Browse Items (3575 total)

Education is experiencing rapid revolution from the chalk to the computer. Since then, education and technology are moving forward with advanced technology. Furthermore, with the positive impact derived from previous research, Augmented Reality (AR)…

Traditional temperature monitoring system for blood delivery requires a USB cable to extract data after delivery has been completed. Without real-time temperature data during delivery, the quality of the products cannot be monitored efficiently. In…

The multiple singularity behaviour of flow through a porous pipe with decelerating wall is numerically studied in the present paper. The behaviour of the Riccati equation is introduced as a model problem. Then the steady axisymmetric flow of a…

The paper presents the semi-numerical solution for the magnetohydrodynamic (MHD) viscous flow due to a shrinking sheet caused by boundary layer of an incompressible viscous flow. The governing three partial differential equations of momentum…

Mobile Ad hoc Networks (MANETs) are getting essential to wireless communications because of the growing popularity of mobile devices. However, mobile devices face several challenges in their resources (eg., battery life, storage, and bandwidth) and…

Enterprises are adopting the Internet of Things paradigm as a strategy to improve competitiveness. But enterprises also need to rely on their legacy systems, which are of vital importance to them and normally difficult to reconfigure or modify, their…

The announcement by the Prime Minister, Narendra Modi in his Independence Day address to the nation of Government's intent to appoint a Chief of Defence Staff (CDS) marked the gamechanger event that the country was to embark upon. The subsequent…

The advancement of mobile communication technologies has created a new form of social network for communities to communicate and share similar interests via the mobile platform. Given the fact that Malaysia is a fast-paced developing nation with a…

 This paper researches the evolution process of what is called two-factor authentication technique and its adaptation related to the educational system through the Internet. This technique is a measure of security employed, particularly in scopes…
Output Formats

atom, dcmes-xml, json, omeka-xml, podcast, rss2