Jamal ZRAQOU - Academia.edu (original) (raw)
Papers by Jamal ZRAQOU
International Journal of Instruction, Jul 1, 2024
Advancements in technology have led to the widespread use of modern technologies in education, in... more Advancements in technology have led to the widespread use of modern technologies in education, including the integration of augmented reality (AR) and virtual reality (VR) technologies. During the COVID-19 era, Music learning like other applied educational disciplines, has faced many technical and application problems, especially in finding alternative educational tools that fulfill the learning purpose and preserve the expected learning outcomes. This study came to explore the effectiveness of using Virtual Reality technology in music education and to figure out the students' acceptance and their intention to use the technology. For this purpose, an interactive virtual learning environment was developed to aid students in learning the "principle of music theory", a sample group of 20 students including students with Motor Disabilities from Luminus Technical University College (LTUC) participated in the study experiment. The results of the study show that the use of virtual reality technology is effective in learning music, and also there is an acceptable degree of intention to use the technology but at a high rate among students with motor disabilities. In addition, the analysis of the results highlights the essential factors that should be considered to improve the VR learning environment and the expected learning outcomes.
Scientific reports, Feb 24, 2024
International journal of interactive mobile technologies, Nov 2, 2023
Emerging technologies in artificial intelligence (AI) and advanced optimization methodologies hav... more Emerging technologies in artificial intelligence (AI) and advanced optimization methodologies have opened up a new frontier in the field of software engineering. Among these methodologies, optimization algorithms such as the multi-verse optimizer (MVO) provide a compelling and structured technique for identifying software vulnerabilities, thereby enhancing software robustness and reliability. This research investigates the feasibility and efficacy of applying an augmented version of this technique, known as the test path distance multiverse optimization (TPDMVO) algorithm, for comprehensive path coverage testing, which is an indispensable aspect of software validation. The algorithm's versatility and robustness are examined through its application to a wide range of case studies with varying degrees of complexity. These case studies include rudimentary functions like maximum and middle value extraction, as well as more sophisticated data structures such as binary search trees and AVL trees. A notable innovation in this research is the introduction of a customized fitness function, carefully designed to guide TPDMVO towards traversing all possible execution paths in a program, thereby ensuring comprehensive coverage. To further enhance the comprehensiveness of the test, a metric called 'test path distance' (TPD) is utilized. This metric is designed to guide TPDMVO towards paths that have not been explored before. The findings confirm the superior performance of the TPDMVO algorithm, which achieves complete path coverage in all test scenarios. This demonstrates its robustness and adaptability in handling different program complexities.
Cybernetics and Information Technologies, Oct 31, 2023
Effective spam filtering plays a crucial role in enhancing user experience by sparing them from u... more Effective spam filtering plays a crucial role in enhancing user experience by sparing them from unwanted messages. This imperative underscores the importance of safeguarding email systems, prompting scholars across diverse fields to delve deeper into this subject. The primary objective of this research is to mitigate the disruptive effects of spam on email usage by introducing improved security measures compared to existing methods. This goal can be accomplished through the development of a novel spam filtering technique designed to prevent spam from infiltrating users' inboxes. Consequently, a hybrid filtering approach that combines an information gain philter and a Wrapper Grey Wolf Optimizer feature selection algorithm with a Naive Bayes Classifier, is proposed, denoted as GWO-NBC. This research is rigorously tested using the WEKA software and the SPAMBASE dataset. Thorough performance evaluations demonstrated that the proposed approach surpasses existing solutions in terms of both security and accuracy.
Advances in intelligent systems and computing, Nov 2, 2018
The vehicles care system (VCS) is developed with a service interval schedule and general guidelin... more The vehicles care system (VCS) is developed with a service interval schedule and general guidelines for the regular maintenance of several vehicles, such as cars, mini vans, pickups and tractors. This work tends to control the process of serving vehicles that require regular maintenance. The novelty of this work is about utilizing the Global Positioning System (GPS) coordinates to determine the past distances for each vehicle. This can be useful to estimate the expiry of tires, oil engine, air filter, and filter of oil engine based on the past distance after a last service without a need of using Google Map or Google Earth software. To reduce the running costs for the GPS service; an offline saving records service for the GPS coordinates is offered. Utilizing the outcome of this service provides the ability to generate another useful report between two dates/times, such as speeds, routes, and estimating the consumed fuel.
