Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    REVIEW

    Biometric Authentication System on Mobile Environment: A Review

    Qasem Abu Al-Haija1,*, Sara Othman Al-Salameen2

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 897-914, 2024, DOI:10.32604/csse.2024.050846 - 17 July 2024

    Abstract The paper discusses the importance of biometric verification systems in mobile environments and highlights the challenges and strategies used to overcome them in order to ensure the security of mobile devices. Emphasis is placed on evaluating the impact of illumination on the performance of biometric verification techniques and how to address this challenge using image processing techniques. The importance of accurate and reliable data collection to ensure the accuracy of verification processes is also discussed. The paper also highlights the importance of improving biometric verification techniques and directing research toward developing models aimed at reducing More >

  • Open Access

    ARTICLE

    RPL-Based IoT Networks under Decreased Rank Attack: Performance Analysis in Static and Mobile Environments

    Amal Hkiri1,*, Mouna Karmani1, Omar Ben Bahri2, Ahmed Mohammed Murayr2, Fawaz Hassan Alasmari2, Mohsen Machhout1

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 227-247, 2024, DOI:10.32604/cmc.2023.047087 - 30 January 2024

    Abstract The RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) protocol is essential for efficient communication within the Internet of Things (IoT) ecosystem. Despite its significance, RPL’s susceptibility to attacks remains a concern. This paper presents a comprehensive simulation-based analysis of the RPL protocol’s vulnerability to the decreased rank attack in both static and mobile network environments. We employ the Random Direction Mobility Model (RDM) for mobile scenarios within the Cooja simulator. Our systematic evaluation focuses on critical performance metrics, including Packet Delivery Ratio (PDR), Average End to End Delay (AE2ED), throughput, Expected Transmission Count More >

  • Open Access

    ARTICLE

    Simulation of Seabed Erosion Produced by an Inclined Jet

    Zhibin Zhang1,2, Yongjun Gong1,*, Liping Zhang3, Min Xv2, Gaofeng Shang4

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.3, pp. 651-662, 2023, DOI:10.32604/fdmp.2022.020936 - 29 September 2022

    Abstract Water jets are widely used in seabed scouring and desilting applications. In the present work, dedicated tests have been conducted using a jet scour model test platform and sand beds containing grains with different sizes. The FLOW-3D simulation software has also been used to tackle the problem form a numerical point of view. The boundary conditions of the simulation have been optimized to reduce the gap between the numerical results and the outcomes of the experimental tests. Scour area calculation has been based on a RNG k-ε Turbulence model. Moreover, the FAVOR (Fractional Area Volume More >

  • Open Access

    ARTICLE

    Mobile Memory Management System Based on User’s Application Usage Patterns

    Jaehwan Lee, Sangoh Park*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4031-4050, 2021, DOI:10.32604/cmc.2021.017872 - 06 May 2021

    Abstract Currently, the number of functions to improve user convenience in smartphone applications is increasing. In addition, more mobile applications are being loaded into mobile operating system memory for faster launches, thus increasing the memory requirements for smartphones. The memory used by applications in mobile operating systems is managed using software; allocated memory is freed up by either considering the usage state of the application or terminating the least recently used (LRU) application. As LRU-based memory management schemes do not consider the application launch frequency in a low memory situation, currently used mobile operating systems can… More >

Displaying 1-10 on page 1 of 4. Per Page