Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (113)
  • Open Access

    ARTICLE

    Deep Learning Based Intrusion Detection in Cloud Services for Resilience Management

    S. Sreenivasa Chakravarthi1,*, R. Jagadeesh Kannan2, V. Anantha Natarajan3, Xiao-Zhi Gao4

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5117-5133, 2022, DOI:10.32604/cmc.2022.022351 - 14 January 2022

    Abstract In the global scenario one of the important goals for sustainable development in industrial field is innovate new technology, and invest in building infrastructure. All the developed and developing countries focus on building resilient infrastructure and promote sustainable developments by fostering innovation. At this juncture the cloud computing has become an important information and communication technologies model influencing sustainable development of the industries in the developing countries. As part of the innovations happening in the industrial sector, a new concept termed as ‘smart manufacturing’ has emerged, which employs the benefits of emerging technologies like internet… More >

  • Open Access

    ARTICLE

    Efficacy of a Community-Based Trauma Recovery Program after a Fire Disaster

    Yun-Jung Choi1, Mi-Ra Won2, Dong-Hee Cho1,*

    International Journal of Mental Health Promotion, Vol.24, No.1, pp. 85-94, 2022, DOI:10.32604/ijmhp.2022.018017 - 20 December 2021

    Abstract As industries develop, fire disasters and their associated damage are increasing. Investigating the mental health of victims is imperative because this is an essential issue for community recovery after a disaster. This study was conducted to determine the efficacy of a program implemented by a community mental health center based on the investigation of the victims’ depression and post-traumatic stress disorder (PTSD) levels immediately after the disaster and at one-year follow-up. As a result, victims’ depression and PTSD recovered over time, and more changes were confirmed. In particular, the high-risk group for PTSD showed a More >

  • Open Access

    ARTICLE

    Intelligent Model for Predicting the Quality of Services Violation

    Muhammad Adnan Khan1,2, Asma Kanwal3, Sagheer Abbas3, Faheem Khan4, T. Whangbo4,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3607-3619, 2022, DOI:10.32604/cmc.2022.023480 - 07 December 2021

    Abstract Cloud computing is providing IT services to its customer based on Service level agreements (SLAs). It is important for cloud service providers to provide reliable Quality of service (QoS) and to maintain SLAs accountability. Cloud service providers need to predict possible service violations before the emergence of an issue to perform remedial actions for it. Cloud users’ major concerns; the factors for service reliability are based on response time, accessibility, availability, and speed. In this paper, we, therefore, experiment with the parallel mutant-Particle swarm optimization (PSO) for the detection and predictions of QoS violations in More >

  • Open Access

    ARTICLE

    Energy-Related Services as a Business: Eco-Transformation Logic to Support the Low-Carbon Transition

    Oleksandr Kovalko1, Tatiana Eutukhova2, Oleksandr Novoseltsev3,*

    Energy Engineering, Vol.119, No.1, pp. 103-121, 2022, DOI:10.32604/EE.2022.017709 - 22 November 2021

    Abstract The transition to low-carbon development has been recognized as one of the most important directions for the transformation of national economies in most countries. Today we can identify two of the most common service-oriented logical models of this transition. These are models of Service-Dominant Logic and Product-Service Systems that are used in this study to create a service-oriented platform for stimulating business development in the field of energy-related (ER) services. The establishment of such a platform is being considered based on the conceptual provisions of the global business ecosystem. Such a platform has been found… More >

  • Open Access

    ARTICLE

    Interactive Middleware Services for Heterogeneous Systems

    Vasanthi Raghupathy1,*, Osamah Ibrahim Khalaf2, Carlos Andrés Tavera Romero3, Sudhakar Sengan4, Dilip Kumar Sharma5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1241-1253, 2022, DOI:10.32604/csse.2022.021997 - 10 November 2021

    Abstract Computing has become more invisible, widespread and ubiquitous since the inception of the Internet of Things (IoT) and Web of Things. Multiple devices that surround us meet user’s requirements everywhere. Multiple Middleware Framework (MF) designs have come into existence because of the rapid development of interactive services in Heterogeneous Systems. This resulted in the delivery of interactive services throughout Heterogeneous Environments (HE). Users are given free navigation between devices in a widespread environment and continuously interact with each other from any chosen device. Numerous interactive devices with recent interactive platforms (for example, Smart Phones, Mobile… More >

