|
|
|
Xi Duan, Jian Liu and Xinjie Wang
The real-time simulation technology of large-scale open sea surfaces has been of great importance in fields such as computer graphics, ocean engineering, and national security. However, existing technologies typically have performance requirements or pla...
ver más
|
|
|
|
|
|
|
Guillermo Calahorra-Candao and María José Martín-de Hoyos
This study develops a theoretical framework integrating the Technology Acceptance Model (TAM) and Uses and Gratifications Theory (UGT) to predict and understand the acceptance of voice shopping intentions, particularly through AI-driven voice assistants....
ver más
|
|
|
|
|
|
|
Hongguo Ren, Ziming Zheng, Jing Zhang, Qingqin Wang and Yujun Wang
Urban landscape parks play a crucial role in providing recreational opportunities for citizens. Different types of landscapes offer varying levels of comfort experiences. However, the assessment of landscape comfort primarily relies on subjective evaluat...
ver más
|
|
|
|
|
|
|
Albérico Travassos Rosário and Joana Carmo Dias
This study explores the transformative impact of IoT technologies on smart tourism, striving to boost operational efficiency and enrich the traveler experience. Using a systematic literature review with bibliometric analysis, we examined a sample of 83 s...
ver más
|
|
|
|
|
|
|
Philip Empl and Günther Pernul
Although there are numerous advantages of the IoT in industrial use, there are also some security problems, such as insecure supply chains or vulnerabilities. These lead to a threatening security posture in organizations. Security analytics is a collecti...
ver más
|
|
|
|
|
|
|
Abdul Majeed, Abdullah M. Alnajim, Athar Waseem, Aleem Khaliq, Aqdas Naveed, Shabana Habib, Muhammad Islam and Sheroz Khan
In fifth Generation (5G) networks, protection from internal attacks, external breaches, violation of confidentiality, and misuse of network vulnerabilities is a challenging task. Various approaches, especially deep-learning (DL) prototypes, have been ado...
ver más
|
|
|
|
|
|
|
Duc-Thinh Ngo, Ons Aouedi, Kandaraj Piamrat, Thomas Hassan and Philippe Raipin-Parvédy
As the complexity and scale of modern networks continue to grow, the need for efficient, secure management, and optimization becomes increasingly vital. Digital twin (DT) technology has emerged as a promising approach to address these challenges by provi...
ver más
|
|
|
|
|
|
|
Ibrahim Bu Haimed, Marwan Albahar and Ali Alzubaidi
Cloud services provided by Microsoft are growing rapidly in number and importance. Azure Active Directory (AAD) is becoming more important due to its role in facilitating identity management for cloud-based services. However, several risks and security i...
ver más
|
|
|
|
|
|
|
Ioanna Anastasaki, George Drosatos, George Pavlidis and Konstantinos Rantos
Immersive technologies are revolutionary technological advancements that offer users unparalleled experiences of immersion in a virtual or mixed world of virtual and real elements. In such technology, user privacy, security, and anonymity are paramount, ...
ver más
|
|
|
|
|
|
|
Yunshandan Wu, Wenfu Wu, Kai Chen, Ji Zhang, Zhe Liu and Yaqiu Zhang
Food security is intrinsically linked to maintaining optimal physical health and promoting active lifestyles. Stored Grain Ecosystems (SGEs) are complex systems comprising a range of grains, microorganisms, and environmental elements. To ensure sustainab...
ver más
|
|
|
|