|
|
|
Bojana Petrovic, Ola Eriksson, Xingxing Zhang and Marita Wallhagen
Previous research has shown a lack of studies with comparisons between primary (virgin) and secondary (re-used) building materials, and their embodied emissions. The creation of different scenarios comparing the environmental impact of virgin vs. re-used...
ver más
|
|
|
|
|
|
Xiaorong Wang, Boyue Liu, Shaolin He, Hongying Yuan, Dongli Ji, Ruolin Li, Yang Song, Wei Xu, Bo Liu and Yingjun Xu
To clarify the risk posed to groundwater in oil shale in situ mining areas, we examine five leached pollutants: Fe, Mn, Cr, sulfate, and ammonia nitrogen. Potential groundwater contents of these five pollutants were evaluated using an improved Nemero com...
ver más
|
|
|
|
|
|
Filippo Dolente, Rosario Giuseppe Garroppo and Michele Pagano
The paper presents an experimental security assessment within two widely used open-source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination concentrates on two network functions (NFs) that are externally exposed within the core ne...
ver más
|
|
|
|
|
|
Arpad Takacs and Tamas Haidegger
The significance of V2X (Vehicle-to-Everything) technology in the context of highly automated and autonomous vehicles can hardly be overestimated. While V2X is not considered a standalone technology for achieving high automation, it is recognized as a sa...
ver más
|
|
|
|
|
|
Davy Preuveneers and Wouter Joosen
Ontologies have the potential to play an important role in the cybersecurity landscape as they are able to provide a structured and standardized way to semantically represent and organize knowledge about a domain of interest. They help in unambiguously m...
ver más
|
|
|