Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    E-AAPIV: Merkle Tree-Based Real-Time Android Manifest Integrity Verification for Mobile Payment Security

    Mostafa Mohamed Ahmed Mohamed Alsaedy1,*, Atef Zaki Ghalwash1, Aliaa Abd Elhalim Yousif2, Safaa Magdy Azzam1

    Journal of Cyber Security, Vol.7, pp. 653-674, 2025, DOI:10.32604/jcs.2025.073547 - 24 December 2025

    Abstract Mobile financial applications and payment systems face significant security challenges from reverse engineering attacks. Attackers can decompile Android Package Kit (APK) files, modify permissions, and repackage applications with malicious capabilities. This work introduces E-AAPIV (Enhanced Android Apps Permissions Integrity Verifier), an advanced framework that uses Merkle Tree technology for real-time manifest integrity verification. The proposed system constructs cryptographic Merkle Tree from AndroidManifest.xml permission structures. It establishes secure client-server connections using Elliptic Curve Diffie-Hellman Protocol (ECDH-P384) key exchange. Root hashes are encrypted with Advanced Encryption Standard-256-Galois/Counter Mode (AES-256-GCM), integrated with hardware-backed Android Keystore for enhanced security. More >

  • Open Access

    ARTICLE

    Traffic Profiling and Secure Virtualized Data Handling of 5G Networks via MinIO Storage

    Khawaja Tahir Mehmood1,*, Muhammad Majid Hussain2

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5643-5670, 2025, DOI:10.32604/cmc.2025.068404 - 23 October 2025

    Abstract In the modern era of 5th generation (5G) networks, the data generated by User Equipments (UE) has increased significantly, with data file sizes varying from modest sensor logs to enormous multimedia files. In modern telecommunications networks, the need for high-end security and efficient management of these large data files is a great challenge for network designers. The proposed model provides the efficient real-time virtual data storage of UE data files (light and heavy) using an object storage system MinIO having inbuilt Software Development Kits (SDKs) that are compatible with Amazon (S3) Application Program Interface (API)… More >

  • Open Access

    ARTICLE

    An Efficient Text Recognition System from Complex Color Image for Helping the Visually Impaired Persons

    Ahmed Ben Atitallah1,*, Mohamed Amin Ben Atitallah2,3, Yahia Said4,5, Mohammed Albekairi1, Anis Boudabous6, Turki M. Alanazi1, Khaled Kaaniche1, Mohamed Atri7

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 701-717, 2023, DOI:10.32604/csse.2023.035871 - 20 January 2023

    Abstract The challenge faced by the visually impaired persons in their day-to-day lives is to interpret text from documents. In this context, to help these people, the objective of this work is to develop an efficient text recognition system that allows the isolation, the extraction, and the recognition of text in the case of documents having a textured background, a degraded aspect of colors, and of poor quality, and to synthesize it into speech. This system basically consists of three algorithms: a text localization and detection algorithm based on mathematical morphology method (MMM); a text extraction… More >

  • Open Access

    ARTICLE

    An Efficient HW/SW Design for Text Extraction from Complex Color Image

    Mohamed Amin Ben Atitallah1,2,3,*, Rostom Kachouri2, Ahmed Ben Atitallah4, Hassene Mnif1

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5963-5977, 2022, DOI:10.32604/cmc.2022.024345 - 14 January 2022

    Abstract In the context of constructing an embedded system to help visually impaired people to interpret text, in this paper, an efficient High-level synthesis (HLS) Hardware/Software (HW/SW) design for text extraction using the Gamma Correction Method (GCM) is proposed. Indeed, the GCM is a common method used to extract text from a complex color image and video. The purpose of this work is to study the complexity of the GCM method on Xilinx ZCU102 FPGA board and to propose a HW implementation as Intellectual Property (IP) block of the critical blocks in this method using HLS More >

  • Open Access

    ARTICLE

    Volatile compounds of unifloral honey and floral nectar from Quillaja saponaria

    Santander F1, C Fredes1, G Nuñez1, G Casaubon2, MI Espinoza2, G Montenegro1

    Phyton-International Journal of Experimental Botany, Vol.83, pp. 17-26, 2014, DOI:10.32604/phyton.2014.83.017

    Abstract Currently, the search for chemical markers related to the botanical origin of honey is an important issue because of its potential use as a complementary tool for melisopalinological analysis. The objective of this research was to compare the (1) volatile compounds of Quillaja saponaria Mol. (Fam. Quillajaceae) floral nectar with those of unifloral honey of this same species, and (2) volatile compounds in Q. saponaria honeys from the same geographical origin. For the identification and semiquantification of volatile compounds, Gas Chromatography with Mass Spectrometry (GC-MS) was performed. The nectar of Q. saponaria presented volatile compounds different from the… More >

Displaying 1-10 on page 1 of 5. Per Page