The usage range of nowadays wireless communications become wide, all of the develop applications uses wireless communication which improve the mobility and improve the mobility of the network subscribers. As known tha...
详细信息
Software-defined networking (SDN) plays a crucial role in the enterprise and wide-area networking. The increasing demand for strict service-level agreement applications on the Internet requires networks to be scalable...
详细信息
This study aims to determine the performance of the heat exchanger in Low Density Polyethylene non-organic waste refining tools into fuel oil. This research is an experimental study that uses plastic waste obtained fr...
详细信息
In this paper, we present WMN-PSODGA hybrid simulation system for optimization of mesh routers in Wireless Mesh Networks (WMNs). We consider Chi-square distribution of mesh clients and compare the results of a Fast Co...
详细信息
The emerging neural topic models make topic modeling more easily adaptable and extendable in unsupervised text mining. However, the existing neural topic models is difficult to retain representative information of the...
The amount of time spent in requesting and waiting for the meal in Martabak Air Mancur restaurant may permanently multiply the number of customers in the line waiting especially during peak hours and on weekend. It wi...
详细信息
The e-learning success factor has been widely researched. One of which is Self-Efficacy, that has a vital role in online learning. Previous research has focused only on computer Self-Efficacy. While the effect of a mo...
详细信息
Over the past years,image manipulation tools have become widely accessible and easier to use,which made the issue of image tampering far more *** a direct result to the development of sophisticated image-editing appli...
详细信息
Over the past years,image manipulation tools have become widely accessible and easier to use,which made the issue of image tampering far more *** a direct result to the development of sophisticated image-editing applications,it has become near impossible to recognize tampered images with naked ***,to overcome this issue,computer techniques and algorithms have been developed to help with the identification of tampered *** on detection of tampered images still carries great *** the present study,we particularly focus on image splicing forgery,a type of manipulation where a region of an image is transposed onto another *** proposed study consists of four features extraction stages used to extract the important features from suspicious images,namely,Fractal Entropy(FrEp),local binary patterns(LBP),Skewness,and *** main advantage of FrEp is the ability to extract the texture information contained in the input ***,the“support vector machine”(SVM)classification is used to classify images into either spliced or *** analysis shows that the proposed algorithm performs better than recent state-of-the-art of splicing detection ***,the proposed algorithm achieves an ideal balance between performance,accuracy,and efficacy,which makes it suitable for real-world applications.
Camouflaged object detection and segmentation is a new and challenging research topic in computer vision. There is a serious issue of lacking data on concealed objects such as camouflaged animals in natural scenes. In...
详细信息
Extension concept mapping is a technique to connect prior existing concept maps with a relevant new knowledge structure. It provides learners with the opportunity to review initial ideas, eliciting missing relationshi...
详细信息
暂无评论