9 research outputs found

    A Deterministic Algorithm for Arabic Character Recognition Based on Letter Properties

    Get PDF
    Handheld devices are flooding the market, and their use is becoming essential among people. Hence, the need for fast and accurate character recognition methods that ease the data entry process for users arises. There are many methods developed for handwriting character recognition especially for Latin-based languages. On the other hand, character recognition methods for Arabic language are lacking and rare. The Arabic language has many traits that differentiate it from other languages: first, the writing process is from right to left; second, the letter changes shape according to the position in the work; and third, the writing is cursive. Such traits compel to produce a special character recognition method that helps in producing applications for Arabic language. This research proposes a deterministic algorithm that recognizes Arabic alphabet letters. The algorithm is based on four categorizations of Arabic alphabet letters. Then, the research suggested a deterministic algorithm composed of 34 rules that can predict the character based on the use of all of categorizations as attributes assembled in a matrix for this purpose

    A lightweight trust management algorithm based on subjective logic for interconnected cloud computing environments

    No full text
    Abstract The interconnected cloud computing paradigm is gaining considerable attention as a fundamental emerging model of cloud computing. It allows a wide range of interactions and collaborations across multiple service providers. Despite the potential advantages of interconnected clouds, establishing trust among participating parties is a challenging issue. In this paper, we introduce a lightweight trust management algorithm based on subjective logic (InterTrust) to promote trust in interconnected clouds. The experimental results demonstrate that InterTrust is capable of producing accurate trust information with significantly low execution time and high scalability compared to application of both the well-established trust management algorithm trust network analysis with subjective logic and no trust algorithm
    corecore