Abstract— Social media are widely used as communication platforms in the world of business. Twitter, in particular, offers valuable opportunities for collaboration due to its open nature. For that, many entrepreneurs employ Twitter for different…
The present study investigated elementary school teachers' competency in relation to their sex and age in India and Iran. 484 teachers were selected through Simple Random Sampling from elementary schools of Mysore city (India) and Arak city (Iran).…
The purpose of this paper is to propose and test an integrated model of mobile advertising taking into consideration the exclusive characteristics of Malaysian consumers. The survey research method has been used to collect data among young mobile…
Different models had been developed to predict crop yields based on remotely sensed data. Most approaches were based on developing empirical relationships between the Satellite based Normalized difference vegetation index NDVI data and the crop…
The study investigates the nature and degree of influence of the range of application usability variables on the learning experience of the students at a specific institution of higher education institution in Oman. The study was carried out via…
Digital technologies have been earsplittingly discussed for a long time with multi-sides of enormous benefits and challenges in educational application. When the Covid19 pandemic has outbreak worldwide, global governments have popularly employed the…
The purpose of the study was to explore the developments in ‘e-services and e-service quality’ from 2000 to 2020. Data Source: Scopus database was used to conduct the bibliometric analysis of 404 documents. Method: VOSviewer soft-ware was used to…
Multipath TCP (MPTCP) is a project that has proposed by IETF group to allow packet streams to be separated across multiple sub-flow paths. MPTCP brings a great benefit in throughput, reliability, and fairness. However, MPTCP can be implemented in a…
The highest way to protect data from intruder and unauthorized persons has become a major issue. This matter led to the development of many techniques for data security, such as Steganography, Cryptography, and Watermarking to disguise data. This…
The paper aim is to come up with methodology for performing video learning data history of learner’s video watching logs, video segments or time series data in accordance with learning processes via mobile technologies. To reach this goal, it is…