|
|
|
William Henry Collinge and Carlos Osorio-Sandoval
A continuing need to improve health, safety and wellbeing in construction has led to multiple research projects and technological innovations. One such innovation is the Safety Risk Library: a repository of data that functions in BIM environments to assi...
ver más
|
|
|
|
|
|
|
Keigo Ogata and Satoshi Fujita
The e-book services we use today have a serious drawback in that we will no longer be able to read the books we have purchased when the service is terminated. One way to solve this problem is to build a decentralized system that does not depend on a spec...
ver más
|
|
|
|
|
|
|
Jose Eduardo Cardoza Plata, Mauricio Olguín Carbajal, Juan Carlos Herrera Lozada, Jacobo Sandoval Gutierrez, Israel Rivera Zarate and Jose Felix Serrano Talamantes
Robots able to roll and jump are used to solve complex trajectories. These robots have a low level of autonomy, and currently, only teleoperation is available. When researching the literature about these robots, limitations were found, such as a high ris...
ver más
|
|
|
|
|
|
|
Roberto Pizarro-Tapia, Fernando González-Leiva, Rodrigo Valdés-Pineda, Ben Ingram, Claudia Sangüesa and Carlos Vallejos
To develop intensity-duration-frequency (IDF) curves, it is necessary to calculate annual maximum rainfall intensities for different durations. Traditionally, these intensities have been calculated from the analysis of traces recorded by rain gauges on p...
ver más
|
|
|
|
|
|
|
Michelle Linklater, Timothy C. Ingleton, Michael A. Kinsela, Bradley D. Morris, Katie M. Allen, Michael D. Sutherland and David J. Hanslow
In 2017, the New South Wales (NSW) Office of Environment and Heritage (OEH) initiated a state-wide mapping program, SeaBed NSW, which systematically acquires high-resolution (2?5 m cell size) multibeam echosounder (MBES) and marine LiDAR data along more ...
ver más
|
|
|
|
|
|
|
S. H. Kok, Azween Abdullah, NZ Jhanjhi and Mahadevan Supramaniam
Ransomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware, because it makes ...
ver más
|
|
|
|
|
|
|
Amine Nehari Talet,Louay Karadsheh,Samer Alhawari,Hana Hunaiti
AbstractBackground: Knowledge-based risk processes are turning into a major aspect inside establishments because they can limit the likelihood and effect of information technology (IT) project threats and catch opportunities amid the life cycle of a...
ver más
|
|
|
|
|
|
|
Carmine Varriale, Agostino De Marco, Elia Daniele, Jonas Schmidt and Bernhard Stoevesandt
This work focuses on the wake encounter problem occurring when a light, or very light, aircraft flies through or nearby a wind turbine wake. The dependency of the aircraft normal load factor on the distance from the turbine rotor in various flight and en...
ver más
|
|
|
|
|
|
|
Gianni Cristian Iannelli and Fabio Dell?Acqua
In order for a risk assessment to deliver sensible results, exposure in the concerned area must be known or at least estimated in a reliable manner. Exposure estimation, though, may be tricky, especially in urban areas, where large-scale surveying is gen...
ver más
|
|
|
|
|
|
|
Jérôme Serp, Christophe Poinssot and Stéphane Bourg
In this early 21st century, our societies have to face a tremendous and increasing energy need while mitigating the global climate change and preserving the environment. Addressing this challenge requires an energy transition from the current fossil ener...
ver más
|
|
|
|