Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    An improved CRNN for Vietnamese Identity Card Information Recognition

    Trinh Tan Dat1, Le Tran Anh Dang1,2, Nguyen Nhat Truong1,2, Pham Cung Le Thien Vu1, Vu Ngoc Thanh Sang1, Pham Thi Vuong1, Pham The Bao1,*

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 539-555, 2022, DOI:10.32604/csse.2022.019064

    Abstract This paper proposes an enhancement of an automatic text recognition system for extracting information from the front side of the Vietnamese citizen identity (CID) card. First, we apply Mask-RCNN to segment and align the CID card from the background. Next, we present two approaches to detect the CID card’s text lines using traditional image processing techniques compared to the EAST detector. Finally, we introduce a new end-to-end Convolutional Recurrent Neural Network (CRNN) model based on a combination of Connectionist Temporal Classification (CTC) and attention mechanism for Vietnamese text recognition by jointly train the CTC and attention objective functions together. The… More >

  • Open Access

    ARTICLE

    Usability and Security of Arabic Text-based CAPTCHA Using Visual Cryptography

    Suliman A. Alsuhibany*, Meznah Alquraishi

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 421-440, 2022, DOI:10.32604/csse.2022.018929

    Abstract Recently, with the spread of online services involving websites, attackers have the opportunity to expose these services to malicious actions. To protect these services, A Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) is a proposed technique. Since many Arabic countries have developed their online services in Arabic, Arabic text-based CAPTCHA has been introduced to improve the usability for their users. Moreover, there exist a visual cryptography (VC) technique which can be exploited in order to enhance the security of text-based CAPTCHA by encrypting a CAPTCHA image into two shares and decrypting it by asking the… More >

  • Open Access

    ARTICLE

    An Architecture Supporting Intelligent Mobile Healthcare Using Human-Computer Interaction HCI Principles

    Mesfer Alrizq1, Shauban Ali Solangi2, Abdullah Alghamdi1,*, Muhammad Ali Nizamani2, Muhammad Ali Memon2, Mohammed Hamdi1

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 557-569, 2022, DOI:10.32604/csse.2022.018800

    Abstract Recent advancements in the Internet of Things IoT and cloud computing have paved the way for mobile Healthcare (mHealthcare) services. A patient within the hospital is monitored by several devices. Moreover, upon leaving the hospital, the patient can be remotely monitored whether directly using body wearable sensors or using a smartphone equipped with sensors to monitor different user-health parameters. This raises potential challenges for intelligent monitoring of patient’s health. In this paper, an improved architecture for smart mHealthcare is proposed that is supported by HCI design principles. The HCI also provides the support for the User-Centric Design (UCD) for smart… More >

  • Open Access

    ARTICLE

    Deep Root Memory Optimized Indexing Methodology for Image Search Engines

    R. Karthikeyan1,*, A. Celine Kavida2, P. Suresh3

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 661-672, 2022, DOI:10.32604/csse.2022.018744

    Abstract Digitization has created an abundance of new information sources by altering how pictures are captured. Accessing large image databases from a web portal requires an opted indexing structure instead of reducing the contents of different kinds of databases for quick processing. This approach paves a path toward the increase of efficient image retrieval techniques and numerous research in image indexing involving large image datasets. Image retrieval usually encounters difficulties like a) merging the diverse representations of images and their Indexing, b) the low-level visual characters and semantic characters associated with an image are indirectly proportional, and c) noisy and less… More >

  • Open Access

    ARTICLE

    Video Identification Based on Watermarking Schemes and Visual Cryptography

    Maged Wafy1,2,*, Samr Gamal Zanaty1,3, Mahmoud Elkhouly1

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 441-453, 2022, DOI:10.32604/csse.2022.018597

    Abstract Related to the growth of data sharing on the Internet and the wide - spread use of digital media, multimedia security and copyright protection have become of broad interest. Visual cryptography () is a method of sharing a secret image between a group of participants, where certain groups of participants are defined as qualified and may combine their share of the image to obtain the original, and certain other groups are defined as prohibited, and even if they combine knowledge of their parts, they can’t obtain any information on the secret image. The visual cryptography is one of the techniques… More >

