Browse Items (1784 total)

The evolution of the current centric cloud to distributed clouds such as fog presents a suitable path to counteract the intolerable processing delays for time-critical applications. It is anticipated that more fog nodes (FN) will be connected to the…

Organism network systems provide a biological data with high complex level. Besides, these data reflect the complex activities in organisms that identifies nonlinear behavior as well. Hence, mathematical modelling methods such as Ordinary…

The pandemic situation forces us to use technology in learning. Likewise, prospective teachers who do field practice must prepare themselves to learn to use technology. So to overcome this, research was conducted to determine the validity,…

Using technology to deliver specific human interests is gaining attention. It results in humans being presented differently with what each individual wants. Therefore, this research aims to develop a culturally tourism recommended application using…

The purpose of this study is to conduct a bibliometric analysis of publications on 3D animation in the Scopus database. Microsoft Excel, VOSviewer for data visualisation, and Harzing's Publish or Perish for citation metrics and analysis were employed…

This article reviews mobile assisted second language learning (MASLL) with a bibliometric method. The authors collected data of papers related to MASLL from Web of Science and then analyzed the sources, authors, papers, and conceptual structure. The…

Gas Leakage and its fatal effects are a great concern throughout the world, especially in developing countries like Bangladesh. Every year lots of people died and countless damages to assets occur due to the fire caused by the gas leakage. Not only…

Mobile phones that accept input by a user’s finger motion are becoming increasingly common. However, they still have challenging problems to research, such as the ergonomic and safety aspects. As an outcome, more research required its capabilities…

In both wireless and mobile ad hoc networks, assaults can come from a variety of different sources. The terms "active attack" and "passive attack" describe these two types of attacks. In the network community, the Sybil attack is one of the most…

Dark web is a canopy concept that denotes any kind of illicit activities carried out by anonymous persons or organizations, thereby making it difficult to trace. The illicit content on the dark web is constantly updated and changed. The collection…
Output Formats

atom, dcmes-xml, json, omeka-xml, podcast, rss2