To search, Click below search items.
All Published Papers Search Service
Title
Ibrahim Mohammed Alseadoon and Mohd Fairuz Iskandar Othman
Author
Vol. 21 No. 10 pp. 240-244
Keywords
Security, Phishing, email, behaviour, users.
Comparison of Two Approaches to Task-specific Real-Time Hand Pose Estimation
Guram Chaganava¢Ó and David Kakulia
Vol. 21 No. 10 pp. 231-239
Hand Pose Estimation, Keypoint, Keypoint Detection, Hand Detection.
An Investigation into the Susceptibility of Engineering Students to Educational Persuasive Technology
Mohammad T. Alshammari and Amjad Qtaish
Vol. 21 No. 10 pp. 224-230
Persuasive Technology; Persuasive Strategies; Personalization; Persuasion in Education; Educational Technology.
Achieving a Secure Information System by Creating Person-Word-Sound Signature
MohamadAl-Laham
Vol. 21 No. 10 pp. 219-223
Wave file, sound signature, sound parameters, signature set, LBP, ANLBP.