Results 91 to 100 of about 2,377,005 (278)

Network Traffic Sampling System Based on Storage Compression for Application Classification Detection

open access: yesIEEE Access, 2020
With the development of the Internet, numerous new applications have emerged, the features of which are constantly changing. It is necessary to perform application classification detection on the network traffic to monitor the changes in the applications.
Shichang Xuan   +5 more
doaj   +1 more source

Healthy Meals 4 Kids: A Four‐Part Instructional Case*

open access: yesAccounting Perspectives, EarlyView.
Abstract This fictional case centers on a not‐for‐profit organization, Healthy Meals 4 Kids, in the province of New Brunswick, Canada, that provides free meals to families experiencing financial difficulty who have children with special dietary needs. The case provides an opportunity for students to perform many tasks related to external auditing—using
Bryce Cross, Samantha Taylor
wiley   +1 more source

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

Implementation of Node Authentication for WSN Using Hash Chains

open access: yesProcedia Computer Science, 2016
AbstractThis paper presents the design and implementation of a lightweight node authentication protocol which comprises of node registration, node authentication and key establishment phases. The solution leverages the low computational overheads associated with cryptographically secure one-way hash chains and Elliptical Curve Crytography (ECC) without
Ayaz Hassan Moon   +2 more
openaire   +2 more sources

Identification of MEF2A, MEF2C, and MEF2D interactomes in basal and Fsk‐stimulated mouse MA‐10 Leydig cells

open access: yesAndrology, EarlyView.
Abstract Background Myocyte enhancer factor 2 transcription factors regulate essential transcriptional programs in various cell types. The activity of myocyte enhancer factor 2 factors is modulated through interactions with cofactors, chromatin remodelers, and other regulatory proteins, which are dependent on cell context and physiological state.
Karine de Mattos   +4 more
wiley   +1 more source

Fully Distributed Cooperative Spectrum Sensing for Cognitive Radio Networks [PDF]

open access: yes, 2012
Cognitive radio networks (CRN) sense spectrum occupancy and manage themselves to operate in unused bands without disturbing licensed users. The detection capability of a radio system can be enhanced if the sensing process is performed jointly by a group ...
Garrigues Olivella, Carles   +2 more
core  

A secure dynamic cross-chain decentralized data consistency verification model

open access: yesJournal of King Saud University: Computer and Information Sciences
The continuous increase in the number of transactions is exerting significant pressure on the storage capacity of blockchains. By storing data on multiple blockchains and interacting with each other with cross-chain technology, the storage pressure can ...
Jiahao Zhao   +4 more
doaj   +1 more source

Generalized Hash Chain Traversal with Selective Output

open access: yesIEICE Transactions on Information and Systems, 2010
A hash chain H for a one-way hash function h(·) is a sequence of hash values , where v0 is a public value, vn a secret value, and vi =h(vi+1). A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round) i for 1 ≤ i ≤ n.
Yum, DH, Seo, JW, Cho, K, Lee, PJ
openaire   +4 more sources

Current application of blockchain technology in healthcare and its potential roles in Urology

open access: yesBJU International, EarlyView.
Objective To assess the current uses of blockchain technology in surgery and explore potential applications in urology. Methods A systematic literature review and critical appraisal was performed. The PubMed database was searched for all relevant papers published in English, between 2003 and 2023, on blockchain and surgery, and urology.
Sulleyman Felemban   +6 more
wiley   +1 more source

Using miniaturized laboratory equipment and DNA barcoding to improve conservation genetics training and identify illegally traded species

open access: yesConservation Biology, EarlyView.
Abstract Illegal wildlife trade (IWT) is one of the largest global illegal activities, and it negatively affects biodiversity and sustainable development worldwide. DNA barcoding coupled with high‐throughput sequencing (i.e., metabarcoding) is useful in identifying taxa affected by IWT and has been used routinely for decades.
Maria Joana Ferreira da Silva   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy