|
|
|
Masoud Jafari Shalamzari, Wanchang Zhang, Atefeh Gholami and Zhijie Zhang
Site selection for runoff harvesting at large scales is a very complex task. It requires inclusion and spatial analysis of a multitude of accurately measured parameters in a time-efficient manner. Compared with direct measurements of runoff, which is tim...
ver más
|
|
|
|
|
|
|
Vesna Tornjanski, Dejan Petrovic, Sandra Nesic
Research question: The study aims to extend and deepen the understanding of maturity level of knowledge transfer effectiveness between project team members in an organization in which disruptive innovations and external forces foster acceleration of vari...
ver más
|
|
|
|
|
|
|
Ana Aleksic Miric, Marina Petrovic, Zorica Anicic
Research Question: This paper explores factors that drive innovativeness of social enterprises in Serbia. Motivation: Social enterprises are gaining importance on global scale, being recognized for their potential to respond to both economic and social c...
ver más
|
|
|
|
|
|
|
Valéria Menezes de Souza,Denilson Teixeira,Jéssica Gonçalves Barbosa
Pág. 83 - 100
As águas subterrâneas são recursos esgotáveis e a sua exploração desregrada pode acarretar uma série de problemas socioeconômicos e ambientais. Assim, as bases conceituais e os instrumentos de gestão propostos pela legislação são fundamentais para a cons...
ver más
|
|
|
|
|
|
|
Dania Tamayo-Vera, Xiuquan Wang and Morteza Mesbah
The interplay of machine learning (ML) and deep learning (DL) within the agroclimatic domain is pivotal for addressing the multifaceted challenges posed by climate change on agriculture. This paper embarks on a systematic review to dissect the current ut...
ver más
|
|
|
|
|
|
|
Mahmud Hossain, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor and S. M. Riazul Islam
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as e...
ver más
|
|
|
|
|
|
|
Daniel Einarson, Fredrik Frisk, Kamilla Klonowska and Charlotte Sennersten
Machine learning (ML) is increasingly used in diverse fields, including animal behavior research. However, its application to ambiguous data requires careful consideration to avoid uncritical interpretations. This paper extends prior research on ringed m...
ver más
|
|
|
|
|
|
|
Xie He, Arash Habibi Lashkari, Nikhill Vombatkere and Dilli Prasad Sharma
Over the past few decades, researchers have put their effort and paid significant attention to the authorship attribution field, as it plays an important role in software forensics analysis, plagiarism detection, security attack detection, and protection...
ver más
|
|
|
|
|
|
|
Paul Scalise, Matthew Boeding, Michael Hempel, Hamid Sharif, Joseph Delloiacovo and John Reed
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Nume...
ver más
|
|
|
|
|
|
|
John T. Van Stan II and Juan Pinos
Plant canopies divert a portion of precipitation to the base of their stems through ?stemflow?, a phenomenon that influences the canopy water balance, soil microbial ecology, and intrasystem nutrient cycling. However, a comprehensive integration of stemf...
ver más
|
|
|
|