Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (77)
  • Open Access

    ARTICLE

    An Optimised Defensive Technique to Recognize Adversarial Iris Images Using Curvelet Transform

    K. Meenakshi1,*, G. Maragatham2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 627-643, 2023, DOI:10.32604/iasc.2023.026961 - 06 June 2022

    Abstract Deep Learning is one of the most popular computer science techniques, with applications in natural language processing, image processing, pattern identification, and various other fields. Despite the success of these deep learning algorithms in multiple scenarios, such as spam detection, malware detection, object detection and tracking, face recognition, and automatic driving, these algorithms and their associated training data are rather vulnerable to numerous security threats. These threats ultimately result in significant performance degradation. Moreover, the supervised based learning models are affected by manipulated data known as adversarial examples, which are images with a particular level… More >

  • Open Access

    ARTICLE

    A Component Selection Framework of Cohesion and Coupling Metrics

    Iyyappan. M1, Arvind Kumar1, Sultan Ahmad2,*, Sudan Jha3, Bader Alouffi4, Abdullah Alharbi5

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 351-365, 2023, DOI:10.32604/csse.2023.025163 - 01 June 2022

    Abstract Component-based software engineering is concerned with the development of software that can satisfy the customer prerequisites through reuse or independent development. Coupling and cohesion measurements are primarily used to analyse the better software design quality, increase the reliability and reduced system software complexity. The complexity measurement of cohesion and coupling component to analyze the relationship between the component module. In this paper, proposed the component selection framework of Hexa-oval optimization algorithm for selecting the suitable components from the repository. It measures the interface density modules of coupling and cohesion in a modular software system. This More >

  • Open Access

    ARTICLE

    Clustering building morphometrics using national spatial data

    Alessandro Araldi1, David Emsellem2, Giovanni Fusco1, Andrea Tettamanzi3, Denis Overal2

    Revue Internationale de Géomatique, Vol.31, No.2, pp. 265-302, 2022, DOI:10.3166/rig31.265-302

    Abstract The identification and description of building typologies play a fundamental role in the understanding of the overall built-up form. A growing body of research is developing and implementing sophisticated, computer-aided protocols for the identification of building typologies. This paper shares the same goal. An innovative data-driven procedure for the unsupervised identification and description of building types and organization is here presented. After a specific pre-processing procedure, we develop an unsupervised clustering combining a new algorithm of Naive Bayes inference and hierarchical ascendant approaches relying on six morphometric features of buildings. This protocol allows us to More >

  • Open Access

    REVIEW

    A Scientometric Analysis and Critical Review of Internet Gaming Disorder Behaviours

    Shirley Qi-Yu Sun1, Anson Chiu-Yan Tang2, Qing Wang1, Loretta Yuet-Foon Chung1,*, Regina Lai-Tong Lee3,4,*

    International Journal of Mental Health Promotion, Vol.24, No.6, pp. 795-810, 2022, DOI:10.32604/ijmhp.2022.024841 - 28 September 2022

    Abstract There are increasing concerns about internet gaming disorder (IGD). No review of existing studies has systematically analyzed and visualized the trends of IGD and those early identification of symptoms related to IGD behaviors. This critical review focuses on the emerging trends for early identification of symptoms related to IGD behaviors in papers published in Web of Science Core Collection from 2009 to 2021 by scientometric analysis and critical review. Scientometric data analysis technique includes co-occurrence analysis, cluster analysis and burst analysis of authors, countries, keywords and co-citation to visualize those contributing and associated factors to… More >

  • Open Access

    ARTICLE

    Age-trends in Cognitive Function and Quality of Life: Sex Differences in a Community Population in Taiwan

    Shu-Yu Wu1, Yu-Chi Huang1, Chi-Fa Hung1,2,3, Liang-Jen Wang4,*

    International Journal of Mental Health Promotion, Vol.24, No.6, pp. 989-998, 2022, DOI:10.32604/ijmhp.2022.022784 - 28 September 2022

    Abstract Population aging has developed into a significant area of concern in developed countries, especially in relation to the preservation of functional independence and the quality of life (QoL). However, information on the contribution of sex differences in quality of life and cognitive function is scarce. Therefore, this study aimed to investigate potential differences in cognitive function and QoL between males and females. For this study, we recruited 382 healthy subjects aged 19–79 years from communities in Southern Taiwan. Cognitive function and QoL were assessed using the UCSD Performance-based Skills Assessment, Brief Version (UPSA-B) and World… More >

