You are currently on the new version of our website. Access the old version .

47 Results Found

  • Article
  • Open Access
1 Citations
1,798 Views
27 Pages

An Extensive Italian Database of River Embankment Breaches and Damages

  • Michela Marchi,
  • Ilaria Bertolini,
  • Laura Tonni,
  • Luca Morreale,
  • Andrea Colombo,
  • Tommaso Simonelli and
  • Guido Gottardi

23 July 2025

River embankments are critical flood defense structures, stretching for thousands of kilometers across alluvial plains. They often originated as natural levees resulting from overbank flows and were later enlarged using locally available soils yet ra...

  • Article
  • Open Access
50 Citations
6,504 Views
22 Pages

30 December 2019

Understanding levee failures can be significantly improved by analysing historical failures, experiments and performance observations. Individual efforts have been undertaken to document flood defence failures but no systematically gathered large sca...

  • Editorial
  • Open Access
1,742 Views
11 Pages

We discuss three applications of blockchain data technology that illustrate its considerable problem-solving potential in: (i) Centralized Bank Digital Currencies (CBDC); (ii) Healthcare (HC); and (iii) Non-Profit Organizations (NPOs). Key solution f...

  • Article
  • Open Access
34 Citations
18,386 Views
23 Pages

19 April 2021

The evaluation of data breaches and cybersecurity risks has not yet been formally addressed in modern business systems. There has been a tremendous increase in the generation, usage and consumption of industrial and business data as a result of smart...

  • Review
  • Open Access
4 Citations
2,111 Views
17 Pages

Bibliometric-Based Research Status and Development Trends of Dam Breach Studies

  • Pengtao Wang,
  • Wei Guo,
  • Chunling Liang,
  • Bingyi She and
  • Donghu Li

30 December 2024

Dam breach can trigger severe flood disasters, threatening life and property safety, and having long-term impacts on the environment, society, and the economy. Dam breach floods also contaminate water bodies, degrading water quality and its sustainab...

  • Article
  • Open Access
1 Citations
3,413 Views
32 Pages

Global Distribution and Morphodynamic Patterns of Paired Spits Developed at the Mouths of Interdistributary Bays of Deltas and within Coastal Channels

  • Javier Alcántara-Carrió,
  • Ángela Fontán-Bouzas,
  • Ana Caicedo Rodríguez,
  • Rogério Portantiolo Manzolli and
  • Luana Portz

23 May 2023

Previously, paired spits have been described at the mouths of bays, estuaries, and deltas. This study analyzed the worldwide distribution and morphodynamic patterns of paired spits located at the mouths of interdistributary bays of deltas (three syst...

  • Article
  • Open Access
16 Citations
5,483 Views
26 Pages

A Framework of Dam-Break Hazard Risk Mapping for a Data-Sparse Region in Indonesia

  • Doddi Yudianto,
  • Bobby Minola Ginting,
  • Stephen Sanjaya,
  • Steven Reinaldo Rusli and
  • Albert Wicaksono

This paper introduces a new simple approach for dam-break hazard mapping in a data-sparse region. A hypothetical breaching case of an earthen dam, i.e., the Ketro Dam in Central Java, (Indonesia) was considered. Open-access hydrological databases, i....

  • Article
  • Open Access
12 Citations
6,048 Views
25 Pages

Probabilistic Damage Stability for Passenger Ships—The p-Factor Illusion and Reality

  • Dracos Vassalos,
  • M. P. Mujeeb-Ahmed,
  • Donald Paterson,
  • Francesco Mauro and
  • Fabien Conti

The paper complements an earlier publication by the authors addressing the probability of survival in the IMO framework for damage stability assessment, the s-factor. The focus here is on the probability of occurrence of a certain damage scenario (br...

  • Article
  • Open Access
1 Citations
926 Views
18 Pages

Bayesian Network-Based Earth-Rock Dam Breach Probability Analysis Integrating Machine Learning

  • Zongkun Li,
  • Qing Shi,
  • Heqiang Sun,
  • Yingjian Zhou,
  • Fuheng Ma,
  • Jianyou Wang and
  • Pieter van Gelder

28 October 2025

Earth-rock dams are critical components of hydraulic engineering, undertaking core functions such as flood control and disaster mitigation. However, the potential occurrence of dam breach poses a severe threat to regional socioeconomic stability and...

