|
|
|
Robert Czerniawski and Tomasz Krepski
Fish occurring in the outlets of water basins reduce the abundance of zooplankton. The study was performed at the outlet sections of the lake and waste stabilization pond of a sewage treatment plant. The aim of the study was to determine which zooplankto...
ver más
|
|
|
|
|
|
|
Heidi Toivonen and Francesco Lelli
This paper investigates how users of smart devices attribute agency both to themselves and to their devices. Statistical analyses, tag cloud analysis, and sentiment analysis were applied on survey data collected from 587 participants. As a result of a pr...
ver más
|
|
|
|
|
|
|
Zhengbao Li, Jianfeng Dai, Yuanxin Luan, Nan Sun and Libin Du
Human marine activities are becoming increasingly frequent. The adverse marine environment has led to an increase in man overboard incidents, resulting in significant losses of life and property. After a drowning accident, the accurate location informati...
ver más
|
|
|
|
|
|
|
Mulatedzi Calvin Rammbuda, Mavhungu Abel Mafukata, Tshimangadzo Selina Mudau, Takalani Samuel Mashau
Pág. 633 - 642
|
|
|
|
|
|
|
Fabio Vighi
Pág. Finance an - 79
The dominant view among critics of today?s financial economy is that, at one point in its long history, capitalism took the wrong turn, falling victim to greed and corruption. This view is fundamentally flawed. The elementary but disavowed reason for the...
ver más
|
|
|
|
|
|
|
Brent Pethers and Abubakar Bello
Cyber sextortion attacks are security and privacy threats delivered to victims online, to distribute sexual material in order to force the victim to act against their will. This continues to be an under-addressed concern in society. This study investigat...
ver más
|
|
|
|
|
|
|
Yuxin Huang, Shukai Hou, Gang Li and Zhengtao Yu
The summary of case?public opinion refers to the generation of case-related sentences from public opinion information related to judicial cases. Case?public opinion news refers to the judicial cases (intentional homicide, rape, etc.) that cause large pub...
ver más
|
|
|
|
|
|
|
Fahim Sufi
Utilizing social media data is imperative in comprehending critical insights on the Russia?Ukraine cyber conflict due to their unparalleled capacity to provide real-time information dissemination, thereby enabling the timely tracking and analysis of cybe...
ver más
|
|
|
|
|
|
|
Denis Rangelov, Philipp Lämmel, Lisa Brunzel, Stephan Borgert, Paul Darius, Nikolay Tcholtchev and Michell Boerger
The constant increase in volume and wide variety of available Internet of Things (IoT) devices leads to highly diverse software and hardware stacks, which opens new avenues for exploiting previously unknown vulnerabilities. The ensuing risks are amplifie...
ver más
|
|
|
|
|
|
|
Junho Shin, Eunkyung Jo, Yeohoon Yoon and Jaehee Jung
In cases of child sexual abuse, interviewing and obtaining trustworthy statements from victims and witnesses is essential because their statements are the only evidence. It is crucial to ascertain objectively the credibility of the victim?s statements, w...
ver más
|
|
|
|