|
|
|
Konstantinos Demertzis, Konstantinos Rantos, Lykourgos Magafas, Charalabos Skianis and Lazaros Iliadis
Pursuing ?intelligent justice? necessitates an impartial, productive, and technologically driven methodology for judicial determinations. This scholarly composition proposes a framework that harnesses Artificial Intelligence (AI) innovations such as Natu...
ver más
|
|
|
|
|
|
|
Hamed Taherdoost
Blockchain is the foundation of all cryptocurrencies, while machine learning (ML) is one of the most popular technologies with a wide range of possibilities. Blockchain may be improved and made more effective by using ML. Even though blockchain technolog...
ver más
|
|
|
|
|
|
|
Chalani Mapa Mudiyanselage, Pethigamage Perera and Sriamannarayana Grandhi
Superannuation is the fund set aside by employers to provide their employees with a dignified retirement. Studies highlight that issues can arise with retirement funds from employers, such as failure to make required contributions to an employee?s supera...
ver más
|
|
|
|
|
|
|
Tomá? Lovecek, Ladislav Mari? and Katarína Petrlová
Water management systems play a crucial role in efficiently allocating water resources while taking into account various demands such as agriculture, industry, domestic use, and environmental needs. These systems optimize the distribution of water, ensur...
ver más
|
|
|
|
|
|
|
Baoquan Cheng, Jianchang Li, Yang Han, Tianyi Zhang, Jianling Huang and Huihua Chen
Given their occupation?s inherent income instability, the promotion of endowment insurance among construction workers is essential. This research reports the barriers and facilitators involved in promoting endowment insurance to construction workers, by ...
ver más
|
|
|
|
|
|
|
Jirí Du?ek
The paper focuses on the analysis of the computerization of public administration in the Czech Republic in the context of the implementation and operation of data mailboxes, which have been an integral and very important part of e-Government in that coun...
ver más
|
|
|
|
|
|
|
Ida Bagus Rahmadi Supancana
Pág. 358 - 363
|
|
|
|
|
|
|
Cheng Yang, Tianliang Lu, Shangyi Yan, Jianling Zhang and Xingzhan Yu
Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals. Accurate detection of malicious domains can effectively defend against cybe...
ver más
|
|
|
|
|
|
|
Victor Chang, Lewis Golightly, Paolo Modesti, Qianwen Ariel Xu, Le Minh Thao Doan, Karl Hall, Sreeja Boddu and Anna Kobusinska
The rapid advancement of internet technologies has dramatically increased the number of connected devices. This has created a huge attack surface that requires the deployment of effective and practical countermeasures to protect network infrastructures f...
ver más
|
|
|
|
|
|
|
Jing Chen, Tong Li and Rui Zhu
False messages sent by malicious or selfish vehicle nodes will reduce the operation efficiency of the Internet of Vehicles, and can even endanger drivers in serious cases. Therefore, it is very important to detect malicious vehicle nodes in the network i...
ver más
|
|
|
|