Results 121 to 130 of about 1,801,560 (284)

Federated Learning Architectures: A Performance Evaluation With Crop Yield Prediction Application

open access: yesSoftware: Practice and Experience, Volume 55, Issue 7, Page 1165-1184, July 2025.
ABSTRACT Introduction Federated learning has become an emerging technology in data analysis for IoT applications. Methods This paper implements centralized and decentralized federated learning frameworks for crop yield prediction based on Long Short‐Term Memory Network and Gated Recurrent Unit.
Anwesha Mukherjee, Rajkumar Buyya
wiley   +1 more source

Integrating Systems Methodologies for Australian Undersea Surveillance: A Systematic Literature Review

open access: yesSystems Engineering, Volume 28, Issue 4, Page 471-497, July 2025.
ABSTRACT Australia is a maritime nation, relying on access to its surrounding oceans for its economy and security. The Royal Australian Navy conducts undersea surveillance to monitor this vital maritime environment and gain insight into activities beneath the ocean's surface.
Timothy J. Milledge   +2 more
wiley   +1 more source

Institutional Environment and the Use of Blockchain Technology: Exploring the Context and Conditions of Using Blockchain in the Higher Education Institutions

open access: yesHigher Education Quarterly, Volume 79, Issue 3, July 2025.
ABSTRACT Blockchain (BC) technology is widely believed to be the next disruptive technology that can address challenges in higher education institutions (HEIs) and support resilient strategies. This study aims to contribute to the literature and inform policymakers about BC's capability and potential in HE by examining enablers, barriers and contextual
Buddhi Pathak   +2 more
wiley   +1 more source

Blockchain Systems in Food Supply Chains: An Interpretation Through the Lens of Agency and Technology–Organization–Environment Theories

open access: yesJournal of Business Logistics, Volume 46, Issue 3, July 2025.
ABSTRACT Blockchain (BC) systems are increasingly used by consortia to monitor ex‐post opportunism in food supply chains. BC systems differ for BC technical characteristics, complementary technologies, and organizational tools. Yet, little is empirically known about the link between different BC system designs and the context where they are implemented
Pamela Danese, Pietro Romano
wiley   +1 more source

A Systematic Literature Review of Current Trends in Electronic Voting System Protection Using Modern Cryptography

open access: yesApplied Sciences
Electronic voting, based on cryptographic protocols and blockchain technology, represents an advanced method for ensuring the security, transparency, and reliability of electoral processes.
Tolegen Aidynov   +3 more
doaj   +1 more source

Divertible protocols and atomic proxy cryptography

open access: bronze, 1998
Matt Blaze   +2 more
openalex   +1 more source

Algorithms of the protected information exchange in radio channels of a space navigation system

open access: yesИзвестия высших учебных заведений России: Радиоэлектроника, 2015
To improve the security of information exchange throw navigation space system radio channels to prevent unauthorized use of the system is proposed to use high accuracy cryptographic methods to protect signal.
S. V. Shtanko, D. A. Lesnyk
doaj  

Home - About - Disclaimer - Privacy