Results 81 to 90 of about 32,420 (268)

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

khmer: Working with Big Data in Bioinformatics [PDF]

open access: yes, 2013
We introduce design and optimization considerations for the 'khmer' package.Comment: Invited chapter for forthcoming book on Performance of Open Source ...
Brown, C. Titus, McDonald, Eric
core  

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

Tamper-proof strategy of dynamic hash chain for smart grid cloud storage based on reinforcement learning key update mechanism

open access: yesDiscover Computing
Cloud storage systems in smart grids face dual challenges: ensuring data integrity while maintaining real-time responsiveness when managing large-scale power data.
Bo Feng   +5 more
doaj   +1 more source

Identification of MEF2A, MEF2C, and MEF2D interactomes in basal and Fsk‐stimulated mouse MA‐10 Leydig cells

open access: yesAndrology, EarlyView.
Abstract Background Myocyte enhancer factor 2 transcription factors regulate essential transcriptional programs in various cell types. The activity of myocyte enhancer factor 2 factors is modulated through interactions with cofactors, chromatin remodelers, and other regulatory proteins, which are dependent on cell context and physiological state.
Karine de Mattos   +4 more
wiley   +1 more source

Adaptive Ensemble Machine Learning Framework for Proactive Blockchain Security

open access: yesApplied Sciences
Blockchain technology has rapidly evolved beyond cryptocurrencies, underpinning diverse applications such as supply chains, healthcare, and finances, yet its security vulnerabilities remain a critical barrier to safe adoption.
Babatomiwa Omonayajo   +2 more
doaj   +1 more source

Using miniaturized laboratory equipment and DNA barcoding to improve conservation genetics training and identify illegally traded species

open access: yesConservation Biology, EarlyView.
Abstract Illegal wildlife trade (IWT) is one of the largest global illegal activities, and it negatively affects biodiversity and sustainable development worldwide. DNA barcoding coupled with high‐throughput sequencing (i.e., metabarcoding) is useful in identifying taxa affected by IWT and has been used routinely for decades.
Maria Joana Ferreira da Silva   +9 more
wiley   +1 more source

Generalized Hash Chain Traversal with Selective Output

open access: yesIEICE Transactions on Information and Systems, 2010
A hash chain H for a one-way hash function h(·) is a sequence of hash values , where v0 is a public value, vn a secret value, and vi =h(vi+1). A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round) i for 1 ≤ i ≤ n.
Yum, DH, Seo, JW, Cho, K, Lee, PJ
openaire   +3 more sources

Automatic Synthesis of Planar Multi-Loop Fractionated Kinematic Chains with Multiple Joints: Topological Graph Atlas and a Mine Scaler Manipulator Case Study

open access: yesMachines
Planar multi-loop fractionated kinematic chains (FKCs)—kinematic chains that can be decomposed into two or more coupled subchains by separating joints or links—are widely used in heavy-duty manipulators, yet their large design space makes automatic ...
Xiaoxiong Li, Jisong Ding, Huafeng Ding
doaj   +1 more source

The Dependability of Crypto Linked Off-chain File Systems in Backend Blockchain Analytics Engine

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2018
This paper presents ways to assure the efficacy of managing crypto links and crypto speed with respect to the dependability of blockchain. The dependability in this work is defined with reference to crypto links in a proportional manner and crypto speed ...
Jongho Seol   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy