Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Google Scholar University Ranking Algorithm to Evaluate the Quality of Institutional Research

    Noor Ul Sabah1, Muhammad Murad Khan1,*, Ramzan Talib1, Muhammad Anwar2, Muhammad Sheraz Arshad Malik3, Puteri Nor Ellyza Nohuddin4

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4955-4972, 2023, DOI:10.32604/cmc.2023.037436

    Abstract Education quality has undoubtedly become an important local and international benchmark for education, and an institute’s ranking is assessed based on the quality of education, research projects, theses, and dissertations, which has always been controversial. Hence, this research paper is influenced by the institutes ranking all over the world. The data of institutes are obtained through Google Scholar (GS), as input to investigate the United Kingdom’s Research Excellence Framework (UK-REF) process. For this purpose, the current research used a Bespoke Program to evaluate the institutes’ ranking based on their source. The bespoke program requires changes to improve the results by… More >

  • Open Access

    ARTICLE

    Selecting Best Software Vulnerability Scanner Using Intuitionistic Fuzzy Set TOPSIS

    Navneet Bhatt1, Jasmine Kaur2, Adarsh Anand2, Omar H. Alhazmi3,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3613-3629, 2022, DOI:10.32604/cmc.2022.026554

    Abstract Software developers endeavor to build their products with the least number of bugs. Despite this, many vulnerabilities are detected in software that threatens its integrity. Various automated software i.e., vulnerability scanners, are available in the market which helps detect and manage vulnerabilities in a computer, application, or a network. Hence, the choice of an appropriate vulnerability scanner is crucial to ensure efficient vulnerability management. The current work serves a dual purpose, first, to identify the key factors which affect the vulnerability discovery process in a network. The second, is to rank the popular vulnerability scanners based on the identified attributes.… More >

Displaying 1-10 on page 1 of 2. Per Page