|
|
|
Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem and Mona Jaber
The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, w...
ver más
|
|
|
|
|
|
|
Audrone Janaviciute, Agnius Liutkevicius, Gedas Dabu?inskas and Nerijus Morkevicius
Online shopping has become a common and popular form of shopping, so online attackers try to extract money from customers by creating online shops whose purpose is to compel the buyer to disclose credit card details or to pay money for goods that are nev...
ver más
|
|
|
|
|
|
|
Xie He, Arash Habibi Lashkari, Nikhill Vombatkere and Dilli Prasad Sharma
Over the past few decades, researchers have put their effort and paid significant attention to the authorship attribution field, as it plays an important role in software forensics analysis, plagiarism detection, security attack detection, and protection...
ver más
|
|
|
|
|
|
|
Paniti Netinant, Thitipong Utsanok, Meennapa Rukhiran and Suttipong Klongdee
With the rapid rise of digitalization in the global economy, home security systems have become increasingly important for personal comfort and property protection. The collaboration between humans, the Internet of Things (IoT), and smart homes can be hig...
ver más
|
|
|
|
|
|
|
Charalampos S. Kouzinopoulos, Eleftheria Maria Pechlivani, Nikolaos Giakoumoglou, Alexios Papaioannou, Sotirios Pemas, Panagiotis Christakakis, Dimosthenis Ioannidis and Dimitrios Tzovaras
Citizen science reinforces the development of emergent tools for the surveillance, monitoring, and early detection of biological invasions, enhancing biosecurity resilience. The contribution of farmers and farm citizens is vital, as volunteers can streng...
ver más
|
|
|
|
|
|
|
Sergio Vélez, Enrique Barajas, José Antonio Rubio, Dimas Pereira-Obaya and José Ramón Rodríguez-Pérez
This study explores spectroscopy in the 350 to 2500 nm range for detecting powdery mildew (Erysiphe necator) in grapevine leaves, crucial for precision agriculture and sustainable vineyard management. In a controlled experimental vineyard setting, the sp...
ver más
|
|
|
|
|
|
|
Mosaad Ali Hussein Ali, Farag M. Mewafy, Wei Qian, Ajibola Richard Faruwa, Ali Shebl, Saleh Dabaa and Hussein A. Saleem
The effective detection and monitoring of mining tailings? leachates (MTLs) plays a pivotal role in environmental protection and remediation efforts. Electrical resistivity tomography (ERT) is a non-invasive technique widely employed for mapping subsurfa...
ver más
|
|
|
|
|
|
|
Christine Dewi, Danny Manongga, Hendry, Evangs Mailoa and Kristoko Dwi Hartomo
Face mask detection is a technological application that employs computer vision methodologies to ascertain the presence or absence of a face mask on an individual depicted in an image or video. This technology gained significant attention and adoption du...
ver más
|
|
|
|
|
|
|
Lijun Zu, Wenyu Qi, Hongyi Li, Xiaohua Men, Zhihui Lu, Jiawei Ye and Liang Zhang
The digital transformation of banks has led to a paradigm shift, promoting the open sharing of data and services with third-party providers through APIs, SDKs, and other technological means. While data sharing brings personalized, convenient, and enriche...
ver más
|
|
|
|
|
|
|
Fengming Du, Cong Li and Weiwei Wang
Oil and gas exploration is a sector which drives the global economy and currently contributes significantly to global economic development. The safety of subsea pipelines is deeply affected by factors such as pipeline buckling, corrosion and leakage. Onc...
ver más
|
|
|
|