Results 131 to 140 of about 70,639 (257)
On-Chain Video Copy Detection Based on Swin-Transformer and Deep Hashing [PDF]
Wenqian Shang, Xintao Liu, Miaoran Song
openalex +1 more source
Wire arc additive manufacturing (WAAM) enables precise metal part production but faces challenges in quality and complexity. Artificial intelligence (AI) techniques enhance efficiency, while blockchain ensures traceability and security. This study explores AI and blockchain integration in WAAM, highlighting their potential to optimize manufacturing ...
Ajithkumar Sitharaj +2 more
wiley +1 more source
This graphical abstract illustrates the cloud‐based GWAS platform as a hub that integrates six major multiomics domains: phenomics, neuroscience, proteomics, microbiomics, metabolomics, and nutrigenomics. The platform unifies diverse data types—including clinical phenotypes, neuroimaging, plasma proteomics, microbiome profiles, metabolic biomarkers ...
Xiaohong Ke +12 more
wiley +1 more source
Hash chaining degrades security at Facebook
Modern web and digital application password storage relies on password hashing for storage and security. Ad-hoc upgrade of password storage to keep up with hash algorithm norms may be used to save costs but can introduce unforeseen vulnerabilities. This is the case in the password storage scheme used by Meta Platforms which services several billion ...
openaire +2 more sources
ABSTRACT The Split Delivery Vehicle Routing Problem with Two‐dimensional Loading Constraints (2L‐SDVRP) integrates vehicle routing, split delivery, and two‐dimensional packing constraints. In the 2L‐SDVRP, customers can be served by multiple vehicles, and their demands consist of different two‐dimensional rectangular items that must be packed in the ...
Kamyla Maria Ferreira +4 more
wiley +1 more source
Analysis of cross-chain technology of blockchain
With the development of blockchain technology,more and more blockchain projects have appeared.Due to the closure property of the blockchain,different blockchains have become islands of value.The information interaction and value transfer problems between
Zhao GUO +4 more
doaj
Healthy Meals 4 Kids: A Four‐Part Instructional Case*
Abstract This fictional case centers on a not‐for‐profit organization, Healthy Meals 4 Kids, in the province of New Brunswick, Canada, that provides free meals to families experiencing financial difficulty who have children with special dietary needs. The case provides an opportunity for students to perform many tasks related to external auditing—using
Bryce Cross, Samantha Taylor
wiley +1 more source
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains [PDF]
Iain Baird +4 more
openalex +1 more source
A spatiotemporal prediction method for the evolution of pavement distress in road networks
Abstract Existing pavement performance prediction models often struggle to capture complex spatiotemporal dependencies in road networks due to reliance on empirical rules and scenario‐based calibration. This study proposes pavement graph network (PaveGNet), a spatiotemporal graph network framework designed to model fine‐grained pavement distress ...
Ning Pan +2 more
wiley +1 more source