  • Article
  • Open Access
6 Citations
2,615 Views
21 Pages

A Statistical Risk Assessment Model of the Hazard Chain Induced by Landslides and Its Application to the Baige Landslide

  • Feng-Yuan Yang,
  • Li Zhuo,
  • Ming-Li Xiao,
  • Hong-Qiang Xie,
  • Huai-Zhong Liu and
  • Jiang-Da He

10 March 2023

Landslides are usually caused by rainstorms and geological processes such as earthquakes and may have a massive impact on human production and life. The hazard chain of landslide–river blockage–outburst flood is the most common hazard cha...

  • Article
  • Open Access
18 Citations
24,739 Views
24 Pages

Data Privacy and Ethical Considerations in Database Management

  • Eduardo Pina,
  • José Ramos,
  • Henrique Jorge,
  • Paulo Váz,
  • José Silva,
  • Cristina Wanzeller,
  • Maryam Abbasi and
  • Pedro Martins

Data privacy and ethical considerations ensure the security of databases by respecting individual rights while upholding ethical considerations when collecting, managing, and using information. Nowadays, despite having regulations that help to protec...

  • Article
  • Open Access
7 Citations
4,242 Views
16 Pages

Set-valued database publication has been increasing its importance recently due to its benefit for various applications such as marketing analysis and advertising. However, publishing a raw set-valued database may cause individual privacy breach such...

  • Article
  • Open Access
4 Citations
3,019 Views
20 Pages

5 November 2023

Digital transformation of the logistics industry triggered by the widespread use of Internet of Things (IoT) technology has prompted a significant revolution in logistics companies, further bringing huge dividends to society. However, the concurrent...

  • Article
  • Open Access
1 Citations
5,620 Views
44 Pages

12 June 2025

This study presents one of the most extensive analyses of the lifecycle of leaked authentication credentials to date, bridging the gap between database breaches and real-world cyberattacks. We analyze over 27 billion leaked credentials—nearly 4...

  • Article
  • Open Access
13 Citations
5,258 Views
19 Pages

Mimicking Anti-Viruses with Machine Learning and Entropy Profiles

  • Héctor D. Menéndez and
  • José Luis Llorente

21 May 2019

The quality of anti-virus software relies on simple patterns extracted from binary files. Although these patterns have proven to work on detecting the specifics of software, they are extremely sensitive to concealment strategies, such as polymorphism...

  • Article
  • Open Access
12 Citations
3,903 Views
20 Pages

A Novel Fragile Zero-Watermarking Algorithm for Digital Medical Images

  • Zulfiqar Ali,
  • Fazal-e-Amin and
  • Muhammad Hussain

25 February 2022

The wireless transmission of patients’ particulars and medical data to a specialised centre after an initial screening at a remote health facility may cause potential threats to patients’ data privacy and integrity. Although watermarking...

  • Article
  • Open Access
6 Citations
3,603 Views
18 Pages

31 January 2023

There has been a growing number of contract cheating incidents recorded in Australia’s higher education system. Such activities create a significant threat to the validity and integrity of qualifications obtained by students. This paper introdu...

  • Review
  • Open Access
7 Citations
4,354 Views
23 Pages

A Review of Cuckoo Filters for Privacy Protection and Their Applications

  • Yekang Zhao,
  • Wangchen Dai,
  • Shiren Wang,
  • Liang Xi,
  • Shenqing Wang and
  • Feng Zhang

As the global digitalization process continues, information is transformed into data and widely used, while the data are also at risk of serious privacy breaches. The Cuckoo filter is a data structure based on the Cuckoo hash. It encrypts data when i...

  • Review
  • Open Access
14 Citations
2,746 Views
17 Pages

Learning from the Past to Improve the Future—Vaccine Hesitancy Determinants in the Italian Population: A Systematic Review

  • Michela Ferrara,
  • Giuseppe Bertozzi,
  • Gianpietro Volonnino,
  • Aldo Di Fazio,
  • Nicola Di Fazio,
  • Mauro Arcangeli,
  • Raffaele La Russa and
  • Paola Frati

12 March 2023

WHO identifies vaccine hesitancy (VH) as one of the ten threats to global health. The authors bring to the international scientific community an Italian episode that offers the opportunity to renew the discussion on the extent of the VH matter. The p...

