We generalize the double negation construction of Boolean algebras in Heyting algebras, to a double negation construction of the same in Visser algebras (also known as basic algeb...
Purpose – Partial least squares (PLS) path modeling is a variance-based structural equation modeling (SEM) technique that is widely applied in business and social sciences. Its ...
Purpose – In this study, we examined the influence of one or more information security breaches on an organization’s stock market value as a way to benchmark the wider economi...
Clustering is a fundamental property of complex networks and it is the mathematical expression of a ubiquitous phenomenon that arises in various types of self-organized networks su...
With the promise of delivering immortality, energy harvesting and wireless energy transfer have become the next research frontier for pervasive computing and networks. The challen...
Muhammad Hamad Alizai, Qasim Raza, Yasra Chandio, ...
Real-time low-power wireless networks are increasingly being used in applications such as: Industrial Internet-ofThings, Smart City technologies, and critical infrastructure monit...
Automatic control of HVAC and artificial lights has been one of the popular methods for achieving energy-efficient buildings. The current systems operate using fixed setpoint c...
Chayan Sarkar, S. N. Akshay Uttama Nambi, R. Venka...
Over the past few years, many low-cost pollution sensors have been integrated into measurement platforms for air quality monitoring. However, using these sensors is challenging: c...
Balz Maag, Olga Saukh, David Hasenfratz, Lothar Th...
The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was recently introduced as the new routing standard for the Internet of Things. Although RPL defines basic securi...
Heiner Perrey, Martin Landsmann, Osman Ugus, Matth...