SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WAKA:ref srt2:(2025)"

Search: WAKA:ref > (2025)

  • Result 1-10 of 63
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Abdi, Somayeh, et al. (author)
  • Deadline-constrained security-aware workflow scheduling in hybrid cloud architecture
  • 2025
  • In: Future Generation Computer Systems. - : Elsevier B.V.. - 0167-739X .- 1872-7115. ; 162
  • Journal article (peer-reviewed)abstract
    • A hybrid cloud is an efficient solution to deal with the problem of insufficient resources of a private cloud when computing demands increase beyond its resource capacities. Cost-efficient workflow scheduling, considering security requirements and data dependency among tasks, is a prominent issue in the hybrid cloud. To address this problem, we propose a mathematical model that minimizes the monetary cost of executing a workflow and satisfies the security requirements of tasks under a deadline. The proposed model fulfills data dependency among tasks, and data transmission time is formulated with exact mathematical expressions. The derived model is a Mixed-integer linear programming problem. We evaluate the proposed model with real-world workflows over changes in the input variables of the model, such as the deadline and security requirements. This paper also presents a post-optimality analysis that investigates the stability of the assignment problem. The experimental results show that the proposed model minimizes the cost by decreasing inter-cloud communications for dependent tasks. However, the optimal solutions are affected by the limitations that are imposed by the problem constraints. 
  •  
2.
  • Achieng, Pauline, et al. (author)
  • Reconstructing of the radiation condition and solution for a variable coefficient Helmholtz equation in a semi-infinite strip from Cauchy data on an interior segment
  • 2025
  • In: Journal of Mathematical Analysis and Applications. - : ACADEMIC PRESS INC ELSEVIER SCIENCE. - 0022-247X .- 1096-0813. ; 541:1
  • Journal article (peer-reviewed)abstract
    • We consider the Helmholtz equation with a variable coefficient in a semi-infinite strip. Homogeneous Neumann conditions are prescribed on a part of the boundary of the strip. Our aim is to find the unknown function in the Dirichlet boundary condition on the remaining part of the boundary from measurements taken on a segment inside the semi-infinite strip. We assume that the radiation condition at infinity is unknown and must be found also. The main difficulty here is the variable coefficient in the Helmholtz equation which does not allow to apply the method of separation of variable as was done in [2]. Such problems appear in acoustics to determine acoustical sources and surface vibrations from acoustic field measurements in non-uniform mediums. We split the problem in two parts. One consists of finding the radiation condition and this problem is well-posed. We derive the equation for finding the parameter of the radiation condition, that holds at infinity. The second one is to find the Dirichlet data and this problem is ill-posed. We present an operator equation with compact operator for finding the Dirichlet data. (c) 2024 The Author(s). Published by Elsevier Inc. This is an open access article under the CC BY license (http://creativecommons .org /licenses /by /4 .0/).
  •  
3.
  • Adami, Rebecca, 1982- (author)
  • Childism, Intersectionality and the Rights of the Child : The myth of a happy childhood
  • 2025
  • Book (peer-reviewed)abstract
    • This book is the first to comprehensively develop the concept of childism to understand, study and analyse age-based discrimination against children.It presents a critical theory to help comprehend intersecting prejudice against children and to examine the weak implementation of the UN Convention on the Rights of the Child (CRC), and in what ways violations against children can be analysed through the intersections of racist, sexist and ableist discrimination. The book further offers scholars a new perspective when studying structural forms of discrimination and oppression against children and provides professionals with a new vocabulary on prejudice targeting children when assessing theory, policy and praxis on ‘child-friendly’ and ‘child-centred’ initiatives that overlook the need to protect children against discrimination.This book will be of key interest to scholars, students and practitioners of human rights, child and youth studies, education, prejudice studies, the United Nations and child law, and more broadly to sociology, social policy, psychology, and social work.
  •  
4.
  •  
5.
  • Alfes, Claudia, et al. (author)
  • A classification of polyharmonic Maaß forms via quiver representations
  • 2025
  • In: Journal of Algebra. - 0021-8693 .- 1090-266X. ; 661, s. 713-756
  • Journal article (peer-reviewed)abstract
    • We give a classification of the Harish-Chandra modules generated by the pullback to SL2(R) of polyharmonic Maaß forms for congruence subgroups of SL2(Z) with exponential growth allowed at the cusps. This extends results of Bringmann–Kudla in the harmonic case. While in the harmonic setting there are nine cases, our classification comprises ten; A new case arises in weights k>1. To obtain the classification we introduce quiver representations into the topic and show that those associated with polyharmonic Maaß forms are cyclic, indecomposable representations of the two-cyclic or the Gelfand quiver. A classification of these transfers to a classification of polyharmonic weak Maaß forms. To realize all possible cases of Harish-Chandra modules we develop a theory of weight shifts for Taylor coefficients of vector-valued spectral families. We provide a comprehensive computer implementation of this theory, which allows us to provide explicit examples.