  • Article
  • Open Access
38 Citations
5,521 Views
22 Pages

A Lightweight RFID Mutual Authentication Protocol with PUF

  • Feng Zhu,
  • Peng Li,
  • He Xu and
  • Ruchuan Wang

4 July 2019

Radio frequency identification is one of the key techniques for Internet of Things, which has been widely adopted in many applications for identification. However, there exist various security and privacy issues in radio frequency identification (RFI...

  • Review
  • Open Access
82 Citations
38,068 Views
42 Pages

17 January 2024

The Internet’s expansion has changed how the services accessed and businesses operate. Blockchain is an innovative technology that emerged after the rise of the Internet. In addition, it maintains transactions on encrypted databases that are distribu...

  • Article
  • Open Access
6 Citations
2,538 Views
20 Pages

15 May 2024

Personal identification is an important aspect of managing electronic health records (EHRs), ensuring secure access to patient information, and maintaining patient privacy. Traditionally, biometric, signature, username/password, photo identity, etc.,...

  • Feature Paper
  • Article
  • Open Access
7 Citations
3,444 Views
14 Pages

Modeling Under-Reporting in Cyber Incidents

  • Seema Sangari,
  • Eric Dallal and
  • Michael Whitman

22 October 2022

Under-reporting in cyber incidents is a well-established problem. Due to reputational risk and the consequent financial impact, a large proportion of incidents are never disclosed to the public, especially if they do not involve a breach of protected...

  • Review
  • Open Access
9 Citations
7,782 Views
16 Pages

With the rise in applications of artificial intelligence (AI) across various sectors, security concerns have become paramount. Traditional AI systems often lack robust security measures, making them vulnerable to adversarial attacks, data breaches, a...

  • Article
  • Open Access
1 Citations
1,992 Views
23 Pages

Water Sustainability Criteria to Regulate the Proliferation of Pig Farms on a Karst Aquifer

  • Adrián Pedrozo-Acuña,
  • Norma Ramírez-Salinas and
  • Camilo Vázquez-Bustos

31 March 2025

This study employs a thorough methodology to define water sustainability criteria for the development of new pig farms on the karst aquifer of Yucatan, Mexico. The integrated approach entails a field campaign to assess water quality from the aquifer...

  • Review
  • Open Access
63 Citations
16,949 Views
25 Pages

28 June 2022

Social media has transformed the mode of communication globally by providing an extensive system for exchanging ideas, initiating business contracts, and proposing new professional ideas. However, there are many limitations to the use of social media...

  • Article
  • Open Access
34 Citations
375 Views
8 Pages

Delayed Cranioplasty: Outcomes Using Frozen Autologous Bone Flaps

  • Daniel Hng,
  • Ivan Bhaskar,
  • Mumtaz Khan,
  • Charley Budgeon,
  • Omprakash Damodaran,
  • Neville Knuckey and
  • Gabriel Lee

Reconstruction of skull defects following decompressive craniectomy is associated with a high rate of complications. Implantation of autologous cryopreserved bone has been associated with infection rates of up to 33%, resulting in considerable patien...

  • Feature Paper
  • Review
  • Open Access
98 Citations
15,515 Views
27 Pages

25 August 2022

While the rapid growth of mobile mental health applications has offered an avenue of support unbridled by physical distance, time, and cost, the digitalization of traditional interventions has also triggered doubts surrounding their effectiveness and...

  • Article
  • Open Access
38 Citations
8,238 Views
15 Pages

5 October 2021

The purpose of this article is to examine the impact of the shock increase, in the value of nonperforming loans, on the equity level and profitability of 141 banks in 18 countries of Central Eastern South Europe (CESE). This study is important for as...

  • Article
  • Open Access
796 Views
15 Pages

21 October 2025

Ports serve as key nodes in eco-friendly and digital logistics networks, and the volume of cargo handled continues to increase in response to growing international trade. However, the increased workload within limited spaces heightens the risk of saf...

  • Communication
  • Open Access
1,389 Views
9 Pages

Occupational Transmission of Measles Despite COVID-19 Precautions

  • Gabriella De Carli,
  • Emanuela Giombini,
  • Alberto Colosi,
  • Maria Concetta Fusco,
  • Eleonora Lalle,
  • Giulia Berno,
  • Martina Rueca,
  • Lavinia Fabeni,
  • Licia Bordi and
  • Francesco Vairo
  • + 4 authors

To determine whether patient-to-doctor transmission of measles occurred in an emergency department (ED) despite isolation precautions and full personal protective equipment (PPE) during the COVID-19 pandemic, an epidemiological and molecular investig...

