Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (29)
  • Open Access


    Awareness about the Online Security Threat and Ways to Secure the Youths

    Yeshi Nidup*

    Journal of Cyber Security, Vol.3, No.3, pp. 133-148, 2021, DOI:10.32604/jcs.2021.024136

    Abstract This study aimed to find out the awareness about the online security threat and understanding of the preventive measuresto secure the youthsfrom online risks. For this, a quantitative method was applied and the survey questionnaire was instituted to collect the data randomly from the youths studying in class eleven and higher. A total of 264 youths, 147 female and 117 male responded to the survey questionnaire. The data was organized and analyzed using Excel data analysis tool package, interpreted and represented in the form of graphs with some explanations. The awareness about the online security threat was found to be… More >

  • Open Access


    Primary User-Awareness-Based Energy-Efficient Duty-Cycle Scheme in Cognitive Radio Networks

    Zilong Jin1,2, Chengbo Zhang1 , Kan Yao3 , Dun Cao4 , Seokhoon Kim5, Yuanfeng Jin6,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5991-6005, 2022, DOI:10.32604/cmc.2022.021498


    Cognitive radio devices can utilize the licensed channels in an opportunistic manner to solve the spectrum scarcity issue occurring in the unlicensed spectrum. However, these cognitive radio devices (secondary users) are greatly affected by the original users (primary users) of licensed channels. Cognitive users have to adjust operation parameters frequently to adapt to the dynamic network environment, which causes extra energy consumption. Energy consumption can be reduced by predicting the future activity of primary users. However, the traditional prediction-based algorithms require large historical data to achieve a satisfying precision accuracy which will consume a lot of time and memory space.… More >

  • Open Access


    Mining the Chatbot Brain to Improve COVID-19 Bot Response Accuracy

    Mukhtar Ghaleb1,*, Yahya Almurtadha2, Fahad Algarni3, Monir Abdullah3, Emad Felemban4, Ali M. Alsharafi3, Mohamed Othman5, Khaled Ghilan6

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2619-2638, 2022, DOI:10.32604/cmc.2022.020358

    Abstract People often communicate with auto-answering tools such as conversational agents due to their 24/7 availability and unbiased responses. However, chatbots are normally designed for specific purposes and areas of experience and cannot answer questions outside their scope. Chatbots employ Natural Language Understanding (NLU) to infer their responses. There is a need for a chatbot that can learn from inquiries and expand its area of experience with time. This chatbot must be able to build profiles representing intended topics in a similar way to the human brain for fast retrieval. This study proposes a methodology to enhance a chatbot's brain functionality… More >

  • Open Access


    Impact of Human Vulnerabilities on Cybersecurity

    Maher Alsharif1, Shailendra Mishra2,*, Mohammed AlShehri1

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1153-1166, 2022, DOI:10.32604/csse.2022.019938

    Abstract Today, security is a major challenge linked with computer network companies that cannot defend against cyber-attacks. Numerous vulnerable factors increase security risks and cyber-attacks, including viruses, the internet, communications, and hackers. Internets of Things (IoT) devices are more effective, and the number of devices connected to the internet is constantly increasing, and governments and businesses are also using these technologies to perform business activities effectively. However, the increasing uses of technologies also increase risks, such as password attacks, social engineering, and phishing attacks. Humans play a major role in the field of cybersecurity. It is observed that more than 39%… More >

  • Open Access


    Location-Aware Personalized Traveler Recommender System (LAPTA) Using Collaborative Filtering KNN

    Mohanad Al-Ghobari1, Amgad Muneer2,*, Suliman Mohamed Fati3

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1553-1570, 2021, DOI:10.32604/cmc.2021.016348

    Abstract Many tourists who travel to explore different cultures and cities worldwide aim to find the best tourist sites, accommodation, and food according to their interests. This objective makes it harder for tourists to decide and plan where to go and what to do. Aside from hiring a local guide, an option which is beyond most travelers’ budgets, the majority of sojourners nowadays use mobile devices to search for or recommend interesting sites on the basis of user reviews. Therefore, this work utilizes the prevalent recommender systems and mobile app technologies to overcome this issue. Accordingly, this study proposes location-aware personalized… More >

  • Open Access


    Awareness of Human Papilloma Virus and Its Association with Cervical Cancer among Female University Students: A Study from United Arab Emirates

