|
|
|
Marmar Mabrouk, Andreja Jonoski, Gualbert H. P. Oude Essink and Stefan Uhlenbrook
The Nile Delta Aquifer (NDA) is threatened by salt water intrusion (SWI). This article demonstrates an approach for identifying critical salinity concentration zones using a three-dimensional (3D) variable-density groundwater flow model in the NDA. An in...
ver más
|
|
|
|
|
|
|
Jiajia Pan and Hung Tao Shen
A two-dimensional wave model coupled with ice dynamics is developed to evaluate ice effects on shallow water wave propagation on a beach and in a channel. The nonlinear Boussinesq equations with ice effects are derived and solved by the hybrid technique ...
ver más
|
|
|
|
|
|
|
Enrique Fernández Escalante, Jon San Sebastián Sauto and Rodrigo Calero Gil
In this article, the authors will support Managed Aquifer Recharge (MAR) as a tool to combat Climate Change (CC) adverse impacts on the basis of real sites, indicators, and specific cases located Spain. MAR has been used in Spain in combination with othe...
ver más
|
|
|
|
|
|
|
H. Nasri MZ, Surya Bakti Rangkuti
Pág. 219 - 225
Microtremor data at 15 point had been taken at tanjung batu around of outcrop igneous rock in back arc basin south sumatra such as carried out at sub basin jambi. The igneous rock, which is found in this area, is basalt and distributed in ± 825 Ha and lo...
ver más
|
|
|
|
|
|
|
Amri Adnan,Muhammad Irham,Muhammad Rusdi
Pág. 96 - 113
Most of the coastal zones of Aceh Besar are areas of accumulation of organic compounds such as C-Organic and CaCO3. Therefore, studying the distribution of organic carbon and carbonates in sediments in coastal areas is necessary. This study aims to analy...
ver más
|
|
|
|
|
|
|
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici
The growth of the Internet of Things (IoT) has led to a significant rise in cyber attacks and an expanded attack surface for the average consumer. In order to protect consumers and infrastructure, research into detecting malicious IoT activity must be of...
ver más
|
|
|
|
|
|
|
Haedam Kim, Suhyun Park, Hyemin Hong, Jieun Park and Seongmin Kim
As the size of the IoT solutions and services market proliferates, industrial fields utilizing IoT devices are also diversifying. However, the proliferation of IoT devices, often intertwined with users? personal information and privacy, has led to a cont...
ver más
|
|
|
|
|
|
|
Konstantinos Psychogyios, Andreas Papadakis, Stavroula Bourou, Nikolaos Nikolaou, Apostolos Maniatis and Theodore Zahariadis
The advent of computer networks and the internet has drastically altered the means by which we share information and interact with each other. However, this technological advancement has also created opportunities for malevolent behavior, with individual...
ver más
|
|
|
|
|
|
|
Emanuele Santonicola, Ennio Andrea Adinolfi, Simone Coppola and Francesco Pascale
Nowadays, a vehicle can contain from 20 to 100 ECUs, which are responsible for ordering, controlling and monitoring all the components of the vehicle itself. Each of these units can also send and receive information to other units on the network or exter...
ver más
|
|
|
|
|
|
|
Omar Abdulkhaleq Aldabash and Mehmet Fatih Akay
An IDS (Intrusion Detection System) is essential for network security experts, as it allows one to identify and respond to abnormal traffic present in a network. An IDS can be utilized for evaluating the various types of malicious attacks. Hence, detecti...
ver más
|
|
|
|