Browse Items (1739 total)

Many communication devices, like mobile phones and PDAs, are enabled for near field communication by using Bluetooth. Many approaches dealt so far with the attempt to transfer mobile ad-hoc networks (MANET) to the mechanism of the â??fixed internet

The end to end encryption of connections over the internet have evolved from SSL to TLS 1.3 over the years. Attacks have exposed vulnerabilities on each upgraded version of the cryptographic protocols used to secure connections over the internet.…

The growing popularity of mobile devices, together with the constant technological improvement of mobile websites and applications informed about the quality of the user interface design. However, the particularities of mobile devices require special…

A module for learning about virtual and augmented reality is being developed under the U-Academy project. The module is composed of three parts. The first part is an introduction to the basic concepts of virtual and augmented reality with the help of…

This research addresses the need for a mobile application to teach Arabic sign language to deaf children in the Arab world. Therefore, the team develops an educational android application to teach deaf children the Arabic sign language using…

Smart devices applications can assist young children in improving their learning capabilities and comprehension skills. However most of learning applications are built without taking into consideration the effective needs and background of Arab…

In both wireless and mobile ad hoc networks, assaults can come from a variety of different sources. The terms "active attack" and "passive attack" describe these two types of attacks. In the network community, the Sybil attack is one of the most…

Wireless Sensor Networks (WSN) includes numerous sensor nodes that are connected to each other through the use of wireless short distance links. The transfer of data between the individual nodes is found to be energy-constrained and the…

This study aims at constructing a theoretical model to discover the main drivers on the user’s continuance intention (UCI) to use the Careem application in Jordan. This study also focuses on exploring new factors appropriate to the Jordanian…

There are several reasons why most of the universities implement E-learning. The extent of E-learning programs is being offered by the higher educational institutes in the UAE are evidently expanding. However, very few studies have been carried out…
Output Formats

atom, dcmes-xml, json, omeka-xml, podcast, rss2