Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31)
  • Open Access

    ARTICLE

    Situation Awareness Data Fusion Method Based on Library Events

    Haixu Xi1,2, Wei Gao2,*, Gyun Yeol Park3

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1047-1061, 2022, DOI:10.32604/csse.2022.022051

    Abstract Microelectronic technology and communication technology are developed in deep manner; the computing mode has been transferred from traditional computer-centered to human centered pervasive. So, the concept of Internet of things (IoT) is gradually put forward, which allows people to access information about their surroundings on demand through different terminals. The library is the major public space for human to read and learn. How to provide a more comfortable library environment to better meet people’s learning requirements is a place where the Internet of things plays its role. The purpose of this paper is to solve the difference between the data… More >

  • Open Access

    ARTICLE

    Modelling and Verification of Context-Aware Intelligent Assistive Formalism

    Shahid Yousaf1,*, Hafiz Mahfooz Ul Haque2, Abbas Khalid1, Muhammad Adnan Hashmi3, Eraj Khan1

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3355-3373, 2022, DOI:10.32604/cmc.2022.023019

    Abstract Recent years have witnessed the expeditious evolution of intelligent smart devices and autonomous software technologies with the expanded domains of computing from workplaces to smart computing in everyday routine life activities. This trend has been rapidly advancing towards the new generation of systems where smart devices play vital roles in acting intelligently on behalf of the users. Context-awareness has emerged from the pervasive computing paradigm. Context-aware systems have the ability to acquire contextual information from the surrounding environment autonomously, perform reasoning on it, and then adapt their behaviors accordingly. With the proliferation of context-aware systems and smart sensors, real-time monitoring… More >

  • Open Access

    ARTICLE

    Awareness about the Online Security Threat and Ways to Secure the Youths

    Yeshi Nidup*

    Journal of Cyber Security, Vol.3, No.3, pp. 133-148, 2021, DOI:10.32604/jcs.2021.024136

    Abstract This study aimed to find out the awareness about the online security threat and understanding of the preventive measuresto secure the youthsfrom online risks. For this, a quantitative method was applied and the survey questionnaire was instituted to collect the data randomly from the youths studying in class eleven and higher. A total of 264 youths, 147 female and 117 male responded to the survey questionnaire. The data was organized and analyzed using Excel data analysis tool package, interpreted and represented in the form of graphs with some explanations. The awareness about the online security threat was found to be… More >

  • Open Access

    ARTICLE

    Primary User-Awareness-Based Energy-Efficient Duty-Cycle Scheme in Cognitive Radio Networks

    Zilong Jin1,2, Chengbo Zhang1 , Kan Yao3 , Dun Cao4 , Seokhoon Kim5, Yuanfeng Jin6,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5991-6005, 2022, DOI:10.32604/cmc.2022.021498

    Abstract

    Cognitive radio devices can utilize the licensed channels in an opportunistic manner to solve the spectrum scarcity issue occurring in the unlicensed spectrum. However, these cognitive radio devices (secondary users) are greatly affected by the original users (primary users) of licensed channels. Cognitive users have to adjust operation parameters frequently to adapt to the dynamic network environment, which causes extra energy consumption. Energy consumption can be reduced by predicting the future activity of primary users. However, the traditional prediction-based algorithms require large historical data to achieve a satisfying precision accuracy which will consume a lot of time and memory space.… More >

  • Open Access

    ARTICLE

    Mining the Chatbot Brain to Improve COVID-19 Bot Response Accuracy

    Mukhtar Ghaleb1,*, Yahya Almurtadha2, Fahad Algarni3, Monir Abdullah3, Emad Felemban4, Ali M. Alsharafi3, Mohamed Othman5, Khaled Ghilan6

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2619-2638, 2022, DOI:10.32604/cmc.2022.020358

    Abstract People often communicate with auto-answering tools such as conversational agents due to their 24/7 availability and unbiased responses. However, chatbots are normally designed for specific purposes and areas of experience and cannot answer questions outside their scope. Chatbots employ Natural Language Understanding (NLU) to infer their responses. There is a need for a chatbot that can learn from inquiries and expand its area of experience with time. This chatbot must be able to build profiles representing intended topics in a similar way to the human brain for fast retrieval. This study proposes a methodology to enhance a chatbot's brain functionality… More >

