|
|
|
Lígia Conceição, Gonçalo Homem de Almeida Correia, Bart van Arem and José Pedro Tavares
Once trusted, automated vehicles (AVs) will gradually appear in urban areas. Such a transition is an opportunity in transport planning to control undesired impacts and possibly mitigate congestion at a time when both conventional vehicles (CVs) and AVs c...
ver más
|
|
|
|
|
|
|
Yikang Rui, Shu Wang, Renfei Wu and Zhe Shen
Automated truck platooning has become an increasingly popular research subject, and its applicability to highways is considered one of the earliest possible landing scenarios for automated driving. However, there is a lack of research regarding the combi...
ver más
|
|
|
|
|
|
|
Ke Liu, Zhenhong Qi, Li Tan, Caiyan Yang and Canwei Hu
Biopesticides are perceived as a feasible alternative to chemical pesticides, providing an effective approach to pest management while mitigating the undesirable effects of chemical pesticide overuse. Yet, due to the distinctive attributes of the two typ...
ver más
|
|
|
|
|
|
|
Wei Sun, Hui Su and Huacheng Xie
Recently, attribute-based access control (ABAC) has received increasingly more attention and has emerged as the desired access control mechanism for many organizations because of its flexibility and scalability for authorization management, as well as it...
ver más
|
|
|
|
|
|
|
Said M. Easa and Maksym Diachuk
In passing maneuvers on two-lane highways, assessing the needed distance and the potential power reserve to ensure the required speed mode of the passing vehicle is a critical task of speed planning. This task must meet several mutually exclusive conditi...
ver más
|
|
|
|
|
|
|
Wei Sun, Shiwei Wei, Huaping Guo and Hongbing Liu
Role-based access control (RBAC), which has been regarded as one of the most popular access-control mechanisms, is featured by the separation-of-duty constraints, mutually exclusive constraints, and the least-privileges principle. Role mining, a bottom-u...
ver más
|
|
|
|
|
|
|
Wei Sun, Hui Su and Hongbing Liu
Role-based access control (RBAC) is one of the most popular access-control mechanisms because of its convenience for management and various security policies, such as cardinality constraints, mutually exclusive constraints, and user-capability constraint...
ver más
|
|
|
|
|
|
|
Amit Majumder
Pág. 69 - 86
Fishing is recognised as a source of food since the Stone Age. A fisherman is the one who is involved in the process of capturing fish and other species from a water body for living and earning purposes, which started with an objective of survival and tr...
ver más
|
|
|
|
|
|
|
Gabriela Argüello Moncayo
Pág. 233 - 250
Incidents relating to unsafe management of wastes generated due to blending operations on board vessels have ignited an ongoing discussion between two competing legal regimes: the Basel Convention on the Control of Transboundary Movements of Hazardous Wa...
ver más
|
|
|
|
|
|
|
ANTON MINARDI
Pág. 180 - 207
The U.S. counter terrorism on ISIS had implemented with various strategies including degrading ISIS?s capability, shaping global coalition to defeat ISIS, and using trained military armed men for Iraq army forces, Kurdi army, Arabian army, and moderate o...
ver más
|
|
|
|