You are currently viewing a new version of our website. To view the old version click .

Computers, Volume 7, Issue 3

September 2018 - 10 articles

Cover Story: Biometrics play an important role for today’s mobile security. Security experts have attempted to integrate different forms of biometrics in their devices. Recently, facial biometrics has introduced a new method for a more secure form of authentication. As these new improved methods are introduced, some credibility has been lost in the older methods used for authentication such as photographs, electronic images, and look alikes. This paper explores the scientific background as to why facial biometrics have become a trusted form of authentication, and user-friendly method, and explores the range of security of mobile device applications available for Android and iOS systems. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (10)

  • Article
  • Open Access
8 Citations
5,252 Views
7 Pages

3 September 2018

This work proposes the first scaler designed specifically for the three-moduli set M 1 = { 2 n + 1 − 1 , 2 n , 2 n − 1 } . Hence, there is no other functionally similar scaler to compare the proposed scaler with. Howeve...

  • Review
  • Open Access
17 Citations
7,144 Views
25 Pages

Added Values of Linked Data in Education: A Survey and Roadmap

  • Safia Nahhas,
  • Omaimah Bamasag,
  • Maher Khemakhem and
  • Nada Bajnaid

1 September 2018

Education values such as knowledge sharing, and the linked data (LD) abilities such as interoperability are in perfect harmony. Much research has exploited that and provided important contributions and improvements in education through LD. Internatio...

  • Article
  • Open Access
5 Citations
5,838 Views
21 Pages

Parallel Computation of Rough Set Approximations in Information Systems with Missing Decision Data

  • Thinh Cao,
  • Koichi Yamada,
  • Muneyuki Unehara,
  • Izumi Suzuki and
  • Do Van Nguyen

The paper discusses the use of parallel computation to obtain rough set approximations from large-scale information systems where missing data exist in both condition and decision attributes. To date, many studies have focused on missing condition da...

  • Article
  • Open Access
1 Citations
6,669 Views
20 Pages

The scale of modern neural networks is growing rapidly, with direct hardware implementations providing significant speed and energy improvements over their software counterparts. However, these hardware implementations frequently assume global connec...

  • Article
  • Open Access
7 Citations
6,465 Views
12 Pages

Online social network users share their information in different social sites to establish connections with individuals with whom they want to be a friend. While users share all their information to connect to other individuals, they need to hide the...

  • Article
  • Open Access
14 Citations
18,689 Views
29 Pages

Over the past decades, many systems composed of arrays of microphones have been developed to satisfy the quality demanded by acoustic applications. Such microphone arrays are sound acquisition systems composed of multiple microphones used to sample t...

  • Article
  • Open Access
2 Citations
9,260 Views
23 Pages

A Ring Oscillator Physical Unclonable Function (RO PUF) is an application-constrained hardware security primitive that can be used for authentication and key generation. PUFs depend on variability during the fabrication process to produce random outp...

  • Feature Paper
  • Article
  • Open Access
163 Citations
14,139 Views
27 Pages

While Internet of Things (IoT) technology has been widely recognized as an essential part of Smart Cities, it also brings new challenges in terms of privacy and security. Access control (AC) is among the top security concerns, which is critical in re...

  • Review
  • Open Access
38 Citations
14,681 Views
11 Pages

A Review of Facial Biometrics Security for Smart Devices

  • Mary Grace Galterio,
  • Simi Angelic Shavit and
  • Thaier Hayajneh

Biometrics play an avid role in today’s mobile security realm. Security experts have attempted to implement different forms of biometrics, from finger, hand, and signature to voice, retina, and iris. Recently, facial biometrics has been added t...

  • Article
  • Open Access
3 Citations
8,307 Views
22 Pages

The end of Dennard scaling led to the use of heterogeneous multi-processor systems-on-chip (MPSoCs). Heterogeneous MPSoCs provide a high efficiency in terms of energy and performance due to the fact that each processing element can be optimized for a...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X