Remarkable success has been recorded in the usage of digital watermarking which is aimed at protecting the intellectual property of multimedia content. In this paper, a new tone mapping attack-resistant high dynamic range (HDR) image…
In the realm of robotics and interactive systems, gender recognition is a crucial problem. Considering the several uses it has in security, web search, human-computer interactions, etc., gender recognition from facial photos has garnered a lot of…
With the rise of IOT devices and the systems connected to the internet, there was, accordingly, an ever-increasing number of network attacks (e.g. in DOS, DDOS attacks). A very significant research problem related to identifying Wireless Sensor…
The multimedia application developments in recent years lead to the widespread of 3D model applications. It becomes more popular in various fields as well as exchanging it over the internet. The security of the 3D models is a very important issue now…
The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard…
During COVID-19 pandemic countries have faced various levels of COVID-19 infection rates, and millions of students are affected by changing the educational process. However, many music Schools have been faced with the challenge of dealing with a…
The mobile IP communication protocol is a flexible system for mobile connection that is designed to allow the device to be moved between networks while maintaining a permanent IP address. IP datagrams using mobile IP can be routed to a specific…
SMS spam messages represent one of the most serious threats to current traditional networks. These messages have been particularly prevalent overseas and are harmful to various types of devices. The current filtering scheme employed in conventional…
This paper is exploring on maneuver to improve research instrument reliability in scientific research related to Educational Technology by analyzing the traditional Cronbach’s alpha reliability using SPSS software and the newer statistical tool, AMOS…
People take their mobile phones everywhere they go. In Saudi Arabia, the mobile penetration is very high and students use their phones for different reasons in the classroom. The use of mobile devices in classroom triggers an alert of the impact it…