Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (47)
  • Open Access

    ARTICLE

    Selecting Best Software Vulnerability Scanner Using Intuitionistic Fuzzy Set TOPSIS

    Navneet Bhatt1, Jasmine Kaur2, Adarsh Anand2, Omar H. Alhazmi3,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3613-3629, 2022, DOI:10.32604/cmc.2022.026554

    Abstract Software developers endeavor to build their products with the least number of bugs. Despite this, many vulnerabilities are detected in software that threatens its integrity. Various automated software i.e., vulnerability scanners, are available in the market which helps detect and manage vulnerabilities in a computer, application, or a network. Hence, the choice of an appropriate vulnerability scanner is crucial to ensure efficient vulnerability management. The current work serves a dual purpose, first, to identify the key factors which affect the vulnerability discovery process in a network. The second, is to rank the popular vulnerability scanners… More >

  • Open Access

    ARTICLE

    An Integrated Framework for Cloud Service Selection Based on BOM and TOPSIS

    Ahmed M. Mostafa*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4125-4142, 2022, DOI:10.32604/cmc.2022.024676

    Abstract Many businesses have experienced difficulties in selecting a cloud service provider (CSP) due to the rapid advancement of cloud computing services and the proliferation of CSPs. Many independent criteria should be considered when evaluating the services provided by different CSPs. It is a case of multi-criteria decision-making (MCDM). This paper presents an integrated MCDM cloud service selection framework for determining the most appropriate service provider based on the best only method (BOM) and technique for order of preference by similarity to ideal solution (TOPSIS). To obtain the weights of criteria and the relative importance of… More >

  • Open Access

    ARTICLE

    Cyber Security Analysis and Evaluation for Intrusion Detection Systems

    Yoosef B. Abushark1, Asif Irshad Khan1,*, Fawaz Alsolami1, Abdulmohsen Almalawi1, Md Mottahir Alam2, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1765-1783, 2022, DOI:10.32604/cmc.2022.025604

    Abstract Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the world. Machine learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and security issues. It is crucial in offering a proactive security system in the field of cybersecurity. In real time, cybersecurity protects information, information systems, and networks from intruders. In the recent decade, several assessments on security and privacy estimates have noted a rapid growth in both the incidence and quantity of cybersecurity breaches. At an increasing rate, intruders are breaching… More >

  • Open Access

    ARTICLE

    Two-Stage Fuzzy MCDM for Green Supplier Selection in Steel Industry

    Chia-Nan Wang, Thi-Ly Nguyen*, Thanh-Tuan Dang

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 1245-1260, 2022, DOI:10.32604/iasc.2022.024548

    Abstract Steel is one of the most powerful industries globally, and the associated products have a tremendous impact on nurturing a sustainable society. Considering environmental concerns within this industry's supply chain is highly successful in saving both energy and natural resources and lowering greenhouse gas emissions. In light of this, sustainable suppliers are considered input partners who play a specific role in the chain of business operations of every enterprise, maintaining them to achieve higher levels of customer satisfaction and thus gain more market share. Supplier selection can be characterized as a multi-criteria decision-making (MCDM) problem… More >

  • Open Access

    ARTICLE

    Quantitative Evaluation of Mental-Health in Type-2 Diabetes Patients Through Computational Model

    Fawaz Alassery1, Ahmed Alzahrani2, Asif Irshad Khan2, Ashi Khan3,*, Mohd Nadeem4, Md Tarique Jamal Ansari4

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1701-1715, 2022, DOI:10.32604/iasc.2022.023314

    Abstract A large number of people live in diabetes worldwide. Type-2 Diabetes (D2) accounts for 92% of patients with D2 and puts a huge burden on the healthcare industry. This multi-criterion medical research is based on the data collected from the hospitals of Uttar Pradesh, India. In recent times there is a need for a web-based electronic system to determine the impact of mental health in D2 patients. This study will examine the impact assessment in D2 patients. This paper used the integrated methodology of Fuzzy Analytic Hierarchy (FAHP) and Fuzzy Technique for Order Performance by… More >

  • Open Access

    ARTICLE

    Autonomous Exploration Based on Multi-Criteria Decision-Making and Using D* Lite Algorithm

