Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    REVIEW

    Biometric Authentication System on Mobile Environment: A Review

    Qasem Abu Al-Haija1,*, Sara Othman Al-Salameen2

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 897-914, 2024, DOI:10.32604/csse.2024.050846 - 17 July 2024

    Abstract The paper discusses the importance of biometric verification systems in mobile environments and highlights the challenges and strategies used to overcome them in order to ensure the security of mobile devices. Emphasis is placed on evaluating the impact of illumination on the performance of biometric verification techniques and how to address this challenge using image processing techniques. The importance of accurate and reliable data collection to ensure the accuracy of verification processes is also discussed. The paper also highlights the importance of improving biometric verification techniques and directing research toward developing models aimed at reducing More >

  • Open Access

    ARTICLE

    Time and Space Efficient Multi-Model Convolution Vision Transformer for Tomato Disease Detection from Leaf Images with Varied Backgrounds

    Ankita Gangwar1, Vijaypal Singh Dhaka1, Geeta Rani2,*, Shrey Khandelwal1, Ester Zumpano3,4, Eugenio Vocaturo3,4

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 117-142, 2024, DOI:10.32604/cmc.2024.048119 - 25 April 2024

    Abstract A consumption of 46.9 million tons of processed tomatoes was reported in 2022 which is merely 20% of the total consumption. An increase of 3.3% in consumption is predicted from 2024 to 2032. Tomatoes are also rich in iron, potassium, antioxidant lycopene, vitamins A, C and K which are important for preventing cancer, and maintaining blood pressure and glucose levels. Thus, tomatoes are globally important due to their widespread usage and nutritional value. To face the high demand for tomatoes, it is mandatory to investigate the causes of crop loss and minimize them. Diseases are… More >

  • Open Access

    ARTICLE

    Implicit Continuous User Authentication for Mobile Devices based on Deep Reinforcement Learning

    Christy James Jose1,*, M. S. Rajasree2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1357-1372, 2023, DOI:10.32604/csse.2023.025672 - 15 June 2022

    Abstract The predominant method for smart phone accessing is confined to methods directing the authentication by means of Point-of-Entry that heavily depend on physiological biometrics like, fingerprint or face. Implicit continuous authentication initiating to be loftier to conventional authentication mechanisms by continuously confirming users’ identities on continuing basis and mark the instant at which an illegitimate hacker grasps dominance of the session. However, divergent issues remain unaddressed. This research aims to investigate the power of Deep Reinforcement Learning technique to implicit continuous authentication for mobile devices using a method called, Gaussian Weighted Cauchy Kriging-based Continuous Czekanowski’s… More >

  • Open Access

    ARTICLE

    Mobile Devices Interface Adaptivity Using Ontologies

    Muhammad Waseem Iqbal1, Muhammad Raza Naqvi2, Muhammad Adnan Khan3,4, Faheem Khan5, T. Whangbo5,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4767-4784, 2022, DOI:10.32604/cmc.2022.023239 - 14 January 2022

    Abstract Currently, many mobile devices provide various interaction styles and modes which create complexity in the usage of interfaces. The context offers the information base for the development of Adaptive user interface (AUI) frameworks to overcome the heterogeneity. For this purpose, the ontological modeling has been made for specific context and environment. This type of philosophy states to the relationship among elements (e.g., classes, relations, or capacities etc.) with understandable satisfied representation. The context mechanisms can be examined and understood by any machine or computational framework with these formal definitions expressed in Web ontology language (WOL)/Resource… More >

  • Open Access

    ARTICLE

    Multi-Floor Indoor Trajectory Reconstruction Using Mobile Devices

    Sultan Alamri1,*, Kartini Nurfalah2, Kiki Adhinugraha3

    CMES-Computer Modeling in Engineering & Sciences, Vol.128, No.3, pp. 927-948, 2021, DOI:10.32604/cmes.2021.014852 - 11 August 2021

    Abstract An indoor trajectory is the path of an object moving through corridors and stairs inside a building. There are various types of technologies that can be used to reconstruct the path of a moving object and detect its position. GPS has been used for reconstruction in outdoor environments, but for indoor environments, mobile devices with embedded sensors are used. An accelerometer sensor and a magnetometer sensor are used to detect human movement and reconstruct the trajectory on a single floor. In an indoor environment, there are many activities that will create the trajectory similar to… More >

  • Open Access

    ARTICLE

    Design and Performance Comparison of Rotated Y-Shaped Antenna Using Different Metamaterial Surfaces for 5G Mobile Devices

    Jalal Khan1, Daniyal Ali Sehrai1, Mushtaq Ahmad Khan1, Haseeb Ahmad Khan2, Salman Ahmad3, Arslan Ali4, Arslan Arif5, Anwer Ahmad Memon6, Sahib Khan1,4,*

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 409-420, 2019, DOI:10.32604/cmc.2019.06883

    Abstract In this paper, a rotated Y-shaped antenna is designed and compared in terms of performance using a conventional and EBG ground planes for future Fifth Generation (5G) cellular communication system. The rotated Y-shaped antenna is designed to transmit at 38 GHz which is one of the most prominent candidate bands for future 5G communication systems. In the design of conventional antenna and metamaterial surfaces (mushroom, slotted), Rogers-5880 substrate having relative permittivity, thickness and loss tangent of 2.2, 0.254 mm, and 0.0009 respectively have been used. The conventional rotated Y-shaped antenna offers a satisfactory wider bandwidth… More >

  • Open Access

    ARTICLE

    Securing Display Path for Security-Sensitive Applications on Mobile Devices

    Jinhua Cui1,2, Yuanyuan Zhang3, Zhiping Cai1,*, Anfeng Liu4, Yangyang Li5

    CMC-Computers, Materials & Continua, Vol.55, No.1, pp. 17-35, 2018, DOI:10.3970/cmc.2018.055.017

    Abstract While smart devices based on ARM processor bring us a lot of convenience, they also become an attractive target of cyber-attacks. The threat is exaggerated as commodity OSes usually have a large code base and suffer from various software vulnerabilities. Nowadays, adversaries prefer to steal sensitive data by leaking the content of display output by a security-sensitive application. A promising solution is to exploit the hardware visualization extensions provided by modern ARM processors to construct a secure display path between the applications and the display device. In this work, we present a scheme named SecDisplay More >

  • Open Access

    ABSTRACT

    A Post-processing for the reduction of blocking artifact in mobile devices

    Dae-Hyun Park1, Hyun-Hee Park2, Yoon Kim1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.11, No.4, pp. 113-114, 2009, DOI:10.3970/icces.2009.011.113

    Abstract In this paper, we propose a post-processing visual enhancement technique to reduce the blocking artifacts in block based DCT decoded image for mobile devices that has allocation of the restricted resource. This algorithm uses the adaptive deblocking filter to remove grid noise and ringing noise in monotone areas. To decide whether monotone region or not, we introduce a notion of Flatness. Also, a new directional filter is utilized to get rid of staircase noise and preserve the original edge component. The directional filter is applied according to the direction of edge, which is corrected in More >

Displaying 1-10 on page 1 of 8. Per Page