Results 81 to 90 of about 91,922 (250)
Conductive Hydrogel‐Based Neural Interfaces: From Fabrication Methods, Properties, to Applications
This review summarizes the fabrication methods, properties, and applications of conductive hydrogels in neural interfaces. Finally, the prevailing challenges and outlines of future directions in the field of conductive hydrogels for neural interfaces are provided, emphasizing the need for interdisciplinary research to address issues such as long‐term ...
Xin‐Yu Xue+10 more
wiley +1 more source
Traditional construction supply chains suffer from extra delays, costs and information wastages due to information intermediaries. Blockchain, a decentralized infrastructure, can provide irreversibility, undeniableness, uniqueness and anonymity for ...
Feng Xiong+4 more
doaj +1 more source
An online algorithm for generating fractal hash chains applied to digital chains of custody [PDF]
This paper gives an online algorithm for generating Jakobsson's fractal hash chains. Our new algorithm compliments Jakobsson's fractal hash chain algorithm for preimage traversal since his algorithm assumes the entire hash chain is precomputed and a particular list of Ceiling(log n) hash elements or pebbles are saved.
arxiv
The growing importance of traceability in supply chains requires robust, transparent, and efficient systems to ensure the integrity and authenticity of product journeys.
Manuel José Fernández-Iglesias+2 more
doaj +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam+9 more
wiley +1 more source
A Distributed Ledger for Supply Chain Physical Distribution Visibility
Supply chains (SC) span many geographies, modes and industries and involve several phases where data flows in both directions from suppliers, manufacturers, distributors, retailers, to customers.
Haoyan Wu+5 more
doaj +1 more source
A Hash of Hash Functions [PDF]
In this paper, we present a general review of hash functions in a cryptographic sense. We give special emphasis on some particular topics such as cipher block chaining message authentication code (CBC MAC) and its variants. This paper also broadens the information given in some well known surveys, by including more details on block-cipher based hash ...
arxiv
Deconstructing the Blockchain to Approach Physical Limits [PDF]
Transaction throughput, confirmation latency and confirmation reliability are fundamental performance measures of any blockchain system in addition to its security. In a decentralized setting, these measures are limited by two underlying physical network
Bagaria, Vivek+4 more
core +1 more source
Efficient implementation of sets and multisets in R using hash tables [PDF]
The package hset for the R language contains an implementation of a S4 class for sets and multisets of numbers. The implementation, based on the hash table data structure from the package hash (Brown, 2019), allows for quick operations when the set is a dynamic object.
arxiv
Enhanced trust management for building trustworthy social internet of things network
IoT devices may need to connect to unknown devices to realise ubiquitous computing in the 5G network and beyond. In such a situation, devices need to evaluate the trustworthiness of the other devices. A trust‐building model using a social network of IoT devices is discussed.
Swati Sucharita Roy+2 more
wiley +1 more source