The concept-knowledge theory or C-K design theory explains that creativity is the conceptualization of design that is independent of any other design domain. It explains innovation, creation, and discovery within the framework...
Web bots are destructive programs that automatically fill the web form and steal the data from web sites. According to numerous web bot traffic reports, web bots traffic comprises of more than fifty percent of the total web...
Outbound logistics focuses on the distribution to the point of sales, such as - collection, storage, and distribution systems etc. Marketers must understand – what the customer wants in terms of logistics and how it can create...
This study developed an integrated model to examine the main factors affecting e-government services adoption in Saudi Arabia context. We extended the UTAUT model to explore factors affecting Saudi Arabia citizens to use...
In this study, three degrees of freedom nonlinear air cushion vehicle (ACV) model is introduced to examine the dynamic behavior of the heave and pitch responses in addition to the cushion pressure of the ACV in both time and...
We consider the problem of fully automatic brain tumor segmentation in MR images containing glioblastomas. We propose a three Dimensional Convolutional Neural Network (3D MedImg-CNN) approach which achieves high performance...
Software development through teams at different geographical locations is a trend of modern era, which is not only producing good results without costing lot of money but also productive in relation to its cost, low risk and...
In this paper, the authors propose and readapt a new concept-based approach of query expansion in the context of Arabic information retrieval. The purpose is to represent the query by a set of weighted concepts in order to...
This study reports on a case study of TQM adoption in searching for answers of why and how organizations adopt such approaches to gain competitive advantages within a Bangladeshi beverage company. It focuses organizational...
Wireless sensor networks (WSNs) are widely used for the different multimedia applications in which the data in multimedia form (e.g., images and videos) are captured by visual sensors and transmitted to base stations or...
Utilitarian ethical triage decisions with monetary value are complex and difficult to estimate, with possible benefits for a patient compared to other patients. The triage includes social and bioethical factors. A new approach...
Vast volumes of raw data are generated from the digital world each day. Acquiring useful information and chief features from this data is challenging, and it has become a prime area of current research. Another crucial area is...
The current study developed a proposed mobile app for tourism companies in Egypt and tested its usability. A survey from a group of 53 respondents was conducted based on the mobile app features which were developed by tourists....
This research evaluated the Performance of major Mobile Network Operators (MNOs) in Nigeria using Data Envelopment Analysis (DEA). The DEA method that is based on Input-oriented Constant Return to Scale (CRS) model is...
This study investigates the antecedents and consequences of trust in e-government websites in Saudi Arabia. FSQCA and Structural equation modelling were used to analyse data collected from 504 participants. The findings indicate...
In last decade, there has been a growing awareness in E-Learning which is the most recent type of distance education, and becomes a highly significant model of educational technology. Today e-Learning studies indicate that there...
This study compared the achievement emotions of Egyptian undergraduates in online versus in-person classes. A sample of 147 students completed an adapted version of the Achievement Emotions Questionnaire concerning class-related...
This paper presents a segmentation method to detect multiple sclerosis (MS) lesions in brain MRI based on the artificial immune systems (AIS) and a support vector machines (SVM). In the first step, AIS is used to segment the...
COVID-19 outbreak has created havoc around the world and has brought life to a disturbing halt claiming thousands of lives worldwide and infected cases rising every day. With technological advancements in Artificial Intelligence...
This study drew on different streams in the literature to theorize a power shift in favor of parents in the post Covid-19 era. We investigated the impact of parents’ campus site visits on university enrollment decisions by...
The aim of the study to investigate the effect and relationship between accounting of fair value according to the standard of (IFRS13) and the qualitative characteristics of accounting information. The fair value made a good...
Online reviews generated by patients on physician rating Websites (PRWs) have recently received much attention from physicians and their patients. In these reviews, patients exchange opinions as a diverse set of topics regarding...
In broad, three machine learning classification algorithms are used to discover correlations, hidden patterns, and other useful information from different data sets known as big data. Today, Twitter, Facebook, Instagram, and...
Phishing attack is a deceitful attempt to steal the confidential data such as credit card information, and account passwords. In this paper, Phish-Shelter, a novel anti-phishing browser is developed, which analyzes the URL and...
Reading information in news feed apps has become a kind of popular content consumption in recent years. However, there are contradictory conclusions about the recommendation strategies. Although some previous research has...