Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (16)
  • Open Access

    ARTICLE

    An Overview of Seismic Risk Management for Italian Architectural Heritage

    Lucio Nobile*

    Structural Durability & Health Monitoring, Vol.17, No.5, pp. 353-368, 2023, DOI:10.32604/sdhm.2023.028247 - 07 September 2023

    Abstract The frequent occurrence of seismic events in Italy poses a strategic problem that involves either the culture of preservation of historical heritage or the civil protection action aimed to reduce the risk to people and goods (buildings, bridges, dams, slopes, etc.). Most of the Italian architectural heritage is vulnerable to earthquakes, identifying the vulnerability as the inherent predisposition of the masonry building to suffer damage and collapse during an earthquake. In fact, the structural concept prevailing in these ancient masonry buildings is aimed at ensuring prevalent resistance to vertical gravity loads. Rarely do these ancient… More >

  • Open Access

    ARTICLE

    Measuring Reliability of A Web Portal Based on Testing Profile

    Malik Muhammad Ali Shahid1, Shahida Sulaiman2, Mohammed Al-Sarem3,4, Aqeel Ur Rahman1, Salman Iqbal1, Rab Nawaz Bashir1, Arfat Ahmad Khan5,6, Momen M. Alrawi7, Rashiq R. Marie8, Settawit Poochaya5,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6641-6663, 2023, DOI:10.32604/cmc.2023.031459 - 28 December 2022

    Abstract

    Conventionally, the reliability of a web portal is validated with generalized conventional methods, but they fail to provide the desired results. Therefore, we need to include other quality factors that affect reliability such as usability for improving the reliability in addition to the conventional reliability testing. Actually, the primary objectives of web portals are to provide interactive integration of multiple functions confirming diverse requirements in an efficient way. In this paper, we employ testing profiles to measure the reliability through software operational profile, input space profile and usability profile along with qualitative measures of reliability

    More >

  • Open Access

    ARTICLE

    Fire Hawk Optimizer with Deep Learning Enabled Human Activity Recognition

    Mohammed Alonazi1, Mrim M. Alnfiai2,*

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3135-3150, 2023, DOI:10.32604/csse.2023.034124 - 21 December 2022

    Abstract Human-Computer Interaction (HCI) is a sub-area within computer science focused on the study of the communication between people (users) and computers and the evaluation, implementation, and design of user interfaces for computer systems. HCI has accomplished effective incorporation of the human factors and software engineering of computing systems through the methods and concepts of cognitive science. Usability is an aspect of HCI dedicated to guaranteeing that human–computer communication is, amongst other things, efficient, effective, and sustaining for the user. Simultaneously, Human activity recognition (HAR) aim is to identify actions from a sequence of observations on… More >

  • Open Access

    ARTICLE

    Usability-Driven Mobile Application Development

    Fadwa Yahya1,2,*, Lassaad Ben Ammar1,2, Gasmi Karim3

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3165-3180, 2023, DOI:10.32604/csse.2023.030358 - 21 December 2022

    Abstract Recently, a specific interest is being taken in the development of mobile application (app) via Model-Based User Interface Development (MBUID) approach. MBUID allows the generation of mobile apps in the target platform(s) from conceptual models. As such it simplified the development process of mobile app. However, the interest is only focused on the functional aspects of the mobile app while neglecting the non-functional aspects, such as usability. The latter is largely considered as the main factor leading to the success or failure of any software system. This paper aims at addressing non-functional aspects of mobile More >

  • Open Access

    ARTICLE

    Robust and Reusable Fuzzy Extractors from Non-Uniform Learning with Errors Problem

    Joo Woo1, Jonghyun Kim1, Jong Hwan Park2,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1985-2003, 2023, DOI:10.32604/cmc.2023.033102 - 22 September 2022

