Results 121 to 130 of about 65,060 (255)

The Influence of Big Data‐Driven Educational Technologies on College Teaching Development

open access: yesEngineering Reports, Volume 8, Issue 2, February 2026.
Exploring the impact of big data on college instructors: enhancing teaching, fostering professional growth, and addressing challenges in data adoption and privacy. ABSTRACT The rapid development of big data and mobile Internet technologies has significantly influenced the instructional growth of college instructors. This study investigated how big data
Ling Yu, Wenye Li, Ying Luo
wiley   +1 more source

Russian Cryptographic Algorithms in the Identity Management Systems

open access: yesБезопасность информационных технологий, 2011
The subject of the research is to implement Russian cryptographic algorithms in the IdM-systems. The research centers on the study of the claim-based authentication protocols and the existing IdM-systems and on the development of an authentication module
A.V. Dubovitskaya, P. V. Smirnov
doaj  

Can Complementary Currencies Foster Sustainability? A Systematic Review of the Impacts of Environmental Complementary Currencies

open access: yesJournal of Economic Surveys, Volume 40, Issue 1, Page 549-581, February 2026.
ABSTRACT Growing financial needs for a sustainable transition have led to the development of green finance and citizen‐led monetary innovations. These initiatives recognized the necessity of developing new forms of money regarding the environmental crisis, referred to as environmental complementary currency (ECCs).
Léo Revelli
wiley   +1 more source

A research on cross‐chain and interoperation methods of fusion protocol

open access: yesIET Blockchain
At present, cross‐chain technology and cross‐chain system pay more attention to cross‐chain security and performance, and have shown great improvement in security, scalability and efficiency. However, the generality of cross‐chain technology in different
Li Ming   +4 more
doaj   +1 more source

Body Biofluids for Minimally‐Invasive Diagnostics: Insights, Challenges, Emerging Technologies, and Clinical Potential

open access: yesAdvanced Healthcare Materials, Volume 15, Issue 4, 26 January 2026.
Recent advances in diagnostics have accelerated the development of miniaturized wearable technologies for the continuous monitoring of diseases. This paradigm is shifting healthcare away from invasive, centralized blood tests toward decentralized monitoring, using alternative body biofluids.
Lanka Tata Rao   +2 more
wiley   +1 more source

Client Trustworthiness within Internet-banking Application Using Removable Key Carriers

open access: yesБезопасность информационных технологий, 2013
In this paper author describes the possibility of using removable key carriers within Internet-banking systems.
Sergey Sergeevich Agafyin
doaj  

Electrically and Geometrically Tunable Photon Pair Entanglement from Ferroelectric Nematic Liquid Crystal

open access: yesAdvanced Science, Volume 13, Issue 3, 14 January 2026.
By exploiting the strong nonlinear optical response and controllable molecular ordering of ferroelectric nematic liquid crystals (FNLCs), these materials can serve as tunable sources of polarization‐entangled photons. Adjusting the sample geometry or applying an external electric field enables continuous control of the entanglement degree, advancing ...
Sara Klopčič   +3 more
wiley   +1 more source

Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi   +2 more
wiley   +1 more source

Post-Quantum Key Exchange in TLS 1.3: Further Analysis on Performance of New Cryptographic Standards

open access: yesCryptography
The emergence of quantum computing presents a significant threat to classical cryptographic primitives, particularly those employed in securing internet communications via widely used protocols such as Transport Layer Security (TLS).
Konstantina Souvatzidaki   +1 more
doaj   +1 more source

Integrated Design of 12 kV Intelligent Ring Main Unit With Multi‐Model Fusion and Fault Diagnosis Method

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
This article proposes an integrated design method for a 12 kV intelligent ring main unit and constructs a fault diagnosis and isolation model. Firstly, building an integrated hardware platform can significantly improve perception speed and fusion potential.
Rongrong Shan, Jieyun Qiu, Dong Han
wiley   +1 more source

Home - About - Disclaimer - Privacy