Browse Items (3575 total)

AbstractـــThe study aimed at detecting the level of (nomophobia) among students in Jordan and its impact on psycho-loneliness. The findings showed that the level of nomophobia through smart phone applications among secondary school students was…

This article explores the intellectual ideas of Ake on feasibility of democratisation in Africa. Democratisation is feasible as government focuses on the real people irrespective of racial affinity. In the past, the apartheid government in South…

This research aims to analyze the patterns of data errors in order to fulfill the data required for household big data development at the sub-district level in Thailand. Feature Selection and Multi-Layer Perceptron Neural Network were applied, while…

The task of network security is to keep services available at all times by dealing with hacker attacks. One of the mechanisms obtainable is the Intrusion Detection System (IDS) which is used to sense and classify any abnormal actions. Therefore, the…

Cross-dressing, as a cultural practice, suggests gender ambiguity and allows freedom of self expression. Yet, it may also serve to reaffirm ideological stereotypes and the binary distinctions between male and female, masculine and feminine,…

The current political environment is undergoing gradual improvements that significantly change the nature of the international system. One of these changes is the growing trend of feminist foreign policy (FFP), which promises to transform the…

The districts of Jember, Bojonegoro, and Lamongan are home to Virginia tobacco shops. In Bojonegoro Regency, there are 11,522 ha and 11,517 ha of tobacco land, while there are 6697 ha and 6683 ha in Lamongan Regency. The quality of tobacco is lowered…

There is a substantive distinction between accessories who do, and those who do not,undertake to serve the beneficiaries of a fiduciary function. Where the access ofaccessories to beneficiary assets is limited, they are directly accountable as…

The Chinese perception of the increasing security challenges has prompted a shift from having “fixed mindsets of mechanized warfare” to “establishing the ideological concept of information warfare”.  In this framework of understanding,…
Output Formats

atom, dcmes-xml, json, omeka-xml, podcast, rss2