Browse Items (1784 total)

One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messaging between two sides without detection. In this paper, an…

The wireless communication system was investigated by novel methods, which produce an optimized data link, especially the software-based methods. Software-Defined Radio (SDR) is a common method for developing and implementing wireless communication…

With the rise of IOT devices and the systems connected to the internet, there was, accordingly, an ever-increasing number of network attacks (e.g. in DOS, DDOS attacks). A very significant research problem related to identifying Wireless Sensor…

Nowadays, smartphones are not only used for communication purposes but also for gaming and studying. Gaming is trendy among adolescents in daily activity. The gamification of chemistry concepts, therefore, becomes very interesting and promising to…

The advance of increasingly sophisticated technology, in the era of the industrial revolution 4.0, led to the patterns of digital economy, artificial intelligence, big data, and robotic, known as the phenomenon of disruptive innovation. This change…

— In these days of online commerce, we need to know the real behavior of consumers in physical stores: the points of sale must anticipate the purchasing decisions of consumers in order to be able to offer the best buying experience as well as tailor…

Nowadays, e-learning management systems are used in many universities around the world. In Saudi Arabia, universities use several systems such as Moodle and Blackboard. However, only little empirical research has been conducted on Saudi students’…

In the present era, due to technological advances, the problem of energy consumption has become one of the most important problems for its environmental and economic impact. Educational buildings are one of the highest energy consuming institutions.…

This paper introduces a new approach named ‘Find My Parked Car’ to provide the user with the return way for his parked car location in the indoor garage of a multi-storey building where GPS is denied using the acquisition data obtained from the…

Growing of time-sensitive applications such as streaming multimedia, voice over IP and online gaming required strongly support from mobile communication technology. So, the persistent need for wireless broadband technologies such as LTE-A is…
Output Formats

atom, dcmes-xml, json, omeka-xml, podcast, rss2