Automatic separation of detective eggs from qualifed would lead to a great reduction on the graders visual stress as well as to an improvement on the quality control process. This paper presents im…
This paper shows the implementation of different algorithms that ure used to detect audio patterns. The present work focuses on the detection of fundamental pitch, a pattern found in the voice,dete…
Researches in computer science and computer engineering devote now a significant part of their efforts in communication and interaction between human and machine. Indeed,with the edvent of rel-time…
In semantic technologies,the shared common understanding of the structure of information among artifacts(people or software agents) can be realized by building an ontology. To do this,it is imperat…
In today's commercial world,accouting software are of great importance for purposes of collecting, classfying and yielding financial reports;thus, it is essential necessity for every firm to select…
Big Data is relatively a new concept which refers to datasets whose size is beyond the ability of typical database software tools to capture, store,manage and analyze. The accumulated huge amount o…
IN this paper, the notion of partial compatibility relation on a finite set whose non-empty subset is endowed with a compatibility relation is introduced. Moreover, some new properties and results …
Building secure software is about taking security into account during all phases of software development. However,the major problem in agile methods is the lack of basic security elements in their …
Today, free trade could no langer be contained so that foreign products in circulations and into the local market in the region of the country. This condition has an impact on the products of local…
Multiple sequence alignment (MSA) is a cornestone proces is computational biology and bioinformatics and it is necessary for sequence analysis. Through decades of extensive to solve the MSA problem…
Research regarding Indonesian languange document similarity measurenment has not yet broad to do. Mostly those research using Karp Rabin algorithm and string matching method, and the documents used…
This paper developes neural network(NN) method using conjugate gradient (CG) with combination of particle swarm optimazitation (PSO) and genetic algorithm (GA). The combination of PSO and GA is use…
Computer network has made it easy to echange data;however, there is a security challenge raising from it. This is because the transmitting data can be intercepted by an attacker. Steganography can …
Peer-to-Peer (P2P) computing is the fast emenrgent overlay network distribution system,yhe main gains of P2P is each peer in the network can act autonomous. Super peer network representation is an …
In this paper, a novel parastic element structure is proposed to reduce the mutual coupling produced in a compact (2*1) multi-input multi-output (MIMO) antenna system working at 2.4 GHz for wireles…
Eliptic curves cryptography (ECC) algorithm is well-known powerfull approach of implementing public key cryptography created by Victor Miler and Neil Kobilitz. ECC is a modular arithmetic based alg…
Eliptic curves cryptography (ECC) algorithm is well-known powerful approcah of implementing public key cryptography created by Victor Miller and Neil Koblitz. ECC is a modular arithmetic based algo…
Today,free trade could no langer be contained so that foreign products in circulation and into the local market in the region of the country. This condition has an impact on the products of local e…
Building secure siftware is about taking security into account during all phases of software development. However,the major problem in agile methods is the lack of basic security elements in their …
The goal of this paper is to discover and implement a method of encoding an audio data from a MIDI audio file format into a special type of Quick Response (QR) code 2D barcode called Color Quick Re…
This paper presents key features and challanges for the development of the next generation ontology matcher. Matching elements of two data instances plays an important role in e-business,multilingu…
With the wide spread popularity of social networking sites (SNS),enterprise organizations have strees to explore the busines opportunities is SNS such as Facebook to conduct targated marketing and …
Thanks to the 6LoWPAN technology, each object will get the opportunity to obtain an IPv6 address and integrete the world of the Internet of Things. this provides the ability to collect and monitor …
This paper deals with the performance analysis of WLAN under variable number of nodes using the adjustable prameters such as TXOPLimit,CWmin,CWmax and AIFS in EDCA. The comperative analysis is done…
This research aims at measuring the quality of E-Service and its impact on student satisfaction at Jordanian universities. Toward this aim, a resesearch model was developed and tested withim the co…
Among all the features which can be extracted from videos, we propose to use Space-Time Interest Points (STIP),these ones are particulary interisting because they are simple and robust. They allow…
In wireless sensor network (WSN) data gathering causes more energy consumption.Also most of the exisiting literature work on data gathering process considers only distance and node density and skip…
Segmented blood vessel from the fundus image provides useful clinical information for the diagnosis and monitoring of eye disease. In this paper,blood vessels from the green channel of the fundus i…
The existing test method for properties of UAV data-link is usually the actual flight test or field"distance" test,which has long test cycle and difficulty for the extraction of test data. In view …
Several applications of mobile ad hoc networks select geographical routing especially the Greedy Perimeter Stateless Routing (GPSR) protocol due to its scability and ability to support location bas…