Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (77)
  • Open Access

    ARTICLE

    Solid Model Generation and Shape Analysis of Human Crystalline Lens Using 3D Digitization and Scanning Techniques

    José Velázquez, Dolores Ojados, Adrián Semitiel, Francisco Cavas*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 1821-1837, 2025, DOI:10.32604/cmes.2025.071131 - 26 November 2025

    Abstract This research establishes a methodological framework for generating geometrically accurate 3D representations of human crystalline lenses through scanning technologies and digital reconstruction. Multiple scanning systems were evaluated to identify optimal approaches for point cloud processing and subsequent development of parameterized solid models, facilitating comprehensive morpho-geometric characterization. Experimental work was performed at the 3D Scanning Laboratory of SEDIC (Industrial Design and Scientific Calculation Service) at the Technical University of Cartagena, employing five distinct scanner types based on structured light, laser, and infrared technologies. Test specimens—including preliminary calibration using a lentil and biological analysis of a human… More >

  • Open Access

    ARTICLE

    A Quantum-Enhanced Biometric Fusion Network for Cybersecurity Using Face and Voice Recognition

    Abrar M. Alajlan1,*, Abdul Razaque2

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 919-946, 2025, DOI:10.32604/cmes.2025.071996 - 30 October 2025

    Abstract Biometric authentication provides a reliable, user-specific approach for identity verification, significantly enhancing access control and security against unauthorized intrusions in cybersecurity. Unimodal biometric systems that rely on either face or voice recognition encounter several challenges, including inconsistent data quality, environmental noise, and susceptibility to spoofing attacks. To address these limitations, this research introduces a robust multi-modal biometric recognition framework, namely Quantum-Enhanced Biometric Fusion Network. The proposed model strengthens security and boosts recognition accuracy through the fusion of facial and voice features. Furthermore, the model employs advanced pre-processing techniques to generate high-quality facial images and voice… More >

  • Open Access

    ARTICLE

    Augmented Deep-Feature-Based Ear Recognition Using Increased Discriminatory Soft Biometrics

    Emad Sami Jaha*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.3, pp. 3645-3678, 2025, DOI:10.32604/cmes.2025.068681 - 30 September 2025

    Abstract The human ear has been substantiated as a viable nonintrusive biometric modality for identification or verification. Among many feasible techniques for ear biometric recognition, convolutional neural network (CNN) models have recently offered high-performance and reliable systems. However, their performance can still be further improved using the capabilities of soft biometrics, a research question yet to be investigated. This research aims to augment the traditional CNN-based ear recognition performance by adding increased discriminatory ear soft biometric traits. It proposes a novel framework of augmented ear identification/verification using a group of discriminative categorical soft biometrics and deriving… More > Graphic Abstract

    Augmented Deep-Feature-Based Ear Recognition Using Increased Discriminatory Soft Biometrics

  • Open Access

    ARTICLE

    Deep Learning Models for Detecting Cheating in Online Exams

    Siham Essahraui1, Ismail Lamaakal1, Yassine Maleh2,*, Khalid El Makkaoui1, Mouncef Filali Bouami1, Ibrahim Ouahbi1, May Almousa3, Ali Abdullah S. AlQahtani4, Ahmed A. Abd El-Latif5,6

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3151-3183, 2025, DOI:10.32604/cmc.2025.067359 - 23 September 2025

    Abstract The rapid shift to online education has introduced significant challenges to maintaining academic integrity in remote assessments, as traditional proctoring methods fall short in preventing cheating. The increase in cheating during online exams highlights the need for efficient, adaptable detection models to uphold academic credibility. This paper presents a comprehensive analysis of various deep learning models for cheating detection in online proctoring systems, evaluating their accuracy, efficiency, and adaptability. We benchmark several advanced architectures, including EfficientNet, MobileNetV2, ResNet variants and more, using two specialized datasets (OEP and OP) tailored for online proctoring contexts. Our findings More >

  • Open Access

    ARTICLE

    Tamper Detection in Multimodal Biometric Templates Using Fragile Watermarking and Artificial Intelligence

    Fatima Abu Siryeh*, Hussein Alrammahi, Abdullahi Abdu İbrahim

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5021-5046, 2025, DOI:10.32604/cmc.2025.065206 - 30 July 2025

    Abstract Biometric template protection is essential for finger-based authentication systems, as template tampering and adversarial attacks threaten the security. This paper proposes a DCT-based fragile watermarking scheme incorporating AI-based tamper detection to improve the integrity and robustness of finger authentication. The system was tested against NIST SD4 and Anguli fingerprint datasets, wherein 10,000 watermarked fingerprints were employed for training. The designed approach recorded a tamper detection rate of 98.3%, performing 3–6% better than current DCT, SVD, and DWT-based watermarking approaches. The false positive rate (≤1.2%) and false negative rate (≤1.5%) were much lower compared to previous… More >

  • Open Access

    ARTICLE

    An Improved Chicken Swarm Optimization Techniques Based on Cultural Algorithm Operators for Biometric Access Control

