Results 61 to 70 of about 6,906 (225)
Secure energy efficient routing protocol for wireless sensor network
The ease of deployment of economic sensor networks has always been a boon to disaster management applications. However, their vulnerability to a number of security threats makes communication a challenging task.
Das Ayan Kumar+2 more
doaj +1 more source
Healthy Meals 4 Kids: A Four‐Part Instructional Case*
Abstract This fictional case centers on a not‐for‐profit organization, Healthy Meals 4 Kids, in the province of New Brunswick, Canada, that provides free meals to families experiencing financial difficulty who have children with special dietary needs. The case provides an opportunity for students to perform many tasks related to external auditing—using
Bryce Cross, Samantha Taylor
wiley +1 more source
Integrated Model of Image Protection Techniques
We propose an integrated model of Block-Permutation-Based Encryption (BPBE) and Reversible Data Hiding (RDH). The BPBE scheme involves four processes for encryption, namely block scrambling, block-rotation/inversion, negative-positive transformation and ...
Anu Aryal+3 more
doaj +1 more source
With the development of the Internet, numerous new applications have emerged, the features of which are constantly changing. It is necessary to perform application classification detection on the network traffic to monitor the changes in the applications.
Shichang Xuan+5 more
doaj +1 more source
Implementation of Node Authentication for WSN Using Hash Chains
AbstractThis paper presents the design and implementation of a lightweight node authentication protocol which comprises of node registration, node authentication and key establishment phases. The solution leverages the low computational overheads associated with cryptographically secure one-way hash chains and Elliptical Curve Crytography (ECC) without
Ayaz Hassan Moon+2 more
openaire +2 more sources
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo+3 more
wiley +1 more source
Abstract Background Myocyte enhancer factor 2 transcription factors regulate essential transcriptional programs in various cell types. The activity of myocyte enhancer factor 2 factors is modulated through interactions with cofactors, chromatin remodelers, and other regulatory proteins, which are dependent on cell context and physiological state.
Karine de Mattos+4 more
wiley +1 more source
Current application of blockchain technology in healthcare and its potential roles in Urology
Objective To assess the current uses of blockchain technology in surgery and explore potential applications in urology. Methods A systematic literature review and critical appraisal was performed. The PubMed database was searched for all relevant papers published in English, between 2003 and 2023, on blockchain and surgery, and urology.
Sulleyman Felemban+6 more
wiley +1 more source
A secure dynamic cross-chain decentralized data consistency verification model
The continuous increase in the number of transactions is exerting significant pressure on the storage capacity of blockchains. By storing data on multiple blockchains and interacting with each other with cross-chain technology, the storage pressure can ...
Jiahao Zhao+4 more
doaj +1 more source
Abstract This paper contributes to the understanding of the complex relationship between British economic performance during the Napoleonic wars and the ‘West Indies’, as the Caribbean slave colonies were called. Not only did profits from slave‐based commerce provide financing for the growth of the financial sector, as has been claimed, but the risk of
Carolyn Sissoko, Mina Ishizu
wiley +1 more source