10 articles in this issue
Nashwan Alsalam Ali,Abdul Monem S. Rahma,Shaimaa H. Shaker
The multimedia application developments in recent years lead to the widespread of 3D model applications. It becomes more popular in various fields as well as exchanging it over the internet. The security of the 3D models is a very important issue now a da... see more
The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encry... see more
Ameer B. A. Alaasam
Smart industry systems are based on integrating historical and current data from sensors with physical and digital systems to control product states. For example, Digital Twin (DT) system predicts the future state of physical assets using live simulation ... see more
Muna Majeed Laftah
Image denoising is a technique for removing unwanted signals called the noise, which coupling with the original signal when transmitting them; to remove the noise from the original signal, many denoising methods are used. In this paper, the Multiwavelet T... see more
Elena Dolzhich,Svetlana Dmitrichenkova,Mona Kamal Ibrahim
The higher education system around the world is being rapidly developed towards digitalization – from computers to laptops, from laptops to tablets and smartphones. Accordingly, traditional delivery of instruction is being shifted towards blended learning... see more
Atilla Wohllebe,Manuel Rolf Adler,Szilárd Podruzsik
With the increasing relevance of mobile apps for companies, push notifications to address app users are also becoming more important. While the acceptance factors of push notifications have already been extensively researched, the effect of the different ... see more
Ijaz Muhammad Khan,Abdul Rahim Ahmad,Nafaa Jabeur,Mohammed Najah Mahdi
One of the important key applications of learning analytics is offering an opportunity to the institutions to track the student’s academic activities and provide them with real-time adaptive consultations if the student academic performance diverts toward... see more
Senanu Okuboyejo,Ooreofe Koyejo
Mobile learning applications (apps) are increasingly and widely adopted for learning purposes and educational content delivery globally, especially with the massive means of accessing the internet done majorly on mobile handheld devices. Users often submi... see more
Sirapat Boonkrong,Arkalerk Kitthimon,Patchara Koksoungnoen,Krissada Jenprakhon
Passwords are considered the most commonly used method of authentication. Unfortunately, weak passwords are known to be the main cause of many cyber attacks. With stronger passwords, it is believed that this first line of defence would be able... see more
Ashraf Ahmed Fadelelmoula
This article presents a new comprehensive approach to realize a sufficient trade-off between the CAP properties (i.e., consistency, availability, and partition tolerance) in the large-scale pervasive information systems. To achieve these critical properti... see more