Browse Items (1784 total)

this report will exhibit an outline of the basic features of Mobile Augmented Reality (MAR) and the key concepts of this technology in the Fashion Retail Industry. Several obstacles such as the necessity of putting on the garments to experience its…

The conventional and most common way to measure the interior of a room is using a measuring tape and other similar tools. However, it is not productive and often more than one worker is required to assist the measurement process. The goal of this…

A body of literature has suggested the benefits of flipped classrooms in mathematics learning at university. However, there is still a lack of evidence regarding the benefits in the context of mathematics teacher education programme. This study aimed…

Many communication devices, like mobile phones and PDAs, are enabled for near field communication by using Bluetooth. Many approaches dealt so far with the attempt to transfer mobile ad-hoc networks (MANET) to the mechanism of the â??fixed internet

The end to end encryption of connections over the internet have evolved from SSL to TLS 1.3 over the years. Attacks have exposed vulnerabilities on each upgraded version of the cryptographic protocols used to secure connections over the internet.…

The growing popularity of mobile devices, together with the constant technological improvement of mobile websites and applications informed about the quality of the user interface design. However, the particularities of mobile devices require special…

A module for learning about virtual and augmented reality is being developed under the U-Academy project. The module is composed of three parts. The first part is an introduction to the basic concepts of virtual and augmented reality with the help of…

This research addresses the need for a mobile application to teach Arabic sign language to deaf children in the Arab world. Therefore, the team develops an educational android application to teach deaf children the Arabic sign language using…

Smart devices applications can assist young children in improving their learning capabilities and comprehension skills. However most of learning applications are built without taking into consideration the effective needs and background of Arab…

In both wireless and mobile ad hoc networks, assaults can come from a variety of different sources. The terms "active attack" and "passive attack" describe these two types of attacks. In the network community, the Sybil attack is one of the most…
Output Formats

atom, dcmes-xml, json, omeka-xml, podcast, rss2