Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    An Overview of Seismic Risk Management for Italian Architectural Heritage

    Lucio Nobile*

    Structural Durability & Health Monitoring, Vol.17, No.5, pp. 353-368, 2023, DOI:10.32604/sdhm.2023.028247

    Abstract The frequent occurrence of seismic events in Italy poses a strategic problem that involves either the culture of preservation of historical heritage or the civil protection action aimed to reduce the risk to people and goods (buildings, bridges, dams, slopes, etc.). Most of the Italian architectural heritage is vulnerable to earthquakes, identifying the vulnerability as the inherent predisposition of the masonry building to suffer damage and collapse during an earthquake. In fact, the structural concept prevailing in these ancient masonry buildings is aimed at ensuring prevalent resistance to vertical gravity loads. Rarely do these ancient masonry structures offer relevant resistance… More >

  • Open Access

    ARTICLE

    Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective

    Yoosef B. Abushark1, Asif Irshad Khan1,*, Fawaz Jaber Alsolami1, Abdulmohsen Almalawi1, Md Mottahir Alam2, Alka Agrawal3, Rajeev Kumar3,4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1203-1218, 2021, DOI:10.32604/cmc.2021.016610

    Abstract Most of the security strategies today are primarily designed to provide security protection, rather than to solve one of the basic security issues related to adequate software product architecture. Several models, frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life cycle. Therefore it is important to assess the usability of the popular security requirements engineering (SRE) approaches. A significant factor in the management and handling of successful security requirements is the assessment of security requirements engineering method performance. This assessment will allow changes to the engineering process of security requirements. The consistency… More >

  • Open Access

    ARTICLE

    Toward the Optimization of the Region-Based P300 Speller

    A. Benabid Najjar1,*, N. AlSahly2, R. AlShamass1, M. Hosny2

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1169-1189, 2021, DOI:10.32604/cmc.2021.014140

    Abstract Technology has tremendously contributed to improving communication and facilitating daily activities. Brain-Computer Interface (BCI) study particularly emerged from the need to serve people with disabilities such as Amyotrophic Lateral Sclerosis (ALS). However, with the advancements in cost-effective electronics and computer interface equipment, the BCI study is flourishing, and the exploration of BCI applications for people without disabilities, to enhance normal functioning, is increasing. Particularly, the P300-based spellers are among the most promising applications of the BCI technology. In this context, the region-based paradigm for P300 BCI spellers was introduced in an effort to reduce the crowding effect and adjacency problem… More >

Displaying 1-10 on page 1 of 3. Per Page