We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Regional Water Resource Security in China Based on a New Fuzzy Method with Combination Weighting

    As one of the important natural resources, water resources are related to the future survival and development of human beings. In recent years, the...

    Yuanxiang Zhou, Weiliang Tao, Malin Song in International Journal of Fuzzy Systems
    Article 29 June 2022
  2. Promoting Surface Runoff Management for Enhancing Water Security: A Case Study of Solapur District Maharashtra

    The present investigation is an attempt to demarcate the micro-watersheds in the Solapur district and prioritize them based on their runoff...

    Kalpana Devi, Sumit Sen, Himanshu Joshi in Journal of The Institution of Engineers (India): Series A
    Article 21 April 2023
  3. Assessment of Water Security for a Sustainable Environment: An Indicator-Based Approach Applied in Penang, Malaysia

    When risks to water security increase it is necessary to enhance the management response. Water and climate change are closely related as water form...
    Rozi Abdullah, Rofiat Bunmi Mudashiru, Nuridah Sabtu in Proceedings of AWAM International Conference on Civil Engineering 2022 - Volume 3
    Conference paper 2024
  4. Towards the Testbed and Dataset for Analysis of Water Treatment Systems Security

    The security of cyber physical systems is highly relevant now. Due to tight connection between physical sensors of the technological processes and...
    Elena Fedorchenko, Evgenia Novikova, ... Igor Saenko in Data Science and Applications
    Conference paper 2024
  5. Assessment of Spring Water Security for Small Community Using Internet of Things (IoT)

    The securing of clean and sustainable water sources is a fundamental entitlement of individuals and an essential factor in the sustained advancement...
    Mohamad Nazrul Hafiz Mohd Nadzri, Maidiana Othman, ... Norzaima Nordin in Advances in Civil Engineering Materials
    Conference paper 2024
  6. An OSINT-Driven Security Analysis of Intelligent Construction of Water Conservancy Projects in China

    China’s major plan to build a modernised economic and ecological system puts water resources at the top of major infrastructure networks, but...
    Conference paper 2024
  7. Intelligent LSTM (iLSTM)-Security Model for HetIoT

    Distributed denial-of-service (DDoS) is the most recent lethal threat, and several industrial and academic researchers are concentrating on defending...

    Shalaka S. Mahadik, Pranav M. Pawar, ... Dnyaneshwar Mantri in Wireless Personal Communications
    Article 01 November 2023
  8. Security Enhancement in IoT with an Application of Water Monitoring

    In recent years, numerous innovations have been observed in IOT-based process management systems. There are smart management technologies and...
    Jui Sanjay Berde, Shirish S. Kulkarni in Inventive Computation and Information Technologies
    Conference paper 2023
  9. Optimizing the Water-Energy-Food Nexus System Considering the Human Development Index

    Water, energy, and food are essential resources for meeting basic human needs and for socio-economic development. The water-energy-food nexus studies...

    Brenda Cansino-Loeza, Sergio Yael Bazán-Ramírez, José María Ponce-Ortega in Process Integration and Optimization for Sustainability
    Article 20 May 2024
  10. Enhancing IoT security in wireless local area networks through dynamic vulnerability scanning

    Wireless local area networks (WLANs) play a crucial role in the internet of things (IoT) landscape, facilitating constant data exchange among...

    P SENTHILRAJA, P NANCY, ... G MANISHA in Sādhanā
    Article 06 June 2024
  11. Medical Image Data Security Risk Identification Based on 6G Wireless Sensor Networks and AI-Assisted Technology

    This study presents a novel technique to protect medical image data from security risks under 6G wireless technology-based communications called...

    Chengwei Li, Zhen Zhang, Hui **ao in Wireless Personal Communications
    Article 04 June 2024
  12. Security Clouds to Improve Privacy and Conduct Continuous Audits in 6G Networked Environments Smart Cities

    Data auditing in the cloud, along with files and authentication server Deduplication, may protect the integrity of cloud storage and substantially...

    M. Mageshwari, R. Naresh in Wireless Personal Communications
    Article 08 May 2024
  13. Traditional and Blockchain Based IoT and IIoT Security in the Context of Agriculture: A Survey

    Agriculture is an inevitable area for research that must be prioritized as the world population is continuously growing. To meet agricultural product...

    Rishikesh, Ditipriya Sinha in Wireless Personal Communications
    Article 01 December 2023
  14. Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks

    In today's world, the Internet of Things (IoT) plays a major role to interconnect all the devices and improve the overall Quality of Life (QoL) for...

    Shraiyash Pandey, Bharat Bhushan in Wireless Networks
    Article 25 March 2024
  15. Water Quality Security Guarantee and Monitoring System Based on Cloud Technology

    In recent years, with the rapid development of social economy, water quality and safety issues are very common, and they are also a topic of our...
    Conference paper 2022
  16. Low Power Blockchain in Industry 4.0 Case Study: Water Management in Tunisia

    Industry has undergone, during this decade, significant technological changes and improvements. The industrial sector is further moving towards IIoT...

    Tarek Frikha, Jalel Ktari, ... Habib Hamam in Journal of Signal Processing Systems
    Article 26 July 2023
  17. Integrating the dynamic frequency security in the real-time scheduling considering the accurate models and network constraints

    The frequency security issue has become more critical in recent decades for various reasons, especially the reduced and degraded primary frequency...

    M. Pazoki, M. K. Sheikh-EL-Eslami, H. Delkhosh in Electrical Engineering
    Article 16 February 2024
  18. A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm

    Maximizing the security of the cloud system is most important need of this world. Similarly, the data controllers are also increased stealing the...

    Sahaya Stalin Jose G, Sugitha G, ... Preethi B. C in Peer-to-Peer Networking and Applications
    Article 06 February 2024
  19. A Systematic Review on Game-Theoretic Models and Different Types of Security Requirements in Cloud Environment: Challenges and Opportunities

    The presented survey paper explores the application of game theoretic models for addressing security challenges in cloud computing environments. It...

    Komal Singh Gill, Anju Sharma, Sharad Saxena in Archives of Computational Methods in Engineering
    Article 01 April 2024
  20. Smart City IoT System Network Level Routing Analysis and Blockchain Security Based Implementation

    This paper demonstrates, network-level performance analysis and implementation of smart city Internet of Things (IoT) system with Infrastructure as a...

    Samuyelu Bommu, Aravind Kumar M, ... S. Kiran S in Journal of Electrical Engineering & Technology
    Article 10 October 2022
Did you find what you were looking for? Share feedback.