The spread of new pandemic novel Corona-Virus (COVID-19) brought violent changes in livelihood. It was difficult to control and cause Curfew in many countries, disrupted life, Imposing conditions for social distancing, masks because of unavailable of…
Gender Disparity is a universal phenomenon. The effect is more evident in an organisational setup. Two common forms of gender disparity are sticky floor effect and glass ceiling effect. Glass ceiling effect refers to the barriers that prevent women…
In recent years, there has been a growing debate on the nature of Jurisprudence. Conventionally understood as the theory and philosophy of law, Jurisprudence in the modern era, has had to deal with issues manating from the more 'earthy' realms of…
Reliability analysis is essential to reduce the structural system failures to an acceptance level. In this paper, a quasi-Monte Carlo Simulation method called âRandom Polar Sampling Technique' (RPST) has been described for the reliability analysis…
The rising and acceleration of the Shia armed group in Iraq, Syria, Yemen, and Lebanon require a deep understanding of the root of the multi-dimensional conflicts in the Middle East. An appropriate and sufficient approach to the research about these…
Nowadays, computers and mobile devices play a huge role in our daily routines; they are used at work, for private purposes and even at school. Moreover, they are used as support for different kinds of activities and task, like for example, learning…
Online media-assisted learning is becoming a necessity at this time, where users have a level of interest in using mobile devices. YouTube has been used by several universities as a learning medium that complements conceptual understanding. This…
The traditional multiple reserves and resounding costs of increase of the corporal volume can be replaced by a distributed file model of divided data employing algorithms, multidimensional integrity, and resilience to complete losses of the storage…
The task of network security is to keep services available at all times by dealing with hacker attacks. One of the mechanisms obtainable is the Intrusion Detection System (IDS) which is used to sense and classify any abnormal actions. Therefore, the…