Warning alerts are specially designed to protect user rights and safety to avoid serious damage caused by overlooking the essence of warning alerts. Today’s wo
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to
Due to developments of information technology, most of companies and E-shops are looking for selling their products by the Web. These companies increasingly try
This manuscript presents a modified algorithm to extract depth information from stereo-vision acquisitions using a correlation based approaches. The main implem
Software testability took a lot of interests of software community. Indeed, this concept has been interpreted in a variety of ways. One interpretation is concer
This work concerns the study of problems relating to the adaptive internal model control of DC motor in both cases conventional and neural. The most important a
The online education market is expanding both globally and locally;Arab countries are paying special attention to the growth of this sector. Reports showed that
The similarity metric in traditional content based 3D model retrieval method mainly refers the distance metric algorithm used in 2D image retrieval. But this me
When the expression “Software Quality” is used, we usually think in terms of an excellent software product that fulfills our expectations. These expectations