Browse Items (1784 total)

Cloud Computing is an environment where computing resources, such as processing power, storage, network, application, and other IT services, are provided to users as computing utility. This paper presents the university distributed databases…

Recommender systems currently used in many applications, including tourism, tend to simply be reactive to user request. The recommender system proposed in this paper uses multi-agents and multi-dimensional contextual information to achieve proactive…

Acknowledging the user context, e.g., position and activity, provides a natural way to adapt applications according to the user needs. How to actually capture and exploit context, however, is not self-evident and it is tempting to assign the related…

Abstract—Students work in sloyd [slöjd] class represents unique areas of learning. The creative, hands-on design work, as well as a mix of both individual and collaborative processes, provide options for developing multiple skills. But these…

Networked learning Community (NLC)  that integrates a professional context into the learning experience that uses learning networks to promote self-efficacy and professional development. Online Learning design integrates three techniques: focus on…

The management of the technology start-up company for development of software for mobile devices includes various activities such as creation of specification, development, implementation, sale, and maintenance of software for mobile devices, as well…

This research reports on the design aspect of a bigger project which sought to design and implement information and communication technology (ICT)-based interventions for the purpose of developing pre-service teachers’ ICT competency for teaching…

A model consisting of five dimensions of mobile learning preferences â?? location, level of distractions, time of day, level of motivation and available time â?? is proposed in this paper. The aim of the model is to potentially increase the learning…

Security and safety are critical concerns in Vehicular Adhoc Networks.  vulnerable to Distributed Denial of Service (DDoS) attacks, which occur when multiple vehicles carry out various tasks. This cause disrupts the normal functioning of legitimate…

Blockchain technology considers the central technology that is used within many applications used frequently with human life. And the primary core of the blockchain is the consensus algorithm which may affect the security of the chain as well as the…
Output Formats

atom, dcmes-xml, json, omeka-xml, podcast, rss2