|
|
|
Yurii Kharazishvili, Andrii Shevchenko
Pág. 7 - 17
The concept of strategic planning of sustainable development on the example of the railway transport of Ukraine from the standpoint of economic security, which includes methodology, methods and principles of research through the identification of the lev...
ver más
|
|
|
|
|
|
|
Håkon Harnes and Donn Morrison
WebAssembly is a low-level bytecode language that enables high-level languages like C, C++, and Rust to be executed in the browser at near-native performance. In recent years, WebAssembly has gained widespread adoption and is now natively supported by al...
ver más
|
|
|
|
|
|
|
Jiawei Han, Qingsa Li, Ying Xu, Yan Zhu and Bingxin Wu
Artificial intelligence-generated content (AIGC) technology has had disruptive results in AI, representing a new trend in research and application and promoting a new era of AI. The potential benefits of this technology are both profound and diverse. How...
ver más
|
|
|
|
|
|
|
Xi Duan, Jian Liu and Xinjie Wang
The real-time simulation technology of large-scale open sea surfaces has been of great importance in fields such as computer graphics, ocean engineering, and national security. However, existing technologies typically have performance requirements or pla...
ver más
|
|
|
|
|
|
|
Armando Silva-Afonso and Carla Pimentel-Rodrigues
The objective of this article is to deepen knowledge about the existing connections, at the level of urban environments, between energy, water, and nutrients (or food). Energy and basic resources?water and food?are closely interconnected, which is why th...
ver más
|
|
|
|
|
|
|
Yuan Yao, Chenwei Tu, Gaojia Hu, Yuhan Zhang, Hanyuan Cao, Wanrui Wang and Weihua Wang
Intense anthropogenic activities in arid regions remarkably affect groundwater by causing phreatic decline and water environmental deterioration. A systematic understanding of groundwater hydrochemical evolution and recharge is critical to regional water...
ver más
|
|
|
|
|
|
|
Haedam Kim, Suhyun Park, Hyemin Hong, Jieun Park and Seongmin Kim
As the size of the IoT solutions and services market proliferates, industrial fields utilizing IoT devices are also diversifying. However, the proliferation of IoT devices, often intertwined with users? personal information and privacy, has led to a cont...
ver más
|
|
|
|
|
|
|
Mahbuba Begum, Sumaita Binte Shorif, Mohammad Shorif Uddin, Jannatul Ferdush, Tony Jan, Alistair Barros and Md Whaiduzzaman
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern. Hence, copyright protection, content authentication, and integrity ver...
ver más
|
|
|
|
|
|
|
Nan Fu, Dengfeng Liu, Hui Liu, Baozhu Pan, Guanghui Ming and Qiang Huang
Water, energy, food, and ecology are essential for achieving sustainable development in a region, and in order to achieve the Sustainable Development Goals, their security is also essential at a river basin scale. This study investigated the interrelatio...
ver más
|
|
|
|
|
|
|
Tao Feng, Taining Chen and Xiang Gong
This paper presents a formal security analysis of the ISA100.11a standard protocol using the Colored Petri Net (CPN) modeling approach. Firstly, we establish a security threat model for the ISA100.11a protocol and provide a detailed description and analy...
ver más
|
|
|
|