{"title":"Multi-Criteria Group Decision-Making Method Based on an Improved Single-Valued Neutrosophic Hamacher Weighted Average Operator and Grey Relational Analysis","authors":"Ye Mei, Jie Yang, Bo Chen","doi":"10.4236/jcc.2023.113013","DOIUrl":"https://doi.org/10.4236/jcc.2023.113013","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70935967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eric Michel Deussom Djomadji, Ivan Basile Kabiena, Joel Thibaut Mandengue, Felix Watching, E. Tonyé
{"title":"Okumura Hata Propagation Model Optimization in 400 MHz Band Based on Differential Evolution Algorithm: Application to the City of Bertoua","authors":"Eric Michel Deussom Djomadji, Ivan Basile Kabiena, Joel Thibaut Mandengue, Felix Watching, E. Tonyé","doi":"10.4236/jcc.2023.115005","DOIUrl":"https://doi.org/10.4236/jcc.2023.115005","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70936394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resilience and Stability in Organizations Employing Cloud Computing in the Financial Services Industry","authors":"D. Nguyen, Juliette Sondano","doi":"10.4236/jcc.2023.114006","DOIUrl":"https://doi.org/10.4236/jcc.2023.114006","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70936671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hierarchical Datacubes","authors":"Mickaël Martin Nevot, Sébastien Nedjar, L. Lakhal","doi":"10.4236/jcc.2023.116004","DOIUrl":"https://doi.org/10.4236/jcc.2023.116004","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70937722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Weighted Directed Dynamic Multiplexing Network of World Grain Trade Based on Improved MLP Framework","authors":"Shan Zhu, S. Gong","doi":"10.4236/jcc.2023.117012","DOIUrl":"https://doi.org/10.4236/jcc.2023.117012","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70938503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One of the technologies that have attracted the most attention recently across a variety of applications is the Internet of Things (IoT). The Internet of Things (IoT) is the combination of sensor, embedded computing, and communication technologies. The goal of the Internet of Things is to provide seamless services to anything, everywhere, at any time. The internet of things (IoT) technologies plays a vital role everywhere after the internet and information and communication technology, ushering in the fourth disruptive technology revolution (ICT). For real-time processing, communication, and monitoring, the smart items are linked together through wired or wireless connections. Implementing the IoT system presents security and privacy challenges since IoT devices are incompatible with current security standards based on tradition. This paper discusses IoT security strands, mitigation strategies, and privacy issues. This study’s major objective is to get more knowledge about security threats, mitigation techniques, and privacy concerns in IoT devices. The authors also mentioned a few cutting-edge technologies that can address general security problems. This study’s major objectives are to find research gaps in IoT security and match solution paradigms. The advent and rapid growth of the Internet of Things (IoT), which offers innumerable benefits, facilities, and applications including smart grids, smart homes, smart cities, and intelligent transportation systems (ITS), have an impact on everyone’s life. However, the deployment and use of sensing devices exposes IoT-based systems and applications to many security flaws and attacks. Furthermore, the lack of standardization brought on by the diversity of devices and technologies makes integrating security in the IoT a severe problem. The purpose of this review paper is to highlight the numerous security threats, challenges, and attacks that IoT-enabled applications face.
