Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (14)
  • Open Access

    ARTICLE

    On Multi-Granulation Rough Sets with Its Applications

    Radwan Abu-Gdairi1, R. Mareay2,*, M. Badr3

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1025-1038, 2024, DOI:10.32604/cmc.2024.048647

    Abstract Recently, much interest has been given to multi-granulation rough sets (MGRS), and various types of MGRS models have been developed from different viewpoints. In this paper, we introduce two techniques for the classification of MGRS. Firstly, we generate multi-topologies from multi-relations defined in the universe. Hence, a novel approximation space is established by leveraging the underlying topological structure. The characteristics of the newly proposed approximation space are discussed. We introduce an algorithm for the reduction of multi-relations. Secondly, a new approach for the classification of MGRS based on neighborhood concepts is introduced. Finally, a real-life application from medical records is… More >

  • Open Access

    ARTICLE

    Weighted Forwarding in Graph Convolution Networks for Recommendation Information Systems

    Sang-min Lee, Namgi Kim*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1897-1914, 2024, DOI:10.32604/cmc.2023.046346

    Abstract Recommendation Information Systems (RIS) are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet. Graph Convolution Network (GCN) algorithms have been employed to implement the RIS efficiently. However, the GCN algorithm faces limitations in terms of performance enhancement owing to the due to the embedding value-vanishing problem that occurs during the learning process. To address this issue, we propose a Weighted Forwarding method using the GCN (WF-GCN) algorithm. The proposed method involves multiplying the embedding results with different weights for each hop layer during graph learning. By applying the WF-GCN… More >

  • Open Access

    REVIEW

    An Overview of Modern Cartographic Trends Aligned with the ICA’s Perspective

    Maan Habib1,*, Maan Okayli2

    Revue Internationale de Géomatique, Vol.32, pp. 1-16, 2023, DOI:10.32604/rig.2023.043399

    Abstract This study provides a comprehensive overview of modern cartography innovations and emerging trends, highlighting the importance of geospatial representation in various fields. It discusses recent advancements in geospatial data collection techniques, including satellite and aerial imagery, Light Detection and Ranging (LiDAR) technology, and crowdsourcing. The research also investigates the integration of big data, machine learning, and real-time processing in Geographic Information Systems (GIS), as well as advances in geospatial visualization. In addition, it examines the role of cartography in addressing global challenges such as climate change, disaster management, and urban planning in line with the International Cartographic Association’s (ICA) perspectives.… More >

  • Open Access

    ARTICLE

    Attribute Reduction for Information Systems via Strength of Rules and Similarity Matrix

    Mohsen Eid1, Tamer Medhat2,*, Manal E. Ali3

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1531-1544, 2023, DOI:10.32604/csse.2023.031745

    Abstract An information system is a type of knowledge representation, and attribute reduction is crucial in big data, machine learning, data mining, and intelligent systems. There are several ways for solving attribute reduction problems, but they all require a common categorization. The selection of features in most scientific studies is a challenge for the researcher. When working with huge datasets, selecting all available attributes is not an option because it frequently complicates the study and decreases performance. On the other side, neglecting some attributes might jeopardize data accuracy. In this case, rough set theory provides a useful approach for identifying superfluous… More >

  • Open Access

    ARTICLE

    An Optimized Method for Accounting Information in Logistic Systems

    Ahmad Mohammed Alamri1, Ahmad Ali AlZubi2,*

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1595-1609, 2023, DOI:10.32604/csse.2023.027971

    Abstract In the era of rapid information development, with the popularity of computers, the advancement of science and technology, and the ongoing expansion of IT technology and business, the enterprise resource planning (ERP) system has evolved into a platform and a guarantee for the fulfilment of company management procedures after long-term operations. Because of developments in information technology, most manual accounting procedures are being replaced by computerized Accounting Information Systems (AIS), which are quicker and more accurate. The primary factors influencing the decisions of logistics firm trading parties are investigated in order to enhance the design of decision-supporting modules and to… More >

  • Open Access

    ARTICLE

    An Optimized Method for Information System Transactions Based on Blockchain

    Jazem Mutared Alanazi, Ahmad Ali AlZubi*

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2289-2308, 2023, DOI:10.32604/iasc.2023.029181

