Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (623)
  • Open Access

    ARTICLE

    Estimating Security Risk of Healthcare Web Applications: A Design Perspective

    Fahad A. Alzahrani*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 187-209, 2021, DOI:10.32604/cmc.2021.014007 - 12 January 2021

    Abstract In the recent years, the booming web-based applications have attracted the hackers’ community. The security risk of the web-based hospital management system (WBHMS) has been increasing rapidly. In the given context, the main goal of all security professionals and website developers is to maintain security divisions and improve on the user’s confidence and satisfaction. At this point, the different WBHMS tackle different types of security risks. In WBHMS, the security of the patients’ medical information is of utmost importance. All in all, there is an inherent security risk of data and assets in the field… More >

  • Open Access

    ARTICLE

    Machine Learning Empowered Security Management and Quality of Service Provision in SDN-NFV Environment

    Shumaila Shahzadi1, Fahad Ahmad1,*, Asma Basharat1, Madallah Alruwaili2, Saad Alanazi2, Mamoona Humayun2, Muhammad Rizwan1, Shahid Naseem3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2723-2749, 2021, DOI:10.32604/cmc.2021.014594 - 28 December 2020

    Abstract With the rising demand for data access, network service providers face the challenge of growing their capital and operating costs while at the same time enhancing network capacity and meeting the increased demand for access. To increase efficacy of Software Defined Network (SDN) and Network Function Virtualization (NFV) framework, we need to eradicate network security configuration errors that may create vulnerabilities to affect overall efficiency, reduce network performance, and increase maintenance cost. The existing frameworks lack in security, and computer systems face few abnormalities, which prompts the need for different recognition and mitigation methods to… More >

  • Open Access

    ARTICLE

    Research on Electronic Document Management System Based on Cloud Computing

    Jin Han1, Cheng Wang2, Jie Miao3, Mingxin Lu3, Yingchun Wang4, Jin Shi3,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2645-2654, 2021, DOI:10.32604/cmc.2021.014371 - 28 December 2020

    Abstract With the development of information technology, cloud computing technology has brought many conveniences to all aspects of work and life. With the continuous promotion, popularization and vigorous development of e-government and e-commerce, the number of documents in electronic form is getting larger and larger. Electronic document is an indispensable main tool and real record of e-government and business activities. How to scientifically and effectively manage electronic documents? This is an important issue faced by governments and enterprises in improving management efficiency, protecting state secrets or business secrets, and reducing management costs. This paper discusses the… More >

  • Open Access

    ARTICLE

    Prediction of COVID-19 Cases Using Machine Learning for Effective Public Health Management

    Fahad Ahmad1,*, Saleh N. Almuayqil2, Mamoona Humayun2, Shahid Naseem3, Wasim Ahmad Khan4, Kashaf Junaid5

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2265-2282, 2021, DOI:10.32604/cmc.2021.013067 - 28 December 2020

    Abstract COVID-19 is a pandemic that has affected nearly every country in the world. At present, sustainable development in the area of public health is considered vital to securing a promising and prosperous future for humans. However, widespread diseases, such as COVID-19, create numerous challenges to this goal, and some of those challenges are not yet defined. In this study, a Shallow Single-Layer Perceptron Neural Network (SSLPNN) and Gaussian Process Regression (GPR) model were used for the classification and prediction of confirmed COVID-19 cases in five geographically distributed regions of Asia with diverse settings and environmental… More >

  • Open Access

    ARTICLE

    Internet of Things Enabled Intelligent Energy Management and Control System for Heavy Equipment Industrial Park and Fuzzy Assessment of Its Schemes

    Jia Zhu*

    Energy Engineering, Vol.118, No.2, pp. 379-397, 2021, DOI:10.32604/EE.2021.014178 - 23 December 2020

    Abstract In order to solve the problems of poor information flow, low energy utilization rate and energy consumption data reuse in the heavy equipment industrial park, the Internet of Things (IoT) technology is applied to construct the intelligent energy management and control system (IEMCS). The application architecture and function module planning are analyzed and designed. Furthermore, the IEMCS scheme is not unique due to the fuzziness of customer demand and the understanding deviation of designer to customer demand in the design stage. Scheme assessment is of great significance for the normal subsequent implementation of the system.… More >

  • Open Access

    ARTICLE

    Contemporary Patterns of Management of Tetralogy of Fallot: Data from a Single Center in China

