Results 81 to 90 of about 32,420 (268)
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
khmer: Working with Big Data in Bioinformatics [PDF]
We introduce design and optimization considerations for the 'khmer' package.Comment: Invited chapter for forthcoming book on Performance of Open Source ...
Brown, C. Titus, McDonald, Eric
core
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo +3 more
wiley +1 more source
Cloud storage systems in smart grids face dual challenges: ensuring data integrity while maintaining real-time responsiveness when managing large-scale power data.
Bo Feng +5 more
doaj +1 more source
Abstract Background Myocyte enhancer factor 2 transcription factors regulate essential transcriptional programs in various cell types. The activity of myocyte enhancer factor 2 factors is modulated through interactions with cofactors, chromatin remodelers, and other regulatory proteins, which are dependent on cell context and physiological state.
Karine de Mattos +4 more
wiley +1 more source
Adaptive Ensemble Machine Learning Framework for Proactive Blockchain Security
Blockchain technology has rapidly evolved beyond cryptocurrencies, underpinning diverse applications such as supply chains, healthcare, and finances, yet its security vulnerabilities remain a critical barrier to safe adoption.
Babatomiwa Omonayajo +2 more
doaj +1 more source
Abstract Illegal wildlife trade (IWT) is one of the largest global illegal activities, and it negatively affects biodiversity and sustainable development worldwide. DNA barcoding coupled with high‐throughput sequencing (i.e., metabarcoding) is useful in identifying taxa affected by IWT and has been used routinely for decades.
Maria Joana Ferreira da Silva +9 more
wiley +1 more source
Generalized Hash Chain Traversal with Selective Output
A hash chain H for a one-way hash function h(·) is a sequence of hash values , where v0 is a public value, vn a secret value, and vi =h(vi+1). A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round) i for 1 ≤ i ≤ n.
Yum, DH, Seo, JW, Cho, K, Lee, PJ
openaire +3 more sources
Planar multi-loop fractionated kinematic chains (FKCs)—kinematic chains that can be decomposed into two or more coupled subchains by separating joints or links—are widely used in heavy-duty manipulators, yet their large design space makes automatic ...
Xiaoxiong Li, Jisong Ding, Huafeng Ding
doaj +1 more source
The Dependability of Crypto Linked Off-chain File Systems in Backend Blockchain Analytics Engine
This paper presents ways to assure the efficacy of managing crypto links and crypto speed with respect to the dependability of blockchain. The dependability in this work is defined with reference to crypto links in a proportional manner and crypto speed ...
Jongho Seol +4 more
doaj +1 more source

