We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 61-80 of 10,000 results
  1. Reagent Treatment of Domestic Wastewater in Arctic Settlements from Ammonium Ions

    The problem of treatment and disposal of domestic wastewater is very relevant for remote small settlements in the Arctic. Biological purification, as...
    Conference paper 2024
  2. Long-Term Risks of Urban Landscape Transformation

    This article analyses different approaches to defining the concept of landscape. The author’s approach to the definition of the concept of landscape,...
    Conference paper 2024
  3. Study of Primary Graphite Separation Products for the Creation of Petroleum Product Sorbents on Their Basis

    Today Russia is experiencing a serious Shortage of natural Graphite. At the same time, little attention is paid to the waste product of iron and...
    Conference paper 2024
  4. Digital Platform for Construction of Environmental and Economic Water Resource Maps

    Today, for balanced environmental management, it is necessary to consider and assess the availability and condition of natural resources and the...
    Conference paper 2024
  5. Prospects for the Use of Drilling Sludge from the Oil Fields of the Southern Federal District as Raw Materials for the Production of Ceramic Building Bricks

    The construction industry is one of the main leading sectors of the economy in the country. Among them, materials from clay raw materials have been...
    Conference paper 2024
  6. Analysis of the Turbocompressor Rotor Dynamics Taking into Account Features of Active Magnetic Bearings Using Specialized Computing Systems

    The article includes an analysis of various computational engineering analysis tools in terms of evaluating the dynamics of rotors in active magnetic...
    Conference paper 2024
  7. Application of Incremental Sheet Forming for Cladding Panels with Customized Design

    Incremental sheet metal forming provides great freedom in unique and versatile sha** of sheet metal at low cost. Products may be industrial parts,...
    Conference paper 2024
  8. Enhancing Cybersecurity in Industrial Control Systems Through GRC Framework: Principles, Regulations, and Risk Assessment

    Information security’s primary purpose is to safeguard confidentiality, integrity, and availability. Moreover, as a result of the current global...
    Conference paper 2024
  9. Legal Aspects of Network Security

    In this article, we will examine some of the international- EU- and Hungarian legal frameworks for network security, summarize them and outline...
    Levente Durczy, Kornélia Lazányi, ... András Molnár in Critical Infrastructure Protection in the Light of the Armed Conflicts
    Conference paper 2024
  10. Fire Database and Cybersecurity

    In science, the terminology “data” is used to describe a gathered body of facts, which represents the information obtained from observing and testing...
    Tianhang Zhang, Yishuo Jiang, Ray Y. Zhong in Intelligent Building Fire Safety and Smart Firefighting
    Chapter 2024
  11. Organization of Smart City Services Based on Microservice Architecture

    The maintenance, integration, rapid deployment, and provision of diverse services are all important directions for research on fifth-generation...
    Mohammed Saleh Ali Muthanna, Dmitry Elkin, ... Ammar Muthanna in Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities
    Chapter 2024
  12. Energy-Efficient Beam Sha** in MIMO System Using Machine Learning

    The work presents an algorithm for energy-efficient beamforming in a MU-MIMO (multiuser multiple input multiple output) system using machine learning...
    Aigul R. Absalyamova, Anna V. Voronkova, ... Grigoriy S. Voronkov in Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities
    Chapter 2024
  13. Electromagnetic Interference Shielding Materials

    This chapter delves into electromagnetic interference (EMI) shielding materials, focusing on graphene-bearing polymer composites. It explores the...
    Suprakas Sinha Ray, Lesego Tabea Temane, Jonathan Tersur Orasugh in Graphene-Bearing Polymer Composites
    Chapter 2024
  14. Techniques for Polymer-Based EMI Shielding and Fire Retarding Characteristics Measurement

    This chapter elucidates various techniques for precisely measuring the electromagnetic interference (EMI) shielding and fire-retarding...
    Suprakas Sinha Ray, Lesego Tabea Temane, Jonathan Tersur Orasugh in Graphene-Bearing Polymer Composites
    Chapter 2024
  15. Big Data Analytics for Secure Edge-Based Manufacturing Internet of Things (MIoT)

    There is increasing demand for Internet of Things (IoT) devices in many aspects of life such as healthcare, transportation, agriculture, and industry...
    Lo’ai Tawalbeh, Swathi Lakkineni, ... Ahmed A. Abd El-latif in Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities
    Chapter 2024
  16. Delay Prediction in M2M Networks Using the Deep Learning Approach

    The rapid development of fifth-generation (5G) mobile technology and its applications in various sectors has increased the number of...
    Ali R. Abdellah, Malik Alsweity, ... Andrey Koucheryavy in Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities
    Chapter 2024
  17. Graphene Nanoplatelets in Brief

    This chapter provides a concise overview of graphene nanoplatelets (GNPs) and their significance in polymer composites. GNPs, comprising stacked...
    Suprakas Sinha Ray, Lesego Tabea Temane, Jonathan Tersur Orasugh in Graphene-Bearing Polymer Composites
    Chapter 2024
  18. Malware Mitigation in Cloud Computing Architecture

    Cloud computing is one of the decade’s most trending discussions in information technology. The cloud is not an array of software, hardware or...
    Sai Kumar Medaram, Leandros Maglaras in Cyber Malware
    Chapter 2024
  19. Android Malware Detection Based on Network Analysis and Federated Learning

    With the dramatic growth of available Android applications in today’s digital era, Android malware has grown accordingly in both quantity and...
    Djallel Hamouda, Mohamed Amine Ferrag, ... Hamid Seridi in Cyber Malware
    Chapter 2024
  20. A Deep-Vision-Based Multi-class Classification System of Android Malware Apps

    The number of malicious software attacks on the Android operating system (OS) is increasing daily. Thus, efficient detection and classification...
    Iman Almomani, Walid El-Shafai, ... Lama AlSwayeh in Cyber Malware
    Chapter 2024
Did you find what you were looking for? Share feedback.