Advances in Intelligent Systems and Computing, 2018
The vehicles care system (VCS) is developed with a service interval schedule and general guidelin... more The vehicles care system (VCS) is developed with a service interval schedule and general guidelines for the regular maintenance of several vehicles, such as cars, mini vans, pickups and tractors. This work tends to control the process of serving vehicles that require regular maintenance. The novelty of this work is about utilizing the Global Positioning System (GPS) coordinates to determine the past distances for each vehicle. This can be useful to estimate the expiry of tires, oil engine, air filter, and filter of oil engine based on the past distance after a last service without a need of using Google Map or Google Earth software. To reduce the running costs for the GPS service; an offline saving records service for the GPS coordinates is offered. Utilizing the outcome of this service provides the ability to generate another useful report between two dates/times, such as speeds, routes, and estimating the consumed fuel.
Visual Informatics, Dec 1, 2022
Visual Informatics
This is a PDF file of an article that has undergone enhancements after acceptance, such as the ad... more This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will undergo additional copyediting, typesetting and review before it is published in its final form, but we are providing this version to give early visibility of the article. Please note that, during the production process, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
An online handwriting recognition (OHWR) is a tool that automatically converts screen brush strok... more An online handwriting recognition (OHWR) is a tool that automatically converts screen brush strokes into text using a special digitizer. Gesture recognition and several customized methods are employed to apply the OHWR on Thaana (Maldivian) language. This language has its own script, and it differs from the way of writing English characters in that it includes vowels derived from Arabic language. The vowels can be located above or below characters. This paper explores a customized approach on this language achieving a recognition rate of 89% from the entered text.
International Journal of Computer Science and Information Technology, 2015
The version presented here may differ from the published version or from the version of the recor... more The version presented here may differ from the published version or from the version of the record. Please see the repository URL above for details on accessing the published version and note that access may require a subscription.
The era of e-learning systems among educational organisations has grown exponentially. Educationa... more The era of e-learning systems among educational organisations has grown exponentially. Educational organisations have a competition to provide a secure wireless network service to staff members. In this paper, a novel authentication and authorization model (NAAM) has been presented to securely transmit the data in e-learning environment without affecting the system resources. As a part of the analysis, multiple encryption methods and face recognition technique are utilized to develop a complete secure e-learning model. MAC address filtering over the wireless network together with the application of pretty good privacy (PGP) encryption algorithm are presented. This model may be termed as hybrid security and authentication scheme (HSAS). The main contribution of this research is to achieve maximum security level. This was achieved by integrating the strength of OpenVPN, HMAC, AES, VLAN, sWIFI, PGP, SSL and faces recognition. The conducted experiments revealed that the performance of t...
Much research work is conducting to find algorithms for embedding hidden information that contrib... more Much research work is conducting to find algorithms for embedding hidden information that contribute in the fields of developing watermarking and steganography. The research work introduced in this paper aims to propose an approach for sending data securely by embedding a hidden cypher text in a stream of images. This study presents an algorithm for hiding information in key frames of a coloured video and then retrieving these data securely and efficiently. Two things should be taken into account, the embedded information should be invariant to the possible changes that might occur for video conversion from one format to another and not all the video frames will be used for hiding the information. Consequently, this research will focus on how to recover the exact version of the original frame in case of any manipulation or update. The proposed work can be divided into two parts, the first one is applying a data encryption method to generate ciphertext, and the second part is to embe...
International Journal of Interactive Mobile Technologies (iJIM)
Cloud computing technology is known as a distributed computing network, which consists of a large... more Cloud computing technology is known as a distributed computing network, which consists of a large number of servers connected via the internet. This technology involves many worthwhile resources, such as applications, services, and large database storage. Users have the ability to access cloud services and resources through web services. Cloud computing provides a considerable number of benefits, such as effective virtualized resources, cost efficiency, self-service access, flexibility, and scalability. However, many security issues are present in cloud computing environment. One of the most common security challenges in the cloud computing environment is the trojan horses. Trojan horses can disrupt cloud computing services and damage the resources, applications, or virtual machines in the cloud structure. Trojan horse attacks are dangerous, complicated and very difficult to be detected. In this research, eight machine learning classifiers for trojan horse detection in a cloud-based...
