Results 61 to 70 of about 2,031,041 (194)

Design and Development of a Blockchain‐Enabled Decentralized Framework for Academic Microcredentials

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Traditional higher education faces significant challenges, including rising costs, inflexibility, and a disconnect from workforce demands, while current credentialing systems are often centralized and vulnerable to fraud. Microcredentials have emerged as a solution, yet they lack integration into formal degree pathways and face issues with recognition ...
Abrar Mahbub Tanim   +4 more
wiley   +1 more source

A Private Blockchain and IPFS‐Based Secure and Decentralized Framework for People Surveillance via Deep Learning Techniques

open access: yesIET Software, Volume 2026, Issue 1, 2026.
The modern metropolis essentially demands the use of state‐of‐the‐art, real‐time surveillance systems, which should be reliable, scalable, and respectful of privacy at the same time. Critical shortcomings in traditional architectures are single points of failure, poor scalability, frequent data breaches, and inadequately managed privacy.
Shihab Sarar   +4 more
wiley   +1 more source

Byzantine Architecture in the Lower City of Perge

open access: yesArt-Sanat
This study focuses on the Byzantine buildings located in the Lower City of Perge. One of the significant structures in the city is the South Church (Basilica A), which is a three-aisled basilica with a transept and gallery, dating back to the early 5th ...
Ayça Tiryaki Türkmenoğlu   +1 more
doaj   +1 more source

Rethinking Blockchain and Power Dynamics in Supply Chains: A Critical Discourse Analysis

open access: yesJournal of Business Logistics, Volume 47, Issue 1, January 2026.
ABSTRACT Despite a generally positive discourse on blockchain technology in academic literature, firms have struggled to implement it in their supply chains. In this article, we are deconstructing the typically positive perception of blockchain in the literature through a provocative style of theorizing and critical discourse analysis.
Lara Schilling   +2 more
wiley   +1 more source

6G Wireless Communications Enabled by the Blockchain: Privacy and Middleware Architecture

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2026, Issue 1, 2026.
6G is transformational and brings revolutionary innovations in virtually all sectors, such as healthcare, autonomous systems, and manufacturing, through ultralow latency, massive connection, and far superior computing capabilities than any previous generation.
Moumita Chanda   +4 more
wiley   +1 more source

Quantum-Resilient Federated Learning for Multi-Layer Cyber Anomaly Detection in UAV Systems

open access: yesSensors
Unmanned Aerial Vehicles (UAVs) are increasingly used in civilian and military applications, making their communication and control systems targets for cyber attacks. The emerging threat of quantum computing amplifies these risks. Quantum computers could
Canan Batur Şahin
doaj   +1 more source

Federated Learning Framework for Efficient and Secure Anomaly Detection in Industrial Control Systems

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
Industrial control systems (ICS) are increasingly vulnerable to cybersecurity threats due to the integration of IoT devices and operational technology networks. Traditional centralized anomaly detection methods face significant challenges, including privacy concerns, bandwidth limitations, and single points of failure.
Emmanuel Osei Owusu   +5 more
wiley   +1 more source

The Christian Nubia and the Arabs

open access: yesStudia Ceranea, 2015
Nubia constituted the area in the Nile Valley in the present day Sudan, the area which spread from the first cataract up to the place where the White Nile meets the Blue Nile. The area was inhabited by the population using a common language – Old Nubian.
Małgorzata Martens-Czarnecka
doaj   +1 more source

Home - About - Disclaimer - Privacy