Results 51 to 60 of about 1,217,812 (237)

A vertex algebra attached to the flag manifold and Lie algebra cohomology

open access: yes, 2009
Each flag manifold carries a unique algebra of chiral differential operators. Continuing along the lines of arXiv:0903.1281 we compute the vertex algebra structure on the cohomology of this algebra.
Arakawa, T., Malikov, F.
core   +1 more source

Algebraic Databases

open access: yesTheory and Applications of Categories, 2017
Databases have been studied category-theoretically for decades. The database schema -- whose purpose is to arrange high-level conceptual entities -- is generally modeled as a category or sketch. The data itself, often called an instance, is generally modeled as a set-valued functor, assigning to each conceptual entity a set of examples.
Schultz, Patrick   +3 more
openaire   +3 more sources

Protection of Personal Data in the Context of E-Commerce

open access: yesJournal of Cybersecurity and Privacy
This paper examines the impact of stringent regulations on personal data protection on customer perception of data security and online shopping behavior. In the context of the rapidly expanding e-commerce landscape, ensuring the security of personal data
Zlatan Morić   +3 more
doaj   +1 more source

Assessing moodle-assisted e-learning for students’ concept understanding and critical thinking skills in algebra

open access: yesAl-Jabar, 2021
Conceptual understanding and critical thinking skills are necessary for all students to help them in their learning process. This research aims to determine the effect of Moodle-assisted e-learning on (1) conceptual understanding, (2) critical thinking ...
Agus Pahrudin   +5 more
doaj   +1 more source

Evaluating End-User Defensive Approaches Against Phishing Using Education and Simulated Attacks in a Croatian University

open access: yesJournal of Cybersecurity and Privacy
This study investigates the effectiveness of two cybersecurity awareness interventions—phishing simulations and organized online training—in enhancing end-user resilience to phishing attacks in a Croatian university setting.
Zlatan Morić   +3 more
doaj   +1 more source

The Safety of Learners and Teachers in School: A Criminological Analysis

open access: yesInternational Journal of Social Sciences & Educational Studies
Recent study revealed that safety of learners and teachers continues to be a matter of major concern in the South African schools. Learners and teachers are no longer safe due to an increased level of violence in the schools.
Puseletso. A Dewee   +2 more
doaj   +1 more source

A note on the restricted universal enveloping algebra of a restricted Lie-Rinehart Algebra

open access: yes, 2015
Lie-Rinehart algebras, also known as Lie algebroids, give rise to Hopf algebroids by a universal enveloping algebra construction, much as the universal enveloping algebra of an ordinary Lie algebra gives a Hopf algebra, of infinite dimension.
Schauenburg, Peter
core   +3 more sources

Classification of Graded Left-symmetric Algebra Structures on Witt and Virasoro Algebras

open access: yes, 2007
We find that a compatible graded left-symmetric algebra structure on the Witt algebra induces an indecomposable module of the Witt algebra with 1-dimensional weight spaces by its left multiplication operators.
Bai, Chengming   +3 more
core   +2 more sources

An AI-Based Decision Support System Utilizing Bayesian Networks for Judicial Decision-Making

open access: yesSystems
Judicial decision-making in continental law systems requires carefully evaluating complex, interdependent evidence while ensuring consistency and fairness.
Zlatan Morić   +2 more
doaj   +1 more source

Advancing Cybersecurity with Honeypots and Deception Strategies

open access: yesInformatics
Cybersecurity threats are becoming more intricate, requiring preemptive actions to safeguard digital assets. This paper examines the function of honeypots as critical instruments for threat detection, analysis, and mitigation.
Zlatan Morić   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy