Open networks enable data communication between different types of mobile devices that showcase the need to enforce elevated security measures. Securing sensitive or confidential data in mobile phones is accomplished by implementing a diverse range…
The present article is concerned with identifying the linguistic and extralinguistic features of Instagram, Twitter, and Live Journal hypertexts, depending on their functional focus. The relevance of the topic is due to the need for a more detailed…
Data collected from the profiles and the digital identities has become a valuable currency for the mobile ecosystem, especially between users and providers. Services that required them are also described as the ground floor in direct linked with the…
Focusing on the issue of host load estimating in mobile cloud computing, the Long Short Term Memory networks (LSTM)is introduced, which is appropriate for the intricate and long-term arrangement information of the cloud condition and a heap…
This paper presents a simple approach to providing location-based services (LBSs) for the remotely located educational and health institutes on demand, particularly in emergency situations i.e., COVID-19, using an antenna array. The proposed approach…
Understanding player behavior in a game is quite important to know people model thinking. Through puzzle games, people can train spatial abilities in a geometry lesson. Spatial ability consists of five groups, one of them is perceptual speed. The…
Threats towards information systems have continued to increase and become more sophisticated, making security approaches a necessity for all types of organizations to ensure their protection. To implement an appropriate computer security policy, it…
Sungai Pusu is the river that passes through the IIUM Gombak campus. The river has been having a cloudy appearance for years hence it is needed to quantify the vital signs such as pH, temperature, and turbidity because these are the vital signs…
Due to the COVID-19 pandemic, the world's population has undergone different changes in which an impact on the use of the internet stands out from daily aspects such as education, commerce, health, among others; which has made us highly dependent on…
A surveillance system is still the most exciting and practical security system to prevent crime effectively. The primary purpose of this system is to recognize the identity of the face caught by the camera. With the advancement of the Internet of…