Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (128)
  • Open Access

    ARTICLE

    Building Information Modeling Based Automated Building Regulation Compliance Checking Asp.net Web Software

    Murat Aydın*

    Intelligent Automation & Soft Computing, Vol.28, No.1, pp. 11-25, 2021, DOI:10.32604/iasc.2021.015065 - 17 March 2021

    Abstract Building regulations used in the architecture, engineering, and construction sectors are legal documents prepared under the control of local authorities for use by individuals. These regulations determine the conditions for ensuring performance and quality throughout the entire construction process. The building regulation inspection process conducted with the traditional manual method is time-consuming and error-prone for architects, engineers, and local authorities. It is known that most of these inspections are carried out with municipalities by local authorities. The mutual interview study and literature review shows that there is no standard rule for the legal auditing process… More >

  • Open Access

    ARTICLE

    Web Application Commercial Design for Financial Entities Based on Business Intelligence

    Carlos Andrés Tavera Romero1,*, Jesus Hamilton Ortiz2, Osamah Ibrahim Khalaf3, Andrea Ríos Prado4

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3177-3188, 2021, DOI:10.32604/cmc.2021.014738 - 01 March 2021

    Abstract Multiple customer data management has become a focus of attention in big organizations. Although much information is available, it does not translate into significant profitable value-added services. We present a design of a commercial web application based on business intelligence that generates information on social and financial behavior of clients in an organization; with the purpose of obtain additional information that allows to get more profits. This app will provide a broader perspective for making strategic decisions to increase profits and reduce internal investment costs. A case in point is the financial sector, a group… More >

  • Open Access

    ARTICLE

    Estimating Security Risk of Healthcare Web Applications: A Design Perspective

    Fahad A. Alzahrani*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 187-209, 2021, DOI:10.32604/cmc.2021.014007 - 12 January 2021

    Abstract In the recent years, the booming web-based applications have attracted the hackers’ community. The security risk of the web-based hospital management system (WBHMS) has been increasing rapidly. In the given context, the main goal of all security professionals and website developers is to maintain security divisions and improve on the user’s confidence and satisfaction. At this point, the different WBHMS tackle different types of security risks. In WBHMS, the security of the patients’ medical information is of utmost importance. All in all, there is an inherent security risk of data and assets in the field… More >

  • Open Access

    ARTICLE

    Smart Object Detection and Home Appliances Control System in Smart Cities

    Sulaiman Khan1, Shah Nazir1, Habib Ullah Khan2,*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 895-915, 2021, DOI:10.32604/cmc.2021.013878 - 12 January 2021

    Abstract During the last decade the emergence of Internet of Things (IoT) based applications inspired the world by providing state of the art solutions to many common problems. From traffic management systems to urban cities planning and development, IoT based home monitoring systems, and many other smart applications. Regardless of these facilities, most of these IoT based solutions are data driven and results in small accuracy values for smaller datasets. In order to address this problem, this paper presents deep learning based hybrid approach for the development of an IoT-based intelligent home security and appliance control… More >

  • Open Access

    ARTICLE

    Technology Provides Better Document Search Results on Slovak Legislation Webpage as Result of a Simulation of Webpage Performance Parameters

    Peter Kvasnica*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 159-170, 2021, DOI:10.32604/cmc.2021.013587 - 12 January 2021

    Abstract This article acquaints the public with the insights gained from conducting document searches in the Slovak public administration information system, when supported by knowledge of its management. Additionally, it discusses the advantages of simulating performance parameters and comparing the obtained results with the real parameters of the eZbierka (eCollection) legislation webpage. This comparison was based upon simulated results, obtained through the Gatling simulation tool, versus those obtained from measuring the properties of the public administration legislation webpage. Both sets of data (simulated and real), were generated via the the document search technologies in place on… More >

  • Open Access

    ARTICLE

    Evaluating the Impact of Software Security Tactics: A Design Perspective

    Mamdouh Alenezi1, Abhishek Kumar Pandey2, Richa Verma3, Mohd Faizan2, Shalini Chandra3, Alka Agrawal2, Rajeev Kumar2,4,*, Raees Ahmad Khan2

