Stroke is the most common cause of Neurological Disability in the adult patients. Once a stroke has occurred, the patient and his/ her family are usually confronted with drastic changes in their life style. Stroke brings many adjustment problems and…
The increasing number of road accidents and deaths among children in Malaysia is a concern. One of the main causes stems from lack of knowledge and skills in dealing with the complexity and condition of the road system. Recognizing the significance…
The article focuses on the orientation of educational aids for blind people. The prototype was made with the Scrum methodology and the prototype design tool called Balsamiq was used. Its objective is to design Prototypes of mobile application…
The existing use of mobile technology nowadays can be integrated with various forms of learning materials such as electronic books and digital references in a form of dictionary or encyclopaedia. The expansion of Islamic banking practices through…
No wadays, the government agencies are looking for strategies to strengthen their newly implemented policies for the nation building. The grassroots or the customer’s sentiments is very important to develop an inclusive policy with a mixed of…
Coastal wetlands provide vital ecosystem services, including nutrient cycling, disaster risk reduction, and habitat for biodiversity, including shorebirds, seabirds, turtles and fish. How we design and implement policy approaches for the conservation…
Shipbuilding is on the verge of blooming into the major foreign revenue-earning industry in Bangladesh. A number of export-oriented shipyards are developed to deliver different kinds of ships for local and international clients. For designing a ship,…
Blockchain technology considers the central technology that is used within many applications used frequently with human life. And the primary core of the blockchain is the consensus algorithm which may affect the security of the chain as well as the…
Security and safety are critical concerns in Vehicular Adhoc Networks. vulnerable to Distributed Denial of Service (DDoS) attacks, which occur when multiple vehicles carry out various tasks. This cause disrupts the normal functioning of legitimate…
A model consisting of five dimensions of mobile learning preferences â?? location, level of distractions, time of day, level of motivation and available time â?? is proposed in this paper. The aim of the model is to potentially increase the learning…