I
n these days of technology, the usage of images has become increasingly high especially now that almost everyone has access to internet. Also, image helps us to learn, grabs our attention, explains complicated concepts as well as inspires us.…
— In application development lifecycle, specifically in test-driven development, refactoring plays a crucial role in sustaining ease. However, in-spite of bringing ease, refactoring does not ensure the desired behaviour of code after it is applied.…
— In light of the pandemic that has swept the world, the use of e-learning in educational institutions has become an urgent necessity for continued knowledge communication with students. Educational institutions can benefit from the free tools that…
Protecting and concealing sensitive data in the modern world is challenging. Due to insufficient protection and privacy, it is feasible for critical information to be fabricated. This led to a significant financial loss for someone. The intended…
The importance of locating a mobile phone has increased significantly during last decade for security and commercial reasons. Locating the mobile phone leads to locating people. This is done by using the most common propagation models in the mobile…
The subject of sentiment analysis through social media sites has witnessed significant development due to the increasing reliance of people on social media in advertising and marketing, especially after the Corona pandemic. There is no doubt that the…
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences…
Computer literacy is an urgent necessity for university students, given the rapid development in the means of communication in which we live in this era, and the flow of abundant information. Mainly on the computer in all administrative and academic…
The highest way to protect data from intruder and unauthorized persons has become a major issue. This matter led to the development of many techniques for data security, such as Steganography, Cryptography, and Watermarking to disguise data. This…
This study was conducted to identify elements (teaching activities) that teachers can engage with involving a combination of M-learning methods with Problem-Based Learning methods (M-PBL). This study was conducted using the Nominal Group Technique…