Volume 02 Number 1 March 2012

    
Weighted Voting Classifier Ensemble for Image Processing

Zahra Rezaei, Mohsen Parvin, Sajad Parvin , Alinejad-Rokny Hamid

https://doi.org/

Abstract Feature extraction for object identification in image processing systems has gained value and significance in the last few years. Realizing its value we have postulated the feature of images as the Gabor response and we deployed a defined processing. In this system we used points for noting the images. In this process we generated matrixes to aggregate them using ensemble... Read More


Using Hand as Support to Insert Virtual Object in Augmented Reality Applications

Mohamed Sakkari, Mourad Zaied, Chokri Ben Amar

https://doi.org/

Abstract Increased reality computer is an emerging field, which is progressing sharply. Its principle is to mix the real world with the virtual world. The real corresponds to concrete scenes related to a specific environment, whereas the virtual corresponds to synthetic scenes constructed by the computer with no real existence. It tries to encourage the user to interact with the real... Read More


Assessment of Digital Educational Games Attributes

Salah Hammami, Hayfa Aleid

https://doi.org/

Abstract Digital games have greater impact in eductional field. Despite more efforts, the digital games have not infused the educational field. The major reason for the low popularity is the lack non-availability of functional designs. Hence, we felt the need for producing functional designs for the educational digital games. This paper is the outcome of such efforts. We used Role Played... Read More


A New Classification Based on IEEE 802.16 for Wireless Access

Noudjoud Kahya-Abbaci, Nacira Ghoualmi

https://doi.org/

Abstract Recently the most accepted standard for wireless broadband access is termed as Wimax which ensures effective and seamless technology. By realizing this value we in this work, propose a new innovative security solution for wireless access in a long range. We have studied in depth the issues in the communication layers and hence we classified these limitations in the protocols.... Read More