The article analyzes the specific features of project work organization in English classes with blended mobile learning with the participation of students who previously haven't studied foreign languages or had school experience in learning other…
This paper addresses the Computational Fluid Dynamics Approach (CFD) to simulate the flow over underwater axisymmetric bodies at higher angle of attacks. Three Dimensional (3D) flow simulation is carried out over MAYA Autonomous Underwater Vehicle…
This study reports on redesigning learning outcomes in terms of postgraduates’ communication skills through science media communication with the aim for interactive teaching and learning. Communication in science education entails the image of…
The recent achievements in mobile technology and wearable OS makes possible to create comfortably wearable and very capable smartwatches. They have many different sensors and powerful hardware combined with general purpose OS and all this available…
Nowadays, natural disasters tend to increase and become more severe. They do affect life and belongings of great numbers of people. One kind of such disasters that hap-pen frequently almost every year is floods in all regions across the world. A…
Due to the increased rate of fire accidents which cause many damages and losses to people souls, material, and property in Basra city. The necessity of analyzing and mining the data of the fire accidents became an urgent need to find a solution. The…
In the regions of Chinese as the first language, children with backward Chinese characters ability are more likely to give up reading the subject content of long texts, which affects their learning in the long term. This study applies augmented…
There have been lots of studies using traditional concept assessment to measure student’s learning achievement. This study adding game elements in concept assessment try to measure student’s learning achievement, and compare this result with…
Mobile enterprise applications (apps) are developed in dynamic and complex environments. Hardware characteristics, operating systems and development tools are constantly changing. In larger institutions, comprehensive corporate guidelines and…
This paper researches the evolution process of what is called two-factor authentication technique and its adaptation related to the educational system through the Internet. This technique is a measure of security employed, particularly in scopes…