Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (114)
  • Open Access

    ARTICLE

    Influence of Different Forest Management Techniques on the Quality of Wood

    Olga Grigoreva1,*, Elena Runova2, Alexei Alyabyev3, Edward Hertz4, Anna Voronova5, Viktor Ivanov2, Svetlana Shadrina6, Igor Grigorev7

    Journal of Renewable Materials, Vol.9, No.12, pp. 2175-2188, 2021, DOI:10.32604/jrm.2021.016387 - 22 June 2021

    Abstract The issue of accelerated forestry plantation with high-quality wood using the best soils in terms of productivity, fertilizers, and intensive treatment has become quite relevant due to increased demand for forestry products and higher requirements for environmentally friendly use of forest resources. This paper presents the results of a study on the impact of various techniques for treating coniferous plantations, including thinning, fertilization, and herbicide processing, on wood quality key indicators. The paper examined the wood density, correlation of early and late wood zones, and the cell wall thickness for 38-year-old pine trees grown on… More >

  • Open Access

    ARTICLE

    IoT Services: Realizing Private Real-Time Detection via Authenticated Conjunctive Searchable Encryption

    Chungen Xu1,*, Lin Mei1, Jinxue Cheng2, Yu Zhao1, Cong Zuo3

    Journal of Cyber Security, Vol.3, No.1, pp. 55-67, 2021, DOI:10.32604/jcs.2021.017217 - 30 April 2021

    Abstract With the rapid development of wireless communication technology, the Internet of Things is playing an increasingly important role in our everyday. The amount of data generated by sensor devices is increasing as a large number of connectable devices are deployed in many fields, including the medical, agricultural, and industrial areas. Uploading data to the cloud solves the problem of data overhead but results in privacy issues. Therefore, the question of how to manage the privacy of uploading data and make it available to be interconnected between devices is a crucial issue. In this paper, we More >

  • Open Access

    ARTICLE

    An Ensemble Approach to Identify Firearm Listing on Tor Hidden-Services

    Hashem Alyami1, Mohd Faizan2, Wael Alosaimi3, Abdullah Alharbi3, Abhishek Kumar Pandey2, Md Tarique Jamal Ansari4, Alka Agrawal2, Raees Ahmad Khan2,*

    Computer Systems Science and Engineering, Vol.38, No.2, pp. 141-149, 2021, DOI:10.32604/csse.2021.017039 - 23 April 2021

    Abstract The ubiquitous nature of the internet has made it easier for criminals to carry out illegal activities online. The sale of illegal firearms and weaponry on dark web cryptomarkets is one such example of it. To aid the law enforcement agencies in curbing the illicit trade of firearms on cryptomarkets, this paper has proposed an automated technique employing ensemble machine learning models to detect the firearms listings on cryptomarkets. In this work, we have used part-of-speech (PoS) tagged features in conjunction with n-gram models to construct the feature set for the ensemble model. We studied More >

  • Open Access

    ARTICLE

    A Link Analysis Algorithm for Identification of Key Hidden Services

    Abdullah Alharbi1, Mohd Faizan2, Wael Alosaimi1, Hashem Alyami3, Mohd Nadeem2, Suhel Ahmad Khan4, Alka Agrawal2, Raees Ahmad Khan2,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 877-886, 2021, DOI:10.32604/cmc.2021.016887 - 22 March 2021

    Abstract The Tor dark web network has been reported to provide a breeding ground for criminals and fraudsters who are exploiting the vulnerabilities in the network to carry out illicit and unethical activities. The network has unfortunately become a means to perpetuate crimes like illegal drugs and firearm trafficking, violence and terrorist activities among others. The government and law enforcement agencies are working relentlessly to control the misuse of Tor network. This is a study in the similar league, with an attempt to suggest a link-based ranking technique to rank and identify the influential hidden services More >

  • Open Access

    ARTICLE

    Impact of Tools and Techniques for Securing Consultancy Services

    Wael Alosaimi1, Abdullah Alharbi1, Hashem Alyami2, Masood Ahmad3, Abhishek Kumar Pandey3, Rajeev Kumar3,4,*, Raees Ahmad Khan3

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 347-360, 2021, DOI:10.32604/csse.2021.015284 - 08 March 2021

