The Implementation of the Qur'an in the Concept of Ijtihad by Substitute Heirs Aisyah Aulia Madzkur, Ishaq Ishaq, Muhammad Faisol Page : 10.21070/acopen.10.2025.12950 DOI : 10.21070/acopen.10.2025.12950 Abstract View : 24 PDF downloads: 6 The Phenomenon of 'Marriage Is Scary' and the Role of Premarital Guidance in Preparing the Mental and Emotional Health of Prospective Brides and Grooms Mohammad Zecky Najmudin, Ishaq Ishaq, Moh. Lutfi Nurcahyono Page : 10.21070/acopen.10.2025.12921 DOI : 10.21070/acopen.10.2025.12921 Abstract View : 209 PDF downloads: 47 The Validity of Imam Shafi‘i, Criticism, and the Influence of Yahya Bin Ma’in's Accusations on the Weakness of Transmission in Hadith Chains Mas Hasan Rifqi, Amaliyah Widya Mahanani, Afro’ Anzali Nurizzati Arifah Page : 10.21070/acopen.11.2026.12996 DOI : 10.21070/acopen.11.2026.12996 Abstract View : 56 PDF downloads: 14 Validated Culturally Responsive Science Assessment Using Integrated Content and Construct Analysis Aisyah Ali, Singgih Bektiarso, Auldry Fransje Walukow, Erlia Narulita, Akhmad Kadir Page : 10.21070/acopen.10.2025.12776 DOI : 10.21070/acopen.10.2025.12776 Abstract View : 67 PDF downloads: 43 Wireless Network Security Using Hotspot Login Authentication Method Bima Yusup Septiana, Yogi Irdes Putra, Fitri Yanti Page : 10.21070/acopen.10.2025.12146 DOI : 10.21070/acopen.10.2025.12146 Abstract View : 291 View article downloads: 75 PDF downloads: 44 Previous 81-85 of 87 Next
The Phenomenon of 'Marriage Is Scary' and the Role of Premarital Guidance in Preparing the Mental and Emotional Health of Prospective Brides and Grooms Mohammad Zecky Najmudin, Ishaq Ishaq, Moh. Lutfi Nurcahyono Page : 10.21070/acopen.10.2025.12921 DOI : 10.21070/acopen.10.2025.12921 Abstract View : 209 PDF downloads: 47 The Validity of Imam Shafi‘i, Criticism, and the Influence of Yahya Bin Ma’in's Accusations on the Weakness of Transmission in Hadith Chains Mas Hasan Rifqi, Amaliyah Widya Mahanani, Afro’ Anzali Nurizzati Arifah Page : 10.21070/acopen.11.2026.12996 DOI : 10.21070/acopen.11.2026.12996 Abstract View : 56 PDF downloads: 14 Validated Culturally Responsive Science Assessment Using Integrated Content and Construct Analysis Aisyah Ali, Singgih Bektiarso, Auldry Fransje Walukow, Erlia Narulita, Akhmad Kadir Page : 10.21070/acopen.10.2025.12776 DOI : 10.21070/acopen.10.2025.12776 Abstract View : 67 PDF downloads: 43 Wireless Network Security Using Hotspot Login Authentication Method Bima Yusup Septiana, Yogi Irdes Putra, Fitri Yanti Page : 10.21070/acopen.10.2025.12146 DOI : 10.21070/acopen.10.2025.12146 Abstract View : 291 View article downloads: 75 PDF downloads: 44 Previous 81-85 of 87 Next
The Validity of Imam Shafi‘i, Criticism, and the Influence of Yahya Bin Ma’in's Accusations on the Weakness of Transmission in Hadith Chains Mas Hasan Rifqi, Amaliyah Widya Mahanani, Afro’ Anzali Nurizzati Arifah Page : 10.21070/acopen.11.2026.12996 DOI : 10.21070/acopen.11.2026.12996 Abstract View : 56 PDF downloads: 14 Validated Culturally Responsive Science Assessment Using Integrated Content and Construct Analysis Aisyah Ali, Singgih Bektiarso, Auldry Fransje Walukow, Erlia Narulita, Akhmad Kadir Page : 10.21070/acopen.10.2025.12776 DOI : 10.21070/acopen.10.2025.12776 Abstract View : 67 PDF downloads: 43 Wireless Network Security Using Hotspot Login Authentication Method Bima Yusup Septiana, Yogi Irdes Putra, Fitri Yanti Page : 10.21070/acopen.10.2025.12146 DOI : 10.21070/acopen.10.2025.12146 Abstract View : 291 View article downloads: 75 PDF downloads: 44 Previous 81-85 of 87 Next
Validated Culturally Responsive Science Assessment Using Integrated Content and Construct Analysis Aisyah Ali, Singgih Bektiarso, Auldry Fransje Walukow, Erlia Narulita, Akhmad Kadir Page : 10.21070/acopen.10.2025.12776 DOI : 10.21070/acopen.10.2025.12776 Abstract View : 67 PDF downloads: 43 Wireless Network Security Using Hotspot Login Authentication Method Bima Yusup Septiana, Yogi Irdes Putra, Fitri Yanti Page : 10.21070/acopen.10.2025.12146 DOI : 10.21070/acopen.10.2025.12146 Abstract View : 291 View article downloads: 75 PDF downloads: 44 Previous 81-85 of 87 Next
Wireless Network Security Using Hotspot Login Authentication Method Bima Yusup Septiana, Yogi Irdes Putra, Fitri Yanti Page : 10.21070/acopen.10.2025.12146 DOI : 10.21070/acopen.10.2025.12146 Abstract View : 291 View article downloads: 75 PDF downloads: 44 Previous 81-85 of 87 Next