|
|
|
Yurii Kharazishvili, Andrii Shevchenko
Pág. 7 - 17
The concept of strategic planning of sustainable development on the example of the railway transport of Ukraine from the standpoint of economic security, which includes methodology, methods and principles of research through the identification of the lev...
ver más
|
|
|
|
|
|
|
Xi Duan, Jian Liu and Xinjie Wang
The real-time simulation technology of large-scale open sea surfaces has been of great importance in fields such as computer graphics, ocean engineering, and national security. However, existing technologies typically have performance requirements or pla...
ver más
|
|
|
|
|
|
|
Chunguang Bi, Shuo Zhang, He Chen, Xinhua Bi, Jinjing Liu, Hao Xie, Helong Yu, Shaozhong Song and Lei Shi
Ensuring the security of germplasm resources is of great significance for the sustainable development of agriculture and ecological balance. By combining the morphological characteristics of maize seeds with hyperspectral data, maize variety classificati...
ver más
|
|
|
|
|
|
|
Zhihui Tian, Ruoyi Zhang, Lili Wu, Yongji Wang, Jinjin Yang and Di Cao
Climate change, population growth, and socio-economic transformations present multifaceted challenges to the water resource systems in the four major river basins of Henan Province. Consequently, to gain a comprehensive understanding of water security wi...
ver más
|
|
|
|
|
|
|
Anas A. Makki and Ammar Y. Alqahtani
This study analyzes the barriers to developing smart cities (SCs) using the decision-making trial and evaluation laboratory (DEMATEL) approach. The primary objective is to identify, classify, and assess the main barriers hindering the progress of SCs. Th...
ver más
|
|
|
|
|
|
|
Abdul Majeed, Abdullah M. Alnajim, Athar Waseem, Aleem Khaliq, Aqdas Naveed, Shabana Habib, Muhammad Islam and Sheroz Khan
In fifth Generation (5G) networks, protection from internal attacks, external breaches, violation of confidentiality, and misuse of network vulnerabilities is a challenging task. Various approaches, especially deep-learning (DL) prototypes, have been ado...
ver más
|
|
|
|
|
|
|
Guoqing Zhang, Shilin Yin, Chenfeng Huang and Weidong Zhang
This paper focuses on the intervehicle security-based robust formation control of unmanned surface vehicles (USVs) to implement the formation switch mission. In the scheme, a novel adaptive potential ship (APS)-based guidance principle is developed to pr...
ver más
|
|
|
|
|
|
|
Maki Kihara and Satoshi Iriyama
A new class of cryptosystems called verifiable encryption (VE) that facilitates the verification of two plaintexts without decryption was proposed in our previous paper. The main contributions of our previous study include the following. (1) Certain cryp...
ver más
|
|
|
|
|
|
|
Xue Jun Li, Maode Ma and Yihan Sun
Modern smart grids are built based on top of advanced computing and networking technologies, where condition monitoring relies on secure cyberphysical connectivity. Over the network infrastructure, transported data containing confidential information, mu...
ver más
|
|
|
|
|
|
|
Zhigang Song, Daisong Li, Zhongyou Chen and Wenqin Yang
The unsupervised domain-adaptive vehicle re-identification approach aims to transfer knowledge from a labeled source domain to an unlabeled target domain; however, there are knowledge differences between the target domain and the source domain. To mitiga...
ver más
|
|
|
|