Browse Items (1981 total)

In the present paper, the effect of magneto-hydrodynamic (MHD) on mixed convection flow within a lid-driven triangular cavity has been numerically investigated. The bottom wall of the cavity is considered as heated. Besides, the left and the inclined…

This development study aims to 1) create a learning model that fuses e-learning, a mobile app, character building, and outdoor study and 2) determine the effectiveness of the EMCO learning model on student learning outcomes. This study uses a…

Abstract— This study aims to develop an Arduino-based Sit Up test measuring instrument and an Ultrasonic sensor with an Android application, with the hope of providing effectiveness and efficiency in calculating Sit Up tests with more accurate…

Nowadays, individuals and organizations areincreasinglytargeted by phishing attacks,soan accurate phishing detectionsystemisrequired. Therefore, many phishing detection techniques have been proposed as well as phishing datasets have been collected.…

Currently, cloud computing is facing different types of threats whether from inside or outside its environment.  This may cause cloud to be crashed or at least unable to provide services to the requests made by clients. In this paper, a new technique…

One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messaging between two sides without detection. In this paper, an…

Technology plays a major role in our daily lives. In healthcare, technology assists in treating and detecting diseases and can improve patients’ quality of life. Alzheimer’s disease patients are generally elderly people who suffer from disabilities…

The traditional learning process used in schools is outdated.  Students nowadays spend most of their time using technologies for entertainment and to communicate with their friends.  Technology can also be used to present opportunities in teaching…

Dyslexia is a problem that an individual has since birth; it poses difficulties for the rest of their life, similar to other learning disabilities. Spelling, writing, reading and in certain instances speech can all be undermined by the language…

Considering that application security is an important aspect, especially nowadays with the increase in technology and the number of fraudsters. It should be noted that determining the security of an application is a difficult task, especially since…
Output Formats

atom, dcmes-xml, json, omeka-xml, podcast, rss2