Results 41 to 50 of about 110,790 (249)
Leveraging Blockchain and Smart Contracts to Combat Greenwashing in Sustainable Development
ABSTRACT Blockchain technology, when combined with smart contracts, enables buyers to distinguish between greenwashed and genuinely eco‐friendly products. The presence of counterfeit items can severely impact supply chains by diminishing brand value, eroding consumer confidence, and undermining market trust.
Ragnhild Silkoset, Arne Nygaard
wiley +1 more source
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha+9 more
wiley +1 more source
On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks [PDF]
Random linear network coding can be used in peer-to-peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are particularly susceptible to Byzantine attacks. We quantify the impact of Byzantine attacks on the coded system by evaluating the probability that a receiver node fails to correctly ...
arxiv +1 more source
ARCHITECTURAL CONCEPTS IN THE RUSSIAN IDEAS IN THE BEGINNING OF THE 19TH CENTURY [PDF]
The given paper for the first time explores the ideas of architecture expressed by Russian thinkers of the first half of the 19th century: K.N. Batyushkov, N.M. Karamzin, Lyubomudry, A.S. Pushkin, A.S. Griboyedov, A.S. Khomyakov, I.V.
Labanov Sergey Sergeevich
doaj
Dating an ancient spring tunnel using archaeological artefacts functioning as nuclei of cave pearls
Abstract Cave pearls are spherical concentric speleothems growing radially around nuclei in shallow pools saturated with calcite. They are very rare in the Southern Levant. We present a unique assemblage of 50 cave pearls found in the Iron Age Joweizeh artificial spring tunnel in the Jerusalem Hills of Israel. Some of these deposits represent the first
Azriel Yechezkel+6 more
wiley +1 more source
Prerequisites for a computational approach to Minoan chronology
Abstract The paper examines the development, adoption, and limitations of the relative chronology system for Minoan pottery, initially established by Sir Arthur Evans and Duncan Mackenzie during the excavation of Knossos (1900–1906). Despite its weaknesses, this system remained largely unchanged due to its convenience rather than its accuracy.
Diamantis Panagiotopoulos+1 more
wiley +1 more source
The rock-cut church of Kızılgeçit located in the eastern mountainous part of Kilikia Region, east of the canyon near the village of Kızılgeçit of Silifke. The church was discovered as a result of during Erdemli-Silifke Surveys.
Şener Yıldırım, Özlem Doğan
doaj +1 more source
The organic structure and effectiveness of the Byzantine fiscal system - a critical evaluation [PDF]
This article investigates the organization and effectiveness of the Byzantine fiscal system and of the implementing government apparatus as constituent elements of the operative institutional framework of the economy.
Maniatis George C.
doaj +1 more source
Abstract Early Byzantine marble objects from Porphyreon and Chhim (Lebanon) were studied to assess the source of raw materials. In all, 66 artefacts, including elements of liturgical furnishings, architectural elements and daily use objects, were examined using optical, cathodoluminescence and scanning electron microscopy, X‐ray diffraction, and δ13C ...
Mariusz Gwiazda+3 more
wiley +1 more source
An Information-theoretical Secured Byzantine-fault Tolerance Consensus in Quantum Key Distribution Network [PDF]
Quantum key distribution (QKD) networks is expected to provide information-theoretical secured (ITS) communication over long distances. QKD networks based trusted relay architecture are now the most widely used scheme in practice. However, it is an unrealistic assumption that all relays are fully trustable in complex networks.
arxiv