|
|
|
Aden Iftin Janjane,Jackson Ndolo Muthini
Pág. 105 - 112
The logistics service industry has evolved quickly to deliver a variety of services including frequently outsourced warehousing, logistics, and freight forwarding, as well as value-added services which include; order management and fulfillment as well as...
ver más
|
|
|
|
|
|
|
M. Imam Arifandy,Hariyadi Hariyadi,Soeryo Adiwibowo
Pág. 199 - 206
Indonesian Sustainability Palm Oil (ISPO) is requirement for palm oil private business in the effort to preserve the environment, increase economic activities, and social activities of the community. The environmental management conducted by the company ...
ver más
|
|
|
|
|
|
|
Yan Chen, Yuhan Yan and Tingju Zhu
Water market development in the Yellow River Basin (YRB) unfolds new opportunities for alleviating water scarcity and improving water productivity. However, the further development of an effective water market in the basin faces challenges such as unclea...
ver más
|
|
|
|
|
|
|
Vandha Pradwiyasma Widartha, Ilkyeun Ra, Su-Yeon Lee and Chang-Soo Kim
Smart lighting control systems represent an advanced approach to reducing energy use. These systems leverage advanced technology to provide users with better control over their lighting, allowing them to manually, remotely, and automatically modify the b...
ver más
|
|
|
|
|
|
|
Audrone Janaviciute, Agnius Liutkevicius, Gedas Dabu?inskas and Nerijus Morkevicius
Online shopping has become a common and popular form of shopping, so online attackers try to extract money from customers by creating online shops whose purpose is to compel the buyer to disclose credit card details or to pay money for goods that are nev...
ver más
|
|
|
|
|
|
|
Xingchen Wang and Peng Li
With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client?s private informat...
ver más
|
|
|
|
|
|
|
Meijuan Huang, Yutian Liu, Bo Yang, Yanqi Zhao and Mingrui Zhang
Revocable attribute-based encryption (RABE) provides greater flexibility and fine-grained access control for data sharing. However, the revocation process for most RABE schemes today is performed by the cloud storage provider (CSP). Since the CSP is an h...
ver más
|
|
|
|
|
|
|
Mona Alkanhal, Abdulaziz Alali and Mohamed Younis
In recent times, the advent of innovative technological paradigms like the Internet of Things has paved the way for numerous applications that enhance the quality of human life. A remarkable application of IoT that has emerged is the Internet of Vehicles...
ver más
|
|
|
|
|
|
|
Lijun Zu, Wenyu Qi, Hongyi Li, Xiaohua Men, Zhihui Lu, Jiawei Ye and Liang Zhang
The digital transformation of banks has led to a paradigm shift, promoting the open sharing of data and services with third-party providers through APIs, SDKs, and other technological means. While data sharing brings personalized, convenient, and enriche...
ver más
|
|
|
|
|
|
|
Peter K. K. Loh, Aloysius Z. Y. Lee and Vivek Balachandran
The rise in generative Artificial Intelligence (AI) has led to the development of more sophisticated phishing email attacks, as well as an increase in research on using AI to aid the detection of these advanced attacks. Successful phishing email attacks ...
ver más
|
|
|
|