During the past decades, smart farming became one of the most important revolutions in the agriculture industry. Smart farming makes use of different communication technologies and modern information sciences for increasing the quality and quantity…
The continuous advancements in wireless network systems have reshaped the healthcare systems towards using emerging communication technologies at different levels. This paper makes two major contributions. Firstly, a new monitoring and tracking…
This paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly…
This article elaborates, explains and analyses the notion of Caribbean Convergence. This represents a new way of thinking about integration in the region, and a potential strategy for injecting the process with new life and energy. The article…
This paper introduces a new model for m- Learning context adaptation due to the need of utilizing mobile technology in education. Mobile learning; m-Learning for short; in considered to be one of the hottest topics in the educational community, many…
This paper introduces a comprehensive mobile learning (m-learning) model in the context of smart classrooms environment as a part of a holistic approach to implement an efficient Technology Enhanced Learning (TEL) Environment. In this new model, the…
Mobile apps play an increasingly important role in healthcare institutions by enhancing the quality of healthcare services. Their role in sport injury prevention is also instrumental. In this article, we propose a system architecture for ski injury…
The concept Web of Things (WoT) goes well beyond the emphasis on the Internet as a means of sharing data, instead of introducing all resources and connections involving computers, data, and people to the Web. It, therefore, focuses on a range of…
Even though many security schemes proposed for wireless sensor networks protect transmitted data content from being revealed to different types of attacks and fulfill most of the desired security requirements, they are not addressing concealing the…