|
|
|
Robert Bold, Haider Al-Khateeb and Nikolaos Ersotelos
Technological achievement and cybercriminal methodology are two parallel growing paths; protocols such as Tor and i2p (designed to offer confidentiality and anonymity) are being utilised to run ransomware companies operating under a Ransomware as a Servi...
ver más
|
|
|
|
|
|
Priyadarshni Suresh Sagar, Eman Abdulah AlOmar, Mohamed Wiem Mkaouer, Ali Ouni and Christian D. Newman
Understanding how developers refactor their code is critical to support the design improvement process of software. This paper investigates to what extent code metrics are good indicators for predicting refactoring activity in the source code. In order t...
ver más
|
|
|
|
|
|
Yong Jun Cho
In this study, a Level III reliability design of an armor block of rubble mound breakwater was developed using the optimized probabilistic wave height model for the Korean marine environment and Van der Meer equation. To demonstrate what distinguishes th...
ver más
|
|
|
|
|
|
Alan Koschel, Christoph Müller and Alexander Reiterer
Cameras play a prominent role in the context of 3D data, as they can be designed to be very cheap and small and can therefore be used in many 3D reconstruction systems. Typical cameras capture video at 20 to 60 frames per second, resulting in a high numb...
ver más
|
|
|
|
|
|
Dadang Juandi,Yaya Sukjaya Kusumah,Maximus Tamur,Krisna Satrio Perbowo,Muhammad Daut Siagian,Rini Sulastri,Habibi R. P Negara
Pág. pp. 18 - 37
The purpose of this study was to (1) assess the impact of using Dynamic Geometry Software (DGS) on students? mathematical abilities, (2) determine the differences in effectiveness based on study characteristics in order to help educators decide under wha...
ver más
|
|
|