Browse Items (3575 total)

The existing use of mobile technology nowadays can be integrated with various forms of learning materials such as electronic books and digital references in a form of dictionary or encyclopaedia. The expansion of Islamic banking practices through…

Having a share of over 80% of the smartphone market, Android has become an important mobile operating system that is used by billions of users on daily basis. With the widespread use of smartphones in general, and Android in specific, privacy…

Classifying bubbles in liquids is a crucial problem that is demanded within multiple fields. This paper discusses a new method for classifying bubble sizes in non-contact and inexpensive approach using ultrasound analysis. Exploiting the principle of…

M-learning has the potential to take education out of classroom boundaries. Based on the device used, any student/learner can access a vast area of content. Varying from podcasts to videos, participate in virtual lessons or just ask a mentor over the…

Malwares are increasing rapidly. The nature of distribution and effects of malwares attacking several applications requires a real-time response. Therefore, a high performance detection platform is required. In this paper, Hadoop is utilized to…

Since cloud computing technology is growing day by day, it comes with many security problems, especially from threats such as malware. As more services migrate to the cloud architecture, the cloud will become a more appealing target for cyber…

We describe a SMS-based information system called CATS, which allows posting and searching through free Arabic text using Information Extraction (IE) technology. We discuss the challenges of applying IE technology for unedited real Arabic text. In…

Children with special needs face major difficulties to understand the script of stories. They cannot comprehend the words’ meaning properly. Instructors use different techniques to explain them. They read the script several times, use glossy images,…

There are continuous threats to network technologies due to its rapidly-changing nature, which raises the demand for data-safe transmission. As a result, the need to come up with new techniques for securing data and accommodating the growing…
Output Formats

atom, dcmes-xml, json, omeka-xml, podcast, rss2