Results 211 to 220 of about 95,792 (317)
ReCord: A Distributed Hash Table with Recursive Structure [PDF]
Jianyang Zeng, Wen-Jing Hsu
openalex +1 more source
To enhance multi‐energy load forecasting accuracy crucial for Integrated Energy System (IES) planning and control, this study proposes the EI2 (Efficient Information Extracting Informer) model. This transformer‐based approach features a shared encoder, incorporates high‐dimensional MLP layers in encoder/decoder feed‐forward networks for deeper pattern ...
Tianlu Gao +7 more
wiley +1 more source
SelectVote Byzantine Fault Tolerance for Evidence Custody: Virtual Voting Consensus with Environmental Compensation. [PDF]
Onyeashie BI +3 more
europepmc +1 more source
Directed acyclic graph (DAG)‐based blockchain is a promising paradigm of a blockchain system. During DAG‐based consensus processes, nodes generate blocks in parallel, as well as voting YES on the previous blocks. It makes the DAG‐based blockchain a performance advantage in terms of confirmation delay and transaction throughput.
Ruilin Lai +6 more
wiley +1 more source
Lightweight data protection framework for secure edge transmission using IOTA-MAM. [PDF]
Lu F, Huang H, Cai Z, Chen J.
europepmc +1 more source
Design and Development of a Blockchain‐Enabled Decentralized Framework for Academic Microcredentials
Traditional higher education faces significant challenges, including rising costs, inflexibility, and a disconnect from workforce demands, while current credentialing systems are often centralized and vulnerable to fraud. Microcredentials have emerged as a solution, yet they lack integration into formal degree pathways and face issues with recognition ...
Abrar Mahbub Tanim +4 more
wiley +1 more source
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source
The modern metropolis essentially demands the use of state‐of‐the‐art, real‐time surveillance systems, which should be reliable, scalable, and respectful of privacy at the same time. Critical shortcomings in traditional architectures are single points of failure, poor scalability, frequent data breaches, and inadequately managed privacy.
Shihab Sarar +4 more
wiley +1 more source
A Lightweight Authentication and Key Distribution Protocol for XR Glasses Using PUF and Cloud-Assisted ECC. [PDF]
Cha W, Lee HJ, Kook S, Kim K, Won D.
europepmc +1 more source
ABSTRACT Blockchain technology is a disruptive technology known for its use in financial services, supply chains and cryptocurrencies; however, it remains relatively underutilised in human resource management (HRM). This study aims to explore current and potential future uses of blockchain in strategic and operational HRM and examines the enablers and ...
Patricia Iglesias +2 more
wiley +1 more source

