Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31)
  • Open Access

    ARTICLE

    Route Planning for Autonomous Transmission of Large Sport Utility Vehicle

    V. A. Vijayakumar*, J. Shanthini, S. Karthik, K. Srihari

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 659-669, 2023, DOI:10.32604/csse.2023.028400

    Abstract The autonomous driving aims at ensuring the vehicle to effectively sense the environment and use proper strategies to navigate the vehicle without the interventions of humans. Hence, there exist a prediction of the background scenes and that leads to discontinuity between the predicted and planned outputs. An optimal prediction engine is required that suitably reads the background objects and make optimal decisions. In this paper, the author(s) develop an autonomous model for vehicle driving using ensemble model for large Sport Utility Vehicles (SUVs) that uses three different modules involving (a) recognition model, (b) planning model and (c) prediction model. The… More >

  • Open Access

    ARTICLE

    An Optimized Method for Information System Transactions Based on Blockchain

    Jazem Mutared Alanazi, Ahmad Ali AlZubi*

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2289-2308, 2023, DOI:10.32604/iasc.2023.029181

    Abstract Accounting Information System (AIS), which is the foundation of any enterprise resource planning (ERP) system, is often built as centralized system. The technologies that allow the Internet-of-Value, which is built on five aspects that are network, algorithms, distributed ledger, transfers, and assets, are based on blockchain. Cryptography and consensus protocols boost the blockchain platform implementation, acting as a deterrent to cyber-attacks and hacks. Blockchain platforms foster innovation among supply chain participants, resulting in ecosystem development. Traditional business processes have been severely disrupted by blockchains since apps and transactions that previously required centralized structures or trusted third-parties to authenticate them may… More >

  • Open Access

    ARTICLE

    Game Theory Based Decision Coordination Strategy of Agricultural Logistics Service Information System

    Long Guo1, Dongsheng Sun1,*, Abdul Waheed2, Huijie Gao3

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 513-532, 2022, DOI:10.32604/cmc.2022.028211

    Abstract Under the background of “Internet plus” rapid development, the agricultural logistics industry should apply information technology to every link of the agricultural product logistics industry chain. By making full use of the decision making module of the agricultural logistics information system, we can realize the full sharing of information and data resources, which makes the decision-making scheme of the agricultural logistics information system more optimized. In real economic society, the uncertainty and mismatch between the customer’s logistics service demand and the logistics service capability that the logistics service function provider can provide, that is, when the two information are asymmetric,… More >

  • Open Access

    ARTICLE

    A Usability Management Framework for Securing Healthcare Information System

    Hosam Alhakami1, Abdullah Baz2, Wajdi Alhakami3, Abhishek Kumar Pandey4, Alka Agrawal4, Raees Ahmad Khan4,*

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1015-1030, 2022, DOI:10.32604/csse.2022.021564

    Abstract Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry play a significant role However, from the beginning, software security remains a serious issue for all levels of stakeholders. Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data, compromising the organizations’ reputation that translates into, financial losses and compromising software usability as well. Most of the data breaches are financially motivated, especially in the healthcare sector. The cyber… More >

  • Open Access

    ARTICLE

    Analysis and Design of University Teaching Equipment Management Information System

    Yu Xue1,2,*, Xiang Jiao1, Chishe Wang2 , Huanlun Chen1,4, Moayad Aloqaily3

    Journal of Cyber Security, Vol.3, No.3, pp. 177-185, 2021, DOI:10.32604/jcs.2021.016657

    Abstract Teaching equipment management is an important factor for colleges and universities to improve their teaching level, and its management level directly affects the service life and efficiency of teaching equipment. But in recent years, our university recruitment of students scale is increasing year by year, the size of the corresponding teaching equipment is also growing, therefore to develop a teaching equipment management information system is necessary, not only can help universities to effective use of the existing teaching resources, also can update scrap equipment, related equipment maintenance, and build a good learning environment to students and to the improvement of… More >

  • Open Access

    ARTICLE

    Modernization Framework to Enhance the Security of Legacy Information Systems

    Musawwer Khan1, Islam Ali1, Wasif Nisar1, Muhammad Qaiser Saleem2, Ali S. Ahmed2, Haysam E. Elamin3, Waqar Mehmood4, Muhammad Shafiq5,*