    Jonathan Ponmile Oguntoye1, Sunday Adeola Ajagbe2,3,*, Oluyinka Titilayo Adedeji1, Olufemi Olayanju Awodoye1, Abigail Bola Adetunji1, Elijah Olusayo Omidiora1, Matthew Olusegun Adigun2

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5713-5732, 2025, DOI:10.32604/cmc.2025.062440 - 30 July 2025

    Abstract This study proposes a system for biometric access control utilising the improved Cultural Chicken Swarm Optimization (CCSO) technique. This approach mitigates the limitations of conventional Chicken Swarm Optimization (CSO), especially in dealing with larger dimensions due to diversity loss during solution space exploration. Our experimentation involved 600 sample images encompassing facial, iris, and fingerprint data, collected from 200 students at Ladoke Akintola University of Technology (LAUTECH), Ogbomoso. The results demonstrate the remarkable effectiveness of CCSO, yielding accuracy rates of 90.42%, 91.67%, and 91.25% within 54.77, 27.35, and 113.92 s for facial, fingerprint, and iris biometrics,… More >

  • Open Access

    ARTICLE

    Enhanced Kinship Verification through Ear Images: A Comparative Study of CNNs, Attention Mechanisms, and MLP Mixer Models

    Thien-Tan Cao, Huu-Thanh Duong, Viet-Tuan Le, Hau Nguyen Trung, Vinh Truong Hoang, Kiet Tran-Trung*

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4373-4391, 2025, DOI:10.32604/cmc.2025.061583 - 19 May 2025

    Abstract Kinship verification is a key biometric recognition task that determines biological relationships based on physical features. Traditional methods predominantly use facial recognition, leveraging established techniques and extensive datasets. However, recent research has highlighted ear recognition as a promising alternative, offering advantages in robustness against variations in facial expressions, aging, and occlusions. Despite its potential, a significant challenge in ear-based kinship verification is the lack of large-scale datasets necessary for training deep learning models effectively. To address this challenge, we introduce the EarKinshipVN dataset, a novel and extensive collection of ear images designed specifically for kinship… More >

  • Open Access

    ARTICLE

    A Novel Approach to Enhanced Cancelable Multi-Biometrics Personal Identification Based on Incremental Deep Learning

    Ali Batouche1, Souham Meshoul2,*, Hadil Shaiba3, Mohamed Batouche2,*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1727-1752, 2025, DOI:10.32604/cmc.2025.063227 - 16 April 2025

    Abstract The field of biometric identification has seen significant advancements over the years, with research focusing on enhancing the accuracy and security of these systems. One of the key developments is the integration of deep learning techniques in biometric systems. However, despite these advancements, certain challenges persist. One of the most significant challenges is scalability over growing complexity. Traditional methods either require maintaining and securing a growing database, introducing serious security challenges, or relying on retraining the entire model when new data is introduced—a process that can be computationally expensive and complex. This challenge underscores the… More >

  • Open Access

    ARTICLE

    EFI-SATL: An EfficientNet and Self-Attention Based Biometric Recognition for Finger-Vein Using Deep Transfer Learning

    Manjit Singh, Sunil Kumar Singla*

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 3003-3029, 2025, DOI:10.32604/cmes.2025.060863 - 03 March 2025

    Abstract Deep Learning-based systems for Finger vein recognition have gained rising attention in recent years due to improved efficiency and enhanced security. The performance of existing CNN-based methods is limited by the puny generalization of learned features and deficiency of the finger vein image training data. Considering the concerns of existing methods, in this work, a simplified deep transfer learning-based framework for finger-vein recognition is developed using an EfficientNet model of deep learning with a self-attention mechanism. Data augmentation using various geometrical methods is employed to address the problem of training data shortage required for a… More > Graphic Abstract

    EFI-SATL: An EfficientNet and Self-Attention Based Biometric Recognition for Finger-Vein Using Deep Transfer Learning

  • Open Access

    ARTICLE

    Fusion of Type-2 Neutrosophic Similarity Measure in Signatures Verification Systems: A New Forensic Document Analysis Paradigm

    Shahlaa Mashhadani1,*, Wisal Hashim Abdulsalam1, Oday Ali Hassen2, Saad M. Darwish3

    Intelligent Automation & Soft Computing, Vol.39, No.5, pp. 805-828, 2024, DOI:10.32604/iasc.2024.054611 - 31 October 2024

    Abstract Signature verification involves vague situations in which a signature could resemble many reference samples or might differ because of handwriting variances. By presenting the features and similarity score of signatures from the matching algorithm as fuzzy sets and capturing the degrees of membership, non-membership, and indeterminacy, a neutrosophic engine can significantly contribute to signature verification by addressing the inherent uncertainties and ambiguities present in signatures. But type-1 neutrosophic logic gives these membership functions fixed values, which could not adequately capture the various degrees of uncertainty in the characteristics of signatures. Type-1 neutrosophic representation is also… More >

Displaying 1-10 on page 1 of 77. Per Page