Over the last few decades, sustainable computing has been widely used in areas like social computing, artificial intelligence-based agent systems, mobile computing, and Internet of Things (IoT).
Pooja Anand+5 more
semanticscholar +1 more source
A review on the application of the DRASTIC method in the assessment of groundwater vulnerability
Industrial and municipal wastes, agricultural contamination owing to pesticides and chemical hazards, seawater intrusion in coastal areas, and other factors damage groundwater. In several towns and industrial clusters across India, is becoming a rising
Priyank H. Patel+2 more
semanticscholar +1 more source
Seismic Vulnerability Assessment of Historic Constructions in the Downtown of Mexico City
Seismic risk is determined by the sum of multiple components produced by a certain seismic intensity, being represented by the seismic hazard, the structural vulnerability and the exposure of assets at a specified zone. Most of the methods and strategies
L. G. F. Salazar, T. Ferreira
semanticscholar +1 more source
Coastal Vulnerability: A Brief Review on Integrated Assessment in Southeast Asia
Coastal zones are an essential part of maintaining sustainability in the world. Coastal regions have gained importance due to various factors, including high ecological production, dense population, industry compatibility, waste disposal, leisure ...
N. M. Noor, K. A. Abdul Maulud
semanticscholar +1 more source
Seismic and Coastal Vulnerability Assessment Model for Buildings in Chile
This article proposes a vulnerability assessment model for evaluating buildings’ expected seismic performance, as well as their vulnerability to tsunamis.
Catalina Quiñones-Bustos+2 more
doaj +1 more source
Autonomous Vehicle Ultrasonic Sensor Vulnerability and Impact Assessment [PDF]
Vehicles today are relying more on technologies to bring about fully autonomous features. The conventional wirings within are being simplified into a network of electronic components, and this network is controlled via advanced sensing of the environment
Keoh, Sye Loong+2 more
core +1 more source
Unknown Vulnerability Risk Assessment Based on Directed Graph Models: A Survey
Nowadays, vulnerability attacks occur frequently. Due to the information asymmetry between attackers and defenders, vulnerabilities can be divided into known and unknown.
Wenhao He, Hongjiao Li, Jinguo Li
doaj +1 more source
IT Support Website Security Evaluation Using Vulnerability Assessment Tools
Vulnerability Assessment is one of the crucial stages that must be carried out to define and identify vulnerabilities in web systems so that they can be repaired and reduced.
Rio Armando+4 more
doaj +1 more source
Vulnerability assessment of the karst aquifer feeding the Pertuso Spring (Central Italy): comparison between different applications of COP method [PDF]
Karst aquifers vulnerability assessment and mapping are important tools for improved sustainable management and protection of karst groundwater resources.
DE FILIPPI, FRANCESCO MARIA+2 more
core +1 more source
Climate change vulnerability assessment of species
Assessing species' vulnerability to climate change is a prerequisite for developing effective strategies to conserve them. The last three decades have seen exponential growth in the number of studies evaluating how, how much, why, when, and where species
W. Foden+17 more
semanticscholar +1 more source