Results 61 to 70 of about 2,031,041 (194)
Design and Development of a Blockchain‐Enabled Decentralized Framework for Academic Microcredentials
Traditional higher education faces significant challenges, including rising costs, inflexibility, and a disconnect from workforce demands, while current credentialing systems are often centralized and vulnerable to fraud. Microcredentials have emerged as a solution, yet they lack integration into formal degree pathways and face issues with recognition ...
Abrar Mahbub Tanim +4 more
wiley +1 more source
The modern metropolis essentially demands the use of state‐of‐the‐art, real‐time surveillance systems, which should be reliable, scalable, and respectful of privacy at the same time. Critical shortcomings in traditional architectures are single points of failure, poor scalability, frequent data breaches, and inadequately managed privacy.
Shihab Sarar +4 more
wiley +1 more source
Byzantine Architecture in the Lower City of Perge
This study focuses on the Byzantine buildings located in the Lower City of Perge. One of the significant structures in the city is the South Church (Basilica A), which is a three-aisled basilica with a transept and gallery, dating back to the early 5th ...
Ayça Tiryaki Türkmenoğlu +1 more
doaj +1 more source
Rethinking Blockchain and Power Dynamics in Supply Chains: A Critical Discourse Analysis
ABSTRACT Despite a generally positive discourse on blockchain technology in academic literature, firms have struggled to implement it in their supply chains. In this article, we are deconstructing the typically positive perception of blockchain in the literature through a provocative style of theorizing and critical discourse analysis.
Lara Schilling +2 more
wiley +1 more source
6G Wireless Communications Enabled by the Blockchain: Privacy and Middleware Architecture
6G is transformational and brings revolutionary innovations in virtually all sectors, such as healthcare, autonomous systems, and manufacturing, through ultralow latency, massive connection, and far superior computing capabilities than any previous generation.
Moumita Chanda +4 more
wiley +1 more source
Quantum-Resilient Federated Learning for Multi-Layer Cyber Anomaly Detection in UAV Systems
Unmanned Aerial Vehicles (UAVs) are increasingly used in civilian and military applications, making their communication and control systems targets for cyber attacks. The emerging threat of quantum computing amplifies these risks. Quantum computers could
Canan Batur Şahin
doaj +1 more source
Industrial control systems (ICS) are increasingly vulnerable to cybersecurity threats due to the integration of IoT devices and operational technology networks. Traditional centralized anomaly detection methods face significant challenges, including privacy concerns, bandwidth limitations, and single points of failure.
Emmanuel Osei Owusu +5 more
wiley +1 more source
The Christian Nubia and the Arabs
Nubia constituted the area in the Nile Valley in the present day Sudan, the area which spread from the first cataract up to the place where the White Nile meets the Blue Nile. The area was inhabited by the population using a common language – Old Nubian.
Małgorzata Martens-Czarnecka
doaj +1 more source

