|
|
|
Angeliki Mentzafou, Yiannis Panagopoulos and Elias Dimitriou
Water quality indices that describe the status of water are commonly used in freshwater vulnerability assessment. The design of river water quality monitoring programs has always been a complex process and despite the numerous methodologies employed by e...
ver más
|
|
|
|
|
|
|
?tefan Bila?co and Titus-Cristian Man
On a global scale, traffic incidents are a leading cause of mortality and material damage. Romania exhibits the highest rate of road traffic fatalities both in the European Union and worldwide, requiring a comprehensive examination of its overall influen...
ver más
|
|
|
|
|
|
|
Gerasim V. Krivovichev and Valentina Yu. Sergeeva
The paper is devoted to the theoretical and numerical analysis of the two-step method, constructed as a modification of Polyak?s heavy ball method with the inclusion of an additional momentum parameter. For the quadratic case, the convergence conditions ...
ver más
|
|
|
|
|
|
|
Chen Zhang, Celimuge Wu, Min Lin, Yangfei Lin and William Liu
In the advanced 5G and beyond networks, multi-access edge computing (MEC) is increasingly recognized as a promising technology, offering the dual advantages of reducing energy utilization in cloud data centers while catering to the demands for reliabilit...
ver más
|
|
|
|
|
|
|
Yadong Zhou, Zhenchao Teng, Linlin Chi and Xiaoyan Liu
Based on the unit life and death technology, the dynamic evolution process of soil loss is considered, and a pipe-soil nonlinear coupling model of buried pipelines passing through the collapse area is constructed. The analysis shows that after the third ...
ver más
|
|
|
|
|
|
|
Mamoon Riaz, Hammad Dilpazir, Sundus Naseer, Hasan Mahmood, Asim Anwar, Junaid Khan, Ian B. Benitez and Tanveer Ahmad
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day. Numerous algorithms have been developed to improve effi...
ver más
|
|
|
|
|
|
|
Mahmud Hossain, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor and S. M. Riazul Islam
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as e...
ver más
|
|
|
|
|
|
|
Özhan Simsek
This study aimed to assess the susceptibility of three strawberry cultivars (?Festival?, ?Fortuna?, and ?Rubygem?) to drought stress induced by varying polyethylene glycol (PEG) concentrations in the culture medium. Plantlets were cultivated on a solid m...
ver más
|
|
|
|
|
|
|
Dafeng Hui, Avedananda Ray, Lovish Kasrija and Jaekedah Christian
Microbial-driven processes, including nitrification and denitrification closely related to soil nitrous oxide (N2O) production, are orchestrated by a network of enzymes and genes such as amoA genes from ammonia-oxidizing bacteria (AOB) and archaea (AOA),...
ver más
|
|
|
|
|
|
|
Hao Wu, Zhezheng Wu, Weimin Song, Dongwei Chen, Mei Yang and Hang Yuan
Due to the issue of weakened adhesion between ultra-thin surface overlays, higher demands have been placed on bonding layer materials in practical engineering. This study proposed a method for preparing a one-component waterborne epoxy resin-modified emu...
ver más
|
|
|
|