  • Open Access

    ARTICLE

    Continuous Symmetry Analysis of the Effects of City Infrastructures on Invariant Metrics for House Market Volatilities

    Chien-Wen Lin1, Jen-Cheng Wang2, Bo-Yan Zhong3, Joe-Air Jiang4,5, Ya-Fen Wu6, Shao-Wei Leu1, Tzer-En Nee3,7,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.3, pp. 619-638, 2022, DOI:10.32604/cmes.2022.021324 - 03 August 2022

    Abstract The invariant metrics of the effects of park size and distance to public transportation on housing value volatilities in Boston, Milwaukee, Taipei and Tokyo are investigated. They reveal a Cobb-Douglas-like behavior. The scale-invariant exponents corresponding to the percentage of a green area (a) are 7.4, 8.41, 14.1 and 15.5 for Boston, Milwaukee, Taipei and Tokyo, respectively, while the corresponding direct distances to the nearest metro station (d) are −5, −5.88, −10 and −10, for Boston, Milwaukee, Taipei and Tokyo, respectively. The multiphysics-based analysis provides a powerful approach for the symmetry characterization of market engineering. The scaling… More >

  • Open Access

    ARTICLE

    Unconstrained Hand Dorsal Veins Image Database and Recognition System

    Mustafa M. Al Rifaee1,*, Mohammad M. Abdallah1, Mosa I. Salah2, Ayman M. Abdalla1

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5063-5073, 2022, DOI:10.32604/cmc.2022.030033 - 28 July 2022

    Abstract Hand veins can be used effectively in biometric recognition since they are internal organs that, in contrast to fingerprints, are robust under external environment effects such as dirt and paper cuts. Moreover, they form a complex rich shape that is unique, even in identical twins, and allows a high degree of freedom. However, most currently employed hand-based biometric systems rely on hand-touch devices to capture images with the desired quality. Since the start of the COVID-19 pandemic, most hand-based biometric systems have become undesirable due to their possible impact on the spread of the pandemic.… More >

  • Open Access

    ARTICLE

    A Proposed Biometric Authentication Model to Improve Cloud Systems Security

    Hosam El- El-Sofany1,2,*

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 573-589, 2022, DOI:10.32604/csse.2022.024302 - 20 April 2022

    Abstract Most user authentication mechanisms of cloud systems depend on the credentials approach in which a user submits his/her identity through a username and password. Unfortunately, this approach has many security problems because personal data can be stolen or recognized by hackers. This paper aims to present a cloud-based biometric authentication model (CBioAM) for improving and securing cloud services. The research study presents the verification and identification processes of the proposed cloud-based biometric authentication system (CBioAS), where the biometric samples of users are saved in database servers and the authentication process is implemented without loss of the… More >

  • Open Access

    ARTICLE

    Artificial Intelligence Techniques Based Learner Authentication in Cybersecurity Higher Education Institutions

    Abdullah Saad AL-Malaise AL-Ghamdi1, Mahmoud Ragab2,3,4,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3131-3144, 2022, DOI:10.32604/cmc.2022.026457 - 29 March 2022

    Abstract Education 4.0 is being authorized more and more by the design of artificial intelligence (AI) techniques. Higher education institutions (HEI) have started to utilize Internet technologies to improve the quality of the service and boost knowledge. Due to the unavailability of information technology (IT) infrastructures, HEI is vulnerable to cyberattacks. Biometric authentication can be used to authenticate a person based on biological features such as face, fingerprint, iris, and so on. This study designs a novel search and rescue optimization with deep learning based learning authentication technique for cybersecurity in higher education institutions, named SRODL-LAC… More >

  • Open Access

    ARTICLE

    EACR-LEACH: Energy-Aware Cluster-based Routing Protocol for WSN Based IoT

    Sankar Sennan1, Kirubasri1, Youseef Alotaibi2, Digvijay Pandey3,*, Saleh Alghamdi4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2159-2174, 2022, DOI:10.32604/cmc.2022.025773 - 29 March 2022

    Abstract Internet of Things (IoT) is a recent paradigm to improve human lifestyle. Nowadays, number devices are connected to the Internet drastically. Thus, the people can control and monitor the physical things in real-time without delay. The IoT plays a vital role in all kind of fields in our world such as agriculture, livestock, transport, and healthcare, grid system, connected home, elderly people carrying system, cypher physical system, retail, and intelligent systems. In IoT energy conservation is a challenging task, as the devices are made up of low-cost and low-power sensing devices and local processing. IoT… More >

Displaying 31-40 on page 4 of 77. Per Page