It is a well-known fact that the forthcoming names are distinctively different: interference range, career sense, and transmission. The given paper reveals the underlying study of disengagement of a request to send (RTS)/ clear to send (CTS) dialog.…
Any educational institution aimed at developing towards e-learning and creating a more interactive environment and use in all fields of governmental institutions. The Ministry of Higher Education and Scientific Research (MOHESR) of Iraq and some of…
The research aims to know the impact of science, technology, engineering, and mathematics education on both creative thinking and mathematical achievement. To achieve it, the two researchers followed the quasi-experimental approach with an…
The global online communication channel made possible with the internet has increased credit card fraud leading to huge loss of monetary fund in their billions annually for consumers and financial institutions. The fraudsters constantly devise new…
Data security has become a paramount necessity and more obligation in daily life. Most of our systems can be hacked, and it causes very high risks to our confidential files inside the systems. Therefore, for various security reasons, we use various…
Computational Thinking (CT) is very useful in the process of solving everyday problems for undergraduates. In terms of content, computational thinking involves solving problems, studying data patterns, deconstructing problems using algorithms and…
Remarkable success has been recorded in the usage of digital watermarking which is aimed at protecting the intellectual property of multimedia content. In this paper, a new tone mapping attack-resistant high dynamic range (HDR) image…
In the realm of robotics and interactive systems, gender recognition is a crucial problem. Considering the several uses it has in security, web search, human-computer interactions, etc., gender recognition from facial photos has garnered a lot of…
With the rise of IOT devices and the systems connected to the internet, there was, accordingly, an ever-increasing number of network attacks (e.g. in DOS, DDOS attacks). A very significant research problem related to identifying Wireless Sensor…
The multimedia application developments in recent years lead to the widespread of 3D model applications. It becomes more popular in various fields as well as exchanging it over the internet. The security of the 3D models is a very important issue now…