Nowadays, individuals and organizations areincreasinglytargeted by phishing attacks,soan accurate phishing detectionsystemisrequired. Therefore, many phishing detection techniques have been proposed as well as phishing datasets have been collected.…
Currently, cloud computing is facing different types of threats whether from inside or outside its environment. This may cause cloud to be crashed or at least unable to provide services to the requests made by clients. In this paper, a new technique…
One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messaging between two sides without detection. In this paper, an…
Technology plays a major role in our daily lives. In healthcare, technology assists in treating and detecting diseases and can improve patients’ quality of life. Alzheimer’s disease patients are generally elderly people who suffer from disabilities…
The traditional learning process used in schools is outdated. Students nowadays spend most of their time using technologies for entertainment and to communicate with their friends. Technology can also be used to present opportunities in teaching…
Dyslexia is a problem that an individual has since birth; it poses difficulties for the rest of their life, similar to other learning disabilities. Spelling, writing, reading and in certain instances speech can all be undermined by the language…
Smartphones and Mobile App are drawing closer to an acceptable learning tool, especially related to history that are viewed as a tool which control the present and build the future, and the study of history is the practical application of the Qur'an…
Considering that application security is an important aspect, especially nowadays with the increase in technology and the number of fraudsters. It should be noted that determining the security of an application is a difficult task, especially since…
Considering that application’s security is an important aspect, especially nowadays with the increase in technology and the number of fraudsters. It should be noted that determining the security of an application is a difficult task, especially since…
In this paper, popular routing protocols for Wireless Sensor Networks (WSNs) are studied. There are many issues and challenges that effect routing of data. First, high energy is consumed which reduces network lifetime. Second, security of routing…