Results 51 to 60 of about 6,906 (225)
Research on trusted DNP3-BAE protocol based on hash chain
To solve the security problem of industrial Ethernet DNP3 protocol broadcast authentication, the attack vector and security requirements of trusted DNP3 protocol are analysed.
Ye Lu, Tao Feng
doaj +1 more source
As an important part of the second defense line of the power system, the Security and Stability Control System (SSCS) is of great significance to ensure the reliable operation of the power system. However, SSCS still lacks an effective security mechanism
Zhaohan Li+5 more
doaj +1 more source
ABSTRACT The Split Delivery Vehicle Routing Problem with Two‐dimensional Loading Constraints (2L‐SDVRP) integrates vehicle routing, split delivery, and two‐dimensional packing constraints. In the 2L‐SDVRP, customers can be served by multiple vehicles, and their demands consist of different two‐dimensional rectangular items that must be packed in the ...
Kamyla Maria Ferreira+4 more
wiley +1 more source
Investigation of the competing reactions during post‐cure of a DGEBF/GA vitrimer and their impact upon dynamic behaviour. ABSTRACT This paper reports on the structure– property and re‐processability relationships for an epoxy anhydride vitrimer network based upon diglycidyl ether of bisphenol F (DGEBF) and glutaric anhydride after cure and post‐cure ...
Jeffrey Masten‐Davies+5 more
wiley +1 more source
High‐Throughput Mechanical Characterization of Single Microgel Particles by Fluidic Force Microscopy
The combination of atomic force microscopy and nanofluidics (FluidFM) allows for a new approach for the mechanical characterization of particulate soft matter in the micrometer regime by inverted nanoindentation. Based on the simplified double contact model, the Young's moduli of microgel particles can be determined much faster than by classical ...
Agnes Specht+8 more
wiley +1 more source
BlockChain (BC), Technology Notary in Data Driven Marketing (DDM) Contracts [PDF]
Today, Data Driven Marketing is challenged by the supply of vague data, inconsistencies between them and fraud through advertising in the digital marketing ecosystem.
Ermal Haxhiaj, Bia Çera
doaj
ABSTRACT Introduction The popularization of blockchain‐based applications made evident a critical challenge, namely the inherent isolation of these decentralized systems, akin to the disconnected and technologically diverse local area networks of the 1970s. This lack of interoperability limits the potential for widespread adoption and innovation in the
Christian Delgado‐von‐Eitzen+3 more
wiley +1 more source
Blockchain and Digital Technologies in the Telecommunications Industry
ABSTRACT This article examines how fourth industrial revolution (4IR) technologies, specifically blockchain and digital twin technologies, can be utilized to address the energy supply challenge and enhance the management of distributed telecom infrastructure assets in a research context.
Charles Okeyia+3 more
wiley +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam+9 more
wiley +1 more source
RBAU: Noval Redactable Model with Audit Mechanism and Key Update for Alliance Chain
With the widespread application of alliance chain technology in diverse scenarios, its immutability has gradually revealed certain limitations in practical use.
Yineng Chen+6 more
doaj +1 more source