Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (33)
  • Open Access

    ARTICLE

    Context and Machine Learning Based Trust Management Framework for Internet of Vehicles

    Abdul Rehman1,*, Mohd Fadzil Hassan1, Yew Kwang Hooi1, Muhammad Aasim Qureshi2, Tran Duc Chung3, Rehan Akbar4, Sohail Safdar5

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4125-4142, 2021, DOI:10.32604/CMC.2021.017620 - 06 May 2021

    Abstract Trust is one of the core components of any ad hoc network security system. Trust management (TM) has always been a challenging issue in a vehicular network. One such developing network is the Internet of vehicles (IoV), which is expected to be an essential part of smart cities. IoV originated from the merger of Vehicular ad hoc networks (VANET) and the Internet of things (IoT). Security is one of the main barriers in the on-road IoV implementation. Existing security standards are insufficient to meet the extremely dynamic and rapidly changing IoV requirements. Trust plays a… More >

  • Open Access

    ARTICLE

    A Broadcast Storm Detection and Treatment Method Based on Situational Awareness

    Zhe Zhu1, Mingjian Zhang2, Yong Liu1, Lan Ma1, Xin Liu1,*

    Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 47-54, 2021, DOI:10.32604/jihpp.2021.016690 - 21 April 2021

    Abstract At present, the research of blockchain is very popular, but the practical application of blockchain is very few. The main reason is that the concurrency of blockchain is not enough to support application scenarios. After that, applications such as Intervalue increase the concurrency of blockchain transactions. However, due to the problems of network bandwidth and algorithm performance, there is always a broadcast storm, which affects the normal use of nodes in the whole network. However, the emergence of broadcast storms needs to rely on the node itself, which may be very slow. Even if developers… More >

  • Open Access

    ARTICLE

    Assessing User’s Susceptibility and Awareness of Cybersecurity Threats

    Maha M. Althobaiti*

    Intelligent Automation & Soft Computing, Vol.28, No.1, pp. 167-177, 2021, DOI:10.32604/iasc.2021.016660 - 17 March 2021

    Abstract Cybersecurity threats, including those involving machine learning, malware, phishing, and cryptocurrency, have become more sophisticated. They target sensitive information and put institutions, governments, and individuals in a continual state of risk. In 2019, phishing attacks became one of the most common and dangerous cyber threats. Such attacks attempt to steal sensitive data, such as login and payment card details, from financial, social, and educational websites. Many universities have suffered data breaches, serving as a prime example of victims of attacks on educational websites. Owing to advances in phishing tactics, strategies, and technologies, the end-user is… More >

  • Open Access

    ARTICLE

    Research on Prediction Methods of Prevalence Perception under Information Exposure

    Weijin Jiang1, 2, 3, 4, Fang Ye1, 2, *, Wei Liu2, 3, Xiaoliang Liu1, 2, Guo Liang5, Yuhui Xu2, 3, Lina Tan1, 2

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2263-2275, 2020, DOI:10.32604/cmc.2020.010082 - 16 September 2020

    Abstract With the rapid development of information technology, the explosive growth of data information has become a common challenge and opportunity. Social network services represented by WeChat, Weibo and Twitter, drive a large amount of information due to the continuous spread, evolution and emergence of users through these platforms. The dynamic modeling, analysis, and network information prediction, has very important research and application value, and plays a very important role in the discovery of popular events, personalized information recommendation, and early warning of bad information. For these reasons, this paper proposes an adaptive prediction algorithm for More >

  • Open Access

    ARTICLE

    Awareness as the Most Effective Measure to Mitigate the Spread of COVID-19 in Nigeria

    Isa Abdullahi Baba1, *, Dumitru Baleanu2, 3

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 1945-1957, 2020, DOI:10.32604/cmc.2020.011508 - 16 September 2020

    Abstract A mathematical model consisting of a system of four nonlinear ordinary differential equations is constructed. Our aim is to study the dynamics of the spread of COVID-19 in Nigeria and to show the effectiveness of awareness and the need for relevant authorities to engage themselves more in enlightening people on the significance of the available control measures in mitigating the spread of the disease. Two equilibrium solutions; Disease free equilibrium and Endemic equilibrium solutions were calculated and their global stability analysis was carried out. Basic reproduction ratio ( More >

