Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (51)
  • Open Access

    ARTICLE

    Unified Computational Modelling for Healthcare Device Security Assessment

    Shakeel Ahmed*, Abdulaziz Alhumam

    Computer Systems Science and Engineering, Vol.37, No.1, pp. 1-18, 2021, DOI:10.32604/csse.2021.015775 - 05 February 2021

    Abstract This article evaluates the security techniques that are used to maintain the healthcare devices, and proposes a mathematical model to list these in the order of priority and preference. To accomplish the stated objective, the article uses the Fuzzy Analytic Network Process (ANP) integrated with Technical for Order Preference by Similarities to Ideal Solution (TOPSIS) to find the suitable alternatives of the security techniques for securing the healthcare devices from trespassing. The methodology is enlisted to rank the alternatives/ techniques based on their weights’ satisfaction degree. Thereafter, the ranks of the alternatives determine the order More >

  • Open Access

    ARTICLE

    Evaluating the Impact of Prediction Techniques: Software Reliability Perspective

    Kavita Sahu1, Fahad A. Alzahrani2, R. K. Srivastava1, Rajeev Kumar3,4,*

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1471-1488, 2021, DOI:10.32604/cmc.2021.014868 - 05 February 2021

    Abstract Maintaining software reliability is the key idea for conducting quality research. This can be done by having less complex applications. While developers and other experts have made significant efforts in this context, the level of reliability is not the same as it should be. Therefore, further research into the most detailed mechanisms for evaluating and increasing software reliability is essential. A significant aspect of growing the degree of reliable applications is the quantitative assessment of reliability. There are multiple statistical as well as soft computing methods available in literature for predicting reliability of software. However,… More >

  • Open Access

    ARTICLE

    Device Security Assessment of Internet of Healthcare Things

    Abdulaziz Attaallah1, Masood Ahmad2, Md Tarique Jamal Ansari2, Abhishek Kumar Pandey2, Rajeev Kumar2,3,*, Raees Ahmad Khan2

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 593-603, 2021, DOI:10.32604/iasc.2021.015092 - 18 January 2021

    Abstract Security of the Internet of Healthcare Things (IoHT) devices plays a vital role in e-healthcare today and there has been a rapid increase in the use of networked devices of IoHT in the present healthcare services. However, these networked devices are also highly vulnerable to attackers who constantly target the security of devices and their components to gain access to the patients’ data. Infringement of patients’ data is not only a violation of privacy but can also jeopardize patients’ health if the health records are tampered with. Once the device has been intruded upon, attackers… More >

  • Open Access

    ARTICLE

    Estimating Security Risk of Healthcare Web Applications: A Design Perspective

    Fahad A. Alzahrani*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 187-209, 2021, DOI:10.32604/cmc.2021.014007 - 12 January 2021

    Abstract In the recent years, the booming web-based applications have attracted the hackers’ community. The security risk of the web-based hospital management system (WBHMS) has been increasing rapidly. In the given context, the main goal of all security professionals and website developers is to maintain security divisions and improve on the user’s confidence and satisfaction. At this point, the different WBHMS tackle different types of security risks. In WBHMS, the security of the patients’ medical information is of utmost importance. All in all, there is an inherent security risk of data and assets in the field… More >

  • Open Access

    ARTICLE

    Atrocious Impinging of COVID-19 Pandemic on Software Development Industries

    Wajdi Alhakami1, Ahmed Binmahfoudh2, Abdullah Baz3, Hosam Alhakami4, Md Tarique Jamal Ansari5, Raees Ahmad Khan5,*

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 323-338, 2021, DOI:10.32604/csse.2021.014929 - 05 January 2021

    Abstract COVID-19 is the contagious disease transmitted by Coronavirus. The majority of people diagnosed with COVID-19 may suffer from moderate-to- severe respiratory illnesses and stabilize without preferential treatment. Those who are most likely to experience significant infections include the elderly as well as people with a history of significant medical issues including heart disease, diabetes, or chronic breathing problems. The novel Coronavirus has affected not only the physical and mental health of the people but also had adverse impact on their emotional well-being. For months on end now, due to constant monitoring and containment measures to… More >

  • Open Access

    ARTICLE

    Evaluating the Impact of Software Security Tactics: A Design Perspective

    Mamdouh Alenezi1, Abhishek Kumar Pandey2, Richa Verma3, Mohd Faizan2, Shalini Chandra3, Alka Agrawal2, Rajeev Kumar2,4,*, Raees Ahmad Khan2

