|
|
|
Yogeswaranathan Kalyani, Liam Vorster, Rebecca Whetton and Rem Collier
In the last decade, digital twin (DT) technology has received considerable attention across various domains, such as manufacturing, smart healthcare, and smart cities. The digital twin represents a digital representation of a physical entity, object, sys...
ver más
|
|
|
|
|
|
Muhammad Umer Masood, Muhammad Rashid, Saif Haider, Iram Naz, Chaitanya B. Pande, Salim Heddam, Fahad Alshehri, Ismail Elkhrachy, Amimul Ahsan and Saad Sh. Sammen
Groundwater is an important source of freshwater. At the same time, anthropogenic activities, in particular, industrialization, urbanization, population growth, and excessive application of fertilizers, are some of the major reasons for groundwater quali...
ver más
|
|
|
|
|
|
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num...
ver más
|
|
|
|
|
|
Elham Al Qahtani, Yousra Javed, Sarah Tabassum, Lipsarani Sahoo and Mohamed Shehab
User adoption and usage of end-to-end encryption tools is an ongoing research topic. A subset of such tools allows users to encrypt confidential emails, as well as manage their access control using features such as the expiration time, disabling forwardi...
ver más
|
|
|
|
|
|
Salman Ali AlQahtani
With the advent of 5G networks, the demand for improved mobile broadband, massive machine-type communication, and ultra-reliable, low-latency communication has surged, enabling a wide array of new applications. A key enabling technology in 5G networks is...
ver más
|
|
|