Considering that application’s security is an important aspect, especially nowadays with the increase in technology and the number of fraudsters. It should be noted that determining the security of an application is a difficult task, especially since…
In this paper, popular routing protocols for Wireless Sensor Networks (WSNs) are studied. There are many issues and challenges that effect routing of data. First, high energy is consumed which reduces network lifetime. Second, security of routing…
Abstract— Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanism that used to sense and classify any abnormal actions. Therefore, the…
The Saudi Arabian government is committed to updating and improving its education system. Thus, in March 2017, a project was declared to convert the existing book-based methodology to modern, mobile technology in the K-12 education space by 2021. As…
The evolution of the current centric cloud to distributed clouds such as fog presents a suitable path to counteract the intolerable processing delays for time-critical applications. It is anticipated that more fog nodes (FN) will be connected to the…
Social networks (SNs) have become a significant part of daily life. It has become one of the most effective ways in which people communicate with each other. Huge amounts of data are generated and shared through SNS worldwide, where users share their…
Using ICTs in education allows the effective integration of new technologies into the educational process. Developing information and communication technologies also require timely changes in knowledge evaluation and use. As a result, methods,…
The study aims to identify the impact of blended learning using the Ideas Box on the motivation toward learning among non-formal education female students in the Syrian refugee camps in Jordan. A semi-experimental approach was adopted; the sample of…
Cloud-based enterprise resource planning (ERP) and cloud computing are critical requirements for all SMEs since they can be used to facilitate the SMEs’ growth by creating competitive and personalized innovations considering their required business…
The existing technological expansion has transformed pervasive revolutions in modern civilization, with continuing innovation of services and products. Nowadays people are having different channels of communication. Currently, mobile learning…