9 articles in this issue
Ahmed El Mahjoubi,Tomader Mazri,Nabil Hmina
5G RF technology is an essential part of the wireless mobile technology. Technically, 5G is predicted to empower people-thing and thing-thing interconnections by combining wireless technologies and networks. Our university has been actively support resear... see more
Mostafa Al-Emran,Yahya Ashour Alkhoudary,Vitaliy Mezhuyev,Mohammed Al-Emran
Mobile learning (M-learning) is relatively becoming a hot topic that attracted the interest of many scholars. Although M-learning is spreading rapidly across many countries in the world, studying the students and educators’ attitudes towards its usage is ... see more
Kwee Teck See,Bava Harji Madhubala,Ah Choo Koo
The use of mobile devices for language learning, under the Mobile Assisted Language Learning (MALL) has been found to motivate children to read digital print. However, parents need to be convinced of the benefits of this new technology-assisted learning m... see more
Mohammed Ouadoud,Tarik Chafiq,Nouha Rida,Mohamed Yassin Chkouri
The context of this work is that of designing a Instructional Management Systems - Learning Design (IMS-LD) model for collaboration space of a Learning Management System (LMS). Our work is specifically in the field or seeking to promote, by means of infor... see more
Samir Abou El-Seoud,Islam Taj-Eddin
this report will exhibit an outline of the basic features of Mobile Augmented Reality (MAR) and the key concepts of this technology in the Fashion Retail Industry. Several obstacles such as the necessity of putting on the garments to experience its actual... see more
Khalil Al-shqeerat
In Wireless Sensor Networks, no physical backbone infrastructure used while all sensor nodes are energy constrained and impractical to recharge. The behavior of networks becomes unstable once the first node dies. The key challenge in such networks is how ... see more
Ibrahim Obeidat,Nabhan Hamadneh,Mouhammd Alkasassbeh,Mohammad Almseidin,Mazen Ibrahim AlZubi
Abstract— Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanism that used to sense and classify any abnormal actions. Therefore, the IDS mu... see more
Hosam El-Sofany,Samir Abou El-Seoud
the increasing growth of mobile devices technology and Mobile-based systems with the emerging of cloud computing technology, created a Mobile Cloud Computing field to be the recent future technology for different wireless services. The development of Mobi... see more
Abubakar Adam,Adamu Abubakar,Murni Mahmud
Owing to the fact that the world population is aging and considering the high cost of healthcare services, researchers are exploiting the use of sensors to support mobile monitoring of healthcare systems remotely. However, this area is faced with numerous... see more