Search
Search Results
-
Reagent Treatment of Domestic Wastewater in Arctic Settlements from Ammonium Ions
The problem of treatment and disposal of domestic wastewater is very relevant for remote small settlements in the Arctic. Biological purification, as... -
Long-Term Risks of Urban Landscape Transformation
This article analyses different approaches to defining the concept of landscape. The author’s approach to the definition of the concept of landscape,... -
Study of Primary Graphite Separation Products for the Creation of Petroleum Product Sorbents on Their Basis
Today Russia is experiencing a serious Shortage of natural Graphite. At the same time, little attention is paid to the waste product of iron and... -
Digital Platform for Construction of Environmental and Economic Water Resource Maps
Today, for balanced environmental management, it is necessary to consider and assess the availability and condition of natural resources and the... -
Prospects for the Use of Drilling Sludge from the Oil Fields of the Southern Federal District as Raw Materials for the Production of Ceramic Building Bricks
The construction industry is one of the main leading sectors of the economy in the country. Among them, materials from clay raw materials have been... -
Analysis of the Turbocompressor Rotor Dynamics Taking into Account Features of Active Magnetic Bearings Using Specialized Computing Systems
The article includes an analysis of various computational engineering analysis tools in terms of evaluating the dynamics of rotors in active magnetic... -
Application of Incremental Sheet Forming for Cladding Panels with Customized Design
Incremental sheet metal forming provides great freedom in unique and versatile sha** of sheet metal at low cost. Products may be industrial parts,... -
Enhancing Cybersecurity in Industrial Control Systems Through GRC Framework: Principles, Regulations, and Risk Assessment
Information security’s primary purpose is to safeguard confidentiality, integrity, and availability. Moreover, as a result of the current global... -
Legal Aspects of Network Security
In this article, we will examine some of the international- EU- and Hungarian legal frameworks for network security, summarize them and outline... -
Fire Database and Cybersecurity
In science, the terminology “data” is used to describe a gathered body of facts, which represents the information obtained from observing and testing... -
Organization of Smart City Services Based on Microservice Architecture
The maintenance, integration, rapid deployment, and provision of diverse services are all important directions for research on fifth-generation... -
Energy-Efficient Beam Sha** in MIMO System Using Machine Learning
The work presents an algorithm for energy-efficient beamforming in a MU-MIMO (multiuser multiple input multiple output) system using machine learning... -
Electromagnetic Interference Shielding Materials
This chapter delves into electromagnetic interference (EMI) shielding materials, focusing on graphene-bearing polymer composites. It explores the... -
Techniques for Polymer-Based EMI Shielding and Fire Retarding Characteristics Measurement
This chapter elucidates various techniques for precisely measuring the electromagnetic interference (EMI) shielding and fire-retarding... -
Big Data Analytics for Secure Edge-Based Manufacturing Internet of Things (MIoT)
There is increasing demand for Internet of Things (IoT) devices in many aspects of life such as healthcare, transportation, agriculture, and industry... -
Delay Prediction in M2M Networks Using the Deep Learning Approach
The rapid development of fifth-generation (5G) mobile technology and its applications in various sectors has increased the number of... -
Graphene Nanoplatelets in Brief
This chapter provides a concise overview of graphene nanoplatelets (GNPs) and their significance in polymer composites. GNPs, comprising stacked... -
Malware Mitigation in Cloud Computing Architecture
Cloud computing is one of the decade’s most trending discussions in information technology. The cloud is not an array of software, hardware or... -
Android Malware Detection Based on Network Analysis and Federated Learning
With the dramatic growth of available Android applications in today’s digital era, Android malware has grown accordingly in both quantity and... -
A Deep-Vision-Based Multi-class Classification System of Android Malware Apps
The number of malicious software attacks on the Android operating system (OS) is increasing daily. Thus, efficient detection and classification...