  • Open Access

    ARTICLE

    Impact of Human Vulnerabilities on Cybersecurity

    Maher Alsharif1, Shailendra Mishra2,*, Mohammed AlShehri1

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1153-1166, 2022, DOI:10.32604/csse.2022.019938

    Abstract Today, security is a major challenge linked with computer network companies that cannot defend against cyber-attacks. Numerous vulnerable factors increase security risks and cyber-attacks, including viruses, the internet, communications, and hackers. Internets of Things (IoT) devices are more effective, and the number of devices connected to the internet is constantly increasing, and governments and businesses are also using these technologies to perform business activities effectively. However, the increasing uses of technologies also increase risks, such as password attacks, social engineering, and phishing attacks. Humans play a major role in the field of cybersecurity. It is observed that more than 39%… More >

  • Open Access

    ARTICLE

    Location-Aware Personalized Traveler Recommender System (LAPTA) Using Collaborative Filtering KNN

    Mohanad Al-Ghobari1, Amgad Muneer2,*, Suliman Mohamed Fati3

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1553-1570, 2021, DOI:10.32604/cmc.2021.016348

    Abstract Many tourists who travel to explore different cultures and cities worldwide aim to find the best tourist sites, accommodation, and food according to their interests. This objective makes it harder for tourists to decide and plan where to go and what to do. Aside from hiring a local guide, an option which is beyond most travelers’ budgets, the majority of sojourners nowadays use mobile devices to search for or recommend interesting sites on the basis of user reviews. Therefore, this work utilizes the prevalent recommender systems and mobile app technologies to overcome this issue. Accordingly, this study proposes location-aware personalized… More >

  • Open Access

    ARTICLE

    Awareness of Human Papilloma Virus and Its Association with Cervical Cancer among Female University Students: A Study from United Arab Emirates

    Madhumitha Kedhari Sundaram1, Abdulmajeed G. Almutary2, Shafiul Haque3, Faheem SM1, Arif Hussain1,*

    Oncologie, Vol.23, No.2, pp. 269-277, 2021, DOI:10.32604/Oncologie.2021.016002

    Abstract Cervical cancer is the neoplasm of the uterine cervix in women, which is highly preventable. With the advent of vaccination against HPV infection, a gradual decline in the incidence of cervical cancer cases has been observed in developing countries. The developing nations bear the brunt of cervical cancer incidence due to low acceptance of vaccination. This survey-based study was designed to assess the awareness and opinions of female university students regarding human papilloma virus, vaccination and cervical cancer. A survey questionnaire was distributed among female expatriate students (18 to 26 years of age) of a private university. The survey sought… More >

  • Open Access

    ARTICLE

    Context and Machine Learning Based Trust Management Framework for Internet of Vehicles

    Abdul Rehman1,*, Mohd Fadzil Hassan1, Yew Kwang Hooi1, Muhammad Aasim Qureshi2, Tran Duc Chung3, Rehan Akbar4, Sohail Safdar5

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4125-4142, 2021, DOI:10.32604/CMC.2021.017620

    Abstract Trust is one of the core components of any ad hoc network security system. Trust management (TM) has always been a challenging issue in a vehicular network. One such developing network is the Internet of vehicles (IoV), which is expected to be an essential part of smart cities. IoV originated from the merger of Vehicular ad hoc networks (VANET) and the Internet of things (IoT). Security is one of the main barriers in the on-road IoV implementation. Existing security standards are insufficient to meet the extremely dynamic and rapidly changing IoV requirements. Trust plays a vital role in ensuring security,… More >

  • Open Access

    ARTICLE

    A Broadcast Storm Detection and Treatment Method Based on Situational Awareness

    Zhe Zhu1, Mingjian Zhang2, Yong Liu1, Lan Ma1, Xin Liu1,*

    Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 47-54, 2021, DOI:10.32604/jihpp.2021.016690

    Abstract At present, the research of blockchain is very popular, but the practical application of blockchain is very few. The main reason is that the concurrency of blockchain is not enough to support application scenarios. After that, applications such as Intervalue increase the concurrency of blockchain transactions. However, due to the problems of network bandwidth and algorithm performance, there is always a broadcast storm, which affects the normal use of nodes in the whole network. However, the emergence of broadcast storms needs to rely on the node itself, which may be very slow. Even if developers debug the corresponding code, they… More >

Displaying 11-20 on page 2 of 31. Per Page