Browse Items (3575 total)

This study aimed to investigate the effect of a digital mind map (DMM) assisted group investigation (GI) on students’ creativity in higher education. A pre-test post-test nonequivalent control group design was employed in this study. The study was…

Enterprises are adopting the Internet of Things paradigm as a strategy to improve competitiveness. But enterprises also need to rely on their legacy systems, which are of vital importance to them and normally difficult to reconfigure or modify, their…

These days there is a huge demand in “storing the information available in paper documents into a computer storage disk”. Digitizing manual filled forms lead to handwriting recognition, a process of translating handwriting into machine editable text.…

Industry 4.0 is a strategic initiative recently introduced by the German government. The goal of the initiative is transformation of industrial manufacturing through digitalization and exploitation of potentials of new technologies. An Industry 4.0…

This document is a report on the findings of a study aims to investigate human motivations affecting an adoption decision for smartphone among Peruvian university students. This research investigates smartphone users’ perception using a technology…

Learning three-dimensional shape of geometry is important for improving students’ spatial abilities. However, the concept of three-dimensional shape is still considered as one of difficult subject matters for teacher to teach and for student to…

Egypt is a place with a long tradition of female participation in revolutions. After years of Mubarak’s despotism, women joined the revolution once again. As a result, they had to deal with the violation of women’s rights. When Morsi was removed,…

The recent considerable loss of many of Taiwan’s diplomatic allies remainsunchanged. The authors of the article focus on the period between 2016and 2018, when the People’s Republic of China (PRC) established itsdiplomatic ties with Taiwan’s former…

This book scrutinizes how contemporary practices of security have come torely on many different translations of security, risk, and danger.Institutions of national security policies are currently undergoing radicalconceptual and organisational…
Output Formats

atom, dcmes-xml, json, omeka-xml, podcast, rss2