  •  
6.
  • Almkvist, Gustaf, 1985- (author)
  • Corporate Criminal Liability : Two Nordic Solutions
  • 2025
  • In: Corporate Criminal Liability and Sanctions. - Abingdon : Routledge. - 9781032349961 ; , s. 51-61
  • Book chapter (peer-reviewed)abstract
    • In this chapter, the systems of Corporate Criminal Liability in four Nordic jurisdictions are examined, as interesting examples of the challenges - and possibilities - of Corporate Criminal Liability. It is argued that a credible model of attributing action to the company must be established, if a criminal sanction against a company is to be understood as a punishment in the sense that it attributes blame. In that regard, attribution can be based either on identification or on a concept of corporate negligence. Identification, where the actions of a representative of a company are attributed directly to the company, does not offer any considerable normative challenges. When corporate negligence is considered, however, the Nordic countries differ in an interesting way. Denmark and Norway share a system of primary corporate criminal liability, where the actions of several individuals can be cumulated and attributed to the company in a way where the company appears to be a genuine actor. Once cumulated, there is very limited room for the company to argue that it has not acted negligently. Sweden and Finland, on the other hand, in principle understand Corporate Criminal Liability as accessory to the crimes of individuals. In order to attribute such crimes, a test of corporate negligence is then employed, where it is determined whether the company has negligently failed to prevent the crimes of the individuals. While the accessory solution in Sweden and Finland appears to be an unnecessary limitation, the negligence test employed in those jurisdictions appears as an interesting model for understanding what it might mean to attribute blame to a company in the Criminal Law, and, in a deeper sense, for a concept of corporate guilt.
  •  
7.
  • Alqudhaibi, Adel, et al. (author)
  • Securing Industry 4.0: Assessing Cybersecurity Challenges and Proposing Strategies for Manufacturing Management
  • 2025
  • In: Cyber Security and Applications. - 2772-9184. ; 3
  • Journal article (peer-reviewed)abstract
    • Industry 4.0 represents the foundation of the fourth industrial revolution, characterised by the integration of innovative technology into the manufacturing process. This integration enhances automation, diagnostics, data analysis, and autonomous decision-making through the networking of equipment and machinery. However, the increased reliance on technology raises concerns about the implementation and maintenance of cybersecurity. This paper aims to address cybersecurity challenges in the manufacturing industry and suggest strategies to reduce risks. In particular, it examines the level of awareness and understanding of cybersecurity issues among manufacturing employees, establishes accountability for cyberattacks, and evaluates the effectiveness of existing industry practices. The current cybersecurity landscape in the manufacturing industry was thoroughly analysed. Data were gathered through surveys, interviews, and case studies to measure awareness, identify knowledge gaps, and assess existing practices. The research findings indicate a significant knowledge gap regarding cybersecurity among manufacturing employees. This vulnerability can be attributed to the lack of funding and training, especially compared to the resources provided to information technology departments and corporate employees. The study emphasises the importance of redirecting cybersecurity resources and protocols towards the manufacturing industry. This paper puts forward a series of recommendations to mitigate risks and safeguard the manufacturing industry.
  •  
8.
  • Artero-Real, A., et al. (author)
  • Evaluating edge joint preparation impact on penetration depth in laser-arc hybrid welding
  • 2025
  • In: Optics and Laser Technology. - : Elsevier Ltd. - 0030-3992 .- 1879-2545. ; 181:part A
  • Journal article (peer-reviewed)abstract
    • Nowadays, conventional welding technologies such as submerged arc welding (SAW) are still used in most heavy-steel industries. This type of traditional technology means that welding takes up a large part of the productive time. As a solution to this problem, there are welding methods, such as Laser-Arc Hybrid Welding (LAHW), that have the potential to reduce the cost of manufacturing large steel structures. This is possible due to the reduced number of weld passes required to join thicker steel sections, as large thicknesses can be welded in one or a few passes.A problem with LAHW is achieving satisfactory quality. For this reason, it is essential to study the starting conditions, e.g. edge joint preparation. The target of this research work is to find out the relationship between the penetration value of the weld bead obtained and the edge joint preparation. The evolution of the molten pool and the behavior of the molten material in the joint is discussed for the different edge joint preparation configurations. The effect of the roughness is that it affects the wetting of the molten material in the joint, which would affect the penetration result, together with the gap and air volume gap used in the joint. Cut-wire is also used in the research, in samples that presented a larger air volume gap. The behavior of the molten metal inside the joint in this case is also discussed. In addition, the quality of the weld beads has also been determined by making macrographs, microstructural analysis, X-ray, microhardness profiles, tensile test and Charpy test. Some pores and cracks have been found, although destructive tests show adequate behavior of the weld bead. It is possible to elucidate from the findings that as the roughness, gap and/or air volume gap of the edge joint increases, the penetration value obtained increases. Cut-wire samples obtained full penetration.
