Results 21 to 30 of about 13,337 (106)

6G Wireless Communications Enabled by the Blockchain: Privacy and Middleware Architecture

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2026, Issue 1, 2026.
6G is transformational and brings revolutionary innovations in virtually all sectors, such as healthcare, autonomous systems, and manufacturing, through ultralow latency, massive connection, and far superior computing capabilities than any previous generation.
Moumita Chanda   +4 more
wiley   +1 more source

Federated Learning Framework for Efficient and Secure Anomaly Detection in Industrial Control Systems

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
Industrial control systems (ICS) are increasingly vulnerable to cybersecurity threats due to the integration of IoT devices and operational technology networks. Traditional centralized anomaly detection methods face significant challenges, including privacy concerns, bandwidth limitations, and single points of failure.
Emmanuel Osei Owusu   +5 more
wiley   +1 more source

StorjLedger: An Innovative Distributed Storage Ecosystem That Overcomes Blockchain Trade‐Offs Using Erasure‐Coded Sharding and Proof‐of‐Storage Consensus

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
StorjLedger leverages erasure‐coded sharding and Proof‐of‐Storage to deliver nearly 1000 transactions per second with sub‐second latency, 98% data redundancy, and 76% lower storage costs, resolving the blockchain trilemma by harmonizing scalability, security, and decentralization.
Saha Reno, Koushik Roy
wiley   +1 more source

Imperial systems and local landscapes of Buldan Yayla in Western Anatolia (Türkiye) during the last 4000 years: An integrated palynological, historical, and archaeological approach

open access: yesJournal of Quaternary Science, Volume 40, Issue 7, Page 1285-1304, October 2025.
ABSTRACT This study investigates long‐term impacts of empires on local socio‐ecosystems in western Anatolia (modern western Türkiye) over the past four millennia. We focus on Buldan Yayla Lake, located in a small mountain basin north of the Büyük Menderes (Great Meander) River valley.
Sabina Fiołna   +7 more
wiley   +1 more source

IoT Technology as an Effective Strategy Enhances Food Authentication for Current Fresh Fruit Supply Chain

open access: yesFuture Postharvest and Food, Volume 2, Issue 3, Page 262-279, September 2025.
ABSTRACT With trade globalization, food fraud such as tampering, substituting, and falsifying, challenges human health and the management of food supply chain. As a food type that only processed at primary level, the authenticity of fruit supply information has become a guarantee for its edible safety.
Yiqin Zhang   +6 more
wiley   +1 more source

Blockchain‐Based Federated Learning Methodologies in Smart Environments for Drone Technology

open access: yesIEEJ Transactions on Electrical and Electronic Engineering, Volume 20, Issue 9, Page 1393-1404, September 2025.
High‐security transactions are stored in a chain of blocks using blockchain technology. Security and privacy concerns may be addressed by using blockchain technology. Federated learning is a paradigm for increasing data mining accuracy and precision by ensuring data privacy and security for both internet of things (IoT) devices and users in smart ...
Mukkoti Maruthi Venkata Chalapathi   +6 more
wiley   +1 more source

Leveraging Blockchain and Smart Contracts to Combat Greenwashing in Sustainable Development

open access: yesSustainable Development, Volume 33, Issue 4, Page 5874-5889, August 2025.
ABSTRACT Blockchain technology, when combined with smart contracts, enables buyers to distinguish between greenwashed and genuinely eco‐friendly products. The presence of counterfeit items can severely impact supply chains by diminishing brand value, eroding consumer confidence, and undermining market trust.
Ragnhild Silkoset, Arne Nygaard
wiley   +1 more source

Letters, gifts and messengers. The epistolary strategies of St Radegund

open access: yesEarly Medieval Europe, Volume 33, Issue 3, Page 309-340, August 2025.
This article studies the ways the sixth‐century queen and monastic founder Radegund (c.520–87) managed the non‐textual elements of communication by letter. While Radegund’s role as a writer and commissioner of letters has been well studied, her efforts as an orchestrator of letter deliveries, gift exchanges and other associated acts of public ...
Robert Flierman, Hope Williard
wiley   +1 more source

Blockweave: An Arweave‐Based Decentralized Storage Solution to Tackle the Blockchain Trilemma

open access: yesEngineering Reports, Volume 7, Issue 7, July 2025.
Leveraging Arweave's blockweave and Proof‐of‐Access consensus, this framework reduces on‐chain metadata to 48 bytes, enabling throughput up to 7200 TPS, 99%$$ 99\% $$ storage savings, and robust security (Q(0.4)=0.82)$$ \left(\mathrm{Q}(0.4)=0.82\right) $$ while achieving Tier‐S decentralization on $300 mining nodes.
Saha Reno, Koushik Roy, Tamanna Tabassum
wiley   +1 more source

Fairness in Federated Learning: Trends, Challenges, and Opportunities

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 6, June 2025.
This survey delves into the intricate issues pertinent to fairness in federated learning , where various biasing factors can skew model performance. By systematically analyzing fairness‐aware strategies, evaluation metrics, and future directions, this work identifies pivotal research gaps in existing approaches and sheds light on both challenges and ...
Noorain Mukhtiar   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy