|
|
|
Ahlam Fakieh and Aymen Akremi
Social engineering (SE) attacks (also called social hacking) refer to various methods used by cybercriminals to exploit the weak nature of human beings rather than the logical and physical security measures used by organizations. This research paper stud...
ver más
|
|
|
|
|
|
Xiang Chen, Shouzhi Xu, Kai Ma and Peng Chen
A consortium system can leverage information to improve workflows, accountability, and transparency through setting up a backbone for these cross-company and cross-discipline solutions, which make it become a hot spot of market application. Users of a co...
ver más
|
|
|
|
|
|
Emilio Matricciani
The purpose of the paper is to extend the general theory of translation to texts written in the same language and show some possible applications. The main result shows that the mutual mathematical relationships of texts in a language have been saved or ...
ver más
|
|
|
|
|
|
Franti?ek Babic, Vladimír Bure?, Pavel Cech, Martina Husáková, Peter Mikulecký, Karel Mls, Tomá? Nacházel, Daniela Ponce, Kamila ?tekerová, Ioanna Triantafyllou, Petr Tucník and Marek Zanker
Immense numbers of textual documents are available in a digital form. Research activities are focused on methods of how to speed up their processing to avoid information overloading or to provide formal structures for the problem solving or decision maki...
ver más
|
|
|
|
|
|
Dianrui Wang, Junhe Wan, Yue Shen, Ping Qin and Bo He
An accurate mathematical model is a basis for controlling and estimating the state of an Autonomous underwater vehicle (AUV) system, so how to improve its accuracy is a fundamental problem in the field of automatic control. However, AUV systems are compl...
ver más
|
|
|