|
|
|
Kenneth David Strang
A critical worldwide problem is that ransomware cyberattacks can be costly to organizations. Moreover, accidental employee cybercrime risk can be challenging to prevent, even by leveraging advanced computer science techniques. This exploratory project us...
ver más
|
|
|
|
|
|
|
Fu-Yuen Hsiao
This study investigated the variation of the osculating orbit elements of a spacecraft propelled by photonic laser propulsion (PLP) under the two-body problem assumption. The PLP thrusting system can produce continuous and constant thrust. This paper fir...
ver más
|
|
|
|
|
|
|
Ondrej Rozinek and Jan Mare?
We introduce a new mathematical basis for similarity space. For the first time, we describe the relationship between distance and similarity from set theory. Then, we derive generally valid relations for the conversion between similarity and a metric and...
ver más
|
|
|
|
|
|
|
Theo Lynn, Pierangelo Rosati and Binesh Nair
Mobilization theory posits that social media gives a voice to non-traditional actors in socio-political discourse. This study uses network analytics to understand the underlying structure of the Brexit discourse and whether the main sub-networks identify...
ver más
|
|
|
|
|
|
|
Oleksandr Lemeshko, Maryna Yevdokymenko
Pág. 169 - 182
The subject of research in the article is the processes of inter-domain routing with ensuring the end-to-end quality of service. The aim of the work is to develop a method of hierarchical inter-domain routing with ensuring the end-to-end quality of servi...
ver más
|
|
|
|
|
|
|
Urooj Q. Amjad, Edema Ojomo, Kristen Downs, Ryan Cronk and Jamie Bartram
The terms sustainability, scaling up, and enabling environment are inconsistently used in implementing water supply projects. To clarify these terms we develop a framework based on Normalization Process Theory, and apply the framework to a hypothetical w...
ver más
|
|
|
|