This paper explores water services restructuring in the post-communist Europe. The cases of the cities of St Petersburg, Russia and Tallinn, Estonia serve to trace changes in tone and timbre over the course of the post-communist transition to a…
In this report, we perform the digital filter computation using Matlab for Wi-Fi tracking application. This work motivates to improve the accuracy of filter algorithm in the RSSI-based distance localization system. There are several aspects that we…
It is no doubt that information technology has played significant importance in higher education in particular in the era of the 4.0 industrial revolution. The progress in technology is expected to support and facilitate the teaching and learning…
The use of mobile devices is increasing to exceeds millions of users and has become an important part of daily life. This wide spread has provided new advantages for a wide range of applications. In learning settings, the term M-Learning is…
Digital smart board is one of interactive technology tools which has been used widely in schools to facilitate teaching and learning. Empirical evidence shows that digital smart board allows students to construct their knowledge while mastering more…
This article aims to analyse Indonesia’s diplomacy strategy to the Philippines in actualizing blue economy from 2014 until 2017. Indonesia's geographical condition, which is the largest archipelagic country in the world and is located within the…
The fast progress of mobile devices and the popularity of mobile applications in the market requires complex software to be run on mobile devices without issues. Mobile devices are known as handhelds and they have different characteristics such as…
Remarkable success has been recorded in the usage of digital watermarking which is aimed at protecting the intellectual property of multimedia content. In this paper, a new tone mapping attack-resistant high dynamic range (HDR) image…
Information hiding one of the important field of security which provide secure level for the information. Achieving multi levels of security system often researchers used cryptography side by side with steganography. Utilizing message digest…