|
|
|
P. K. Paul, P. S. Aithal, R. Saavedra, K.S. Tiwary, B. Aremu, S. Mewada
Pág. 99 - 105
AbstractInformation is the power and Technology is the driving force for the development of all the facets. Information Science and Technology as a field of study and professional practice is therefore responsible for providing information and technology...
ver más
|
|
|
|
|
|
|
Tienan Li, Xueting Zeng, Cong Chen, Xiangmin Kong, Junlong Zhang, Ying Zhu, Fan Zhang and He Dong
In this study, an initial water-rights allocation (IWRA) model is proposed for adjusting the traditional initial water-rights empowerment model based on previous water intake permits, with the aim of improving the productivity of water resources under po...
ver más
|
|
|
|
|
|
|
Danlu Jiang, Dong Bai, Zhaowei Yin and Gongyuan Fan
With the rapid development of shale gas exploration (SGE) in China, there is an urgent need to evaluate the public?s preferences with respect to the environmental risks that go along with the exploration, which have not yet been studied in the literature...
ver más
|
|
|
|
|
|
|
Tatan Sukwika,Dudung Darusman,Cecep Kusmana,Dodik Ridho Nurrochmat
Pág. 207 - 215
This study discusses the policy scenarios on private-forest management in Bogor. The aims of this study are: determining leverage attribut on private-forest and formulating policy models, and making scenario for the development of the sustainability inde...
ver más
|
|
|
|
|
|
|
Jian Xu, Yujia Qian, Bingyue He, Huixuan Xiang, Ran Ling and Genyu Xu
To effectively combat environmental challenges, it is necessary to evaluate urban residential building carbon emissions and implement energy-efficient, emission-reducing strategies. The lack of a specialized carbon emission monitoring system complicates ...
ver más
|
|
|
|
|
|
|
Abdul Rehman Khalid, Nsikak Owoh, Omair Uthmani, Moses Ashawa, Jude Osamor and John Adejoh
In the era of digital advancements, the escalation of credit card fraud necessitates the development of robust and efficient fraud detection systems. This paper delves into the application of machine learning models, specifically focusing on ensemble met...
ver más
|
|
|
|
|
|
|
Peter K. K. Loh, Aloysius Z. Y. Lee and Vivek Balachandran
The rise in generative Artificial Intelligence (AI) has led to the development of more sophisticated phishing email attacks, as well as an increase in research on using AI to aid the detection of these advanced attacks. Successful phishing email attacks ...
ver más
|
|
|
|
|
|
|
Jinqiang Yao, Yu Qian, Zhanyu Feng, Jian Zhang, Hongbin Zhang, Tianyi Chen and Shaoyin Meng
With the development of vehicle-road network technologies, the future traffic flow will appear in the form of hybrid network traffic flow for a long time. Due to the change in traffic characteristics, the current hard shoulder running strategy based on t...
ver más
|
|
|
|
|
|
|
Eunkyu Lee, Junaid Khan, Umar Zaman, Jaebin Ku, Sanha Kim and Kyungsup Kim
With the global advancement of maritime autonomous surface ships (MASS), the critical task of verifying their key technologies, particularly in challenging conditions, becomes paramount. This study introduces a synthetic maritime traffic generation syste...
ver más
|
|
|
|
|
|
|
Qiang Yang, Xiaojie Yan, Wenkai Chen and Juncheng Fan
With the rapid development of the construction industry, there have been an uncountable number of damages caused by safety accidents at construction sites. Traditional safety management methods are no longer able to meet the needs of production. This pap...
ver más
|
|
|
|