|
|
|
Manuel Pulido, Jesús Barrena-González, Alberto Alfonso-Torreño, Rafael Robina-Ramírez and Saskia Keesstra
Water is a key strategic resource, particularly in Mediterranean climate-type areas with impermeable rocks and shallow soils like Southwestern Spain. The region of Extremadura is commonly known by its large surface occupied by big dams (30% of water damm...
ver más
|
|
|
|
|
|
|
Oscar Licandro, José Luis Vázquez Burguete, Luis Camilo Ortigueira-Sánchez and Patricia Correa
Research work on the relationship between Corporate Social Responsibility and financial performance has been going on for seven decades. Even when the prevailing studies are those that found a positive influence of social responsibility on financial perf...
ver más
|
|
|
|
|
|
|
Isaac Oluoch
Over the past two decades, there has been increasing research on the use of artificial intelligence (AI) and geographic information technologies for monitoring and mapping varying phenomena on the Earth?s surface. At the same time, there has been growing...
ver más
|
|
|
|
|
|
|
Zeming Wei, Jiawen Fang, Zhicheng Hong, Yu Zhou, Shansi Ma, Junlang Zhang, Chufeng Liang, Gansen Zhao and Hua Tang
Blockchain is a distributed ledger technology that possesses characteristics such as decentralization, tamper resistance, and programmability. However, while blockchain ensures transaction openness and transparency, transaction privacy is also at risk of...
ver más
|
|
|
|
|
|
|
Nuno Marques de Almeida and Adolfo Crespo
The frequency and severity of natural or human-induced disaster events, such as floods, earthquakes, hurricanes, fires, pandemics, hazardous material spills, groundwater contamination, structural failures, explosions, etc., as well as their impacts, have...
ver más
|
|
|
|
|
|
|
Ou Ruan, Changwang Yan, Jing Zhou and Chaohao Ai
Multiparty Private Set Intersection (MPSI) is dedicated to finding the intersection of datasets of multiple participants without disclosing any other information. Although many MPSI protocols have been presented, there are still some important practical ...
ver más
|
|
|
|
|
|
|
Lucas Mayr, Lucas Palma, Gustavo Zambonin, Wellington Silvano and Ricardo Custódio
Private key management is a complex obstacle arising from the traditional public key infrastructure model. However, before any related security breach can be addressed, it must first be reliably detected. Certificate Transparency (CT) is an example of a ...
ver más
|
|
|
|
|
|
|
Wonhyuk Cho, Seeyoung Choi and Hemin Choi
The advancement of data technology such as machine learning and artificial intelligence has broadened the scope of human resources (HR) analytics, commonly referred to as ?people analytics.? This field has seen significant growth in recent years as organ...
ver más
|
|
|
|
|
|
|
Zainab Jamroz, Insaf Ullah, Bilal Hassan, Noor Ul Amin, Muhammad Asghar Khan, Pascal Lorenz and Nisreen Innab
The Internet of Medical Things (IoMT) overcomes the flaws in the traditional healthcare system by enabling remote administration, more effective use of resources, and the mobility of medical devices to fulfil the patient?s needs. The IoMT makes it simple...
ver más
|
|
|
|
|
|
|
Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi and Amna Eleyan
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove...
ver más
|
|
|
|