    Novak Zagradjanin1,*, Dragan Pamucar2, Kosta Jovanovic1, Nikola Knezevic1, Bojan Pavkovic3

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1369-1386, 2022, DOI:10.32604/iasc.2022.021979

    Abstract An autonomous robot is often in a situation to perform tasks or missions in an initially unknown environment. A logical approach to doing this implies discovering the environment by the incremental principle defined by the applied exploration strategy. A large number of exploration strategies apply the technique of selecting the next robot position between candidate locations on the frontier between the unknown and the known parts of the environment using the function that combines different criteria. The exploration strategies based on Multi-Criteria Decision-Making (MCDM) using the standard SAW, COPRAS and TOPSIS methods are presented in… More >

  • Open Access

    ARTICLE

    Sustainability Evaluation of Modern Photovoltaic Agriculture Based on Interval Type-2 Fuzzy AHP-TOPSIS and Least Squares Support Vector Machine Optimized by Fireworks Algorithm

    Yi Liang1,2, Haichao Wang3,*, Wei-Chiang Hong4

    Energy Engineering, Vol.119, No.1, pp. 163-188, 2022, DOI:10.32604/EE.2022.017396

    Abstract Photovoltaics (PV) has been combined with many other industries, such as agriculture. But there are many problems for the sustainability of PV agriculture. Timely and accurate sustainability evaluation of modern photovoltaic agriculture is of great significance for accelerating the sustainable development of modern photovoltaic agriculture. In order to improve the timeliness and accuracy of evaluation, this paper proposes an evaluation model based on interval type-2 Fuzzy AHP-TOPSIS and least squares support vector machine optimized by fireworks algorithm. Firstly, the criteria system of modern photovoltaic agriculture sustainability is constructed from three dimensions including technology sustainability, economic… More >

  • Open Access

    ARTICLE

    Fuzzy-TOPSIS Evaluation of Power Product-Service System: A Framework Driven by Big Data

    Xuchang Hu*

    Energy Engineering, Vol.119, No.1, pp. 301-314, 2022, DOI:10.32604/EE.2022.014877

    Abstract Power product-service system (power PSS), which combines industrial electric products with electric energy services, is an effective solution for power enterprises under the background of the rapid development of power systems. In the life cycle of power PSS, evaluation decision of power PSS alternatives is of great significance for subsequent implementation. To address the power PSS alternative evaluation problem, a power PSS evaluation framework is explored driven by the big data of stakeholder comments. Based on the multi-stakeholder comments of power PSS evaluation decision’s influence factors, the index system is constructed through analyzing and summarizing… More >

  • Open Access

    ARTICLE

    Network Quality Assessment in Heterogeneous Wireless Settings: An Optimization Approach

    Sultan H. Almotiri*, Mohammed A. Al Ghamdi

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 439-455, 2022, DOI:10.32604/cmc.2022.021012

    Abstract The identification of an effective network which can efficiently meet the service requirements of the target, while maintaining ultimate performance at an increased level is significant and challenging in a fully interconnected wireless medium. The wrong selection can contribute to unwanted situations like frustrated users, slow service, traffic congestion issues, missed and/or interrupted calls, and wastefulness of precious network components. Conventional schemes estimate the handoff need and cause the network screening process by a single metric. The strategies are not effective enough because traffic characteristics, user expectations, network terminology and other essential device metrics are… More >

  • Open Access

    ARTICLE

    Healthcare Device Security Assessment through Computational Methodology

    Masood Ahmad1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Sabita Khatri2, Adil Hussain Seh1, Mohd Nadeem1, Alka Agrawal1,*

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 811-828, 2022, DOI:10.32604/csse.2022.020097

    Abstract The current study discusses the different methods used to secure healthcare devices and proposes a quantitative framework to list them in order of significances. The study uses the Hesitant Fuzzy (HF), Analytic Hierarchy Process (AHP) integrated with Fuzzy Technical for Order Preference by Similarities to Ideal Solution (TOPSIS) to classify the best alternatives to security techniques for healthcare devices to securing the devices. The technique is enlisted to rate the alternatives based on the degree of satisfaction of their weights. The ranks of the alternatives consequently decide the order of priority for the techniques. A1… More >

Displaying 11-20 on page 2 of 47. Per Page