Results 81 to 90 of about 6,906 (225)

Review on cross-chain technology research of blockchains

open access: yes物联网学报, 2022
With the in-depth development and continuous innovation of blockchain technology, blockchain networks suitable for different application scenarios and design requirements have emerged as the times require, the mutual independence of blockchains ...
Chuannian SHEN
doaj   +2 more sources

The Nexus Between Bitcoin and CO2 Emissions

open access: yesAsia &the Pacific Policy Studies, Volume 12, Issue 3, September 2025.
ABSTRACT This research examined the connection between Bitcoin, the prominent and extensively mined cryptocurrency, and CO2 emissions using the SVAR model. Azerbaijan, Kazakhstan, and Russia, the three main countries in the Caspian Basin that are the centre of cryptocurrency mining, were examined in terms of their primary industries.
Emre Ünal, Nezir Köse
wiley   +1 more source

Hash-Chain based Micropayment without Disclosing Privacy Information [PDF]

open access: bronze, 2005
Yoon-Su Jeong   +3 more
openalex   +1 more source

Small Bugs, Big Data: Metagenomics for Arthropod Biodiversity Monitoring

open access: yesEcology and Evolution, Volume 15, Issue 9, September 2025.
We used metagenomic sequencing of 40 bulk arthropod samples collected across Sweden to classify taxa and compare results with metabarcoding from the same samples. While metabarcoding was more sensitive for detecting low‐abundance taxa, taxonomic overlap between methods was strongly influenced by reference database representation.
Samantha López Clinton   +6 more
wiley   +1 more source

A Survey of RFID Authentication Protocols Based on Hash-Chain Method [PDF]

open access: green, 2008
Irfan Syamsuddin   +3 more
openalex   +1 more source

IoT Technology as an Effective Strategy Enhances Food Authentication for Current Fresh Fruit Supply Chain

open access: yesFuture Postharvest and Food, Volume 2, Issue 3, Page 262-279, September 2025.
ABSTRACT With trade globalization, food fraud such as tampering, substituting, and falsifying, challenges human health and the management of food supply chain. As a food type that only processed at primary level, the authenticity of fruit supply information has become a guarantee for its edible safety.
Yiqin Zhang   +6 more
wiley   +1 more source

A New Paradigm for Precision Drug Delivery in Inflammatory Bowel Disease: Effective Transfer, Enhanced Retention, and Pathology‐Targeting Treatment via Biomaterials and Engineered Platforms

open access: yesMedComm – Biomaterials and Applications, Volume 4, Issue 3, September 2025.
This review presents a precision delivery paradigm for inflammatory bowel disease, centered on Effective Transfer, Enhanced Retention, and Pathology‐targeting Treatment. Biomaterials and engineered platforms facilitate effective intestinal transit, prolonged mucosal retention, and respond to pathological cues, such as oxidative stress or immune ...
Ruoyi Gan, Enqi Ni, Guanyue Li, Wei Chen
wiley   +1 more source

Secure resource metering and accounting with hash chain in cloud storage

open access: yesTongxin xuebao, 2013
Cloud storage is a pay-per-use service of which the billing plan is typically based on users' resource consump-tion metered by server side. Therefore, the trustworthiness between payer and service provider becomes a key factor for the business, and ...
Mei LIU   +5 more
doaj   +2 more sources

The Guardian Research Network: A Real‐World Data Source for Pharmacoepidemiologic Research and Regulatory Applications

open access: yesPharmacoepidemiology and Drug Safety, Volume 34, Issue 9, September 2025.
ABSTRACT Background The quality of real‐world data (RWD) directly impacts the value of real‐world evidence (RWE) generated for regulatory decision‐making. Data owners and investigators must be prepared to provide documentation on data quality assessments to regulators when submitting secondary data for regulatory purposes.
Andrea McCracken   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy