Many companies, such as Aramex, FedEx, and SMSA, offer product delivery services. However, the delivery process through these companies is costly and/or requires the customer’s physical attendance at the company to get the sent shipments. There is a…
The purpose of the proposed research is to design and implement a LabVIEW-based remote lab client to run on a TCP/IP enabled PDA (Personal Digital Assistant) device, thus teaching using this wireless m-learning system will not be limited by time and…
Sustainable development has underlined the relevance of education and culture in the specific area. While place-based learning has been shown to be a successful community-oriented approach, this study combined the participation of people in a variety…
The success of information systems research has begun to decline in the past few years, but existing research is still inaccurate in its definition and in the factors that affect the success of the information system. The purpose of this research is…
Abstract— This document presents the design and development of an integrated library management system based on the needs assessment conducted in response to technology, infrastructure, existing condition, facilities, technology readiness of human…
This study was undertaken to address the need to modernize the modes of teaching and learning pedagogy by taking advantage of the proliferation of electronic gadgets and mobile devices since, as counted there are more computers than the people in the…
This research presents the development of online teachers-students consultation application. A need assessment was conducted to determine what subjects, which activities, respondents’ preference and attitude towards face-to-face and online…
Recently, the study of emotional recognition models has increased in the human-computer interaction field. With high recognition accuracy of emotions’ data, we could get immediate feedback from mobile users, get a better perception of human behavior…
Threats towards information systems have continued to increase and become more sophisticated, making security approaches a necessity for all types of organizations to ensure their protection. To implement an appropriate computer security policy, it…