Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (105)
  • Open Access

    ARTICLE

    Smart Dynamic Traffic Monitoring and Enforcement System

    Youssef El-Hansali1, Fatma Outay2,*, Ansar Yasar1, Siham Farrag1,3, Muhammad Shoaib4, Muhammad Imran4, Hammad Hussain Awan5

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2797-2806, 2021, DOI:10.32604/cmc.2021.014812

    Abstract Enforcement of traffic rules and regulations involves a wide range of complex tasks, many of which demand the use of modern technologies. variable speed limits (VSL) control is to change the current speed limit according to the current traffic situation based on the observed traffic conditions. The aim of this study is to provide a simulation-based methodological framework to evaluate (VSL) as an effective Intelligent Transportation System (ITS) enforcement system. The focus of the study is on measuring the effectiveness of the dynamic traffic control strategy on traffic performance and safety considering various performance indicators such as total travel time,… More >

  • Open Access

    ARTICLE

    Modelling the Psychological Impact of COVID-19 in Saudi Arabia Using Machine Learning

    Mohammed A. Aleid1, Khaled A. Z. Alyamani2, Mohieddine Rahmouni2,3, Theyazn H. H. Aldhyani2,*, Nizar Alsharif4, Mohammed Y. Alzahrani4

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2029-2047, 2021, DOI:10.32604/cmc.2021.014873

    Abstract This article aims to assess health habits, safety behaviors, and anxiety factors in the community during the novel coronavirus disease (COVID-19) pandemic in Saudi Arabia based on primary data collected through a questionnaire with 320 respondents. In other words, this paper aims to provide empirical insights into the correlation and the correspondence between socio-demographic factors (gender, nationality, age, citizenship factors, income, and education), and psycho-behavioral effects on individuals in response to the emergence of this new pandemic. To focus on the interaction between these variables and their effects, we suggest different methods of analysis, comprising regression trees and support vector… More >

  • Open Access

    ARTICLE

    Atrocious Impinging of COVID-19 Pandemic on Software Development Industries

    Wajdi Alhakami1, Ahmed Binmahfoudh2, Abdullah Baz3, Hosam Alhakami4, Md Tarique Jamal Ansari5, Raees Ahmad Khan5,*

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 323-338, 2021, DOI:10.32604/csse.2021.014929

    Abstract COVID-19 is the contagious disease transmitted by Coronavirus. The majority of people diagnosed with COVID-19 may suffer from moderate-to- severe respiratory illnesses and stabilize without preferential treatment. Those who are most likely to experience significant infections include the elderly as well as people with a history of significant medical issues including heart disease, diabetes, or chronic breathing problems. The novel Coronavirus has affected not only the physical and mental health of the people but also had adverse impact on their emotional well-being. For months on end now, due to constant monitoring and containment measures to combat COVID-19, people have been… More >

  • Open Access

    ARTICLE

    Estimating the Impact of COVID-19 Pandemic on the Research Community in the Kingdom of Saudi Arabia

    Abdulaziz Attaallah1, Masood Ahmad2, Adil Hussain Seh2, Alka Agrawal2, Rajeev Kumar2,3,*, Raees Ahmad Khan2

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.1, pp. 419-436, 2021, DOI:10.32604/cmes.2021.014263

    Abstract Ever since its outbreak in Wuhan, COVID-19 has cloaked the entire world in a pall of despondency and uncertainty. The present study describes the exploratory analysis of all COVID cases in Saudi Arabia. Besides, the study has executed the forecasting model for predicting the possible number of COVID-19 cases in Saudi Arabia till a defined period. Towards this intent, the study analyzed different age groups of patients (child, adult, elderly) who were affected by COVID-19. The analysis was done city-wise and also included the number of recoveries recorded in different cities. Furthermore, the study also discusses the impact of COVID-19… More >

  • Open Access

    ARTICLE

    Research on the Optimization Design of Intersections for Safe Operation of Large Trucks

    Yujie Bao, Pincheng Wang*, Yuhang Li

    Journal of Information Hiding and Privacy Protection, Vol.2, No.3, pp. 143-154, 2020, DOI:10.32604/jihpp.2020.09759

    Abstract When big trucks are running at urban road intersections, they are easy to interfere with other motor vehicles, and the turning big trucks are easy to have conflicts with non-motor vehicles and pedestrians, which will affect the safety of intersections. This paper first studied the intersection of trucks to the running trajectory, on this basis, through the establishment of mathematical model analysis of large truck steering conditions inside the wheel, and the influence of blind area to the driver. In the research of intersection safety design, the safety design is divided into three parts: Entrance road, internal operation and signal… More >

