.32604/cmc.2021.015490 - 01 March 2021

    Abstract In the Next Generation Radio Networks (NGRN), there will be extreme massive connectivity with the Heterogeneous Internet of Things (HetIoT) devices. The millimeter-Wave (mmWave) communications will become a potential core technology to increase the capacity of Radio Networks (RN) and enable Multiple-Input and Multiple-Output (MIMO) of Radio Remote Head (RRH) technology. However, the challenging key issues in unfair radio resource handling remain unsolved when massive requests are occurring concurrently. The imbalance of resource utilization is one of the main issues occurs when there is overloaded connectivity to the closest RRH receiving exceeding requests. To handle… More >

  • Open Access

    ARTICLE

    Feasibility-Guided Constraint-Handling Techniques for Engineering Optimization Problems

    Muhammad Asif Jan1,*, Yasir Mahmood1, Hidayat Ullah Khan2, Wali Khan Mashwani1, Muhammad Irfan Uddin3, Marwan Mahmoud4, Rashida Adeeb Khanum5, Ikramullah6, Noor Mast3

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2845-2862, 2021, DOI:10.32604/cmc.2021.015294 - 01 March 2021

    Abstract The particle swarm optimization (PSO) algorithm is an established nature-inspired population-based meta-heuristic that replicates the synchronizing movements of birds and fish. PSO is essentially an unconstrained algorithm and requires constraint handling techniques (CHTs) to solve constrained optimization problems (COPs). For this purpose, we integrate two CHTs, the superiority of feasibility (SF) and the violation constraint-handling (VCH), with a PSO. These CHTs distinguish feasible solutions from infeasible ones. Moreover, in SF, the selection of infeasible solutions is based on their degree of constraint violations, whereas in VCH, the number of constraint violations by an infeasible solution… More >

  • Open Access

    ARTICLE

    Formal Volunteering and Mental Health in South Korea: Does Age Matter?

    Manacy Pai1, Joongbaeck Kim2,*

    International Journal of Mental Health Promotion, Vol.23, No.1, pp. 27-42, 2021, DOI:10.32604/IJMHP.2021.011996 - 19 February 2021

    Abstract Extensive research shows a positive association between formal volunteering and mental health and this association is stronger for older adults compared to their younger peers. The purpose of our study is to re-examine the link between formal volunteering, age, and mental health in a non-western society, South Korea. We employ two recent waves—years 2012-13 -- of nationally representative data from the Korea Welfare Panel Survey to test the extent to which the relationship between formal volunteering and mental health, as measured by depression, varies across two non-elderly age groups—young adults (18–35) and those middle-aged (36–55). More >

  • Open Access

    ARTICLE

    TLSmell: Direct Identification on Malicious HTTPs Encryption Traffic with Simple Connection-Specific Indicators

    Zhengqiu Weng1,2, Timing Chen1,*, Tiantian Zhu1, Hang Dong1, Dan Zhou1, Osama Alfarraj3

    Computer Systems Science and Engineering, Vol.37, No.1, pp. 105-119, 2021, DOI:10.32604/csse.2021.015074 - 05 February 2021

    Abstract Internet traffic encryption is a very common traffic protection method. Most internet traffic is protected by the encryption protocol called transport layer security (TLS). Although traffic encryption can ensure the security of communication, it also enables malware to hide its information and avoid being detected. At present, most of the malicious traffic detection methods are aimed at the unencrypted ones. There are some problems in the detection of encrypted traffic, such as high false positive rate, difficulty in feature extraction, and insufficient practicability. The accuracy and effectiveness of existing methods need to be improved. In… More >

Displaying 281-290 on page 29 of 420. Per Page