<p class="Default">This research examines the mobile-government services adoption, by combining both UTAUT and GAM models with adding new constructs for explaining the key factors that affect on adoption of mobile-government services. As a result, the study identified the critical factors that influence users’ to adopt the system, and developed an integrated model as a powerful tool that assists in the adoption process of mobile-government applications. The novelty of this research will be an added value to the body of knowledge and its implications will be vital for researchers and decision/policy makers who are willing to make a change.</p>
A novel methodology to manipulate wave file and create a feature array for each wave file will be introduced, this array can be used later on to recognize the voice file. A set of experiments will be performed in order to prove the uniqueness of the calculated feature array, and that the created feature array for a certain wave file does not match any other feature array for other wave files. The proposed methodology will minimize the efforts of voice recognition by mean of minimizing the time of feature array creation and minimizing the size of the calculated array. General TermsVoice recognitions, artificial intelligence KeywordsWave file, feature array, histogram.
Data exchange has been rapidly increased recently by increasing the use of mobile networks. Sharing information (text, image, audio and video) over unsecured mobile network channels is liable for attacking and stealing. Encryption techniques are the most suitable methods to protect information from hackers. Hill cipher algorithm is one of symmetric techniques, it has a simple structure and fast computations, but weak security because sender and receiver need to use and share the same private key within a non-secure channel. Therefore, a novel hybrid encryption approach between elliptic curve cryptosystem and hill cipher (ECCHC) is proposed in this paper to convert Hill Cipher from symmetric technique (private key) to asymmetric one (public key) and increase its security and efficiency and resist the hackers. Thus, no need to share the secret key between sender and receiver and both can generate it from the private and public keys. Therefore, the proposed approach presents a new contribution by its ability to encrypt every character in the 128 ASCII table by using its ASCII value direct without needing to assign a numerical value for each character. The main advantages of the proposed method are represented in the computation simplicity, security efficiency and faster computation.
<p>In this work, we present a novel approach for extracting features of a digital wave file. This approach will be presented, implemented and tested. A signature or a key to any wave file will be created. This signature will be reduced to minimize the efforts of digital signal processing applications. Hence, the features array can be used as key to recover a wave file from a database consisting of several wave files using reduced Local binary patterns (RLBP). Experimental results are presented and show that The proposed RLBP method is at least 3 times faster than CSLBP method, which mean that the proposed method is more efficient.</p>
A multiprocessor system is a computer with two or more central processing units (CPUs) with each one sharing the common main memory as well as the peripherals. Multiprocessor system is either homogeneous or heterogeneous system. A homogeneous system is a cluster of processors joined to a high speed network for accomplishing the required task; also it is defined as parallel computing system. Homogeneous is a technique of parallel computing system. A heterogeneous system can be defined as the interconnection of a number of processors, having dissimilar computational speed. Load balance is a method of distributing work between the processors fairly in order to get optimal response time, resource utilization, and throughput. Load balancing is either static or dynamic. In static load balancing, work is distributed among all processors before the execution of the algorithm. In dynamic load balancing, work is distributed among all processors during execution of the algorithm. So problems arise when it cannot statistically divide the tasks among the processors. To use multiprocessor systems efficiently, several load balancing algorithms have been adopted widely. This paper proposes an efficient load balance algorithm which addresses common overheads that may decrease the efficiency of a multiprocessor system. Such overheads are synchronization, data communication, response time, and throughput.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.