Browse Items (9344 total)

5_A+Helical+Model+for+Color+Harmony.pdf
Among the many approaches to the study of color harmony tried so far, a relatively recent method is to leverage the large number of human-created and ranked color palettes, such as those hosted at colourlovers.com. Analysis of these large datasets…

4_An+Improved+Gait+Recognition+Method+Using.pdf
Gait recognition is a valuable technology for remote and concealed identity authentication, widely applied in intelligent video monitoring. Existing gait recognition algorithms fall into two categories: appearance-based methods and model-based…

3_Secured+Personal+Notes+Application+using+PlayFair.pdf
Secured personal notes application is a mobile application that allows a person to secure his personal and confidential information by storing it in the application after encrypting the data. This application involves complex encryption algorithms…

2_Improving+Smart+Healthcare+based+on+the+Self-.pdf
The smart healthcare concept is new and interdisciplinary knowledge in the modern world, and it has not been a long time since its emergence and is also important from a management point of view. The electronic contexts can have several benefits as…

1_Business+Process+as+a+Service.pdf
The pursuit of adaptive and efficient operational strategies in contemporary corporate settings resonates with the inherent flexibility and transformative potential offered by cloud computing. The integration of cloud technology has emerged as a…

4_A+Biometric+Authentication+Scheme+to+Enhance.pdf
Access control and security within higher education institutions are of paramount importance in safeguarding sensitive information and resources. Conventional authentication methods, such as passwords and identification cards, have proven susceptible…

3_Fortifying+Connectivity+A+Hybrid+Algorithm.pdf
Bluetooth technology has become an integral part of our daily lives, providing wireless connectivity and seamless communication between wide ranges of devices. Bluetooth uses a master-slave architecture, where one device acts as the master, and the…

2_Fraud+Detection+in+Motor+Insurance+Claims+Using.pdf
Fraudulent claims have been a big drawback in motor insurance despite the insurance industry having vast amounts of motor claims data. Analyzing this data can lead to a more efficient way of detecting reported fraudulent claims. The challenge is how…

1_Identification+of+Medical+Mask+Use+by+Applying+the+Convolutional.pdf
Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-COV-2) causes global pandemics and makes countries around the world lock down for tourists. This action is required to prevent the spread of viruses that take 14 days to disappear. SARS-COV-2 can…

1_Benchmarking+Performances+of+Raspberry+pi.pdf
Video wall development is affected by cost, power
consumption, processing capabilities, algorithm, and video used.
Literature has shown that using microcomputers reduces power
consumption and costs, but performance remains a…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2