Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access


    Real-Time Multi Fractal Trust Evaluation Model for Efficient Intrusion Detection in Cloud

    S. Priya1, R. S. Ponmagal2,*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1895-1907, 2023, DOI:10.32604/iasc.2023.039814

    Abstract Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks. To address such threats towards cloud services, numerous techniques exist that mitigate the service threats according to different metrics. The rule-based approaches are unsuitable for new threats, whereas trust-based systems estimate trust value based on behavior, flow, and other features. However, the methods suffer from mitigating intrusion attacks at a higher rate. This article presents a novel Multi Fractal Trust Evaluation Model (MFTEM) to overcome these deficiencies. The method involves analyzing service growth,… More >

  • Open Access


    Employment Quality Evaluation Model Based on Hybrid Intelligent Algorithm

    Xianhui Gu1,*, Xiaokan Wang1, Shuang Liang2

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 131-139, 2023, DOI:10.32604/cmc.2023.028756

    Abstract In order to solve the defect of large error in current employment quality evaluation, an employment quality evaluation model based on grey correlation degree method and fuzzy C-means (FCM) is proposed. Firstly, it analyzes the related research work of employment quality evaluation, establishes the employment quality evaluation index system, collects the index data, and normalizes the index data; Then, the weight value of employment quality evaluation index is determined by Grey relational analysis method, and some unimportant indexes are removed; Finally, the employment quality evaluation model is established by using fuzzy cluster analysis algorithm, and compared with other employment quality… More >

  • Open Access


    Study on the Whole Process Simulation and Regulation Mechanism of Urban Green Ecological Rainwater Drainage System

    Lu Cao, Li Huang, Penghe Zhao, Yuling Liu*

    CMES-Computer Modeling in Engineering & Sciences, Vol.129, No.2, pp. 787-803, 2021, DOI:10.32604/cmes.2021.016226

    Abstract In view of the frequent waterlogging caused by rapid urbanization and the public’s dissatisfaction with the drainage system, the article based on the concept of the green ecological drainage system, constructed the urban green ecological drainage comprehensive simulation research system, and quickly evaluated pipe network operation and surface water of an industrial park under typical rainfall conditions. The results showed that the drainage capacity of the designed green ecological rainwater drainage system reached 100%, and there was no ponding phenomenon, which indicated that the green ecological rainwater drainage system could effectively solve the practical problems of urban drainage. The green… More >

  • Open Access


    Evaluation Model of Farmer Training Effect Based on AHP–A Case Study of Hainan Province

    Shengjie Li, Chaosheng Tang*

    Journal on Artificial Intelligence, Vol.3, No.2, pp. 55-62, 2021, DOI:10.32604/jai.2021.017408

    Abstract On the basis of studying the influencing factors of training effect evaluation, this paper constructs an AHP-fuzzy comprehensive evaluation model for farmers’ vocational training activities in Hainan Province to evaluate farmers’ training effect, which overcomes the limitations of traditional methods. Firstly, the content and index system of farmer training effect evaluation are established by analytic hierarchy process, and the weight value of each index is determined. Then, the fuzzy comprehensive evaluation (FCE) of farmer training effect is carried out by using multi-level FCE. The joint use of AHP and FCE improves the reliability and effectiveness of the evaluation process and… More >

  • Open Access


    A Model for the Optimization of the Shale Gas Horizontal Well Section Based on the Combination of Different Weighting Methods in the Frame of the Game Theory

    Minxuan Li1, Jing Sun1,*, Dehua Liu1, Yang Li1, Kuidong Li2, Wei Liu2, Jialin Xiao2, Jiani Hu3

    FDMP-Fluid Dynamics & Materials Processing, Vol.16, No.5, pp. 993-1005, 2020, DOI:10.32604/fdmp.2020.010443

    Abstract Existing “evaluation indicators” are selected and combined to build a model to support the optimization of shale gas horizontal wells. Towards this end, different “weighting methods”, including AHP and the so-called entropy method, are combined in the frame of the game theory. Using a relevant test case for the implementation of the model, it is shown that the horizontal section of the considered well is in the middle sweet spot area with good physical properties and fracturing ability. In comparison with the FSI (flow scanner Image) gas production profile, the new model seems to display better abilities for the optimization… More >

  • Open Access


    Deterministic Vessel Automatic Collision Avoidance Strategy Evaluation Modeling

    Liu Hongdan, Liu Qi, Sun Rong

    Intelligent Automation & Soft Computing, Vol.25, No.4, pp. 789-804, 2019, DOI:10.31209/2019.100000083

    Abstract Based on the concrete sailing parameters of the own vessel and the target vessel demarcate and the division of stages of vessel collision avoidance, the deterministic vessel automatic collision avoidance strategy evaluation model is constructed by the relevant factors which influence ships encounter dangerous situation. By means of inputting the relevant parameters of the collision avoidance strategy into the feasibility evaluation model, the estimated judging curves of the pivotal parameters of vessel collision avoidance can be validated, furthermore, the deterministic collision avoidance evaluation model for single vessel can be extended to the multi-vessels collision avoidance evaluation. Finally, by means of… More >

  • Open Access


    Comprehensive Information Security Evaluation Model Based on Multi-Level Decomposition Feedback for IoT

    Jinxin Zuo1, 3, Yueming Lu1, 3, *, Hui Gao2, 3, Ruohan Cao2, 3, Ziyv Guo2, 3, Jim Feng4

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 683-704, 2020, DOI:10.32604/cmc.2020.010793

    Abstract The development of the Internet of Things (IoT) calls for a comprehensive information security evaluation framework to quantitatively measure the safety score and risk (S&R) value of the network urgently. In this paper, we summarize the architecture and vulnerability in IoT and propose a comprehensive information security evaluation model based on multi-level decomposition feedback. The evaluation model provides an idea for information security evaluation of IoT and guides the security decision maker for dynamic protection. Firstly, we establish an overall evaluation indicator system that includes four primary indicators of threat information, asset, vulnerability, and management, respectively. It also includes eleven… More >

  • Open Access


    CM-Droid: Secure Container for Android Password Misuse Vulnerability

    Wen Zhang1, Keyue Li1,*, Tianyang Li1, Shaozhang Niu1, Zhenguang Gao2

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 181-198, 2019, DOI:10.32604/cmc.2019.05813

    Abstract Android applications are associated with a large amount of sensitive data, therefore application developers use encryption algorithms to provide user data encryption, authentication and data integrity protection. However, application developers do not have the knowledge of cryptography, thus the cryptographic algorithm may not be used correctly. As a result, security vulnerabilities are generated. Based on the previous studies, this paper summarizes the characteristics of password misuse vulnerability of Android application software, establishes an evaluation model to rate the security level of the risk of password misuse vulnerability and develops a repair strategy for password misuse vulnerability. And on this basis,… More >

Displaying 1-10 on page 1 of 8. Per Page