{"title":"Security Threads and IoT Security","authors":"Dona Alkunidry, Shahad Alhuwaysi, Rawan Alharbi","doi":"10.4236/jcc.2023.119005","DOIUrl":"https://doi.org/10.4236/jcc.2023.119005","url":null,"abstract":"One of the technologies that have attracted the most attention recently across a variety of applications is the Internet of Things (IoT). The Internet of Things (IoT) is the combination of sensor, embedded computing, and communication technologies. The goal of the Internet of Things is to provide seamless services to anything, everywhere, at any time. The internet of things (IoT) technologies plays a vital role everywhere after the internet and information and communication technology, ushering in the fourth disruptive technology revolution (ICT). For real-time processing, communication, and monitoring, the smart items are linked together through wired or wireless connections. Implementing the IoT system presents security and privacy challenges since IoT devices are incompatible with current security standards based on tradition. This paper discusses IoT security strands, mitigation strategies, and privacy issues. This study’s major objective is to get more knowledge about security threats, mitigation techniques, and privacy concerns in IoT devices. The authors also mentioned a few cutting-edge technologies that can address general security problems. This study’s major objectives are to find research gaps in IoT security and match solution paradigms. The advent and rapid growth of the Internet of Things (IoT), which offers innumerable benefits, facilities, and applications including smart grids, smart homes, smart cities, and intelligent transportation systems (ITS), have an impact on everyone’s life. However, the deployment and use of sensing devices exposes IoT-based systems and applications to many security flaws and attacks. Furthermore, the lack of standardization brought on by the diversity of devices and technologies makes integrating security in the IoT a severe problem. The purpose of this review paper is to highlight the numerous security threats, challenges, and attacks that IoT-enabled applications face.","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135799788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.4236/jcc.2023.1111001
Shridula Kapa
The Artificial Intelligence in the medical field has revolutionized the industry. Recently, A. I. has interested medical practitioners in applying innovation to healthcare systems. A. I. has еmеrgеd as a transformative forcе, revolutionizing the industry by leveraging advanced algorithms and computing powеr to еnhancе various aspects of hеalthcarе dеlivеry. The background highlights that artificial intelligence as innovation promises to transform how medical staffs manage patients and treat and diagnose patients. This comprehensive literature review to identify the relevant sources of information on A. I implementation in healthcare, focusing on the advantages and disadvantages. The obtained results from the materials provided valuable insights into the various means A. I. is used in the medical industry and its effects on patient care and recovery. The findings indicated that; A. I. streamlines Tedious Tasks since it is accurate and gives speedy services enabling early detection of illnesses and leading to positive patient outcomes. A. I. provides Real-Time Data which is essential in addressing patients’ conditions with clear objectives; the use of A. I. improves helps to reduce Burnout in medical practitioners. The use of A. I. helps provide Precision Medicine since it can obtain and analyze large amounts of information. The future directions encompass the implementation of the legal framework, enhancing transparency and accountability, and addressing challenges related to data standardization.
{"title":"The Role of Artificial Intelligence in the Medical Field","authors":"Shridula Kapa","doi":"10.4236/jcc.2023.1111001","DOIUrl":"https://doi.org/10.4236/jcc.2023.1111001","url":null,"abstract":"The Artificial Intelligence in the medical field has revolutionized the industry. Recently, A. I. has interested medical practitioners in applying innovation to healthcare systems. A. I. has еmеrgеd as a transformative forcе, revolutionizing the industry by leveraging advanced algorithms and computing powеr to еnhancе various aspects of hеalthcarе dеlivеry. The background highlights that artificial intelligence as innovation promises to transform how medical staffs manage patients and treat and diagnose patients. This comprehensive literature review to identify the relevant sources of information on A. I implementation in healthcare, focusing on the advantages and disadvantages. The obtained results from the materials provided valuable insights into the various means A. I. is used in the medical industry and its effects on patient care and recovery. The findings indicated that; A. I. streamlines Tedious Tasks since it is accurate and gives speedy services enabling early detection of illnesses and leading to positive patient outcomes. A. I. provides Real-Time Data which is essential in addressing patients’ conditions with clear objectives; the use of A. I. improves helps to reduce Burnout in medical practitioners. The use of A. I. helps provide Precision Medicine since it can obtain and analyze large amounts of information. The future directions encompass the implementation of the legal framework, enhancing transparency and accountability, and addressing challenges related to data standardization.","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135560646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low-Light Enhancer for UAV Night Tracking Based on Zero-DCE++","authors":"Yihong Zhang, Yinjian Li, Qin Lin","doi":"10.4236/jcc.2023.114001","DOIUrl":"https://doi.org/10.4236/jcc.2023.114001","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70936171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of B and Y Ions in Peptide MS/MS Spectra Based on Machine Learning","authors":"Xinming Li","doi":"10.4236/jcc.2023.113008","DOIUrl":"https://doi.org/10.4236/jcc.2023.113008","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70936271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Feature Discretization in Alarm and Fire Detection Systems Using Probabilistic Inference Models","authors":"J. Essien","doi":"10.4236/jcc.2023.117009","DOIUrl":"https://doi.org/10.4236/jcc.2023.117009","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70938522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}