Browse Items (3575 total)

An emerging literature has shown concerns about the impact of thepandemic on the proliferation of digital surveillance. Contributing to thesedebates, in this paper we demonstrate how the pandemic facilitates digitalsurveillance in three ways: (1) By…

Artillery fires are aimed at crippling the enemy's war-waging machinery. Such operations are time-sensitive since they need to ensure that the enemy is engaged effectively and sufficiently degraded at critical points in time and space to achieve…

Threats towards information systems have continued to increase and become more sophisticated, making security approaches a necessity for all types of organizations to ensure their protection. To implement an appropriate computer security policy, it…

Understanding player behavior in a game is quite important to know people model thinking. Through puzzle games, people can train spatial abilities in a geometry lesson. Spatial ability consists of five groups, one of them is perceptual speed. The…

This paper presents a simple approach to providing location-based services (LBSs) for the remotely located educational and health institutes on demand, particularly in emergency situations i.e., COVID-19, using an antenna array. The proposed approach…

Bengaluru is one of the fastest growing cities in India. This paper traces the emergence of Bengaluru as one of the leading hubs of Information and CommunicationTechnology as well as Research and Development in India. This is rooted in a complex…

Focusing on the issue of host load estimating in mobile cloud computing, the Long Short Term Memory networks (LSTM)is introduced, which is appropriate for the intricate and long-term arrangement information of the cloud condition and a heap…

Are United Nations peacekeeping missions effective at reducing violence incivil wars? Although UN peacekeeping is a notable intervention tool, theinternational community lacks systematic knowledge of how well itmitigates civil war violence. Given…

The text presents a contribution to the study of territoriality of violent non-state actors in areas of limited internal state power projection. It presentsthe strategy of liquid territoriality as a survival strategy of the territorialviolent…

Data collected from the profiles and the digital identities has become a valuable currency for the mobile ecosystem, especially between users and providers. Services that required them are also described as the ground floor in direct linked with the…
Output Formats

atom, dcmes-xml, json, omeka-xml, podcast, rss2