  • Open Access

    ARTICLE

    Energy-Aware Scheduling for Tasks with Target-Time in Blockchain based Data Centres

    I. Devi*, G.R. Karpagam

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 405-419, 2022, DOI:10.32604/csse.2022.018573

    Abstract

    Cloud computing infrastructures have intended to provide computing services to end-users through the internet in a pay-per-use model. The extensive deployment of the Cloud and continuous increment in the capacity and utilization of data centers (DC) leads to massive power consumption. This intensifying scale of DCs has made energy consumption a critical concern. This paper emphasizes the task scheduling algorithm by formulating the system model to minimize the makespan and energy consumption incurred in a data center. Also, an energy-aware task scheduling in the Blockchain-based data center was proposed to offer an optimal solution that minimizes makespan and energy consumption.… More >

  • Open Access

    ARTICLE

    Implementation of K-Means Algorithm and Dynamic Routing Protocol in VANET

    Manoj Sindhwani1, Charanjeet Singh1,*, Rajeshwar Singh2

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 455-467, 2022, DOI:10.32604/csse.2022.018498

    Abstract With the growth of Vehicular Ad-hoc Networks, many services delivery is gaining more attention from the intelligent transportation system. However, mobility characteristics of vehicular networks cause frequent disconnection of routes, especially during the delivery of data. In both developed and developing countries, a lot of time is consumed due to traffic congestion. This has significant negative consequences, including driver stress due to increased time demand, decreased productivity for various personalized and commercial vehicles, and increased emissions of hazardous gases especially air polluting gases are impacting public health in highly populated areas. Clustering is one of the most powerful strategies for… More >

  • Open Access

    ARTICLE

    Desertification Detection in Makkah Region based on Aerial Images Classification

    Yahia Said1,2,*, Mohammad Barr1, Taoufik Saidani2,3, Mohamed Atri2,4

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 607-618, 2022, DOI:10.32604/csse.2022.018479

    Abstract Desertification has become a global threat and caused a crisis, especially in Middle Eastern countries, such as Saudi Arabia. Makkah is one of the most important cities in Saudi Arabia that needs to be protected from desertification. The vegetation area in Makkah has been damaged because of desertification through wind, floods, overgrazing, and global climate change. The damage caused by desertification can be recovered provided urgent action is taken to prevent further degradation of the vegetation area. In this paper, we propose an automatic desertification detection system based on Deep Learning techniques. Aerial images are classified using Convolutional Neural Networks… More >

  • Open Access

    ARTICLE

    Organizational Data Breach: Building Conscious Care Behavior in Incident Response

    Adlyn Adam Teoh1, Norjihan Binti Abdul Ghani1,*, Muneer Ahmad1, Nz Jhanjhi2, Mohammed A. Alzain3, Mehedi Masud4

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 505-515, 2022, DOI:10.32604/csse.2022.018468

    Abstract Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses. This research study draws upon the literature in the areas of information security, incident response, theory of planned behaviour, and protection motivation theory to expand and empirically validate a modified framework of information security conscious care behaviour formation. The applicability of the theoretical framework is shown through a case study labelled as a cyber-attack of unprecedented scale and sophistication in Singapore’s history to-date, the 2018 SingHealth data breach. The single in-depth case study observed information security awareness, policy,… More >

  • Open Access

    ARTICLE

    Integrated Random Early Detection for Congestion Control at the Router Buffer

    Ahmad Adel Abu-Shareha*

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 719-734, 2022, DOI:10.32604/csse.2022.018369

    Abstract This paper proposed an Integrated Random Early Detection (IRED) method that aims to resolve the problems of the queue-based AQM and load-based AQM and gain the benefits of both using indicators from both types. The arrival factor (e.g., arrival rate, queue and capacity) and the departure factors are used to estimate the congestion through two integrated indicators. The utilized indicators are mathematically calculated and integrated to gain unified and coherent congestion indicators. Besides, IRED is built based on a new dropping calculation approach that fits the utilized congestion indicators while maintaining the intended buffer management criteria, avoiding global synchronization and… More >

Displaying 10871-10880 on page 1088 of 22225. Per Page