|
|
|
Ishu Gupta,Niharika Singh,Ashutosh Kumar Singh
Pág. 173 - 185
The management of data while maintaining its utility and preservation of security scheme is a matter of concern for the cloud owner. In order to minimize the overhead at cloud service provider of applying security over each document and then send it to t...
ver más
|
|
|
|
|
|
|
Nelson Carriço, Bruno Ferreira, André Antunes, João Caetano and Dídia Covas
This paper presents a set of computational tools specially developed for supporting the operation and management of water distribution systems towards digital transformation of water services. These tools were developed in the scope of two R&D projec...
ver más
|
|
|
|
|
|
|
Nigang Sun, Chenyang Zhu, Yuanyi Zhang and Yining Liu
Digital transformation of the logistics industry triggered by the widespread use of Internet of Things (IoT) technology has prompted a significant revolution in logistics companies, further bringing huge dividends to society. However, the concurrent acce...
ver más
|
|
|
|
|
|
|
Muhammad Sohaib and Jong-Myon Kim
Boiler heat exchange in thermal power plants involves tubes to transfer heat from the fuel to the water. Boiler tube leakage can cause outages and huge power generation loss. Therefore, early detection of leaks in boiler tubes is necessary to avoid such ...
ver más
|
|
|
|
|
|
|
Diane Gan and Lily R. Jenkins
This research investigates the privacy issues that exist on social networking sites. It is reasonable to assume that many Twitter users are unaware of the dangers of uploading a tweet to their timeline which can be seen by anyone. Enabling geo-location t...
ver más
|
|
|
|
|
|
|
Johannes Schuster, Ludwig Hagn, Martin Mittermayer, Franz-Xaver Maidl and Kurt-Jürgen Hülsbergen
Satellite and sensor-based systems of site-specific fertilization have been developed almost exclusively in conventional farming. Agronomic and ecological advantages can also be expected from these digital methods in organic farming. However, it has not ...
ver más
|
|
|
|
|
|
|
Xu Jiang, Dejun Mu and Huixiang Zhang
Increasingly, malicious Android apps use various methods to steal private user data without their knowledge. Detecting the leakage of private data is the focus of mobile information security. An initial investigation found that none of the existing secur...
ver más
|
|
|
|
|
|
|
Mishall Al-Zubaidie and Ghanima Sabr Shyaa
Technology advancements have driven a boost in electronic commerce use in the present day due to an increase in demand processes, regardless of whether goods, products, services, or payments are being bought or sold. Various goods are purchased and sold ...
ver más
|
|
|
|
|
|
|
Hyun-Kwon Do, Seong-Taek Yun, Soonyoung Yu, Yon-Gyung Ryuh and Hyeon-Su Choi
Three hydrochemical types of CO2-rich water (i.e., Na-HCO3, Ca-Na-HCO3 and Ca-HCO3) occur together in the silicate bedrock (granite and gneiss) of Gangwon Province in South Korea. As a natural analogue of geological carbon storage (GCS), this can provide...
ver más
|
|
|
|
|
|
|
Ilya Ostanin, Zahie Anka and Rolando Di Primio
Hydrocarbon prospectivity in the Greater Barents Sea remains enigmatic as gas discoveries have dominated over oil in the past three decades. Numerous hydrocarbon-related fluid flow anomalies in the area indicate leakage and redistribution of petroleum in...
ver más
|
|
|
|
|
|
|
Thejaswini P, Vivekananda G, Anu H, Priya R, Krishna Prasad B S, Nischay M
Pág. 370 - 388
Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency. NoC is a communication architectu...
ver más
|
|
|
|
|
|
|
Xingchen Wang and Peng Li
With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client?s private informat...
ver más
|
|
|
|
|
|
|
Bin Cheng, Ping Chen, Xin Zhang, Keyu Fang, Xiaoli Qin and Wei Liu
With the rapid development of ubiquitous data collection and data analysis, data privacy in a recommended system is facing more and more challenges. Differential privacy technology can provide strict privacy protection while reducing the risk of privacy ...
ver más
|
|
|
|
|
|
|
Alessandro Bocci, Stefano Forti, Roberto Guanciale, Gian-Luigi Ferrari and Antonio Brogi
The security of Cloud applications is a major concern for application developers and operators. Protecting users? data confidentiality requires methods to avoid leakage from vulnerable software and unreliable Cloud providers. Recently, trusted execution ...
ver más
|
|
|
|
|
|
|
Dohoon Lee, David Camacho and Jason J. Jung
Many vehicles are connected to the Internet, and big data are continually created. Various studies have been conducted involving the development of artificial intelligence, machine learning technology, and big data frameworks. The analysis of smart mobil...
ver más
|
|
|
|
|
|
|
Mohammed Akallouch, Oussama Akallouch, Khalid Fardousse, Afaf Bouhoute and Ismail Berrada
Accurate and timely traffic information is a vital element in intelligent transportation systems and urban management, which is vitally important for road users and government agencies. However, existing traffic prediction approaches are primarily based ...
ver más
|
|
|
|
|
|
|
Muhammad Firdaus and Kyung-Hyune Rhee
The conventional architecture of vehicular ad hoc networks (VANETs) with a centralized approach has difficulty overcoming the increasing complexity of intelligent transportation system (ITS) applications as well as challenges in providing large amounts o...
ver más
|
|
|
|
|
|
|
Shaoyong Li, Liang Lv, Xiaoya Li and Zhaoyun Ding
At present, most mobile App start-up prediction algorithms are only trained and predicted based on single-user data. They cannot integrate the data of all users to mine the correlation between users, and cannot alleviate the cold start problem of new use...
ver más
|
|
|
|
|
|
|
Md Sahidul Islam
Pág. 22
Security measures of water resources are analysed in most countries in the Asia pacific region. The purpose of this study is to investigate and overview the water crisis in Asian countries, as well as predict the crisis in the following years. Numerical ...
ver más
|
|
|
|
|
|
|
Mate Horvath,Istvan Vajda
Pág. 104 - 111
The proliferation of cloud computing highlights the importance of techniques that permit both secure storage of sensitive data and flexible data management at the same time. One line of research with this double motivation is the study&nbs...
ver más
|
|
|
|