Browse Items (3575 total)

This paper is exploring on maneuver to improve research instrument reliability in scientific research related to Educational Technology by analyzing the traditional Cronbach’s alpha reliability using SPSS software and the newer statistical tool, AMOS…

Digital technologies have become powerful tools in today society in many aspects. However, without proper knowledge and guidance, youth is   being challenged with potential hazards of cybercrimes. Hence, the purpose of this study was to compare who…

Abstract—Increasingly, blended learning courses are being offered in schools throughout China. One of the key factors influencing the effectiveness of blended learning is students’ acceptance. The researchers proposed six predictive dimensions that…

Abstract— Information technology encourages various forms of organizations to always adapt to changes so that they can sustain their business for a long time. Higher education institutions are organizational entities required to use information…

Abstract—The objective of this study is to evaluate student performance using fuzzy set theory in Islamic Finance online course. This study focuses on selecting best individual among 30 students that registered for Islamic Bank Management course. The…

Online news media and social media applications recorded an unprecedented success in just few of the recent years. However, online news media and social media domain are still little understood in term of usage among aborigines or Orang Asli in…

One of the instrumental functional overheads in many commercial edifices and industrial plants is the electricity bill. The design and development of a Smart Power monitoring device used to make monitoring on the electrical parameters represented as…

The implementation of face recognition technique using CCTV is able to prevent unauthorized person enter the gate. Face recognition can be used for authentication, which can be implemented for preventing of criminal incidents. This re-search proposed…

Security attacks become daily news due to an exposure of a security threat in a widely used software. Taking software security into consideration during the analysis, design, and implementation phases is a must. A software application should be…

Constant changes in a business context and software development make it important to understand how software quality assurance (SQA) should respond. Examining SQA from supplier and client perspectives, this study explores how different groups of SQA…
Output Formats

atom, dcmes-xml, json, omeka-xml, podcast, rss2