  • Review
  • Open Access
74 Citations
10,591 Views
15 Pages

19 January 2021

African swine fever (ASF) is a notifiable viral disease of pigs and wild boars that could lead to serious economic losses for the entire European pork industry. As no effective treatment or vaccination is available, disease prevention and control rel...

  • Article
  • Open Access
38 Citations
8,791 Views
23 Pages

A Blockchain-Based End-to-End Data Protection Model for Personal Health Records Sharing: A Fully Homomorphic Encryption Approach

  • Fausto Neri da Silva Vanin,
  • Lucas Micol Policarpo,
  • Rodrigo da Rosa Righi,
  • Sandra Marlene Heck,
  • Valter Ferreira da Silva,
  • José Goldim and
  • Cristiano André da Costa

20 December 2022

Personal health records (PHR) represent health data managed by a specific individual. Traditional solutions rely on centralized architectures to store and distribute PHR, which are more vulnerable to security breaches. To address such problems, distr...

  • Article
  • Open Access
15 Citations
6,002 Views
14 Pages

Modeling the Research Landscapes of Artificial Intelligence Applications in Diabetes (GAPRESEARCH)

  • Giang Thu Vu,
  • Bach Xuan Tran,
  • Roger S. McIntyre,
  • Hai Quang Pham,
  • Hai Thanh Phan,
  • Giang Hai Ha,
  • Kenneth K. Gwee,
  • Carl A. Latkin,
  • Roger C.M. Ho and
  • Cyrus S.H. Ho

The rising prevalence and global burden of diabetes fortify the need for more comprehensive and effective management to prevent, monitor, and treat diabetes and its complications. Applying artificial intelligence in complimenting the diagnosis, manag...

  • Case Report
  • Open Access
10 Citations
8,851 Views
20 Pages

Flood Response System—A Case Study

  • Yogesh Kumar Singh,
  • Upasana Dutta,
  • T. S. Murugesh Prabhu,
  • I. Prabu,
  • Jitendra Mhatre,
  • Manoj Khare,
  • Sandeep Srivastava and
  • Subasisha Dutta

Flood Response System (FRS) is a network-enabled solution developed using open-source software. The system has query based flood damage assessment modules with outputs in the form of spatial maps and statistical databases. FRS effectively facilitates...

  • Article
  • Open Access
7 Citations
3,058 Views
13 Pages

Glioma Shapes Blood–Brain Barrier Integrity and Remodels the Tumor Microenvironment: Links with Clinical Features and Prognosis

  • Xiaokai Li,
  • Lei Li,
  • Ke Zhou,
  • Huixiang Zhang,
  • Ali Abdi Maalim,
  • Xingyu Chen,
  • Ximiao He,
  • Xinmin Ding,
  • Chuanrui Xu and
  • Yonghong Wang

4 October 2022

Background: The presence of the blood–brain barrier (BBB) uniquely distinguishes the brain from other organs, and various brain pathologies, including cancer, can disrupt or breach the BBB. The specific implications of BBB alterations in glioma...

  • Article
  • Open Access
50 Citations
5,316 Views
27 Pages

Secure and Privacy-Preserving Intrusion Detection and Prevention in the Internet of Unmanned Aerial Vehicles

  • Ernest Ntizikira,
  • Wang Lei,
  • Fahad Alblehai,
  • Kiran Saleem and
  • Muhammad Ali Lodhi

25 September 2023

In smart cities, unmanned aerial vehicles (UAVS) play a vital role in surveillance, monitoring, and data collection. However, the widespread integration of UAVs brings forth a pressing concern: security and privacy vulnerabilities. This study introdu...

  • Article
  • Open Access
60 Citations
8,834 Views
19 Pages

Remote Patient Activity Monitoring System by Integrating IoT Sensors and Artificial Intelligence Techniques

  • Preethi Palanisamy,
  • Amudhavalli Padmanabhan,
  • Asokan Ramasamy and
  • Sakthivel Subramaniam

25 June 2023

Even with the most cutting-edge tools, treating and monitoring patients—including children, elders, and suspected COVID-19 patients—remains a challenging activity. This study aimed to track multiple COVID-19-related vital indicators using...

