Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Saleh A. Khawatreh"'
Publikováno v:
International Journal of Computer Applications. 175:36-42
Publikováno v:
IJARCCE. 9:117-123
Autor:
Saleh A. Khawatreh, Enas N. Al-Zubi
Publikováno v:
International Journal of Computer Applications. 181:9-16
Securing the confidential secret and personal messages is a vital and important task. In this paper we will show how to increase the security of LSB2 method of data steganography to protect the message imbedded in digital color image. An encryption p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bcb3c0e3b7ba1894ee4bff8f01d37598
Publikováno v:
International Journal of Interactive Mobile Technologies (iJIM); Vol. 14 No. 03 (2020); pp. 199-225
International Journal of Interactive Mobile Technologies, Vol 14, Iss 03, Pp 199-225 (2020)
International Journal of Interactive Mobile Technologies, Vol 14, Iss 03, Pp 199-225 (2020)
This research examines the mobile-government services adoption, by combining both UTAUT and GAM models with adding new constructs for explaining the key factors that affect on adoption of mobile-government services. As a result, the study identified
Publikováno v:
International Journal of Computer Applications. 180:1-7
Publikováno v:
International Journal of Computer Applications. 179:40-43
Publikováno v:
International Journal of Advanced Computer Science and Applications. 10
Opportunistic Routing (OR) is attracted much in the research field of multi-hop wireless networks because it is different from traditional routing protocols [such as: Distance Vector (DV) and Link State (LS)], that it needs a lightweight protocol whi
Autor:
Ziad E. Dawahdeh, Saleh A. Khawatreh, Mohammed Amin Almaiah, Omar Almomani, Ahmad Al-Khasawneh, Adeeb Alsaaidah
Publikováno v:
International Journal of Electrical and Computer Engineering (IJECE). 10:6461
Data exchange has been rapidly increased recently by increasing the use of mobile networks. Sharing information (text, image, audio and video) over unsecured mobile network channels is liable for attacking and stealing. Encryption techniques are the
In this work, we present a novel approach for extracting features of a digital wave file. This approach will be presented, implemented and tested. A signature or a key to any wave file will be created. This signature will be reduced to minimize the e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::898d21ab63b612707cee6e5772049bee
https://zenodo.org/record/4070353
https://zenodo.org/record/4070353