    Abstract A fuzzy extractor can extract an almost uniform random string from a noisy source with enough entropy such as biometric data. To reproduce an identical key from repeated readings of biometric data, the fuzzy extractor generates a helper data and a random string from biometric data and uses the helper data to reproduce the random string from the second reading. In 2013, Fuller et al. proposed a computational fuzzy extractor based on the learning with errors problem. Their construction, however, can tolerate a sub-linear fraction of errors and has an inefficient decoding algorithm, which causes the reproducing time… More >

  • Open Access

    ARTICLE

    Artificial Intelligence Model for Software Reusability Prediction System

    R. Subha1,*, Anandakumar Haldorai1, Arulmurugan Ramu2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2639-2654, 2023, DOI:10.32604/iasc.2023.028153 - 17 August 2022

    Abstract The most significant invention made in recent years to serve various applications is software. Developing a faultless software system requires the software system design to be resilient. To make the software design more efficient, it is essential to assess the reusability of the components used. This paper proposes a software reusability prediction model named Flexible Random Fit (FRF) based on aging resilience for a Service Net (SN) software system. The reusability prediction model is developed based on a multilevel optimization technique based on software characteristics such as cohesion, coupling, and complexity. Metrics are obtained from… More >

  • Open Access

    ARTICLE

    A Usability Management Framework for Securing Healthcare Information System

    Hosam Alhakami1, Abdullah Baz2, Wajdi Alhakami3, Abhishek Kumar Pandey4, Alka Agrawal4, Raees Ahmad Khan4,*

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1015-1030, 2022, DOI:10.32604/csse.2022.021564 - 08 February 2022

    Abstract Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry play a significant role However, from the beginning, software security remains a serious issue for all levels of stakeholders. Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data, compromising the organizations’ reputation that translates into, financial losses and compromising software usability as well. Most of the data breaches are financially motivated, especially in… More >

  • Open Access

    ARTICLE

    Estimating Usable-Security Through Hesitant Fuzzy Linguistic Term Sets Based Technique

    Abdulaziz Attaallah1, Raees Ahmad Khan2,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5683-5705, 2022, DOI:10.32604/cmc.2022.021643 - 11 October 2021

    Abstract The apparent contradiction between usability and security has been discussed in the literature for several years. This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced. However, some progressive analysts point out that present security solutions are usually very difficult for several users, and they have expressed a willingness to simplify the security product user experience. Usable security is still mostly unexplored territory in computer science. Which we are all aware with security and usability on many levels, usable security has received little operational attention. Companies have recently focused primarily on usable… More >

  • Open Access

    ARTICLE

    Usability and Security of Arabic Text-based CAPTCHA Using Visual Cryptography

    Suliman A. Alsuhibany*, Meznah Alquraishi

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 421-440, 2022, DOI:10.32604/csse.2022.018929 - 09 September 2021

    Abstract Recently, with the spread of online services involving websites, attackers have the opportunity to expose these services to malicious actions. To protect these services, A Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) is a proposed technique. Since many Arabic countries have developed their online services in Arabic, Arabic text-based CAPTCHA has been introduced to improve the usability for their users. Moreover, there exist a visual cryptography (VC) technique which can be exploited in order to enhance the security of text-based CAPTCHA by encrypting a CAPTCHA image into two shares and More >

  • Open Access

    ARTICLE

    A Parametric Study of Arabic Text-Based CAPTCHA Difficulty for Humans

    Suliman A. Alsuhibany*, Hessah Abdulaziz Alhodathi

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 523-537, 2022, DOI:10.32604/iasc.2022.019913 - 03 September 2021

    Abstract The Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) technique has been an interesting topic for several years. An Arabic CAPTCHA has recently been proposed to serve Arab users. Since there have been few scientific studies supporting a systematic design or tuning for users, this paper aims to analyze the Arabic text-based CAPTCHA at the parameter level by conducting an experimental study. Based on the results of this study, we propose an Arabic text-based CAPTCHA scheme with Fast Gradient Sign Method (FGSM) adversarial images. To evaluate the security of the proposed More >

Displaying 1-10 on page 1 of 16. Per Page