Results 81 to 90 of about 2,377,005 (278)
Supply chain dynamic multi-center coordination authentication model based on block chain
The value of block chain technology is proved by the success of Bitcoin. The characteristics, limitations and its chain structure Hash principle of block chain were analyzed, the applications of block chain technology were researched, the B2B+B2C supply ...
Jian-ming ZHU, Yong-gui FU
doaj +3 more sources
BlockChain (BC), Technology Notary in Data Driven Marketing (DDM) Contracts [PDF]
Today, Data Driven Marketing is challenged by the supply of vague data, inconsistencies between them and fraud through advertising in the digital marketing ecosystem.
Ermal Haxhiaj, Bia Çera
doaj
Research progress in the application of single‐cell sequencing technology in rheumatic diseases
Application of single‐cell RNA sequencing (scRNA‐seq) technology in the study of the pathogenesis of rheumatic diseases. Tree of content illustration depicting the multi‐layered insights from scRNA‐seq in rheumatic diseases. The outer layer highlights key cell subsets identified by scRNA‐seq in rheumatoid arthritis, systemic lupus erythematosus ...
Xinzhe Feng +5 more
wiley +1 more source
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye +8 more
wiley +1 more source
Blockchain and Digital Technologies in the Telecommunications Industry
ABSTRACT This article examines how fourth industrial revolution (4IR) technologies, specifically blockchain and digital twin technologies, can be utilized to address the energy supply challenge and enhance the management of distributed telecom infrastructure assets in a research context.
Charles Okeyia +3 more
wiley +1 more source
Secure energy efficient routing protocol for wireless sensor network
The ease of deployment of economic sensor networks has always been a boon to disaster management applications. However, their vulnerability to a number of security threats makes communication a challenging task.
Das Ayan Kumar +2 more
doaj +1 more source
Integrated Model of Image Protection Techniques
We propose an integrated model of Block-Permutation-Based Encryption (BPBE) and Reversible Data Hiding (RDH). The BPBE scheme involves four processes for encryption, namely block scrambling, block-rotation/inversion, negative-positive transformation and ...
Anu Aryal +3 more
doaj +1 more source
RBAU: Noval Redactable Model with Audit Mechanism and Key Update for Alliance Chain
With the widespread application of alliance chain technology in diverse scenarios, its immutability has gradually revealed certain limitations in practical use.
Yineng Chen +6 more
doaj +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
An optimistic fair e-commerce protocol for large e-goods [PDF]
Suppose two entities that do not trust each other want to exchange some arbitrary data over a public channel. A fair exchange protocol ensures that both parties get what they want or neither gets anything.
Levi, Albert +4 more
core