The Sun is of fundamental importance to life on earth and is studied by scientists from many disc... more The Sun is of fundamental importance to life on earth and is studied by scientists from many disciplines. It exhibits phenomena on a wide range of observable scales, timescales and wavelengths and due to technological developments there is a continuing increase in the rate at which solar data is becoming available for study which presents both opportunities and challenges. Two satellites recently launched to observe the sun are STEREO (Solar TErrestrial RElations Observatory), providing simultaneous views of the SUN from two different viewpoints and SDO (Solar Dynamics Observatory
Anaglyphs are an interesting way of generating stereoscopic images, especially in a cost-efficien... more Anaglyphs are an interesting way of generating stereoscopic images, especially in a cost-efficient and technically simple way. An anaglyph is generated by combining stereo pair of images for left and right scenes with appropriate offset with respect to each other, where each image is shown using a different color in order to reflect the 3D effect for the users who are using red/blue or red/green glasses, as represented as a 3D image or movie. The resulting anaglyph can be displayed in monochrome (yellow or gray), or in color with possibly some ghosting visible. In this paper we introduce tow techniques for improving the quality of anaglyph. The first one is to eliminate the effect of ghosting by controlling the amount of saturation while maintain the 3D visualization. The second technique is to use an enhanced Super-resolution approach. Super Anaglyph (SA) image is a term that we will refer to the anaglyph image which created by combing pair images from super resolution images rathe...
International Journal of Advanced Computer Science and Applications
Data testing is a vital part of the software development process, and there are various approache... more Data testing is a vital part of the software development process, and there are various approaches available to improve the exploration of all possible software code paths. This study introduces two contributions. Firstly, an improved version of the Multi-verse Optimizer called Testing Multi-Verse Optimizer (TMVO) is proposed, which takes into account the movement of the swarm and the mean of the two best solutions in the universe. The particles move towards the optimal solution by using a mean-based algorithm model, which guarantees efficient exploration and exploitation. Secondly, TMVO is applied to automatically develop test cases for structural data testing, particularly path testing. Instead of automating the entire testing process, the focus is on centralizing automated procedures for collecting testing data. Automation for generating testing data is becoming increasingly popular due to the high cost of manual data generation. To evaluate the effectiveness of TMVO, it was tested on various well-known functions as well as five programs that presented unique challenges in testing. The test results indicated that TMVO performed better than the original MVO algorithm on the majority of the tested functions.
IJARCCE
The concept of integrating information, communication, and some physical devices and being connec... more The concept of integrating information, communication, and some physical devices and being connected to a network to support the city operations and services efficiently is a part of building a smart city. In this research, IoT devices and GIS are utilized to predict the status of roads based on time to avoid traffic congestion. The GIS and IoT sensors are utilized to collect the required data to run the proposed research to control traffic lights. The info of each light is saved in a predefined list and equipped with three lights: red, orange, and green. These colours are used to indicate the status of the road in front of the drivers. The proposed method introduces a novel algorithm to avoid the traffic using GIS and IoT devices to avoid traffic congestion.
IJARCCE
In this research, we have developed a Smart Classrooms Management System (SCMS). The SCMS provide... more In this research, we have developed a Smart Classrooms Management System (SCMS). The SCMS provides a comprehensive solution to classroom management through the engagement of smart devices, the Internet, and computer applications. The system consists of several components; these are classroom scheduling and access control, student attendance, and lectures management. The work has been divided into three phases; In phase one, we have developed the student attendance registration and monitoring system by using the QR Code technology. The attendance system was recorded manually. The manual process required more time, labour, and prune to human errors. The manual attendance has been replaced with automatic methods that utilizes smartphones based on QR Code technology. The work has shown promising results which made classroom management smarter and more efficient.
A new technique of image fusion combining multi-focus images is proposed. It employs Discrete Mul... more A new technique of image fusion combining multi-focus images is proposed. It employs Discrete MultiWavelet Transform (DMWT) together with Fast Fourier Transform (FFT). Two source images are decomposed by FFT and DMWT first, then, treated by three different fusion rules, namely maximum selection rule, gradient rule, and absolute maximum selection rule for merging coefficients low and highfrequency sub-bands. This technique is experimentally implemented and tested on the often-used grayscale images, then the obtained results are compared with other multi-focus techniques, such as the Simple Pixels Averaging (SPA), the Principal Component Analysis (PCA), and wavelet transform (WLT). It was found that the proposed method has outperformed the formers in terms of image fusion. The comparison included the various metrics, such as correlation (CORR), MI, EN, QE, QAB/F, SD, root mean square error (RMSE), AG, and SF. Hence, based on objective and subjective evaluations, the proposed technique...
