Results 71 to 80 of about 9,486 (244)
Factors that Impact Blockchain Scalability [PDF]
Blockchain systems (more precisely Distributed Ledger Technologies(DLTs)) represent a different digital ecosystem compared with traditional computer systems.
Beck, Roman, Eklund, Peter
core +1 more source
Existing schemes in the realm of mobile healthcare (also, e-Healthcare) based on cloud and IoMT (Internet of Medical Things) do not ensure end-to-end security and are not compliant with HIPAA (Health Insurance Portability and Accountability Act).
Shaik Shakeel Ahamad +1 more
doaj +1 more source
Sistem Pengendali Smart-Kontak dengan Aplikasi Android dan Web [PDF]
Smart-kontak merupakan stopkontak portable yang dapat dikendalikan dari jarak jauh dengan menggunakan aplikasi Android dan situs web. Aplikasi Android dapat mengendalikan smart-kontak melalui Bluetooth, sedangkan situs web dapat mengendalikan smart ...
Nathania, S. (Shinta) +1 more
core
Analysis of Local Labour Market in Jarocin District [PDF]
Badanie dotyczące analizy lokalnych rynków pracy pokazało, że aktywność zawodowa ludności w latach 2006 – 2011, mimo powolnego wzrostu, nie osiągnęła poziomu występującego w krajach Unii Europejskiej.
Buchwald, Tomasz, Ginter, Michał
core +1 more source
ABSTRACT Background Feedback as one of the most influential factors for learning has been subject to a great body of research. It plays a key role in the development of educational technology systems and is traditionally rooted in deterministic feedback defined by experts and their experience.
Dominic Lohr +2 more
wiley +1 more source
BERKAH JAYA ELECTRIC SHOP APPLICATION IS BASED ON ANDROID
Berkah Jaya Electric Shop is a shop engaged in the sale of various kinds of electrical equipment. Goods sold by the store such as cables, sockets, and switches.
Andiani Andiani, Siti Anzila Nur
doaj +1 more source
Optimal growth under military threat [PDF]
National Defense is a public good that requires resources for its production and its availability affects the economic behavior of private agents. A major policy problem of the government is to find an optimal allocation of resources between private use ...
Ersel, Hasan
core +1 more source
The rapid growth and diversification of malware variants, driven by advanced code obfuscation, evasion, and antianalysis techniques, present a significant threat to cybersecurity. The inadequacy of traditional methods in accurately classifying these evolving threats highlights the need for effective and robust malware classification techniques.
K. Sundara Krishnan +2 more
wiley +1 more source
Performance of the CMS Pixel Detector at an upgraded LHC
The CMS experiment will include a pixel detector for pattern recognition and vertexing. It will consist of three barrel layers and two endcaps on each side, providing three space-points up to a pseudoraditity of 2.1.
Bruzzi +9 more
core +1 more source