  • Open Access

    ARTICLE

    DDoS Detection in SDN using Machine Learning Techniques

    Muhammad Waqas Nadeem, Hock Guan Goh*, Vasaki Ponnusamy, Yichiet Aun

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 771-789, 2022, DOI:10.32604/cmc.2022.021669 - 03 November 2021

    Abstract Software-defined network (SDN) becomes a new revolutionary paradigm in networks because it provides more control and network operation over a network infrastructure. The SDN controller is considered as the operating system of the SDN based network infrastructure, and it is responsible for executing the different network applications and maintaining the network services and functionalities. Despite all its tremendous capabilities, the SDN face many security issues due to the complexity of the SDN architecture. Distributed denial of services (DDoS) is a common attack on SDN due to its centralized architecture, especially at the control layer of… More >

  • Open Access

    ARTICLE

    Automatic License Plate Recognition System for Vehicles Using a CNN

    Parneet Kaur1, Yogesh Kumar1, Shakeel Ahmed2,*, Abdulaziz Alhumam2, Ruchi Singla3, Muhammad Fazal Ijaz4

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 35-50, 2022, DOI:10.32604/cmc.2022.017681 - 03 November 2021

    Abstract Automatic License Plate Recognition (ALPR) systems are important in Intelligent Transportation Services (ITS) as they help ensure effective law enforcement and security. These systems play a significant role in border surveillance, ensuring safeguards, and handling vehicle-related crime. The most effective approach for implementing ALPR systems utilizes deep learning via a convolutional neural network (CNN). A CNN works on an input image by assigning significance to various features of the image and differentiating them from each other. CNNs are popular for license plate character recognition. However, little has been reported on the results of these systems with More >

  • Open Access

    ARTICLE

    Fully Authentication Services Scheme for NFC Mobile Payment Systems

    Munefah Alshammari*, Shadi Nashwan

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 401-428, 2022, DOI:10.32604/iasc.2022.022065 - 26 October 2021

    Abstract One commonly used wireless communication technology is Near-Field Communication (NFC). Smartphones that support this technology are used in contactless payment systems as identification devices to emulate credit cards. This technology has essentially focused on the quality of communication services and has somewhat disregarded security services. Communication messages between smartphones, the point of sale (POS), and service providers are susceptible to attack due to existing weaknesses, including that an adversary can access, block and modify the transmitted messages to achieve illegal goals. Therefore, there have been many research proposals in regards to authentication schemes for NFC… More >

  • Open Access

    ARTICLE

    Evaluating the Impacts of Security-Durability Characteristic: Data Science Perspective

    Abdullah Alharbi1, Masood Ahmad2, Wael Alosaimi1, Hashem Alyami3, Alka Agrawal2, Rajeev Kumar4,*, Abdul Wahid5, Raees Ahmad Khan2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 557-567, 2022, DOI:10.32604/csse.2022.020843 - 25 October 2021

    Abstract Security has always been a vital research topic since the birth of web application. A great deal of research has been conducted to determine the ways of identifying and classifying security issues or goals However, in the recent years, it has been noticed that high secure web applications have less durability; thus reducing their business continuity. High security features of a web application are worthless unless they provide effective services to the user and meet the standards of commercial viability. Hence, there is a need to bridge the gap between security and durability of the… More >

  • Open Access

    ARTICLE

    Hybrid Metaheuristics Web Service Composition Model for QoS Aware Services

    P. Rajeswari*, K. Jayashree

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 511-524, 2022, DOI:10.32604/csse.2022.020352 - 25 October 2021

    Abstract Recent advancements in cloud computing (CC) technologies signified that several distinct web services are presently developed and exist at the cloud data centre. Currently, web service composition gains maximum attention among researchers due to its significance in real-time applications. Quality of Service (QoS) aware service composition concerned regarding the election of candidate services with the maximization of the whole QoS. But these models have failed to handle the uncertainties of QoS. The resulting QoS of composite service identified by the clients become unstable and subject to risks of failing composition by end-users. On the other… More >

Displaying 51-60 on page 6 of 113. Per Page