Browse Items (1739 total)

With the availability of mobile devices capable of accessing the Internet in the Industry 4.0 era, M-learning methodology has been established. Based on the Technology Acceptance Model on technology adoption, this article analyses factors affecting…

The mobile devices related industries are subject to rapid change, driven by technological advances and dynamic consumer behaviour. Hence, the understanding of the mobile devices markets is an important step in the analysis phase of mobile…

Today, every business depends on Information Technology (IT) for the efficient service delivery and cost-effective application of technological resources. Modern technologies are being adopted to overcome business pressure, streamline existing…

Abstrait-Ce travail vise à étudier comment une expérience de formation à distance de trois jours pour enseignants, programmée d'urgence, pour développer chez ces enseignants les capacités d'utilisation de la plateforme numérique, la création et la…

This research presents a chatbot application to provide educational information for university students. There are three objectives: 1) to study the problem of providing information to university students with chatbots, 2) to develop a model and…

The graduation projects (GP) are important because it reflects the academic profile and achievement of the students. For many years’ graduation projects are done by the information technology department students. Most of these projects have great…

There are many benefits from using AbL and WbL, especially in the learning process through all subjects. Also, it is necessary always to discover novelty, innovation, improvement, and development of AbL or WbL to increase the quality of the study…

The existence of mobile learning application has provided an opportunity for Islamic knowledge to be delivered widely. Accordingly, Muslim application developers have been developing Islamic-based applications for learning about hadith, prayer…

Leaf identification image is consistently a difficult task when using computer vision. The convolutional component extraction methods on images have their impediment and limitation, such as low accuracy, are not adaptable and less promising when…

Considering that application security is an important aspect, especially nowadays with the increase in technology and the number of fraudsters. It should be noted that determining the security of an application is a difficult task, especially since…
Output Formats

atom, dcmes-xml, json, omeka-xml, podcast, rss2