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 543-555, 2022, DOI:10.32604/iasc.2022.016120

    Abstract Due to various issues such as lack of agility, low performance, security issues, and high maintenance costs, the organization replaces its legacy information system (LIS). However, with the expansion of information technology, the security of the old system has received great attention. The protection of legacy data and information is critical to the organization. However, achieving safety through modernization, redevelopment, or redesign of LIS is a time-consuming and costly solution, especially in small and medium enterprises (SMEs). In addition, newly developed systems often lose inherent business rules, data integrity, and user trust. In this paper, we propose a Security Modernization… More >

  • Open Access

    ARTICLE

    Methods for the Efficient Energy Management in a Smart Mini Greenhouse

    Vasyl Teslyuk1,*, Ivan Tsmots1, Michal Gregus ml.2, Taras Teslyuk3, Iryna Kazymyra1

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3169-3187, 2022, DOI:10.32604/cmc.2022.019869

    Abstract To solve the problem of energy efficiency of modern enterprise it is necessary to reduce energy consumption. One of the possible ways is proposed in this research. A multi-level hierarchical system for energy efficiency management of the enterprise is designed, it is based on the modular principle providing rapid modernization. The novelty of the work is the development of new and improvement of the existing methods and models, in particular: 1) models for dynamic analysis of IT tools for data acquisition and processing (DAAP) in multilevel energy management systems, which are based on Petri nets; 2) method of synthesis of… More >

  • Open Access

    ARTICLE

    Deep Semisupervised Learning-Based Network Anomaly Detection in Heterogeneous Information Systems

    Nazarii Lutsiv1, Taras Maksymyuk1,*, Mykola Beshley1, Orest Lavriv1, Volodymyr Andrushchak1, Anatoliy Sachenko2, Liberios Vokorokos3, Juraj Gazda3

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 413-431, 2022, DOI:10.32604/cmc.2022.018773

    Abstract The extensive proliferation of modern information services and ubiquitous digitization of society have raised cybersecurity challenges to new levels. With the massive number of connected devices, opportunities for potential network attacks are nearly unlimited. An additional problem is that many low-cost devices are not equipped with effective security protection so that they are easily hacked and applied within a network of bots (botnet) to perform distributed denial of service (DDoS) attacks. In this paper, we propose a novel intrusion detection system (IDS) based on deep learning that aims to identify suspicious behavior in modern heterogeneous information systems. The proposed approach… More >

  • Open Access

    ARTICLE

    Self-Driving Algorithm and Location Estimation Method for Small Environmental Monitoring Robot in Underground Mines

    Heonmoo Kim, Yosoon Choi*

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.3, pp. 943-964, 2021, DOI:10.32604/cmes.2021.015300

    Abstract In underground mine environments where various hazards exist, such as tunnel collapse, toxic gases, the application of autonomous robots can improve the stability of exploration and efficiently perform repetitive exploratory operations. In this study, we developed a small autonomous driving robot for unmanned environmental monitoring in underground mines. The developed autonomous driving robot controls the steering according to the distance to the tunnel wall measured using the light detection and ranging sensor mounted on the robot to estimate its location by simultaneously considering the measured values of the inertial measurement unit and encoder sensors. In addition, the robot autonomously drives… More >

  • Open Access

    ARTICLE

    Security-Critical Components Recognition Algorithm for Complex Heterogeneous Information Systems

    Jinxin Zuo1,2, Yueming Lu1,2,*, Hui Gao2,3, Tong Peng1,2, Ziyv Guo2,3, Tong An1,2, Enjie Liu4

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2579-2595, 2021, DOI:10.32604/cmc.2021.016623

    Abstract With the skyrocketing development of technologies, there are many issues in information security quantitative evaluation (ISQE) of complex heterogeneous information systems (CHISs). The development of CHIS calls for an ISQE model based on security-critical components to improve the efficiency of system security evaluation urgently. In this paper, we summarize the implication of critical components in different filed and propose a recognition algorithm of security-critical components based on threat attack tree to support the ISQE process. The evaluation model establishes a framework for ISQE of CHISs that are updated iteratively. Firstly, with the support of asset identification and topology data, we… More >

Displaying 11-20 on page 2 of 31. Per Page