|
|
|
Chinh Lieou, Serge Jolicoeur, Thomas Guyondet, Stéphane O?Carroll and Tri Nguyen-Quang
This study examines the hydrodynamic regimes in Shediac Bay, located in New Brunswick, Canada, with a focus on the breach in the Grande-Digue sand spit. The breach, which was developed in the mid-1980s, has raised concerns about its potential impacts on ...
ver más
|
|
|
|
|
|
|
Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem and Mona Jaber
The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, w...
ver más
|
|
|
|
|
|
|
Deepak Verma, Parveen Berwal, Mohammad Amir Khan, Raied Saad Alharbi, Faisal M. Alfaisal and Upaka Rathnayake
The study of embankment breaching is not an easy practice, as it includes various parameters to meet the suitability of the design approach, especially when we consider it for the long term. Embankment breach studies generally include the prediction of d...
ver más
|
|
|
|
|
|
|
Karl van der Schyff, Greg Foster, Karen Renaud and Stephen Flowerday
Online users are responsible for protecting their online privacy themselves: the mantra is custodiat te (protect yourself). Even so, there is a great deal of evidence pointing to the fact that online users generally do not act to preserve the privacy of ...
ver más
|
|
|
|
|
|
|
Hazem M. Eldeeb, Ali Ibrahim, Magdy H. Mowafy, Martina Zelenáková, Hany F. Abd-Elhamid, Katarzyna Pietrucha-Urbanik and Mahmoud T. Ghonim
Dams are built for different purposes, but failure of a dam could result in extreme disasters such as floods. The Grand Ethiopian Renaissance Dam (GERD) was mainly built for power generation, but concerns about its safety, location and site conditions ha...
ver más
|
|
|
|
|
|
|
Dominik Molitor, Wullianallur Raghupathi, Aditya Saharia and Viju Raghupathi
While data breaches are a frequent and universal phenomenon, the characteristics and dimensions of data breaches are unexplored. In this novel exploratory research, we apply machine learning (ML) and text analytics to a comprehensive collection of data b...
ver más
|
|
|
|
|
|
|
Jianwei Zhang, Bingpeng Wang, Huokun Li, Fuhong Zhang, Weitao Wu, Zixu Hu and Chengchi Deng
The dam-break water flow is a complex fluid motion, showing strong nonlinearity and stochasticity. In order to better study the characteristics of the dam burst flood, the smooth particle hydrodynamics (SPH) method was chosen to establish a two-dimension...
ver más
|
|
|
|
|
|
|
Daria Wieslawa Krasiewicz and Grzegorz Wierzbicki
The origin and dynamics of a 2010 pluvial flood in the valley of a large European river are described. In order to study how local people perceive this catastrophic event a small administrative unit (rural municipality) within the Holocene floodplain (th...
ver más
|
|
|
|
|
|
|
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici
This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices?a Raspberry Pi 3 model B and a Dragon...
ver más
|
|
|
|
|
|
|
Ryan Paulik, Shaun Williams and Benjamin Popovich
This study investigates residential building damage model transferability between coastal and fluvial flood hazard contexts. Despite the frequency of damaging coastal flood events, empirical damage models from fluvial flooding are often applied in quanti...
ver más
|
|
|
|