Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (34)
  • Open Access

    ARTICLE

    Hesitant Fuzzy-Sets Based Decision-Making Model for Security Risk Assessment

    Ahmed S. Alfakeeh1, Abdulmohsen Almalawi2, Fawaz Jaber Alsolami2, Yoosef B. Abushark2, Asif Irshad Khan2,*, Adel Aboud S. Bahaddad1, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2297-2317, 2022, DOI:10.32604/cmc.2022.020146 - 27 September 2021

    Abstract Security is an important component in the process of developing healthcare web applications. We need to ensure security maintenance; therefore the analysis of healthcare web application's security risk is of utmost importance. Properties must be considered to minimise the security risk. Additionally, security risk management activities are revised, prepared, implemented, tracked, and regularly set up efficiently to design the security of healthcare web applications. Managing the security risk of a healthcare web application must be considered as the key component. Security is, in specific, seen as an add-on during the development process of healthcare web… More >

  • Open Access

    ARTICLE

    A New Random Forest Applied to Heavy Metal Risk Assessment

    Ziyan Yu1, Cong Zhang1,*, Naixue Xiong2, Fang Chen1

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 207-221, 2022, DOI:10.32604/csse.2022.018301 - 26 August 2021

    Abstract As soil heavy metal pollution is increasing year by year, the risk assessment of soil heavy metal pollution is gradually gaining attention. Soil heavy metal datasets are usually imbalanced datasets in which most of the samples are safe samples that are not contaminated with heavy metals. Random Forest (RF) has strong generalization ability and is not easy to overfit. In this paper, we improve the Bagging algorithm and simple voting method of RF. A W-RF algorithm based on adaptive Bagging and weighted voting is proposed to improve the classification performance of RF on imbalanced datasets.… More >

  • Open Access

    ARTICLE

    A Lightning Disaster Risk Assessment Model Based on SVM

    Jianqiao Sheng1, Mengzhu Xu2, Jin Han3,*, Xingyan Deng2

    Journal on Big Data, Vol.3, No.4, pp. 183-190, 2021, DOI:10.32604/jbd.2021.024892 - 20 December 2021

    Abstract Lightning disaster risk assessment, as an intuitive method to reflect the risk of regional lightning disasters, has aroused the research interest of many researchers. Nowadays, there are many schemes for lightning disaster risk assessment, but there are also some shortcomings, such as the resolution of the assessment is not clear enough, the accuracy rate cannot be verified, and the weight distribution has a strong subjective trend. This paper is guided by lightning disaster data and combines lightning data, population data and GDP data. Through support vector machine (SVM), it explores a way to combine More >

  • Open Access

    ARTICLE

    A Mortality Risk Assessment Approach on ICU Patients Clinical Medication Events Using Deep Learning

    Dejia Shi1, Hanzhong Zheng2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.128, No.1, pp. 161-181, 2021, DOI:10.32604/cmes.2021.014917 - 28 June 2021

    Abstract ICU patients are vulnerable to medications, especially infusion medications, and the rate and dosage of infusion drugs may worsen the condition. The mortality prediction model can monitor the real-time response of patients to drug treatment, evaluate doctors’ treatment plans to avoid severe situations such as inverse Drug-Drug Interactions (DDI), and facilitate the timely intervention and adjustment of doctor’s treatment plan. The treatment process of patients usually has a time-sequence relation (which usually has the missing data problem) in patients’ treatment history. The state-of-the-art method to model such time-sequence is to use Recurrent Neural Network (RNN).… More >

  • Open Access

    ARTICLE

    A Network Security Risk Assessment Method Based on a B_NAG Model

    Hui Wang1, Chuanhan Zhu1, Zihao Shen1,*, Dengwei Lin2, Kun Liu1, MengYao Zhao3

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 103-117, 2021, DOI:10.32604/csse.2021.014680 - 01 April 2021

    Abstract Computer networks face a variety of cyberattacks. Most network attacks are contagious and destructive, and these types of attacks can be harmful to society and computer network security. Security evaluation is an effective method to solve network security problems. For accurate assessment of the vulnerabilities of computer networks, this paper proposes a network security risk assessment method based on a Bayesian network attack graph (B_NAG) model. First, a new resource attack graph (RAG) and the algorithm E-Loop, which is applied to eliminate loops in the B_NAG, are proposed. Second, to distinguish the confusing relationships between… More >

  • Open Access

    ARTICLE

    A Novel Heuristic Algorithm for the Modeling and Risk Assessment of the COVID-19 Pandemic Phenomenon

