Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (86)
  • Open Access

    ARTICLE

    Cancelable Speaker Identification System Based on Optical-Like Encryption Algorithms

    Safaa El-Gazar1, Walid El-Shafai2,3,*, Ghada El-Banby4, Hesham F. A. Hamed1, Gerges M. Salama1, Mohammed Abd-Elnaby5, Fathi E. Abd El-Samie2,6

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 87-102, 2022, DOI:10.32604/csse.2022.022722 - 23 March 2022

    Abstract Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last decades. It achieves safe access to systems using biometrics instead of the traditional passwords. The utilization of a biometric in its original format makes it usable only once. Therefore, a cancelable biometric template should be used, so that it can be replaced when it is attacked. Cancelable biometrics aims to enhance the security and privacy of biometric authentication. Digital encryption is an efficient technique to be used in order to generate cancelable biometric templates. In this paper, a highly-secure encryption… More >

  • Open Access

    ARTICLE

    Face Recognition System Using Deep Belief Network and Particle Swarm Optimization

    K. Babu1,*, C. Kumar2, C. Kannaiyaraju3

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 317-329, 2022, DOI:10.32604/iasc.2022.023756 - 05 January 2022

    Abstract Facial expression for different emotional feelings makes it interesting for researchers to develop recognition techniques. Facial expression is the outcome of emotions they feel, behavioral acts, and the physiological condition of one’s mind. In the world of computer visions and algorithms, precise facial recognition is tough. In predicting the expression of a face, machine learning/artificial intelligence plays a significant role. The deep learning techniques are widely used in more challenging real-world problems which are highly encouraged in facial emotional analysis. In this article, we use three phases for facial expression recognition techniques. The principal component… More >

  • Open Access

    ARTICLE

    Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security

    Rashad Mahmood Saqib1, Adnan Shahid Khan1,*, Yasir Javed2, Shakil Ahmad2, Kashif Nisar3, Irshad A. Abbasi4, Muhammad Reazul Haque5, Azlina Ahmadi Julaihi1

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1633-1647, 2022, DOI:10.32604/iasc.2022.021786 - 09 December 2021

    Abstract This study presents the current state of research on multi-factor authentication. Authentication is one of the important traits in the security domain as it ensures that legitimate users have access to the secure resource. Attacks on authentication occur even before digital access is given, but it becomes quite challenging with remote access to secure resources. With increasing threats to single authentication schemes, 2Factor and later multi-factor authentication approaches came into practice. Several studies have been done in the multi-factor authentication discipline, and most of them proposed the best possible approaches, but there are very limited… More >

  • Open Access

    ARTICLE

    Automated Teller Machine Authentication Using Biometric

    Shumukh M. Aljuaid*, Arshiya S. Ansari

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1009-1025, 2022, DOI:10.32604/csse.2022.020785 - 10 November 2021

    Abstract This paper presents a novel method of a secured card-less Automated Teller Machine (ATM) authentication based on the three bio-metrics measures. It would help in the identification and authorization of individuals and would provide robust security enhancement. Moreover, it would assist in providing identification in ways that cannot be impersonated. To the best of our knowledge, this method of Biometric_ fusion way is the first ATM security algorithm that utilizes a fusion of three biometric features of an individual such as Fingerprint, Face, and Retina simultaneously for recognition and authentication. These biometric images have been… More >

  • Open Access

    ARTICLE

    Dynamic Audio-Visual Biometric Fusion for Person Recognition

    Najlaa Hindi Alsaedi*, Emad Sami Jaha

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1283-1311, 2022, DOI:10.32604/cmc.2022.021608 - 03 November 2021

    Abstract Biometric recognition refers to the process of recognizing a person’s identity using physiological or behavioral modalities, such as face, voice, fingerprint, gait, etc. Such biometric modalities are mostly used in recognition tasks separately as in unimodal systems, or jointly with two or more as in multimodal systems. However, multimodal systems can usually enhance the recognition performance over unimodal systems by integrating the biometric data of multiple modalities at different fusion levels. Despite this enhancement, in real-life applications some factors degrade multimodal systems’ performance, such as occlusion, face poses, and noise in voice data. In this… More >