    Xianchao Jiang1, Jinyang Liu1, Bo Peng1, Heng Zhang2, Shoujun Li1, Jun Yan1, Qiang Wang1,2,*

    Congenital Heart Disease, Vol.16, No.1, pp. 53-64, 2021, DOI:10.32604/CHD.2021.013233 - 23 December 2020

    Abstract Background: There is scarce research on large cohorts with tetralogy of Fallot (TOF) from China. The database in Fuwai Hospital was reviewed to ascertain current trends in the management of TOF and to determine the prevalence of various surgical techniques and the optimal early outcome. Methods: This cross-sectional study included 1861 patients who underwent surgery between 2012 and 2017 and were aged 0-18 years old with a primary diagnosis of TOF. A total of 1760 eligible patients were included in the analyses. Results: A total of 1683 patients underwent repair of TOF as a one-stage operation (primary… More >

  • Open Access

    ARTICLE

    Fuzzy Adaptive Filtering-Based Energy Management for Hybrid Energy Storage System

    Xizheng Zhang1,2,*, Zhangyu Lu1, Chongzhuo Tan1, Zeyu Wang1

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 117-130, 2021, DOI:10.32604/csse.2021.014081 - 23 December 2020

    Abstract Regarding the problem of the short driving distance of pure electric vehicles, a battery, super-capacitor, and DC/DC converter are combined to form a hybrid energy storage system (HESS). A fuzzy adaptive filtering-based energy management strategy (FAFBEMS) is proposed to allocate the required power of the vehicle. Firstly, the state of charge (SOC) of the super-capacitor is limited according to the driving/braking mode of the vehicle to ensure that it is in a suitable working state, and fuzzy rules are designed to adaptively adjust the filtering time constant, to realize reasonable power allocation. Then, the positive… More >

  • Open Access

    ARTICLE

    Hajj Crowd Management Using CNN-Based Approach

    Waleed Albattah1,*, Muhammad Haris Kaka Khel2, Shabana Habib1, Muhammad Islam3, Sheroz Khan3,4, Kushsairy Abdul Kadir2

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 2183-2197, 2021, DOI:10.32604/cmc.2020.014227 - 26 November 2020

    Abstract Hajj as the Muslim holy pilgrimage, attracts millions of humans to Mecca every year. According to statists, the pilgrimage has attracted close to 2.5 million pilgrims in 2019, and at its peak, it has attracted over 3 million pilgrims in 2012. It is considered as the world’s largest human gathering. Safety makes one of the main concerns with regards to managing the large crowds and ensuring that stampedes and other similar overcrowding accidents are avoided. This paper presents a crowd management system using image classification and an alarm system for managing the millions of crowds… More >

  • Open Access

    ARTICLE

    A New Database Intrusion Detection Approach Based on Hybrid Meta-Heuristics

    Youseef Alotaibi*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1879-1895, 2021, DOI:10.32604/cmc.2020.013739 - 26 November 2020

    Abstract A new secured database management system architecture using intrusion detection systems (IDS) is proposed in this paper for organizations with no previous role mapping for users. A simple representation of Structured Query Language queries is proposed to easily permit the use of the worked clustering algorithm. A new clustering algorithm that uses a tube search with adaptive memory is applied to database log files to create users’ profiles. Then, queries issued for each user are checked against the related user profile using a classifier to determine whether or not each query is malicious. The IDS… More >

  • Open Access

    ARTICLE

    Real Estate Management via a Decentralized Blockchain Platform

    Iftikhar Ahmad1,*, Mohammed A. Alqarni2, Abdulwahab Ali Almazroi3, Laiba Alam1

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1813-1822, 2021, DOI:10.32604/cmc.2020.013048 - 26 November 2020

    Abstract Blockchain technology is one of the key technological breakthroughs of the last decade. It has the ability to revolutionize numerous aspects of society, including financial systems, healthcare, e-government and many others. One such area that is able to reap the benefits of blockchain technology is the real estate industry. Like many other industries, real estate faces major administrative problems such as high transaction fees, a lack of transparency, fraud and the effects of a middleman including undue influence and commissions. Blockchain enables supporting technologies to overcome the obstacles inherent within the real estate investment market.… More >

Displaying 421-430 on page 43 of 623. Per Page