The Civil Liability Acts place significant limitations and caps on the damages that are recoverable for claims caught by those Acts or relevant parts thereof. Such limitations and preclusions significantly impact on what were plaintiffs’ existing…
This document is a report on the findings of a study aims to investigate human motivations affecting an adoption decision for smartphone among Peruvian university students. This research investigates smartphone users’ perception using a technology…
The Massive open online courses (MOOCs) have been introduced over the past few decades to account for the twenty-first-era education and recent COVID-19 pandemic trials driven by the spread of internet-based technology on the internet. This research…
Abstract— Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanism that used to sense and classify any abnormal actions. Therefore, the…
Multi-factorial contribution of bio-psychological and social constitution has been established as a maintaining factor for chronic illnesses like Schizophrenia. Current case study depicts how long term impairments can have considerable effects on a…
SMS spam messages represent one of the most serious threats to current traditional networks. These messages have been particularly prevalent overseas and are harmful to various types of devices. The current filtering scheme employed in conventional…
Using ICTs in education allows the effective integration of new technologies into the educational process. Developing information and communication technologies also require timely changes in knowledge evaluation and use. As a result, methods,…
The novel coronavirus (COVID-19) has become widespread around the world. It started in Wuhan, China, and has since spread rapidly among people living in other countries. Hence, the World Health Organization has considered COVID-19 as a pandemic that…
Innovative applications are employed to enhance human-style life. The Internet of Things (IoT) is recently utilized in designing these environments. Therefore, security and privacy are considered essential parts to deploy and successful intelligent…
The rate of smartphone purchases is rising daily, and mobile payments are now frequently accepted in various areas. It is essential to transfer money completely safe as well as quick. The encrypted distributed ledgers function provides verified…