  • Open Access

    ARTICLE

    The Impact of Privacy Seal on Users’ Perception in Network Transactions

    Jing Chen,Yuchen Luo2,†, Ruiqi Du3,‡

    Computer Systems Science and Engineering, Vol.35, No.3, pp. 199-206, 2020, DOI:10.32604/csse.2020.35.199

    Abstract In the age of big data, the issue of online privacy has attracted much attention from all sectors. The introduction and establishment of an evaluation system for the privacy agreement based on a third party, together with the establishment of a safer internet transaction environment, can help to establish mutual trust between users and the platform. With the research background links to the online trading platform, this article investigates how the privacy seal which is provided by the third-party evaluation organization influences and addresses trust-awareness and privacy concerns of users, as well as exposing information… More >

  • Open Access

    ARTICLE

    "Data Mining of Urban New Energy Vehicles in an Intelligent Government Subsidy Environment Using Closed-Loop Supply Chain Pricing Model"

    Jing-Hua Zhao1,†, Da-Lin Zeng2,*, Ting-Wei Zhou1,‡, Ze-Chao Zhu1,§

    Computer Systems Science and Engineering, Vol.35, No.3, pp. 151-172, 2020, DOI:10.32604/csse.2020.35.151

    Abstract Given the government subsidies for new energy vehicles, this study is conducted to study the closed-loop supply chain comprising individual manufacturers, individual retailers and individual third-party recyclers. In this paper, combine the reality of new energy vehicles with the relevant research of game theory, and establish an no government subsidy model (Model N), a government subsidized consumer model (Model C), a government subsidized manufacturer model (Model M), a government subsidized third party recycler model (Model T), and a government subsidized retailer model (Model R) for quantitative research. Then, numerical examples are used to simulate the More >

  • Open Access

    ARTICLE

    An Improved Crow Search Based Intuitionistic Fuzzy Clustering Algorithm for Healthcare Applications

    Parvathavarthini S1,*, Karthikeyani Visalakshi N2, Shanthi S3, Madhan Mohan J4

    Intelligent Automation & Soft Computing, Vol.26, No.2, pp. 253-260, 2020, DOI:10.31209/2019.100000155

    Abstract Intuitionistic fuzzy clustering allows the uncertainties in data to be represented more precisely. Medical data usually possess a high degree of uncertainty and serve as the right candidate to be represented as Intuitionistic fuzzy sets. However, the selection of initial centroids plays a crucial role in determining the resulting cluster structure. Crow search algorithm is hybridized with Intuitionistic fuzzy C-means to attain better results than the existing hybrid algorithms. Still, the performance of the algorithm needs improvement with respect to the objective function and cluster indices especially with internal indices. In order to address these More >

  • Open Access

    ARTICLE

    Challenges and Growth as a Mental Health Professional from Volunteering Experiences in the Community Gambling Awareness Campaign

    So Yeon Yoo1, Yun-Jung Choi2,*, Youn-Joo Um2,*

    International Journal of Mental Health Promotion, Vol.22, No.2, pp. 83-91, 2020, DOI:10.32604/IJMHP.2020.011299 - 16 June 2020

    Abstract As the demand for high-quality mental health services increases, producing expert nurses with the skills and expertise to deal with various complex mental health situations involving diverse subjects is critical. Nursing programs should be prepared to provide education that can improve mental health professional competence. Using a qualitative study and focus group interviews, we focused on the experiences of nursing students who voluntarily participated in campaign activities to prevent gambling problems. The respondents were 23 nursing students who participated in the campaign for more than four months. Data were analyzed using Downe-Wamboldt’s eight steps of More >

  • Open Access

    ARTICLE

    Media and Mental Health Literacy: Do Mediated Interventions Enhance Mental Health Awareness? Implications and Policy Recommendations

    Arooj Arshad1,*, Mian Ahmad Hanan2,*, Noshina Saleem3, Saima Farzooq4, Remsha Fatima5

    International Journal of Mental Health Promotion, Vol.21, No.3, pp. 99-109, 2019, DOI:10.32604/IJMHP.2019.010834

    Abstract In the current digital era, public health campaigns using media has been very successful in giving knowledge and changes the attitudes of people. But till now scarce literature is available related to media campaigns about mental health. In this study Pre-Post Quasi Experimental Design using vignettes as a data collection measure were employed. The participants were categories in to experimental (n = 138) and control (n = 134) groups having 18–55 years of age to evaluate the efficiency of media mediated interventions using social media campaign in increasing Mental Health Literacy (MHL). The results from More >

Displaying 21-30 on page 3 of 33. Per Page