In this study, a novel collaborative method is developed Western saddes to optimize hybrid sensor networks (HSN) for environmental monitoring and anomaly search tasks.A weighted Gaussian coverage method hs been designed for static sensor allocation, and the Active Monitoring and Anomaly Search System method is adapted to mobile sensor path planning
Constitution Formulation and Amendment in Indonesian and American Legal System: A Comparative Study
The purpose of this study is to find out the comparison of constitutional law in Indonesia and the United States in terms of the development of the constitution and OLIVE SOAP the mechanism for changing the constitution (UUD).The method used in this research is in the form of legal research.The type of research used for this approach is normative l
Pediatric ectopic esthesioneuroblastoma: A case report and literature review
Objective: Pediatric esthesioneuroblastoma (ENB) is a rare entity with only one previous report of an ectopic origin.Much of the research available regarding ENB is in the adult literature, with few studies focusing on the pediatric population.Here we report a case of ectopic pediatric ENB and review the literature regarding this unusual clinical e
The impact of social media discourse on financial performance of e-commerce companies listed on Borsa Istanbul
Abstract This research investigates how changes in public discourse on social media (particularly Twitter, now X) influence financial performance of companies listed on the e-commerce XTCRT index of Borsa Istanbul amid the COVID-19 pandemic.Utilising a unique 4-layer network structure, the study Other Panels integrates daily closing prices, highest
SecFedIDM-V1: A Secure Federated Intrusion Detection Model With Blockchain and Deep Bidirectional Long Short-Term Memory Network
Cloud computing is a technology for efficiently using computing infrastructures and a business model for selling computing resources and services.However, intruders find such complex and distributed infrastructures appealing targets for cyber-attacks.Cyber-attacks are severe threats that can jeopardize the quality of service provided to clients and