Sciweavers

876 search results - page 120 / 176
» The next step - open prototyping
Sort
View
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
14 years 7 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
JDCTA
2010
125views more  JDCTA 2010»
14 years 4 months ago
Safety technologies impacts survey in M-services security provision
Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools t...
Fatemeh NasserEslami, Fatemeh Saghafi
IWQOS
2011
Springer
14 years 21 days ago
Advanced Quality-of-Service signaling for IP multicast
—Supporting Quality-of-Service resource reservations for IP multicast flows is especially advantageous for distributed multimedia applications like video conferencing, 3D teleim...
Roland Bless, Martin Röhricht
TOG
2012
242views Communications» more  TOG 2012»
13 years 7 days ago
Precomputed acceleration noise for improved rigid-body sound
We introduce an efficient method for synthesizing acceleration noise – sound produced when an object experiences abrupt rigidbody acceleration due to collisions or other contac...
Jeffrey N. Chadwick, Changxi Zheng, Doug L. James
ICSNC
2007
IEEE
15 years 4 months ago
Movement Prediction Using Bayesian Learning for Neural Networks
Nowadays, path prediction is being extensively examined for use in the context of mobile and wireless computing towards more efficient network resource management schemes. Path pr...
Sherif Akoush, Ahmed Sameh