International Journal of Instruction, Jul 1, 2024
Advancements in technology have led to the widespread use of modern technologies in education, in... more Advancements in technology have led to the widespread use of modern technologies in education, including the integration of augmented reality (AR) and virtual reality (VR) technologies. During the COVID-19 era, Music learning like other applied educational disciplines, has faced many technical and application problems, especially in finding alternative educational tools that fulfill the learning purpose and preserve the expected learning outcomes. This study came to explore the effectiveness of using Virtual Reality technology in music education and to figure out the students' acceptance and their intention to use the technology. For this purpose, an interactive virtual learning environment was developed to aid students in learning the "principle of music theory", a sample group of 20 students including students with Motor Disabilities from Luminus Technical University College (LTUC) participated in the study experiment. The results of the study show that the use of virtual reality technology is effective in learning music, and also there is an acceptable degree of intention to use the technology but at a high rate among students with motor disabilities. In addition, the analysis of the results highlights the essential factors that should be considered to improve the VR learning environment and the expected learning outcomes.
Scientific reports, Feb 24, 2024
International journal of interactive mobile technologies, Nov 2, 2023
Emerging technologies in artificial intelligence (AI) and advanced optimization methodologies hav... more Emerging technologies in artificial intelligence (AI) and advanced optimization methodologies have opened up a new frontier in the field of software engineering. Among these methodologies, optimization algorithms such as the multi-verse optimizer (MVO) provide a compelling and structured technique for identifying software vulnerabilities, thereby enhancing software robustness and reliability. This research investigates the feasibility and efficacy of applying an augmented version of this technique, known as the test path distance multiverse optimization (TPDMVO) algorithm, for comprehensive path coverage testing, which is an indispensable aspect of software validation. The algorithm's versatility and robustness are examined through its application to a wide range of case studies with varying degrees of complexity. These case studies include rudimentary functions like maximum and middle value extraction, as well as more sophisticated data structures such as binary search trees and AVL trees. A notable innovation in this research is the introduction of a customized fitness function, carefully designed to guide TPDMVO towards traversing all possible execution paths in a program, thereby ensuring comprehensive coverage. To further enhance the comprehensiveness of the test, a metric called 'test path distance' (TPD) is utilized. This metric is designed to guide TPDMVO towards paths that have not been explored before. The findings confirm the superior performance of the TPDMVO algorithm, which achieves complete path coverage in all test scenarios. This demonstrates its robustness and adaptability in handling different program complexities.
Cybernetics and Information Technologies, Oct 31, 2023
Effective spam filtering plays a crucial role in enhancing user experience by sparing them from u... more Effective spam filtering plays a crucial role in enhancing user experience by sparing them from unwanted messages. This imperative underscores the importance of safeguarding email systems, prompting scholars across diverse fields to delve deeper into this subject. The primary objective of this research is to mitigate the disruptive effects of spam on email usage by introducing improved security measures compared to existing methods. This goal can be accomplished through the development of a novel spam filtering technique designed to prevent spam from infiltrating users' inboxes. Consequently, a hybrid filtering approach that combines an information gain philter and a Wrapper Grey Wolf Optimizer feature selection algorithm with a Naive Bayes Classifier, is proposed, denoted as GWO-NBC. This research is rigorously tested using the WEKA software and the SPAMBASE dataset. Thorough performance evaluations demonstrated that the proposed approach surpasses existing solutions in terms of both security and accuracy.
Advances in intelligent systems and computing, Nov 2, 2018
The vehicles care system (VCS) is developed with a service interval schedule and general guidelin... more The vehicles care system (VCS) is developed with a service interval schedule and general guidelines for the regular maintenance of several vehicles, such as cars, mini vans, pickups and tractors. This work tends to control the process of serving vehicles that require regular maintenance. The novelty of this work is about utilizing the Global Positioning System (GPS) coordinates to determine the past distances for each vehicle. This can be useful to estimate the expiry of tires, oil engine, air filter, and filter of oil engine based on the past distance after a last service without a need of using Google Map or Google Earth software. To reduce the running costs for the GPS service; an offline saving records service for the GPS coordinates is offered. Utilizing the outcome of this service provides the ability to generate another useful report between two dates/times, such as speeds, routes, and estimating the consumed fuel.
