|
|
|
Enrique Fernández Escalante, Jon San Sebastián Sauto and Rodrigo Calero Gil
In this article, the authors will support Managed Aquifer Recharge (MAR) as a tool to combat Climate Change (CC) adverse impacts on the basis of real sites, indicators, and specific cases located Spain. MAR has been used in Spain in combination with othe...
ver más
|
|
|
|
|
|
|
Zhiyu Lin, Shengbin Hu and Hang Lin
While urban underground space is being built and developed at a high speed, urban flooding is also occurring gradually and frequently. Urban water, in many disasters, has intruded into underground spaces, such as subway stations, often leading to serious...
ver más
|
|
|
|
|
|
|
Khalid Alnajim and Ahmed A. Abokifa
In the wake of the terrorist attacks of 11 September 2001, extensive research efforts have been dedicated to the development of computational algorithms for identifying contamination sources in water distribution systems (WDSs). Previous studies have ext...
ver más
|
|
|
|
|
|
|
Zhihang Hu, Xiaowei Gu, Baojun Cheng, Qing Wang, Jianping Liu, Xiaowei Ge and Shiqi Yin
The preparation of iron ore tailings (IOTs) into supplementary cementitious materials (SCMs) is an effective approach to achieve value-added utilization of industrial solid waste. This study systematically investigates the hydration pattern and strength ...
ver más
|
|
|
|
|
|
|
Bharati Mahajan, Sameer Shastri and Shreenivas Londhe
Freshwater sources are affected by a diverse range of pollutants, which increases the demand for effective remediation. Aquatic phytoremediation is a nature-based solution. It has the potential to provide efficient, adaptable, and multi-targeted treatmen...
ver más
|
|
|
|
|
|
|
Furkat Safarov, Mainak Basak, Rashid Nasimov, Akmalbek Abdusalomov and Young Im Cho
In the rapidly evolving landscape of internet usage, ensuring robust cybersecurity measures has become a paramount concern across diverse fields. Among the numerous cyber threats, denial of service (DoS) and distributed denial of service (DDoS) attacks p...
ver más
|
|
|
|
|
|
|
Gordon Gilja, Neven Kuspilic, Martina Lacko and Davor Romic
Rainfed agriculture is dependent on rainfall and runoff patterns, especially in lowland areas that rely on pumping operation to remove excess water from the drainage network. Polder areas are extremely vulnerable to saltwater intrusion and subsequent soi...
ver más
|
|
|
|
|
|
|
Faeiz Alserhani and Alaa Aljared
With the increased sophistication of cyber-attacks, there is a greater demand for effective network intrusion detection systems (NIDS) to protect against various threats. Traditional NIDS are incapable of detecting modern and sophisticated attacks due to...
ver más
|
|
|
|
|
|
|
Betty Saridou, Isidoros Moulas, Stavros Shiaeles and Basil Papadopoulos
Image conversion of malicious binaries, or binary visualisation, is a relevant approach in the security community. Recently, it has exceeded the role of a single-file malware analysis tool and has become a part of Intrusion Detection Systems (IDSs) thank...
ver más
|
|
|
|
|
|
|
Zhenyu Sun, Jianyu Hu, Hongyang Lin, Zhaozhang Chen, Jia Zhu, Longqi Yang, Zhiyuan Hu, Xirong Chen and Xuewen Wu
In this research, the features of the Kuroshio Current in 2019 were studied based on the observations of 29 self-developed surface current experiment drifters deployed in the western Pacific Ocean and the East China Sea. The Kuroshio flow pattern and vel...
ver más
|
|
|
|