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2283-2299, 2021, DOI:10.32604/cmc.2021.013579 - 28 December 2020

    Abstract Design architecture is the edifice that strengthens the functionalities as well as the security of web applications. In order to facilitate architectural security from the web application’s design phase itself, practitioners are now adopting the novel mechanism of security tactics. With the intent to conduct a research from the perspective of security tactics, the present study employs a hybrid multi-criteria decision-making approach named fuzzy analytic hierarchy process-technique for order preference by similarity ideal solution (AHP-TOPSIS) method for selecting and assessing multi-criteria decisions. The adopted methodology is a blend of fuzzy analytic hierarchy process (fuzzy AHP)… More >

  • Open Access

    ARTICLE

    Fuzzy Based Decision-Making Approach for Estimating Usable-Security of Healthcare Web Applications

    Fahad A. Alzahrani*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2599-2625, 2021, DOI:10.32604/cmc.2021.013124 - 28 December 2020

    Abstract Usability and security are often considered contradictory in nature. One has a negative impact on the other. In order to satisfy the needs of users with the security perspective, the relationship and trade-offs among security and usability must be distinguished. Security practitioners are working on developing new approaches that would help to secure healthcare web applications as well increase usability of the web applications. In the same league, the present research endeavour is premised on the usable-security of healthcare web applications. For a compatible blend of usability and security that would fulfill the users’ requirments,… More >

  • Open Access

    ARTICLE

    Estimating the Impact of COVID-19 Pandemic on the Research Community in the Kingdom of Saudi Arabia

    Abdulaziz Attaallah1, Masood Ahmad2, Adil Hussain Seh2, Alka Agrawal2, Rajeev Kumar2,3,*, Raees Ahmad Khan2

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.1, pp. 419-436, 2021, DOI:10.32604/cmes.2021.014263 - 22 December 2020

    Abstract Ever since its outbreak in Wuhan, COVID-19 has cloaked the entire world in a pall of despondency and uncertainty. The present study describes the exploratory analysis of all COVID cases in Saudi Arabia. Besides, the study has executed the forecasting model for predicting the possible number of COVID-19 cases in Saudi Arabia till a defined period. Towards this intent, the study analyzed different age groups of patients (child, adult, elderly) who were affected by COVID-19. The analysis was done city-wise and also included the number of recoveries recorded in different cities. Furthermore, the study also… More >

  • Open Access

    ARTICLE

    Multiple Response Optimization of Dimensional Accuracy of Nimonic Alloy Miniature Gear Machined on Wire Edm Using Entropy Topsis Andpareto Anova

    Tina Chaudhary1,*, Arshad Noor Siddiquee2, Arindam Kumar Chanda3, Shafi Ahmad2, Irfan Anjum Badruddin4,*, Zahid A. Khan2

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.1, pp. 241-259, 2021, DOI:10.32604/cmes.2021.013368 - 22 December 2020

    Abstract The purpose of this research is to obtain the optimum cutting parameters to achieve the dimensional accuracy of Nimonic alloy miniature gear manufactured using Wire EDM. The cutting parameters investigated in this study are current, pulse on time (PON), pulse off time (POFF), wire tension (WT) and dielectric fluids. Ethylene glycol, nanopowder of alumina and oxygen are mixed to demineralized water to prepare novel dielectric fluids. Deviation in inner diameter, deviation in outer diameter, deviation in land and deviation in tooth width are considered to check the dimensional accuracy. Taguchi L16 is employed for experimental design More >

  • Open Access

    ARTICLE

    Weighing and Prioritizing Noise Control Methods Using the Delphi Technique and the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) in an Iranian Tire Manufacturing Factory

    Mohammad Reza Ghotbi-Ravandi1, Davoud Hassanvand2, Sajad Zare3,*, Milad Beytollahi4

    Sound & Vibration, Vol.54, No.3, pp. 201-213, 2020, DOI:10.32604/sv.2020.08651 - 31 August 2020

    Abstract Undoubtedly, noise has become a major hazardous issue in today’s industrial world, with a lot of people suffering from exposure to excessive noise in their work environments. This study was conducted to weigh and prioritize noise control methods in an Iranian tire manufacturing complex in Iran. The Delphi method and the Technique for Order Preference by Similarity and an Ideal Solution (TOPSIS) were utilized for this purpose. This cross-sectional, descriptive study was conducted in the baking hall of an Iranian tire manufacturing factory in 2016. To weigh and prioritize noise control methods, Analytic Hierarchy Process… More >

Displaying 41-50 on page 5 of 51. Per Page