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2283-2299, 2021, DOI:10.32604/cmc.2021.013579 - 28 December 2020

    Abstract Design architecture is the edifice that strengthens the functionalities as well as the security of web applications. In order to facilitate architectural security from the web application’s design phase itself, practitioners are now adopting the novel mechanism of security tactics. With the intent to conduct a research from the perspective of security tactics, the present study employs a hybrid multi-criteria decision-making approach named fuzzy analytic hierarchy process-technique for order preference by similarity ideal solution (AHP-TOPSIS) method for selecting and assessing multi-criteria decisions. The adopted methodology is a blend of fuzzy analytic hierarchy process (fuzzy AHP)… More >

  • Open Access

    ARTICLE

    Fuzzy Based Decision-Making Approach for Estimating Usable-Security of Healthcare Web Applications

    Fahad A. Alzahrani*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2599-2625, 2021, DOI:10.32604/cmc.2021.013124 - 28 December 2020

    Abstract Usability and security are often considered contradictory in nature. One has a negative impact on the other. In order to satisfy the needs of users with the security perspective, the relationship and trade-offs among security and usability must be distinguished. Security practitioners are working on developing new approaches that would help to secure healthcare web applications as well increase usability of the web applications. In the same league, the present research endeavour is premised on the usable-security of healthcare web applications. For a compatible blend of usability and security that would fulfill the users’ requirments,… More >

  • Open Access

    ARTICLE

    A Combinatorial Optimized Knapsack Linear Space for Information Retrieval

    Varghese S. Chooralil1, Vinodh P. Vijayan2, Biju Paul1, M. M. Anishin Raj3, B. Karthikeyan4,*, G. Manikandan4

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2891-2903, 2021, DOI:10.32604/cmc.2021.012796 - 28 December 2020

    Abstract Key information extraction can reduce the dimensional effects while evaluating the correct preferences of users during semantic data analysis. Currently, the classifiers are used to maximize the performance of web-page recommendation in terms of precision and satisfaction. The recent method disambiguates contextual sentiment using conceptual prediction with robustness, however the conceptual prediction method is not able to yield the optimal solution. Context-dependent terms are primarily evaluated by constructing linear space of context features, presuming that if the terms come together in certain consumer-related reviews, they are semantically reliant. Moreover, the more frequently they coexist, the… More >

  • Open Access

    ARTICLE

    A Novel Collective User Web Behavior Simulation Method

    Hongri Liu1,2,3, Xu Zhang1,3, Jingjing Li1,3, Bailing Wang1,3,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2539-2553, 2021, DOI:10.32604/cmc.2021.012213 - 28 December 2020

    Abstract

    A collective user web behavior simulation is an import means for generating a large-scale user network behavior in a network testbed or cyber range. Existing studies almost focus on individual web behavior analysis and prediction, which cannot simulate human dynamics that widely exist in large-scale users’ behaviors. To address these issues, we propose a novel collective user web behavior simulation method, in which an algorithm for constructing a connected virtual social network is proposed, and then a collective user web behavior simulation algorithm is designed on the virtual social network. In the simulation method, a

    More >

  • Open Access

    ARTICLE

    Functionality Aware Dynamic Composition of Web Services

    Mohemmed Sha*, Abdalla Alameen

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 201-211, 2021, DOI:10.32604/csse.2021.014513 - 23 December 2020

    Abstract The composition of the web service is a common technique to attain the best results of complex web tasks. The selection of appropriate web services, linking those services in the action flow and attaining the actual functionality of the task are the important factors to be considered. Even though different frameworks and methods have been proposed to dynamically compose web services, each method has its advantage and disadvantage over the other. Most of the methods give much importance to the Quality of Service (QoS) but fail to achieve the actual functionality after composition. This paper… More >

Displaying 81-90 on page 9 of 128. Per Page