  • Open Access

    ARTICLE

    Kernel Granulometric Texture Analysis and Light RES-ASPP-UNET Classification for Covid-19 Detection

    A. Devipriya1, P. Prabu2, K. Venkatachalam3, Ahmed Zohair Ibrahim4,*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 651-666, 2022, DOI:10.32604/cmc.2022.020820 - 03 November 2021

    Abstract This research article proposes an automatic frame work for detecting COVID -19 at the early stage using chest X-ray image. It is an undeniable fact that coronovirus is a serious disease but the early detection of the virus present in human bodies can save lives. In recent times, there are so many research solutions that have been presented for early detection, but there is still a lack in need of right and even rich technology for its early detection. The proposed deep learning model analysis the pixels of every image and adjudges the presence of… More >

  • Open Access

    ARTICLE

    Dynamic Feature Subset Selection for Occluded Face Recognition

    Najlaa Hindi Alsaedi*, Emad Sami Jaha

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 407-427, 2022, DOI:10.32604/iasc.2022.019538 - 03 September 2021

    Abstract Accurate recognition of person identity is a critical task in civil society for various application and different needs. There are different well-established biometric modalities that can be used for recognition purposes such as face, voice, fingerprint, iris, etc. Recently, face images have been widely used for person recognition, since the human face is the most natural and user-friendly recognition method. However, in real-life applications, some factors may degrade the recognition performance, such as partial face occlusion, poses, illumination conditions, facial expressions, etc. In this paper, we propose two dynamic feature subset selection (DFSS) methods to… More >

  • Open Access

    ARTICLE

    An Intelligent Graph Edit Distance-Based Approach for Finding Business Process Similarities

    Abid Sohail1, Ammar Haseeb1, Mobashar Rehman2,*, Dhanapal Durai Dominic3, Muhammad Arif Butt4

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3603-3618, 2021, DOI:10.32604/cmc.2021.017795 - 24 August 2021

    Abstract There are numerous application areas of computing similarity between process models. It includes finding similar models from a repository, controlling redundancy of process models, and finding corresponding activities between a pair of process models. The similarity between two process models is computed based on their similarity between labels, structures, and execution behaviors. Several attempts have been made to develop similarity techniques between activity labels, as well as their execution behavior. However, a notable problem with the process model similarity is that two process models can also be similar if there is a structural variation between More >

  • Open Access

    ARTICLE

    Performances of K-Means Clustering Algorithm with Different Distance Metrics

    Taher M. Ghazal1,2, Muhammad Zahid Hussain3, Raed A. Said5, Afrozah Nadeem6, Mohammad Kamrul Hasan1, Munir Ahmad7, Muhammad Adnan Khan3,4,*, Muhammad Tahir Naseem3

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 735-742, 2021, DOI:10.32604/iasc.2021.019067 - 11 August 2021

    Abstract Clustering is the process of grouping the data based on their similar properties. Meanwhile, it is the categorization of a set of data into similar groups (clusters), and the elements in each cluster share similarities, where the similarity between elements in the same cluster must be smaller enough to the similarity between elements of different clusters. Hence, this similarity can be considered as a distance measure. One of the most popular clustering algorithms is K-means, where distance is measured between every point of the dataset and centroids of clusters to find similar data objects and More >

  • Open Access

    ARTICLE

    Development of Mental Health Literacy Scale for Depression Affecting the Help-Seeking Process in Health Professional Students

    Soshi Kodama1,*, Koichi Shido2, Nozomu Ikeda3

    International Journal of Mental Health Promotion, Vol.23, No.3, pp. 331-352, 2021, DOI:10.32604/IJMHP.2021.016337 - 23 July 2021

    Abstract Despite depression being a global mental health disorder, many people with depression do not seek psychiatric help. In particular, it has been reported that only 15.7% of medical students seek treatment. A longer duration of untreated illness (DUI) leads to clinically poor results. To shorten the DUI, the mental health literacy (MHL) with regard to depression needs to be improved, although it is unclear which MHL components will improve the help-seeking process. Additionally, the existing MHL scale for depression is poorly validated for structural validity. Therefore, the purpose of this study was to develop an… More >

Displaying 51-60 on page 6 of 86. Per Page