  • Systematic Review
  • Open Access
5 Citations
6,355 Views
22 Pages

Cybersecurity and Major Cyber Threats of Smart Meters: A Systematic Mapping Review

  • Jones Márcio Nambundo,
  • Otávio de Souza Martins Gomes,
  • Adler Diniz de Souza and
  • Raphael Carlos Santos Machado

14 March 2025

Smart meters are a vital part of the smart grid, enabling energy management, real-time control, and data collection. Despite advances in technology, there is still a lack of content and limited understanding of the specific cybersecurity threats faci...

  • Article
  • Open Access
34 Citations
5,566 Views
18 Pages

Data Improvement Model Based on ECG Biometric for User Authentication and Identification

  • Alex Barros,
  • Paulo Resque,
  • João Almeida,
  • Renato Mota,
  • Helder Oliveira,
  • Denis Rosário and
  • Eduardo Cerqueira

21 May 2020

The rapid spread of wearable technologies has motivated the collection of a variety of signals, such as pulse rate, electrocardiogram (ECG), electroencephalogram (EEG), and others. As those devices are used to do so many tasks and store a significant...

  • Systematic Review
  • Open Access
3 Citations
7,586 Views
27 Pages

27 August 2025

In the era of educational digital transformation, integrating information and communication technology (ICT) into school administration aligns with the goals of promoting personalized learning, equity, and teaching quality. This study examines how IC...

  • Case Report
  • Open Access
20 Citations
15,020 Views
28 Pages

16 September 2020

The planform of the Brahmaputra-Jamuna River followed its natural path in Bangladesh until the construction of bank protection works started to save Sirajganj from bank erosion since the 1930s. Several so-called hardpoints such as groynes and revetme...

  • Systematic Review
  • Open Access
89 Citations
20,114 Views
32 Pages

A Systematic Review of the Factors That Influence Teachers’ Occupational Wellbeing

  • Joy C. Nwoko,
  • Theophilus I. Emeto,
  • Aduli E. O. Malau-Aduli and
  • Bunmi S. Malau-Aduli

Teachers belong to a high-demand occupational group and experience work-related challenges and discretely diverse emotional turmoils of varying intensity while teaching and interacting with students. These experiences often result in high stress leve...

  • Review
  • Open Access
81 Citations
21,570 Views
30 Pages

A Survey of the Recent Trends in Deep Learning Based Malware Detection

  • Umm-e-Hani Tayyab,
  • Faiza Babar Khan,
  • Muhammad Hanif Durad,
  • Asifullah Khan and
  • Yeon Soo Lee

28 September 2022

Monitoring Indicators of Compromise (IOC) leads to malware detection for identifying malicious activity. Malicious activities potentially lead to a system breach or data compromise. Various tools and anti-malware products exist for the detection of m...

  • Review
  • Open Access
2,833 Views
17 Pages

A Contemporary Multifaceted Insight into the Association Between Diabetes Mellitus and Diverticular Disease: An Update About Geriatric Syndrome

  • Ridwan Hashi,
  • Rahma Thamer,
  • Ahmed Hassan,
  • Khalid Canna,
  • Musaab Ahmed,
  • Mohamed T. Hassan,
  • Safaa Badi and
  • Mohamed H. Ahmed

18 February 2025

Introduction: Diverticular disease, once considered a rare geriatric gastrointestinal condition, has now become a prevalent disorder associated with increased morbidity and healthcare costs. The spectrum of complications from diverticular disease ran...

  • Systematic Review
  • Open Access
5 Citations
6,138 Views
34 Pages

A Systematic Literature Review for Blockchain-Based Healthcare Implementations

  • Mutiullah Shaikh,
  • Shafique Ahmed Memon,
  • Ali Ebrahimi and
  • Uffe Kock Wiil

Background: Healthcare information systems are hindered by delayed data sharing, privacy breaches, and lack of patient control over data. The growing need for secure, privacy-preserved access control interoperable in health informatics technology (HI...

  • Article
  • Open Access
366 Views
29 Pages

25 December 2025

The rapid proliferation of artificial intelligence (AI) systems across high-stakes domains—with global AI adoption accelerating since 2023—has created an urgent need to identify which AI challenges and issues are materializing into real-w...