Browse Items (3575 total)

Over the course of the twentieth century, Japan has experienced a radicalshift in its self-perception. After World War II, Japan embraced a peacefuland anti-militarist identity, which was based on its war-prohibitingConstitution and the foreign…

This study aims to uncover and describe the transformation of the meaning of learning at the millennial generation mindset. The research approach used is a qualitative research method through a naturalistic phenomenological design. The research…

This study aims (1) to analyze the use of various disruptive community learning resources during the Covid-19 period in terms of characteristics, levels, and types of learning resources used by lecturers in lectures, and (2) to find out the…

This contribution reviews and comments on recent scholarship on thepolitics of the COVID-19 pandemic, focusing on how vulnerability wasconstructed and studied. We reflect on the various meanings ofvulnerability and suggest political science should go…

Beside the increasing trend of cloud computing and mobile applications, the use of cloud based mobile learning applications is also mounting. Almost every e-commerce service provider offers cloud based mobile learning applications so that they can…

The purpose of this research was to produce a model that can be used as a reference in implementing hybrid learning and Problem Based Learning (PBL) in learning with the MoLearn application. This research was included in Research and…

The security strategy of a nation is based on harnessing the cumulative strength of its various instruments of national power. These, amongst others, include the economy, diplomacy, information and military. Nations periodically undertake the…

the rapid development of mobile technologies allows platform devices to perform sophisticated tasks, including character recognition. These identification systems are notable techniques that required high computation cost, in order to achieve…

A white fist punches the air, grasping tightly to a fluorescent green dollar bill — the Buycott app’s icon pictorially represents the power of consumer decisions. Buycott was developed by freelance programmer Ivan Pardo and released in May 2013 in…

Protecting and concealing sensitive data in the modern world is challenging. Due to insufficient protection and privacy, it is feasible for critical information to be fabricated. This led to a significant financial loss for someone. The intended…
Output Formats

atom, dcmes-xml, json, omeka-xml, podcast, rss2