|
|
|
Naning Fatmawatie
Pág. 101 - 112
AbstractionThe success of economic development has indicators of economic factors and non-economic factors. The impact of the corona has made the Indonesian economy slump. The business world in various sectors, including trade, industry, and services, ha...
ver más
|
|
|
|
|
|
|
Fahad M. Alotaibi and Vassilios G. Vassilakis
Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity of these threats, such as web application firewalls (WAFs). On the other hand...
ver más
|
|
|
|
|
|
|
Lei Chen, Zhihao Wang, Ru Huo and Tao Huang
As an essential piece of infrastructure supporting cyberspace security technology verification, network weapons and equipment testing, attack defense confrontation drills, and network risk assessment, Cyber Range is exceptionally vulnerable to distribute...
ver más
|
|
|
|
|
|
|
Fu-Hau Hsu, Min-Hao Wu, Yan-Ling Hwang, Jian-Xin Chen, Jian-Hong Huang, Hao-Jyun Wang and Yi-Wen Lai
The number of Internet of Things (IoT) devices has increased dramatically in recent years, and Bluetooth technology is critical for communication between IoT devices. It is possible to protect electronic communications, the Internet of Things (IoT), and ...
ver más
|
|
|
|
|
|
|
Chendi Li, Jiang Wang and Peng Huang
This correspondence proposes an optimal cooperative guidance law for protecting a target from a guided missile. The linearized three-body kinematics using the line-of-sight (LOS) triangle concept is formulated, and a new concept called error distance is ...
ver más
|
|
|
|
|
|
|
Zesheng Chen, Li-Chi Chang, Chao Chen, Guoping Wang and Zhuming Bi
Speaker verification systems use human voices as an important biometric to identify legitimate users, thus adding a security layer to voice-controlled Internet-of-things smart homes against illegal access. Recent studies have demonstrated that speaker ve...
ver más
|
|
|
|
|
|
|
DINI SURYANI
Pág. 1 - 17
The collapse of the authoritarian regime in 1998 has made Indonesia as one of the most democratic country in Southeast Asia. To ensure the quality ofdemocracy, in particular electoral democracy, supervision and monitoring of elections has a veryimportant...
ver más
|
|
|
|
|
|
|
Alfonso González Aguado
Pág. Pág. 64 - 73
Desde los tiempos del Movimiento Moderno, los arquitectos se han responsabilizado del diseño de las ciudades y los espacios urbanos. La concepción arquitectónica de las ciudades ha llevado a nuestra disciplina al equívoco de creer que el diseño de las ca...
ver más
|
|
|
|
|
|
|
Alfonso González Aguado
Pág. Pág. 64 - 73
Desde los tiempos del Movimiento Moderno, los arquitectos se han responsabilizado del diseño de las ciudades y los espacios urbanos. La concepción arquitectónica de las ciudades ha llevado a nuestra disciplina al equívoco de creer que el diseño de las ca...
ver más
|
|
|
|
|
|
|
Peter Harris, William Stahlin
The Last in First out Method (LIFO) is presently under severe scrutiny from the financial community which may soon culminate in its repeal as an acceptable accounting method. There are pressures from the SEC in conjunction with the International Financia...
ver más
|
|
|
|
|
|
|
D. J. Bradfield,D. C. Bowie
AbstractIn this article a model is proposed for measuring the risk that shareholders bear during hostile merger activities. An empirical study on the failed Minorco-Consolidated Goldfields merger attempt reveals several insights on the additional risk bo...
ver más
|
|
|
|
|
|
|
D. J. Bradfield,D. C. Bowie
AbstractIn this article a model is proposed for measuring the risk that shareholders bear during hostile merger activities. An empirical study on the failed Minorco-Consolidated Goldfields merger attempt reveals several insights on the additional risk bo...
ver más
|
|
|
|
|
|
|
Mario Alviano
Client puzzle protocols are widely adopted mechanisms for defending against resource exhaustion denial-of-service (DoS) attacks. Among the simplest puzzles used by such protocols, there are cryptographic challenges requiring the finding of hash values wi...
ver más
|
|
|
|
|
|
|
Mahfod M. Aldoseri and Maged M. Albaz
This research aims to broaden the understanding of the determinants of climate change disclosure, where the study analyzes the impact of corporate business strategy and Chief Executive Officer (CEO) overconfidence on the level of climate change disclosur...
ver más
|
|
|
|
|
|
|
Dolores Brandis García
Since the late 20th century major, European cities have exhibited large projects driven by neoliberal urban planning policies whose aim is to enhance their position on the global market. By locating these projects in central city areas, they also heighte...
ver más
|
|
|
|
|
|
|
Vanessa Rodríguez-Breijo, Núria Simelio and Pedro Molina-Rodríguez-Navas
This study uses a qualitative approach to examine what political and technical leaders of municipalities understand transparency and public information to mean, and what role they believe the different subjects involved (government, opposition, and the p...
ver más
|
|
|
|
|
|
|
Liliana Hawrysz
Much has been written about the strategic orientation of public administration organizations (prospecting, defending, reacting, and analyzing) and their consequences for organizational effects, but little is dedicated to e-administration. Is the provisio...
ver más
|
|
|
|
|
|
|
Julen Castellano and Miguel Pic
The objective was to model the teams? styles of play (SoPs) in elite football and relate them to the match result. For this, the twenty Spanish first division teams in the 2016?2017 season were analysed, using nine interaction performance indicators (IRi...
ver más
|
|
|
|
|
|
|
Amanuel Tamiru and Zeyaur R. Khan
Plants have evolved highly intriguing ways of defending themselves against insect attacks, including through emission of defense volatiles. These volatiles serve the plant?s defense by directly repelling phytophagous insects and/or indirectly through att...
ver más
|
|
|
|
|
|
|
Cláudio Luiz Melo da Luz,Gustavo Gobbo,Rosália Aldraci Barbosa Lavarda
Pág. 123 - 149
This study aims to examine how is characterized the participation of middle manager considering Floyd and Wooldridge (1992) studies, in the implementation process of deliberate strategy. The four different roles that managers play are synthesizing inform...
ver más
|
|
|
|