Browse Items (1981 total)

Abstract—The objective of this study is to evaluate student performance using fuzzy set theory in Islamic Finance online course. This study focuses on selecting best individual among 30 students that registered for Islamic Bank Management course. The…

Internet users all over the world are highly exposed to social media exploitation, where they are vulnerable to be targeted by this cyber-attack. Furthermore, excessive use of social media leads to Internet Addiction Disorder (IAD). Fortunately,…

In a social context, Mobile Augmented Reality is a type of Augmented Reality which enables users to interact with the augmented environment. However, the degree of engagement and non-distraction of Mobile Augmented Reality has been of major concern…

Mobile Augmented Reality (MAR) has grown exponentially over the last four decades from imagination to real physical experience, especially in education. Previously, experts have completed the concepts of effectiveness, usability, acceptance and…

Many studies have begun to consider how to ensure a pleasant experience during visits to cultural heritage sites and museums. Although, when considering the populace of the visitors to these sites, the hearing impaired (HI) visitors which made up of…

The increasing number of road accidents and deaths among children in Malaysia is a concern. One of the main causes stems from lack of knowledge and skills in dealing with the complexity and condition of the road system. Recognizing the significance…

There is a significant increase in road accident statistics in Malaysia and this reflects the culture formed among users related to road safety. In developing a positive road safety culture, road safety education should be introduced from an early…

Aquaponics is one of the agricultural production technological advancements that should be publicized. Climate change, population expansion, water scarcity, soil degradation, and food security are just a few of the world's most pressing issues.…

Nowadays, social networks become popular with the emerging of web-based social networking services. Recently, several mobile services are developed to connect users to their favourite social networks such as Facebook, Twitter, Flickr, etc. However,…

Cyberattacks have increased in tandem with the exponential expansion of computer networks and network applications throughout the world. In this study, we evaluate and compare four features selection methods, seven classical machine learning…
Output Formats

atom, dcmes-xml, json, omeka-xml, podcast, rss2