    Madhumitha Kedhari Sundaram1, Abdulmajeed G. Almutary2, Shafiul Haque3, Faheem SM1, Arif Hussain1,*

    Oncologie, Vol.23, No.2, pp. 269-277, 2021, DOI:10.32604/Oncologie.2021.016002

    Abstract Cervical cancer is the neoplasm of the uterine cervix in women, which is highly preventable. With the advent of vaccination against HPV infection, a gradual decline in the incidence of cervical cancer cases has been observed in developing countries. The developing nations bear the brunt of cervical cancer incidence due to low acceptance of vaccination. This survey-based study was designed to assess the awareness and opinions of female university students regarding human papilloma virus, vaccination and cervical cancer. A survey questionnaire was distributed among female expatriate students (18 to 26 years of age) of a private university. The survey sought… More >

  • Open Access


    Context and Machine Learning Based Trust Management Framework for Internet of Vehicles

    Abdul Rehman1,*, Mohd Fadzil Hassan1, Yew Kwang Hooi1, Muhammad Aasim Qureshi2, Tran Duc Chung3, Rehan Akbar4, Sohail Safdar5

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4125-4142, 2021, DOI:10.32604/CMC.2021.017620

    Abstract Trust is one of the core components of any ad hoc network security system. Trust management (TM) has always been a challenging issue in a vehicular network. One such developing network is the Internet of vehicles (IoV), which is expected to be an essential part of smart cities. IoV originated from the merger of Vehicular ad hoc networks (VANET) and the Internet of things (IoT). Security is one of the main barriers in the on-road IoV implementation. Existing security standards are insufficient to meet the extremely dynamic and rapidly changing IoV requirements. Trust plays a vital role in ensuring security,… More >

  • Open Access


    A Broadcast Storm Detection and Treatment Method Based on Situational Awareness

    Zhe Zhu1, Mingjian Zhang2, Yong Liu1, Lan Ma1, Xin Liu1,*

    Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 47-54, 2021, DOI:10.32604/jihpp.2021.016690

    Abstract At present, the research of blockchain is very popular, but the practical application of blockchain is very few. The main reason is that the concurrency of blockchain is not enough to support application scenarios. After that, applications such as Intervalue increase the concurrency of blockchain transactions. However, due to the problems of network bandwidth and algorithm performance, there is always a broadcast storm, which affects the normal use of nodes in the whole network. However, the emergence of broadcast storms needs to rely on the node itself, which may be very slow. Even if developers debug the corresponding code, they… More >

  • Open Access


    Assessing User’s Susceptibility and Awareness of Cybersecurity Threats

    Maha M. Althobaiti*

    Intelligent Automation & Soft Computing, Vol.28, No.1, pp. 167-177, 2021, DOI:10.32604/iasc.2021.016660

    Abstract Cybersecurity threats, including those involving machine learning, malware, phishing, and cryptocurrency, have become more sophisticated. They target sensitive information and put institutions, governments, and individuals in a continual state of risk. In 2019, phishing attacks became one of the most common and dangerous cyber threats. Such attacks attempt to steal sensitive data, such as login and payment card details, from financial, social, and educational websites. Many universities have suffered data breaches, serving as a prime example of victims of attacks on educational websites. Owing to advances in phishing tactics, strategies, and technologies, the end-user is the main victim of an… More >

  • Open Access


    Research on Prediction Methods of Prevalence Perception under Information Exposure

    Weijin Jiang1, 2, 3, 4, Fang Ye1, 2, *, Wei Liu2, 3, Xiaoliang Liu1, 2, Guo Liang5, Yuhui Xu2, 3, Lina Tan1, 2

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2263-2275, 2020, DOI:10.32604/cmc.2020.010082

    Abstract With the rapid development of information technology, the explosive growth of data information has become a common challenge and opportunity. Social network services represented by WeChat, Weibo and Twitter, drive a large amount of information due to the continuous spread, evolution and emergence of users through these platforms. The dynamic modeling, analysis, and network information prediction, has very important research and application value, and plays a very important role in the discovery of popular events, personalized information recommendation, and early warning of bad information. For these reasons, this paper proposes an adaptive prediction algorithm for network information transmission. A popularity… More >

Displaying 11-20 on page 2 of 29. Per Page