The adversarialist approach to criminal justice places a premium on autonomy, efficiency and finality. It trusts that giving parties control will put reliable comprehensive evidence before the trial court. Where forensic science evidence is involved,…
This paper deals with the transnational cooperation of the Czech and German extreme right. The paper focuses on one of the most prominent international partners of the Czech extreme right – the German Nationaldemokratische Partei Deutschlands. By…
Fog-computing is a new network architecture and computing paradigm that uses user or near-users devices (network edge) to carry out some processing tasks. Accordingly, it extends the cloud computing with more flexibility the one found in the…
Internet of Things (IoT) systems usually produce massive amounts of data, while the number of devices connected to the internet might reach billions by now. Sending all this data over the internet will overhead the cloud and consume bandwidth. Fog…
Flying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast…
The effects of torsion, aspect ratio and curvature on the flow in a helical pipe of rectangular cross- section are studied by introducing a non-orthogonal helical coordinate system. Spectral method is applied as main tool for numerical approach where…
In this paper, the effect of slip on Micropolar fluid in a circular tube of non-uniform cross-section with multiple stenosis have been studied. The coupled equations governing to the flow are calculated by using Homotopy Perturbation Method. The…
Every flood causes damages to many lives and properties. Moreover, it affects the economy and lifestyle of people in the society in a short period and a long period. In consequence, this research would demonstrate techniques and flood detection…