Knowledge hoarding in Requirements Elicitation (RE) phase could lead to informationsystems Development (ISD) project failure. Many researchers have discussed important factors in knowledge sharing. Nevertheless, the ...
详细信息
Different notions and techniques have been proposed to support query in XML. This led to the generation of algorithms to provide more efficient and accurate query processing. This research proposes an efficient algori...
详细信息
The recent unprecedented threat from COVID-19 and past epidemics,such as SARS,AIDS,and Ebola,has affected millions of people in multiple *** have shut their borders,and their nationals have been advised to *** variety...
详细信息
The recent unprecedented threat from COVID-19 and past epidemics,such as SARS,AIDS,and Ebola,has affected millions of people in multiple *** have shut their borders,and their nationals have been advised to *** variety of responses to the pandemic has given rise to data privacy *** prevention and control strategies as well as disease control measures,especially real-time contact tracing for COVID-19,require the identification of people exposed to *** tracing frameworks use mobile apps and geolocations to trace ***,while the motive may be well intended,the limitations and security issues associated with using such a technology are a serious cause of *** are growing concerns regarding the privacy of an individual’s location and personal identifiable information(PII)being shared with governments and/or health *** study presents a real-time,trust-based contact-tracing framework that operateswithout the use of an individual’sPII,location sensing,or gathering GPS *** focus of the proposed contact tracing framework is to ensure real-time privacy using the Bluetooth range of individuals to determine others within the *** research validates the trust-based framework using Bluetooth as practical and *** our proposed methodology,personal information,health logs,and location data will be secure and not *** research analyzes 100,000 tracing dataset records from 150 mobile devices to identify infected users and active users.
Recently, the Internet is accessible by the children in the rural area. The purpose of this paper is to understand what affects their true information findings based on the analysis of the survey. Data collection is o...
详细信息
作者:
Gabr, MohamedKorayem, YousefChen, Yen-LinYee, Por LipKu, Chin SoonAlexan, Wassim
Faculty of Media Engineering and Technology Computer Science Department Cairo11835 Egypt National Taipei University of Technology
Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Malaya
Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia Universiti Tunku Abdul Rahman
Department of Computer Science Kampar31900 Malaysia
Faculty of Information Engineering and Technology Communications Department Cairo11835 Egypt
New Administrative Capital Mathematics Department Cairo13507 Egypt
This work proposes a novel image encryption algorithm that integrates unique image transformation techniques with the principles of chaotic and hyper-chaotic systems. By harnessing the unpredictable behavior of the Ch...
详细信息
Traffic classification software is an important tool in complex environments like a cloud-based environment for network and device safety. The new methods of traffic classification attempt to benefit from numerical fl...
详细信息
Internet of things (IoT) is technology that connected anything and everything to the Internet. IoT is the newest technology rapidly widen in its usage. This technology brings new products such as disaster monitoring. ...
详细信息
For decades, several image enhancement techniques have been proposed. Although most techniques require profuse amount of advance and critical steps, the result for the perceive image are not as satisfied. In this stud...
详细信息
For decades, several image enhancement techniques have been proposed. Although most techniques require profuse amount of advance and critical steps, the result for the perceive image are not as satisfied. In this study, we proposed a new method to enhance the satellite image which using intelligent aspect of filtering and describe multi-threshold technique with an additional step in order to obtain the perceived image. In this way, several simple filters can be combined to form a more efficient and more flexible context dependent filter. This paper proposes a new idea for edge enhancement using smoothing techniques. Various smoothing technologies are explored and implemented for comparing their performance with various threshold values. Comparison is done by qualitative and quantitative approaches. From the results, specific filtering is only applied to the region for which it is suitable. We also evaluate the image quality. The proposed method shows dramatically increase in pixel distribution throughout the range of RGB. The result of this research is also beneficial in terms of geographical views due to the process which determined the difference appeared on each area.
Learning Object (LO) is one of the main research topics in the e-learning community in the recent years, and most researchers pay attention to the issue of Learning Object Reusability. The most obvious motivation is t...
详细信息
Social media platforms, such as Twitter, have become powerful sources of information on people's perception of major events. Many people use Twitter to express their views on various issues and events and use it t...
详细信息
暂无评论