|
|
|
Ernesto Gómez-Marín, Valerio Senni, Luis Parrilla, Jose L. Tejero López, Encarnación Castillo and Davide Martintoni
The accurate tracking of every production step and related outcome in a supply chain is a stringent requirement in safety-critical sectors such as civil aviation. In such a framework, trusted traceability and accountability can be reliably and securely m...
ver más
|
|
|
|
|
|
|
Emanuel Rieder, Matthias Schmuck and Alexandru Tugui
Digital transformation (or digitalization) is the process of continuous further development of digital technologies (such as smart devices, cloud services, and Big Data) that have a lasting impact on our economy and society. In this manner, digitalizatio...
ver más
|
|
|
|
|
|
|
Felipe Orellana, Peppe J. V. D?Aranno, Silvia Scifoni and Maria Marsella
Monitoring structural stability in urban areas and infrastructure networks is emerging as one of the dominant socio-economic issues for population security. The problem is accentuated by the age of the infrastructure because of increasing risks due to ma...
ver más
|
|
|
|
|
|
|
Hongming Cai, Zhuoran Zhang and Shuanghou Deng
Recently, ducted fan unmanned aerial vehicles (UAVs) have attracted considerable attention due to their potential for application in both civil and military missions. Compared with free propellers, the presence of duct can in principle decrease the flow ...
ver más
|
|
|
|
|
|
|
Salvatore Distefano, Niccolò Baldassini, Viviana Barbagallo, Laura Borzì, Natale Maria D?Andrea, Salvatore Urso and Agata Di Stefano
The assessment of the vulnerability of a site to tsunami events should take into consideration the geomorphological setting, which is strongly determined by the stratigraphic framework of the area. Lampedusa island is located in the central portion of th...
ver más
|
|
|
|
|
|
|
In Lee
To address rapidly growing data breach incidents effectively, healthcare providers need to identify various insider and outsider threats, analyze the vulnerabilities of their internal security systems, and develop more appropriate data security measures ...
ver más
|
|
|
|
|
|
|
Zhigang Zhu, Zhijian Yi, Shiyao Li and Lin Li
Radar data mining is the key module for signal analysis, where patterns hidden inside of signals are gradually available in the learning process and its superiority is significant for enhancing the security of the radar emitter classification (REC) syste...
ver más
|
|
|
|
|
|
|
Kun Qin, Qixin Wang, Binbin Lu, Huabo Sun and Ping Shu
In the civil aviation industry, security risk management has shifted from post-accident investigations and analyses to pre-accident warnings in an attempt to reduce flight risks by identifying currently untracked flight events and their trends and effect...
ver más
|
|
|
|
|
|
|
Jiaqi Zhang, Peter Oosterveer, Yu?e Li and Mary Greene
Promoting crop residue-based bioenergy (CRB) is a strategy for mitigating climate change and ensuring water-energy-food security. Although China has abundant crop residues, CRB is not well developed, and several policy targets are not being reached. Thes...
ver más
|
|
|
|
|
|
|
Asli Pelin Gurgun, Mehmet Ilker Genc, Kerim Koc and David Arditi
Various stakeholders are involved in managing supply chain processes in construction. Suppliers can hardly tolerate upfront costs when faced with flaws in the payment pipeline. This is a serious problem in building construction that uses a large variety ...
ver más
|
|
|
|