    Panagiotis G. Asteris1,*, Maria G. Douvika1, Chrysoula A. Karamani1, Athanasia D. Skentou1, Katerina Chlichlia2, Liborio Cavaleri3, Tryfon Daras4, Danial J. Armaghani5, Theoklis E. Zaoutis6

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.2, pp. 815-828, 2020, DOI:10.32604/cmes.2020.013280 - 12 October 2020

    Abstract The modeling and risk assessment of a pandemic phenomenon such as COVID-19 is an important and complicated issue in epidemiology, and such an attempt is of great interest for public health decision-making. To this end, in the present study, based on a recent heuristic algorithm proposed by the authors, the time evolution of COVID-19 is investigated for six different countries/states, namely New York, California, USA, Iran, Sweden and UK. The number of COVID-19-related deaths is used to develop the proposed heuristic model as it is believed that the predicted number of daily deaths in each More >

  • Open Access

    ARTICLE

    Quantum Risk Assessment Model Based on Two Three-Qubit GHZ States

    Tao Zheng, Yan Chang, Shibin Zhang*

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.2, pp. 573-584, 2020, DOI:10.32604/cmes.2020.010445 - 20 July 2020

    Abstract With the acceleration of the construction of quantum communication networks, scholars have proposed different quantum communication protocols for different application scenarios. However, few scholars pay attention to the risk assessment process before communication. In this paper, we propose a novel quantum risk assessment model based on quantum teleportation technology with two three-qubit GHZ states. Only by using Bell states measurements (BSMs) and two-qubit projective measurements (PJMs), the communicators can recovery any arbitrary two-qubit state. This protocol can transmit two-dimension risk assessment factors with better security performance. On the one hand, more sufficient evaluation factors allow… More >

  • Open Access

    ARTICLE

    Preoperative Risk Assessment and Perioperative Management of Adults with Congenital Heart Disease Undergoing Non-Cardiac Surgery

    Michela Palma, Giancarlo Scognamiglio*, Flavia Fusco, Assunta Merola, Anna Correra, Diego Colonna, Emanuele Romeo, Berardo Sarubbi

    Congenital Heart Disease, Vol.15, No.1, pp. 33-49, 2020, DOI:10.32604/CHD.2020.011523 - 17 June 2020

    Abstract Adults with congenital heart disease (ACHD) constitute a growing population with complex cardiac physiopathology and frequent extra-cardiac involvement. The recent dramatic improvement of their life expectancy has resulted in an increasing proportion of ACHD patients requiring non-cardiac surgery. While a large body of evidence demonstrated the importance of an accurate risk assessment in patients with acquired heart disease before noncardiac surgery in order to reduce perioperative morbidity and mortality and detailed algorithms have been released by international societies, no specific guidelines are available for the perioperative management in this population. Nonetheless, understanding the complex anatomy… More >

  • Open Access

    ARTICLE

    Hip Fracture Risk Assessment Based on Different Failure Criteria Using QCT-Based Finite Element Modeling

    Hossein Bisheh1, 2, Yunhua Luo1, 3, Timon Rabczuk4, *

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 567-591, 2020, DOI:10.32604/cmc.2020.09393 - 01 May 2020

    Abstract Precise evaluation of hip fracture risk leads to reduce hip fracture occurrence in individuals and assist to check the effect of a treatment. A subject-specific QCT-based finite element model is introduced to evaluate hip fracture risk using the strain energy, von-Mises stress, and von-Mises strain criteria during the single-leg stance and the sideways fall configurations. Choosing a proper failure criterion in hip fracture risk assessment is very important. The aim of this study is to define hip fracture risk index using the strain energy, von Mises stress, and von Mises strain criteria and compare the… More >

  • Open Access

    ARTICLE

    Cyber-security Risk Assessment Framework for Critical Infrastructures

    Zubair Baig1, Sherali Zeadally2

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 121-129, 2019, DOI:10.31209/2018.100000049

    Abstract A critical infrastructure provides essential services to a nation’s population. Interruptions in its smooth operations are highly undesirable because they will cause significant and devastating consequences on all stakeholders in the society. In order to provide sustained protection to a nation’s critical infrastructure, we must continually assess and evaluate the risks thereof. We propose a risk assessment framework that can evaluate the risks posed to the security of a critical infrastructure from threat agents, with a special emphasis on the smart grid communications infrastructure. The framework defines finegrained risk identification to help quantify and assess More >

Displaying 21-30 on page 3 of 34. Per Page