|
|
|
Harnovinsah Harnovinsah,Nindy Elfania Kansil,Lucky Nugroho,Yananto Mihadi Putra
Pág. 1 - 20
|
|
|
|
|
|
|
Dávid Tozsér, Zoltán Lakner, Novy Anggraini Sudibyo and Anita Boros
As the relevant European Union directives require in-depth sustainability reporting from large institutions, banks are among the concerned with disclosure obligations. Several institutions prepare self-structured recommendations by which companies are in...
ver más
|
|
|
|
|
|
|
Nicolás Molina-Padrón, Francisco Cabrera-Almeida, Víctor Araña-Pulido and Beatriz Tovar
Every year, more than 1500 containers are lost around the world. These accidents are increasingly more common due to the boom of the shipping industry, presenting serious consequences for marine ecosystems and maritime navigation. This problem has alerte...
ver más
|
|
|
|
|
|
|
Vivek Kumar Prasad, Debabrata Dansana, Madhuri D. Bhavsar, Biswaranjan Acharya, Vassilis C. Gerogiannis and Andreas Kanavos
With the proliferation of IoT devices, there has been exponential growth in data generation, placing substantial demands on both cloud computing (CC) and internet infrastructure. CC, renowned for its scalability and virtual resource provisioning, is of p...
ver más
|
|
|
|
|
|
|
Kunkun Fan, Daichao Li, Cong Li, Xinlei Jin, Fei Ding and Zhan Zeng
Analyzing the influencing factors of PM2.5 concentration, scenario simulations, and countermeasure research to address the problem of PM2.5 pollution in Guangdong Province is of great significance for governments at all levels for formulating relevant po...
ver más
|
|
|
|
|
|
|
Guoray Cai and Yimu Pan
Room usage semantics in models of large indoor environments such as public buildings and business complex are critical in many practical applications, such as health and safety regulations, compliance, and emergency response. Existing models such as Indo...
ver más
|
|
|
|
|
|
|
Afrah Almansoori, Mostafa Al-Emran and Khaled Shaalan
Cybersecurity procedures and policies are prevalent countermeasures for protecting organizations from cybercrimes and security incidents. Without considering human behaviors, implementing these countermeasures will remain useless. Cybersecurity behavior ...
ver más
|
|
|
|
|
|
|
Osvaldo Massicame, Helena Coelho Inácio and Maria Anunciação Bastos
The function of the external audit, largely as a result of the scandals and financial crises that have occurred, has been the subject of debate and criticism. This aspect has fostered discussions around the Audit Expectation Gap, which, in short, is unde...
ver más
|
|
|
|
|
|
|
Jaime Ramírez-Angulo, Anindita Paul, Manaswini Gangineni, Jose Maria Hinojo-Montero and Jesús Huerta-Chua
The application of the flipped voltage follower to implement two high-performance circuits is presented: (1) The first is a class AB cascode flipped voltage follower that shows an improved slew rate and an improved bandwidth by very large factors and tha...
ver más
|
|
|
|
|
|
|
José Brás, Ruben Pereira and Sérgio Moro
Robotic process automation and intelligent process automation have gained a foothold in the automation of business processes, using blocks of software (bots). These agents interact with systems through interfaces, replacing human intervention with the ai...
ver más
|
|
|
|