|
|
|
Olusola Akinrolabu, Steve New and Andrew Martin
Security and privacy concerns represent a significant hindrance to the widespread adoption of cloud computing services. While cloud adoption mitigates some of the existing information technology (IT) risks, research shows that it introduces a new set of ...
ver más
|
|
|
|
|
|
Pradeka Brilyan Purwandoko, Kudang Boro Seminar, Sutrisno and Sugiyanta
Rice is an essential food commodity in national and food security in Indonesia with a complex supply chain network. Various risks related to food quality and food safety occurs along the supply chain. Therefore, a tool is needed to monitor the rice produ...
ver más
|
|
|
|
|
|
Oleg Pokusaev,Vasily Kupriyanovsky,Dmitry Katzin,Dmitry Namiot
Pág. 81 - 93
The article discusses issues related to the architecture of autonomous (unmanned) car software. The work uses the English abbreviation CAV (Connected Autonomous Vehicle). Automobile vehicles today have much more complex computer systems than airplanes, d...
ver más
|
|
|
|
|
|
Da-Yin Liao and Xuehong Wang
The gaming industry has evolved into a multi-functional smart city that combines integrated casinos and entertainment (ICE). ICE logistics involve supply chains with various stages in geographically-distributed locations and with limited and complex stor...
ver más
|
|
|
|
|
|
Mariaenrica Frigione and Mariateresa Lettieri
In order to protect a material belonging to Cultural Heritage (i.e., stone, wood) from weathering, and in turn to preserve its beauty and historical value for the future generations, the contact with external harmful agents, particularly water, must be a...
ver más
|
|
|