Advances in Intelligent Systems and Computing, 2018
The vehicles care system (VCS) is developed with a service interval schedule and general guidelin... more The vehicles care system (VCS) is developed with a service interval schedule and general guidelines for the regular maintenance of several vehicles, such as cars, mini vans, pickups and tractors. This work tends to control the process of serving vehicles that require regular maintenance. The novelty of this work is about utilizing the Global Positioning System (GPS) coordinates to determine the past distances for each vehicle. This can be useful to estimate the expiry of tires, oil engine, air filter, and filter of oil engine based on the past distance after a last service without a need of using Google Map or Google Earth software. To reduce the running costs for the GPS service; an offline saving records service for the GPS coordinates is offered. Utilizing the outcome of this service provides the ability to generate another useful report between two dates/times, such as speeds, routes, and estimating the consumed fuel.
Visual Informatics, Dec 1, 2022
Visual Informatics
This is a PDF file of an article that has undergone enhancements after acceptance, such as the ad... more This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will undergo additional copyediting, typesetting and review before it is published in its final form, but we are providing this version to give early visibility of the article. Please note that, during the production process, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
An online handwriting recognition (OHWR) is a tool that automatically converts screen brush strok... more An online handwriting recognition (OHWR) is a tool that automatically converts screen brush strokes into text using a special digitizer. Gesture recognition and several customized methods are employed to apply the OHWR on Thaana (Maldivian) language. This language has its own script, and it differs from the way of writing English characters in that it includes vowels derived from Arabic language. The vowels can be located above or below characters. This paper explores a customized approach on this language achieving a recognition rate of 89% from the entered text.
International Journal of Computer Science and Information Technology, 2015
The version presented here may differ from the published version or from the version of the recor... more The version presented here may differ from the published version or from the version of the record. Please see the repository URL above for details on accessing the published version and note that access may require a subscription.
The era of e-learning systems among educational organisations has grown exponentially. Educationa... more The era of e-learning systems among educational organisations has grown exponentially. Educational organisations have a competition to provide a secure wireless network service to staff members. In this paper, a novel authentication and authorization model (NAAM) has been presented to securely transmit the data in e-learning environment without affecting the system resources. As a part of the analysis, multiple encryption methods and face recognition technique are utilized to develop a complete secure e-learning model. MAC address filtering over the wireless network together with the application of pretty good privacy (PGP) encryption algorithm are presented. This model may be termed as hybrid security and authentication scheme (HSAS). The main contribution of this research is to achieve maximum security level. This was achieved by integrating the strength of OpenVPN, HMAC, AES, VLAN, sWIFI, PGP, SSL and faces recognition. The conducted experiments revealed that the performance of t...
Much research work is conducting to find algorithms for embedding hidden information that contrib... more Much research work is conducting to find algorithms for embedding hidden information that contribute in the fields of developing watermarking and steganography. The research work introduced in this paper aims to propose an approach for sending data securely by embedding a hidden cypher text in a stream of images. This study presents an algorithm for hiding information in key frames of a coloured video and then retrieving these data securely and efficiently. Two things should be taken into account, the embedded information should be invariant to the possible changes that might occur for video conversion from one format to another and not all the video frames will be used for hiding the information. Consequently, this research will focus on how to recover the exact version of the original frame in case of any manipulation or update. The proposed work can be divided into two parts, the first one is applying a data encryption method to generate ciphertext, and the second part is to embe...
International Journal of Interactive Mobile Technologies (iJIM)
Cloud computing technology is known as a distributed computing network, which consists of a large... more Cloud computing technology is known as a distributed computing network, which consists of a large number of servers connected via the internet. This technology involves many worthwhile resources, such as applications, services, and large database storage. Users have the ability to access cloud services and resources through web services. Cloud computing provides a considerable number of benefits, such as effective virtualized resources, cost efficiency, self-service access, flexibility, and scalability. However, many security issues are present in cloud computing environment. One of the most common security challenges in the cloud computing environment is the trojan horses. Trojan horses can disrupt cloud computing services and damage the resources, applications, or virtual machines in the cloud structure. Trojan horse attacks are dangerous, complicated and very difficult to be detected. In this research, eight machine learning classifiers for trojan horse detection in a cloud-based...
