Zobrazeno 1 - 10
of 368
pro vyhledávání: '"Chowdhury Partha"'
Publikováno v:
Annals of the West University of Timisoara: Mathematics and Computer Science, Vol 57, Iss 2, Pp 1-17 (2019)
The object of the present paper is to study generalized weakly symmetric and generalized weakly Ricci symmetric Kenmotsu manifolds whose metric tensor is η-Ricci soliton. The paper also aims to bring out curvature conditions for which η-Ricci solit
Externí odkaz:
https://doaj.org/article/b89301634b214e71aab1a59d26c48d53
Cyber Essentials (CE) comprise a set of controls designed to protect organisations, irrespective of their size, against cyber attacks. The controls are firewalls, secure configuration, user access control, malware protection & security update managem
Externí odkaz:
http://arxiv.org/abs/2406.15210
Publikováno v:
Annals of the West University of Timisoara: Mathematics and Computer Science, Vol 55, Iss 2, Pp 51-64 (2017)
The purpose of this paper is to introduce the notions of an almost generalized weakly symmetric LP-Sasakian manifolds and an almost generalized weakly Ricci-symmetric LP-Sasakian manifolds. The existence of an almost generalized weakly symmetric LP-S
Externí odkaz:
https://doaj.org/article/c4a3d8d05aee44fd8c9a91028bff7cf0
Publikováno v:
Annals of the West University of Timisoara: Mathematics and Computer Science, Vol 54, Iss 1, Pp 35-53 (2016)
Recently the present authors introduced the notion of generalized quasi-conformal curvature tensor which bridges Conformal curvature tensor, Concircular curvature tensor, Projective curvature tensor and Conharmonic curvature tensor. This paper attemp
Externí odkaz:
https://doaj.org/article/f5c56f728de147d28addb6865642e6a6
Autor:
Hernández, Andrés Domínguez, Ramokapane, Kopo M., Chowdhury, Partha Das, Michalec, Ola, Johnstone, Emily, Godwin, Emily, Cork, Alicia G, Rashid, Awais
The phrase "online harms" has emerged in recent years out of a growing political willingness to address the ethical and social issues associated with the use of the Internet and digital technology at large. The broad landscape that surrounds online h
Externí odkaz:
http://arxiv.org/abs/2307.02332
Autor:
Chowdhury, Partha Das, Sameen, Maria, Blessing, Jenny, Boucher, Nicholas, Gardiner, Joseph, Burrows, Tom, Anderson, Ross, Rashid, Awais
Threat modelling is foundational to secure systems engineering and should be done in consideration of the context within which systems operate. On the other hand, the continuous evolution of both the technical sophistication of threats and the system
Externí odkaz:
http://arxiv.org/abs/2301.05653
Saltzer \& Schroeder's principles aim to bring security to the design of computer systems. We investigate SolarWinds Orion update and Log4j to unpack the intersections where observance of these principles could have mitigated the embedded vulnerabili
Externí odkaz:
http://arxiv.org/abs/2211.02341
Publikováno v:
ApJ, 2022
The Kodaikanal Observatory has made synoptic observations of the Sun in white light since 1904, and these images are sketched on the Stonyhurst grids called sun charts. These continuous hand-drawn data sets are used for long-term studies of the Sun.
Externí odkaz:
http://arxiv.org/abs/2211.01651
The sub-barrier fusion hindrance has been observed in the domain of very low energies of astrophysical relevance. This phenomenon can be analyzed effectively using an uncomplicated straightforward elegant mathematical formula gleaned presuming diffus
Externí odkaz:
http://arxiv.org/abs/2206.15087
The wider adoption of PETs has relied on usability studies, which focus mainly on an assessment of how a specified group of users interface, in particular contexts, with the technical properties of a system. While human centred efforts in usability a
Externí odkaz:
http://arxiv.org/abs/2202.08548