    Abstract In a digital world moving at a breakneck speed, consultancy services have emerged as one of the prominent resources for seeking effective, sustainable and economically viable solutions to a given crisis. The present day consultancy services are aided by the use of multiple tools and techniques. However, ensuring the security of these tools and techniques is an important concern for the consultants because even a slight malfunction of any tool could alter the results drastically. Consultants usually tackle these functions after establishing the clients’ needs and developing the appropriate strategy. Nevertheless, most of the consultants… More >

  • Open Access

    ARTICLE

    Computing the User Experience via Big Data Analysis: A Case of Uber Services

    Jang Hyun Kim1,2, Dongyan Nan1,*, Yerin Kim2, Min Hyung Park2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2819-2829, 2021, DOI:10.32604/cmc.2021.014922 - 01 March 2021

    Abstract As of 2020, the issue of user satisfaction has generated a significant amount of interest. Therefore, we employ a big data approach for exploring user satisfaction among Uber users. We develop a research model of user satisfaction by expanding the list of user experience (UX) elements (i.e., pragmatic, expectation confirmation, hedonic, and burden) by including more elements, namely: risk, cost, promotion, anxiety, sadness, and anger. Subsequently, we collect 125,768 comments from online reviews of Uber services and perform a sentiment analysis to extract the UX elements. The results of a regression analysis reveal the following:… More >

  • Open Access

    ARTICLE

    Integrity Assessment of Medical Devices for Improving Hospital Services

    Fahad A. Alzahrani1, Masood Ahmad2, Mohd Nadeem2, Rajeev Kumar2,3,*, Raees Ahmad Khan2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3619-3633, 2021, DOI:10.32604/cmc.2021.014869 - 01 March 2021

    Abstract The present study examines the various techniques being used to maintain the integrity of the medical devices, and develops a quantitative framework to list these in the sequence of priority. To achieve the intended objective, the study employs the combined procedure of Fuzzy Analytic Network Process (ANP) and Fuzzy Technical for Order Preference by Similarities to Ideal Solution (TOPSIS). We selected fuzzy based decision making techniques for assessing the integrity of medical devices. The suggested methodology was then used for classifying the suitable techniques used to evaluate the integrity of medical devices. Different techniques or… More >

  • Open Access

    ARTICLE

    State-Based Offloading Model for Improving Response Rate of IoT Services

    K. Sakthidasan1, Bhekisipho Twala2, S. Yuvaraj3, K. Vijayan3,*, S. Praveenkumar3, Prashant Mani4, C. Bharatiraja3

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3721-3735, 2021, DOI:10.32604/cmc.2021.014321 - 01 March 2021

    Abstract The Internet of Things (IoT) is a heterogeneous information sharing and access platform that provides services in a pervasive manner. Task and computation offloading in the IoT helps to improve the response rate and the availability of resources. Task offloading in a service-centric IoT environment mitigates the complexity in response delivery and request processing. In this paper, the state-based task offloading method (STOM) is introduced with a view to maximize the service response rate and reduce the response time of the varying request densities. The proposed method is designed using the Markov decision-making model to… More >

  • Open Access

    ARTICLE

    A Data Security Framework for Cloud Computing Services

    Luis-Eduardo Bautista-Villalpando1,*, Alain Abran2

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 203-218, 2021, DOI:10.32604/csse.2021.015437 - 01 March 2021

    Abstract Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloud-based technologies, such as the Internet of Things. With increasing industry adoption and migration of traditional computing services to the cloud, one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies. This work proposes a Data Security Framework for cloud computing services (CCS) that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques More >

  • Open Access

    ARTICLE

    Smart Object Detection and Home Appliances Control System in Smart Cities

    Sulaiman Khan1, Shah Nazir1, Habib Ullah Khan2,*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 895-915, 2021, DOI:10.32604/cmc.2021.013878 - 12 January 2021

    Abstract During the last decade the emergence of Internet of Things (IoT) based applications inspired the world by providing state of the art solutions to many common problems. From traffic management systems to urban cities planning and development, IoT based home monitoring systems, and many other smart applications. Regardless of these facilities, most of these IoT based solutions are data driven and results in small accuracy values for smaller datasets. In order to address this problem, this paper presents deep learning based hybrid approach for the development of an IoT-based intelligent home security and appliance control… More >

Displaying 71-80 on page 8 of 114. Per Page