Results 221 to 230 of about 1,527 (301)
Abstract This study employs a novel application of Impact Chains combined with tailored metrics to conduct a cross‐country comparative analysis of the same hazard event. This is a research approach currently absent from the literature, yet essential for developing transferable Disaster Risk Management (DRM) lessons.
Andra‐Cosmina Albulescu +4 more
wiley +1 more source
A scoping review of privacy and utility metrics in medical synthetic data. [PDF]
Kaabachi B +7 more
europepmc +1 more source
Practical Capacitor Placement Strategy for Loss Minimisation in Low‐Voltage Distribution Networks
The paper proposes a practical capacitor placement strategy specifically for line loss reduction in rural low‐voltage distribution networks. An optimisation problem is formulated and solved under two input modes with the objective of minimising total line loss, ultimately identifying the optimal set of capacitor installation locations.
Ke Wang
wiley +1 more source
Revisiting the Security of the Lightweight Stream Cipher Draco: New Observation and TMDTO Attacks
Draco is a lightweight small‐state stream cipher proposed in 2022. It is designed to provide a 128‐bit security level and be provably secure against time‐memory‐data trade‐off (TMDTO) attacks. In this paper, we revisit the security of Draco against TMDTO attacks.
Ziyu Guan +5 more
wiley +1 more source
Enhanced secure storage and data privacy management system for big data based on multilayer model. [PDF]
Ting T, Li M.
europepmc +1 more source
Design and Development of a Blockchain‐Enabled Decentralized Framework for Academic Microcredentials
Traditional higher education faces significant challenges, including rising costs, inflexibility, and a disconnect from workforce demands, while current credentialing systems are often centralized and vulnerable to fraud. Microcredentials have emerged as a solution, yet they lack integration into formal degree pathways and face issues with recognition ...
Abrar Mahbub Tanim +4 more
wiley +1 more source
A comparative performance analysis of fully homomorphic and attribute-based encryption schemes. [PDF]
More KD, Pramod D.
europepmc +1 more source
Criminalising ‘Conversion Therapy’
An increasing number of jurisdictions have introduced legal bans on so‐called ‘conversion therapy’ practices. Yet significant uncertainty and disagreement persist among legal scholars, policymakers and advocates about whether criminal law is an appropriate tool in this area and, if so, how it should be used.
Ilias Trispiotis, Stuart Goosey
wiley +1 more source
A Review of Asynchronous Byzantine Consensus Protocols. [PDF]
Ji Z, Zhang X, Hu J, Lu Y, Liu J.
europepmc +1 more source

