Cloud security vulnerabilities have recently become more prevalent around the world, posing a threat to cloud service providers' (CSPs) ability to respond to client demands. In cloud market, the requests are announced by the client nodes to their…
In order to explore the physics implicated with the sloshing phenomenon subjected to independent regular sway, heave and roll excitations of the liquid tank system, theoretical studies are carried out. Four liquid fill levels with static liquid…
A computational hydrodynamics method was formulated and implemented as a tool from screw propeller propulsion to renewable energy performance prediction, design and optimization of horizontal axis turbines. As an example for tidal energy generation,…
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences…
Mobile devices have emerged as our daily companion whose applicability evolves as the day unfolds. One of such applications is in the area of learning, called mobile learning (M-learning). However, as with all new technologies, M-learning is faced…
Images Recognition and Face Recognition are a form of artificial intelligence developed on Robots and Smart CCTV, such as technology currently developing, such as YOLO Real-time Object Detection and Images Recognition using Python language. In this…
It is estimated that as many as 25 percent of individuals living with autism spectrum disorders are non-verbal. That is, they cannot functionally communicate with others using their voice. Despite that substantial fraction, we still know very little…
Sustainable development has underlined the relevance of education and culture in the specific area. While place-based learning has been shown to be a successful community-oriented approach, this study combined the participation of people in a variety…
Collaborative software is usually thought of as providing audio-video conferencing services, application/desktop sharing, and access to large content repositories. However mobile device usage is characterized by users carrying out short and…
This research focuses on developing an Android-based cattle identification system that is applicable and easy to use. This system uses a Scale Invariant Feature Transform (SIFT) algorithm to extract features from the muzzle images, and Random Sample…