  • Open Access

    ARTICLE

    Experimental Study on Permeability Characteristics of Geotubes for Seepage Analysis on Safety Assessment of Dams

    Xiaolei Man1,*, Ganggang Sha2, Shuigen Hu1, Hui Bao1, Guangying Liu1

    Structural Durability & Health Monitoring, Vol.14, No.4, pp. 339-353, 2020, DOI:10.32604/sdhm.2020.013001

    Abstract Geotubes are heterogeneous structures composed of filling sand and bag material, and its permeability characteristics are different from that of filling sand. The uncertainty of geotubes permeability characteristics results in the failure of seepage analysis of geotube dams, which restricts the safety assessment of the dams. As the basis of the study on the seepage mechanism of the geotubes, the influence of particle grading on permeability coefficient of filling sand and sand covered with geotextiles were explored by the permeability tests of filling sand with different particle grading under the condition of sand covered with or without geotextiles. And the… More >

  • Open Access

    ARTICLE

    Frequencies Rotation at High Sound Pressure Levels Toward Low Frequencies

    Hadi Negahdari1, Sirus Javadpour2,*, Faramarz Moattar3

    Sound & Vibration, Vol.54, No.4, pp. 237-246, 2020, DOI:10.32604/sv.2020.011086

    Abstract Today, analyzing of sound pressure level and frequency is considered as an important index in human society. Sound experts believe that analyzing of these parameters can help us to better understanding of work environments. Sound measurements and frequency analysis did to fix the harmful frequency in all sections in Shiraz gas power plant with sound analyzer model BSWA 308. The sound pressure levels (LP) and the one and one-third octave band were continuously measured in A and C weighting networks and slow mode for time response. Excel 2013 and Minitab 18.1 software used for statistical calculations. Results analyzed by Minitab… More >

  • Open Access

    ARTICLE

    Face Detection Method for Public Safety Surveillance based on Convex Grouping

    Jianhui Wu1,2, Feng Huang1,2, Wenjing Hu2,Wei He1,2, Bing Tu1,2, Longyuan Guo1,2, Xianfeng Ou1,2,*

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 327-334, 2018, DOI:10.32604/csse.2018.33.327

    Abstract Face detection is very important in video surveillance of public safety. This paper proposed a face detection method based on the best optimization convex grouping to detect the face regions from different face shape images at actual conditions. Firstly, the basic principle of convex grouping was discussed, the main rules of convex and the structure of the convex polygons was described. And then the best optimization convex grouping algorithm of the convex polygons was designed. At last, all of the algorithms, which used the best optimization convex grouping to detect the face region on the data set of MIT single… More >

  • Open Access

    ARTICLE

    The Lateral Conflict Risk Assessment for Low-altitude Training Airspace Using Weakly Supervised Learning Method

    Kaijun Xu1, Xueting Chen2, Yusheng Yao1, Shanshan Li1

    Intelligent Automation & Soft Computing, Vol.24, No.3, pp. 603-611, 2018, DOI:10.31209/2018.100000027

    Abstract The lateral conflict risk assessment of low-altitude training airspace strategic planning, which is based on the TSE errors has always been a difficult task for training flight research. In order to effectively evaluate the safety interval and lateral collision risk in training airspace, in this paper, TSE error performance using a weakly supervised learning method was modelled. First, the lateral probability density function of TSE is given by using a multidimensional random variable covariance matrix, and the risk model of a training flight lateral collision based on TSE error is established. The lateral conflict risk in specific training airspace is… More >

  • Open Access

    ARTICLE

    Comprehensive Information Security Evaluation Model Based on Multi-Level Decomposition Feedback for IoT

    Jinxin Zuo1, 3, Yueming Lu1, 3, *, Hui Gao2, 3, Ruohan Cao2, 3, Ziyv Guo2, 3, Jim Feng4

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 683-704, 2020, DOI:10.32604/cmc.2020.010793

    Abstract The development of the Internet of Things (IoT) calls for a comprehensive information security evaluation framework to quantitatively measure the safety score and risk (S&R) value of the network urgently. In this paper, we summarize the architecture and vulnerability in IoT and propose a comprehensive information security evaluation model based on multi-level decomposition feedback. The evaluation model provides an idea for information security evaluation of IoT and guides the security decision maker for dynamic protection. Firstly, we establish an overall evaluation indicator system that includes four primary indicators of threat information, asset, vulnerability, and management, respectively. It also includes eleven… More >

Displaying 71-80 on page 8 of 105. Per Page