Results 61 to 70 of about 132,813 (243)

Network cost allocation methods for pay-as-bid peer-to-peer energy trading: A comparison

open access: yesEnergy Reports, 2022
In pay-as-bid peer-to-peer (P2P) energy trading, various types of prosumers and consumers can participate, regardless of their offers. Thus, various types of participants impact the network differently.
Noorfatima N., Choi Y., Onen A., Jung J.
doaj   +1 more source

How digital platforms affect local entrepreneurial activities: Evidence from the staggered entry of craigslist

open access: yesStrategic Entrepreneurship Journal, EarlyView.
Abstract Research Summary Access to markets is critical for entrepreneurial success, yet many face significant barriers. This study argues that digital platforms functioning as peer‐to‐peer marketplaces can facilitate entrepreneurial activity by improving market access for new ventures.
Daehyun Kim, Yongwook Paik, Namil Kim
wiley   +1 more source

Boosting 2D Black Phosphorus Ambient Stability: Noncovalent Functionalization Using Viologen Molecules

open access: yesSmall, EarlyView.
Viologen derivatives are employed to tackle BPNS oxidation challenges through a noncovalent strategy. Comprehensive characterization techniques, complemented by DFT calculations, provide detailed insights into these interactions. Notably, XPS analysis reveals that MV‐BPNS hybrids experience minimal oxidation under ambient conditions, highlighting the ...
Ishan Sarkar   +5 more
wiley   +1 more source

A Game Theoretic Analysis of Incentives in Content Production and Sharing over Peer-to-Peer Networks

open access: yes, 2010
User-generated content can be distributed at a low cost using peer-to-peer (P2P) networks, but the free-rider problem hinders the utilization of P2P networks.
Park, Jaeok, van der Schaar, Mihaela
core   +1 more source

Ultrasensitive MicroRNA Detection Combining Reduced Graphene Oxide Electrolyte‐Gated Transistors and Machine Learning

open access: yesSmall, EarlyView.
We developed an ultrasensitive and highly selective biosensor by integrating bio‐functionalized reduced graphene oxide (rGO) electrolyte‐gated transistors (EGTs) and machine learning (ML) to detect miRNAs (miR‐34a, miR‐34b, and miR‐34c) associated with cancer and neurological disorders.
Ana Vitória Ferreira Deleigo   +7 more
wiley   +1 more source

FİNANSAL TEKNOLOJİLER (FINTECH) İLE KURUMSAL KREDİ BANKACILIĞINDA DEĞİŞİM VE GELİŞMELER: BİR LİTERATÜR DEĞERLENDİRMESİ

open access: yesJournal of Management Theory and Practices Research, 2022
Dünya üzerinde her şey değişim ve dönüşüm sürecini yaşamaktadır. Bu değişim sadece kullanılan ürünlerde değil sistemlerde, doğada, insan ve insan ile ilişkili tüm süreçlerde gerçekleşmektedir.
Enes Koçoğlu, Filiz Ersöz
doaj  

NEURON: Enabling Autonomicity in Wireless Sensor Networks

open access: yesSensors, 2010
Future Wireless Sensor Networks (WSNs) will be ubiquitous, large-scale networks interconnected with the existing IP infrastructure. Autonomic functionalities have to be designed in order to reduce the complexity of their operation and management, and ...
Anastasios Zafeiropoulos   +4 more
doaj   +1 more source

Illicit Drug‐Derived Volatile Organic Compounds as Markers for Application in Noncontact Detection Technology

open access: yesThe Chemical Record, EarlyView.
This review highlights the characteristic odor markers of illicit drugs, emphasizing volatile markers from both natural and synthetic sources, and explores the shift from canine‐based detection to emerging noncontact sensing technologies. Illicit drug use remains a global concern, requiring effective detection methods to counter evolving concealment ...
Minwoo Kim   +4 more
wiley   +1 more source

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

A new security architecture for SIP based P2P computer networks [PDF]

open access: yes, 2008
Many applications are transferred from C/S (Client/Server) mode to P2P (Peer-to-Peer) mode such as VoIP (Voice over IP). This paper presents a new security architecture, i.e.
Tang, S, Yip, YJ, Yongfeng, H
core  

Home - About - Disclaimer - Privacy