Browse Items (1784 total)

The main target of the work in this paper is to detect the gender and oldness of a person with an accurate decision and efficient time based on the number of facial outward attributes extracted using Linear-Discriminate Analysis to classify a person…

Significant advances have been made in facial image animation from a single image. Nonetheless, generating convincing facial feature movements remains a complex challenge in computer graphics. The purpose of this study is to develop an efficient and…

Election is a basic democratic tool that offers an official mechanism for the people to express their opinions in order to form a government by democratic means. Electronic voting has evolved into the most significant application of e-governance and…

Computational Thinking (CT) is very useful in the process of solving everyday problems for undergraduates. In terms of content, computational thinking involves solving problems, studying data patterns, deconstructing problems using algorithms and…

In order to provide secure communication between mobile nodes in a hostile environment, security has become a top priority. There are a variety of nontrivial difficulties to security design in mobile ad hoc networks because of its unique properties,…

Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and…

During the past decades, smart farming became one of the most important revolutions in the agriculture industry. Smart farming makes use of different communication technologies and modern information sciences for increasing the quality and quantity…

This research aims to combine assessment of creative and critical thinking in a mobile device context, to see its effect on the creative and critical thinking of students. Design-based research as the method was used to develop the assessment as…

The Vehicular Ad-hoc Network (VANET) represents a new future for dynamic information dissemination between societies. VANET has a wide range of applications in a variety of aspects, including Intelligent Transportation Systems (ITS). VANET has some…

The operation time of LEACH protocol is divided into several frames. Each frame consists of a number of equal time slots where the selection of cluster heads and the re-establishment of clusters are periodic. Each member of the cluster exploits its…
Output Formats

atom, dcmes-xml, json, omeka-xml, podcast, rss2