This study introduces a novel authentication methodology; it is based on pattern recognition of fingers size and pressure when users touch smartphone screen. By analyzing diagrams of these touches and applying data mining for the first time as an…
The article discusses the genesis of man, the human nature and the vision of the future of mankind. In a synthetic way it presents the main stages of the process of anthropogenesis. It describes the dual nature of modern man (biological and cultural…
This article aims to explore pedagogic spaces in autonomous institutions and the identities they enable. It situates this exploration in the undergraduate General English classrooms and works with the uses of differing printed-literary and…
The number of devices connected to the Internet using mobile devices is increasing every day. Charge for mobile data over 3G and 4G networks is high in some countries which pushes users to browse the Internet through text-only service. Facebook…
This research is intended to answer the question, how are the students' perceptions of internet technology in learning and how is the acceptance of Padlet as a microblogging platform for writing skills in German language level A2-B1 CEFR standards…
SMS can be utilized as a new opportunity that can be applied to improve current educational practices and processes in a variety of fields, including distance education. This study is an in-depth qualitative inquiry into distance education students’…
The main objective of this project was to evaluate the impact of the application of the virtual reality platform ImmerseMe as an empowering and innovative tool for learning English in a private university, as well as evaluating its possible future…
The use of perceptual inputs is an emerging area within HCI that suggests a developing Perceptual User Interface (PUI) that may prove advantageous for those involved in mobile serious games and immersive social network environments. Since there are a…
De facto states have moved from a periphery to the center of academicattention during the last two decades. The objective of the paper is anidentification of characteristic development trends within a set of thesenon-state territorial political…
Due to the exponential rise of mobile technology, a slew of new mobile security concerns has surfaced recently. To address the hazards connected with malware, many approaches have been developed. Signature-based detection is the most widely used…