Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    ARTICLE

    Hybrid Dynamic Optimization for Multilevel Security System in Disseminating Confidential Information

    Shahina Anwarul1, Sunil Kumar2, Ashok Bhansali3, Hammam Alshazly4,*, Hany S. Hussein5,6

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3145-3163, 2023, DOI:10.32604/csse.2023.041061 - 09 November 2023

    Abstract Security systems are the need of the hour to protect data from unauthorized access. The dissemination of confidential information over the public network requires a high level of security. The security approach such as steganography ensures confidentiality, authentication, integrity, and non-repudiation. Steganography helps in hiding the secret data inside the cover media so that the attacker can be confused during the transmission process of secret data between sender and receiver. Therefore, we present an efficient hybrid security model that provides multifold security assurance. To this end, a rectified Advanced Encryption Standard (AES) algorithm is proposed More >

  • Open Access

    ARTICLE

    Deep Facial Emotion Recognition Using Local Features Based on Facial Landmarks for Security System

    Youngeun An, Jimin Lee, EunSang Bak*, Sungbum Pan*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1817-1832, 2023, DOI:10.32604/cmc.2023.039460 - 30 August 2023

    Abstract Emotion recognition based on facial expressions is one of the most critical elements of human-machine interfaces. Most conventional methods for emotion recognition using facial expressions use the entire facial image to extract features and then recognize specific emotions through a pre-trained model. In contrast, this paper proposes a novel feature vector extraction method using the Euclidean distance between the landmarks changing their positions according to facial expressions, especially around the eyes, eyebrows, nose, and mouth. Then, we apply a new classifier using an ensemble network to increase emotion recognition accuracy. The emotion recognition performance was More >

  • Open Access

    ARTICLE

    Hybrid of Distributed Cumulative Histograms and Classification Model for Attack Detection

    Mostafa Nassar1, Anas M. Ali1,2, Walid El-Shafai1,3, Adel Saleeb1, Fathi E. Abd El-Samie1, Naglaa F. Soliman4, Hussah Nasser AlEisa5,*, Hossam Eldin H. Ahmed1

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2235-2247, 2023, DOI:10.32604/csse.2023.032156 - 03 November 2022

    Abstract Traditional security systems are exposed to many various attacks, which represents a major challenge for the spread of the Internet in the future. Innovative techniques have been suggested for detecting attacks using machine learning and deep learning. The significant advantage of deep learning is that it is highly efficient, but it needs a large training time with a lot of data. Therefore, in this paper, we present a new feature reduction strategy based on Distributed Cumulative Histograms (DCH) to distinguish between dataset features to locate the most effective features. Cumulative histograms assess the dataset instance More >

  • Open Access

    ARTICLE

    Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms

    Iman Almomani1,2, Walid El-Shafai1,3,*, Aala AlKhayer1, Albandari Alsumayt4, Sumayh S. Aljameel5, Khalid Alissa6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3515-3537, 2023, DOI:10.32604/cmc.2023.033765 - 31 October 2022

    Abstract Nowadays, there is tremendous growth in biometric authentication and cybersecurity applications. Thus, the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private sectors. Therefore, designing and implementing robust security algorithms for users’ biometrics is still a hot research area to be investigated. This work presents a powerful biometric security system (BSS) to protect different biometric modalities such as faces, iris, and fingerprints. The proposed BSS model is based on hybridizing auto-encoder (AE) network and a chaos-based ciphering algorithm to cipher the details of the stored biometric patterns and… More >

  • Open Access

    ARTICLE

    An Efficient SDFRM Security System for Blockchain Based Internet of Things

    Vivekraj Mannayee1,*, Thirumalai Ramanathan2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1545-1563, 2023, DOI:10.32604/iasc.2023.027675 - 19 July 2022

    Abstract Blockchain has recently sparked interest in both the technological and business firms. The Internet of Things's (IoT) core principle emerged due to the connectivity of several new technologies, including wireless technology, the Internet, embedded automation systems, and micro-electromechanical devices. Manufacturing environments and operations have been successfully converted by implementing recent advanced technology like Cloud Computing (CC), Cyber-Physical System (CSP), Information and Communication Technologies (ICT) and Enterprise Model, and other technological innovations into the fourth industrial revolution referred to as Industry 4.0. Data management is defined as the process of accumulation in order to make better… More >

  • Open Access

    ARTICLE

    An Enhanced Security System Using Blockchain Technology for Strong FMC Relationship

    K. Meenakshi*, K. Sashi Rekha

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 111-128, 2023, DOI:10.32604/iasc.2023.025032 - 06 June 2022

    Abstract Blockchain technology is a shared database of logs of all consumer transactions which are registered on all machines on a network. Both transactions in the system are carried out by consensus processes and to preserve confidentiality all the files contained cannot be changed. Blockchain technology is the fundamental software behind digital currencies like Bitcoin, which is common in the marketplace. Cloud computing is a method of using a network of external machines to store, monitor, and process information, rather than using the local computer or a local personal computer. The software is currently facing multiple… More >

  • Open Access

    CORRECTION

    Corrections Notice to: Evolved Algorithm and Vibration Stability for Nonlinear Disturbed Security Systems

    Tim Chen1, Wray Marriott2, Ann Nicholson3, Tim Chen4, Mars Kmieckowiak5, Jcy Chen6,*

    Sound & Vibration, Vol.53, No.6, pp. 309-309, 2019, DOI:10.32604/sv.2019.00308

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Evolved Algorithm and Vibration Stability for Nonlinear Disturbed Security Systems

    Tcw Chen1, Wray Marriott2, Ann Nicholson3, Tim Chen4, Mars Kmieckowiak5, Jcy Chen6,*

    Sound & Vibration, Vol.53, No.2, pp. 29-37, 2019, DOI:10.32604/sv.2019.04224

    Abstract In this paper, a method sustaining system stability after decomposition is proposed. Based on the stability criterion derived from the energy function, a set of intelligent controllers is synthesized which is used to maintain the stability of the system. The sustainable stability problem can be reformulated as a Linear Matrix Inequalities (LMI) problem. The key to guaranteeing the stability of the system as a whole is to find a common symmetrically positive definite matrix for all subsystems. Furthermore, the Evolved Bat Algorithm (EBA) is employed to replace the pole assignment method and the conventional mathematical More >

Displaying 1-10 on page 1 of 8. Per Page