The Sun is of fundamental importance to life on earth and is studied by scientists from many disc... more The Sun is of fundamental importance to life on earth and is studied by scientists from many disciplines. It exhibits phenomena on a wide range of observable scales, timescales and wavelengths and due to technological developments there is a continuing increase in the rate at which solar data is becoming available for study which presents both opportunities and challenges. Two satellites recently launched to observe the sun are STEREO (Solar TErrestrial RElations Observatory), providing simultaneous views of the SUN from two different viewpoints and SDO (Solar Dynamics Observatory
Anaglyphs are an interesting way of generating stereoscopic images, especially in a cost-efficien... more Anaglyphs are an interesting way of generating stereoscopic images, especially in a cost-efficient and technically simple way. An anaglyph is generated by combining stereo pair of images for left and right scenes with appropriate offset with respect to each other, where each image is shown using a different color in order to reflect the 3D effect for the users who are using red/blue or red/green glasses, as represented as a 3D image or movie. The resulting anaglyph can be displayed in monochrome (yellow or gray), or in color with possibly some ghosting visible. In this paper we introduce tow techniques for improving the quality of anaglyph. The first one is to eliminate the effect of ghosting by controlling the amount of saturation while maintain the 3D visualization. The second technique is to use an enhanced Super-resolution approach. Super Anaglyph (SA) image is a term that we will refer to the anaglyph image which created by combing pair images from super resolution images rathe...
International Journal of Advanced Computer Science and Applications
Data testing is a vital part of the software development process, and there are various approache... more Data testing is a vital part of the software development process, and there are various approaches available to improve the exploration of all possible software code paths. This study introduces two contributions. Firstly, an improved version of the Multi-verse Optimizer called Testing Multi-Verse Optimizer (TMVO) is proposed, which takes into account the movement of the swarm and the mean of the two best solutions in the universe. The particles move towards the optimal solution by using a mean-based algorithm model, which guarantees efficient exploration and exploitation. Secondly, TMVO is applied to automatically develop test cases for structural data testing, particularly path testing. Instead of automating the entire testing process, the focus is on centralizing automated procedures for collecting testing data. Automation for generating testing data is becoming increasingly popular due to the high cost of manual data generation. To evaluate the effectiveness of TMVO, it was tested on various well-known functions as well as five programs that presented unique challenges in testing. The test results indicated that TMVO performed better than the original MVO algorithm on the majority of the tested functions.
IJARCCE
The concept of integrating information, communication, and some physical devices and being connec... more The concept of integrating information, communication, and some physical devices and being connected to a network to support the city operations and services efficiently is a part of building a smart city. In this research, IoT devices and GIS are utilized to predict the status of roads based on time to avoid traffic congestion. The GIS and IoT sensors are utilized to collect the required data to run the proposed research to control traffic lights. The info of each light is saved in a predefined list and equipped with three lights: red, orange, and green. These colours are used to indicate the status of the road in front of the drivers. The proposed method introduces a novel algorithm to avoid the traffic using GIS and IoT devices to avoid traffic congestion.
IJARCCE
In this research, we have developed a Smart Classrooms Management System (SCMS). The SCMS provide... more In this research, we have developed a Smart Classrooms Management System (SCMS). The SCMS provides a comprehensive solution to classroom management through the engagement of smart devices, the Internet, and computer applications. The system consists of several components; these are classroom scheduling and access control, student attendance, and lectures management. The work has been divided into three phases; In phase one, we have developed the student attendance registration and monitoring system by using the QR Code technology. The attendance system was recorded manually. The manual process required more time, labour, and prune to human errors. The manual attendance has been replaced with automatic methods that utilizes smartphones based on QR Code technology. The work has shown promising results which made classroom management smarter and more efficient.
A new technique of image fusion combining multi-focus images is proposed. It employs Discrete Mul... more A new technique of image fusion combining multi-focus images is proposed. It employs Discrete MultiWavelet Transform (DMWT) together with Fast Fourier Transform (FFT). Two source images are decomposed by FFT and DMWT first, then, treated by three different fusion rules, namely maximum selection rule, gradient rule, and absolute maximum selection rule for merging coefficients low and highfrequency sub-bands. This technique is experimentally implemented and tested on the often-used grayscale images, then the obtained results are compared with other multi-focus techniques, such as the Simple Pixels Averaging (SPA), the Principal Component Analysis (PCA), and wavelet transform (WLT). It was found that the proposed method has outperformed the formers in terms of image fusion. The comparison included the various metrics, such as correlation (CORR), MI, EN, QE, QAB/F, SD, root mean square error (RMSE), AG, and SF. Hence, based on objective and subjective evaluations, the proposed technique...