    Abstract Accounting Information System (AIS), which is the foundation of any enterprise resource planning (ERP) system, is often built as centralized system. The technologies that allow the Internet-of-Value, which is built on five aspects that are network, algorithms, distributed ledger, transfers, and assets, are based on blockchain. Cryptography and consensus protocols boost the blockchain platform implementation, acting as a deterrent to cyber-attacks and hacks. Blockchain platforms foster innovation among supply chain participants, resulting in ecosystem development. Traditional business processes have been severely disrupted by blockchains since apps and transactions that previously required centralized structures or trusted third-parties to authenticate them may… More >

  • Open Access

    ARTICLE

    Analysis and Design of University Teaching Equipment Management Information System

    Yu Xue1,2,*, Xiang Jiao1, Chishe Wang2 , Huanlun Chen1,4, Moayad Aloqaily3

    Journal of Cyber Security, Vol.3, No.3, pp. 177-185, 2021, DOI:10.32604/jcs.2021.016657

    Abstract Teaching equipment management is an important factor for colleges and universities to improve their teaching level, and its management level directly affects the service life and efficiency of teaching equipment. But in recent years, our university recruitment of students scale is increasing year by year, the size of the corresponding teaching equipment is also growing, therefore to develop a teaching equipment management information system is necessary, not only can help universities to effective use of the existing teaching resources, also can update scrap equipment, related equipment maintenance, and build a good learning environment to students and to the improvement of… More >

  • Open Access

    ARTICLE

    Modernization Framework to Enhance the Security of Legacy Information Systems

    Musawwer Khan1, Islam Ali1, Wasif Nisar1, Muhammad Qaiser Saleem2, Ali S. Ahmed2, Haysam E. Elamin3, Waqar Mehmood4, Muhammad Shafiq5,*

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 543-555, 2022, DOI:10.32604/iasc.2022.016120

    Abstract Due to various issues such as lack of agility, low performance, security issues, and high maintenance costs, the organization replaces its legacy information system (LIS). However, with the expansion of information technology, the security of the old system has received great attention. The protection of legacy data and information is critical to the organization. However, achieving safety through modernization, redevelopment, or redesign of LIS is a time-consuming and costly solution, especially in small and medium enterprises (SMEs). In addition, newly developed systems often lose inherent business rules, data integrity, and user trust. In this paper, we propose a Security Modernization… More >

  • Open Access

    ARTICLE

    Deep Semisupervised Learning-Based Network Anomaly Detection in Heterogeneous Information Systems

    Nazarii Lutsiv1, Taras Maksymyuk1,*, Mykola Beshley1, Orest Lavriv1, Volodymyr Andrushchak1, Anatoliy Sachenko2, Liberios Vokorokos3, Juraj Gazda3

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 413-431, 2022, DOI:10.32604/cmc.2022.018773

    Abstract The extensive proliferation of modern information services and ubiquitous digitization of society have raised cybersecurity challenges to new levels. With the massive number of connected devices, opportunities for potential network attacks are nearly unlimited. An additional problem is that many low-cost devices are not equipped with effective security protection so that they are easily hacked and applied within a network of bots (botnet) to perform distributed denial of service (DDoS) attacks. In this paper, we propose a novel intrusion detection system (IDS) based on deep learning that aims to identify suspicious behavior in modern heterogeneous information systems. The proposed approach… More >

  • Open Access

    ARTICLE

    Security-Critical Components Recognition Algorithm for Complex Heterogeneous Information Systems

    Jinxin Zuo1,2, Yueming Lu1,2,*, Hui Gao2,3, Tong Peng1,2, Ziyv Guo2,3, Tong An1,2, Enjie Liu4

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2579-2595, 2021, DOI:10.32604/cmc.2021.016623

    Abstract With the skyrocketing development of technologies, there are many issues in information security quantitative evaluation (ISQE) of complex heterogeneous information systems (CHISs). The development of CHIS calls for an ISQE model based on security-critical components to improve the efficiency of system security evaluation urgently. In this paper, we summarize the implication of critical components in different filed and propose a recognition algorithm of security-critical components based on threat attack tree to support the ISQE process. The evaluation model establishes a framework for ISQE of CHISs that are updated iteratively. Firstly, with the support of asset identification and topology data, we… More >

Displaying 1-10 on page 1 of 14. Per Page