  •  
9.
  • Aryapoor, Masood, et al. (author)
  • Flipped non-associative polynomial rings and the Cayley-Dickson construction
  • 2025
  • In: Journal of Algebra. - 0021-8693 .- 1090-266X. ; 662, s. 482-501
  • Journal article (peer-reviewed)abstract
    • We introduce and study flipped non-associative polynomial rings. In particular, we show that all Cayley–Dickson algebras naturally appear as quotients of a certain type of such rings; this extends the classical construction of the complex numbers (and quaternions) as a quotient of a (skew) polynomial ring to the octonions, and beyond. We also extend some classical results on algebraic properties of Cayley–Dickson algebras by McCrimmon to a class of flipped non-associative polynomial rings.
  •  
10.
  • Baha, Ehsan, et al. (author)
  • Book Review: A Dialogue for Design and Democracy: Activist Thoughts and Practical Examples for Sociopolitical Empowerment
  • 2025
  • In: Design Issues. - 1531-4790 .- 0747-9360.
  • Journal article (peer-reviewed)abstract
    • The book Design and Democracy: Activist Thoughts and Practical Examples for Sociopolitical Empowerment, edited by Michael Erlhoff and Maziar Rezai, was released in April 2021 and features a compilation of 12 thought-provoking chapters contributed by various authors. These chapters delve into the intricate relationships and dynamic interplay between design and democracy. While previous reviews in journals such as The Design Journal, Design and Culture, and Design Studies have offered insights into this notable publication, this review addresses crucial aspects that remain unexplored. It underscores the book's unique perspectives, which are paramount for shaping the trajectory of future research and practice within the realm of design and democracy. Specifically, this review highlights the potential and limitations of design in serving democracy, as well as explores democracy's diverse, agnostic, and norm-breaking nature—considered through both theoretical and practical perspectives.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-10 of 63
Type of publication
journal article (41)
book chapter (13)
book (5)
editorial collection (3)
conference paper (1)
Type of content
peer-reviewed (63)
Author/Editor
Adami, Rebecca, 1982 ... (2)
Wang, Lihui (2)
Lipnizki, Frank (1)
Zhang, X. (1)
Li, X. (1)
Wang, Y. (1)
show more...
Gardella, Eusebio (1)
Pakpour, Amir H. (1)
Battestini Vives, Ma ... (1)
Abdi, Somayeh (1)
Ashjaei, Seyed Moham ... (1)
Mubeen, Saad (1)
Liu, Yang (1)
Bock, Wolfgang (1)
Klar, Axel (1)
Nypelö, Tiina, 1982 (1)
Malyarenko, Anatoliy ... (1)
Johansson, Thomas (1)
Sandblom, Erik, 1978 (1)
Achieng, Pauline (1)
Berntsson, Fredrik (1)
Kozlov, Vladimir (1)
Biverstål, H (1)
Mikkola, Jyri-Pekka (1)
Wang, Xi Vincent, Dr ... (1)
Mattsson, Christer (1)
Tysklind, Mats (1)
Madison, Guy, 1961- (1)
Bazan, NG (1)
Forssén, Jens, 1968 (1)
Li, Li (1)
Li, Jing (1)
Schultzberg, M (1)
Andreasson, Jesper, ... (1)
Bäckstrand, Jenny, 1 ... (1)
Inose, Hiroko (1)
Chirico, Francesco (1)
Rönnerman, Karin, 19 ... (1)
Berg, Charlotte (1)
Li, N (1)
Molin, Mikael, 1973 (1)
Forsberg, Kerstin (1)
Jagtap, Sandeep (1)
Salonitis, Konstanti ... (1)
Alfes, Claudia (1)
Burban, Igor (1)
Raum, Martin (1)
Parida, Vinit (1)
Niu, Yuran (1)
Nystrom, Thomas (1)
show less...
University
University of Gothenburg (9)
Jönköping University (8)
Royal Institute of Technology (7)
Stockholm University (6)
Lund University (6)
Chalmers University of Technology (6)
show more...
Umeå University (4)
Mälardalen University (4)
Linnaeus University (4)
Uppsala University (3)
Luleå University of Technology (3)
Linköping University (3)
Karolinska Institutet (2)
Högskolan Dalarna (1)
show less...
Language
English (62)
Swedish (1)
Research subject (UKÄ/SCB)
Natural sciences (21)
Social Sciences (18)
Engineering and Technology (16)
Humanities (12)
Medical and Health Sciences (7)
Year

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view