Results 51 to 60 of about 7,356,867 (183)

May I pick your brain? Local minds as living cadastres in a Portuguese eleventh‐century lawsuit

open access: yesEarly Medieval Europe, Volume 34, Issue 2, Page 231-253, May 2026.
In the context of a dispute with the monastery of Lorvão, in the late eleventh century, the monks of Vacariça, near Coimbra (modern Portugal), carried out a field enquiry in the village of Recardães. This was part of a failed attempt to repossess a number of land plots that they claimed were theirs, but had lost control of.
Julio Escalona
wiley   +1 more source

Infection Risk From Humans and Animals in the Anatomy Laboratory: A Scoping Review

open access: yesClinical Anatomy, Volume 39, Issue 3, Page 346-367, April 2026.
ABSTRACT Whole‐body dissection is a cornerstone of anatomy education. During and following the COVID‐19 pandemic, exposure to infectious agents and other risks of dissection were highlighted. To identify potential risks, one must have the data outlining these risks in specific situations.
Margaret A. McNulty, Elizabeth R. Agosto
wiley   +1 more source

TransShard: A Dynamic Transaction-Aware Sharding Scheme for Account-Based Blockchain

open access: yesIEEE Access
The poor scalability of blockchain technology restricts its application in large-scale networks. Sharding technology is viewed as the most promising on-chain solution to improving blockchain scalability.
Qian Wang, Yepeng Guan
doaj   +1 more source

Bret/BRAT

open access: yes
Critical Quarterly, EarlyView.
Nicholas Smart
wiley   +1 more source

Data Clustering Method for Fault‐Tolerant Privacy Protection of Smart Grid Based on BGN Homomorphic Encryption Algorithm

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
Smart meter (SM): Collect the data of users' electricity consumption periodically, and preprocess the noise reduction by using the Robust Local Weighted Regression algorithm, then encrypt the private data in it by Boneh‐Goh‐Nissim homomorphic encryption, and submit the encrypted private data to the fog node.
Jiangtao Guo   +5 more
wiley   +1 more source

Conditional Text Generation for AI‐Powered Interviews: A T5‐Based System With GPT‐2 Comparison

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
This work introduces an AI‐based interview system that uses T5 to generate context‐specific interview questions and responses. By comparing it with GPT‐2, the study shows T5's ability to produce more coherent and relevant dialogue, supporting advances in automated interview and conversational AI applications.
Kritika Acharya, Rashna K.C., Sudip Rana
wiley   +1 more source

Optimized byzantine fault tolerant algorithm for improving performance and security with trust values

open access: yesIET Blockchain
Blockchain is considered to be a promising technology due to its decentralization, open, and non tamperation. Nevertheless, the current blockchain system cannot replace traditional financial institutions because its performance and security indicators in
Linqing Xiao   +3 more
doaj   +1 more source

EquiFlowShard: A Blockchain Sharding Protocol with Optimized Account Distribution

open access: yesInformation
Blockchain sharding is a scalable solution for distributed ledgers, but may be hindered due to cross-shard transactions and uneven workload distribution.
Yemin Chen, Yongdong Wu, Tong Li
doaj   +1 more source

Research on Application of Urban Rail Transit Network-Level Power Dispatching System

open access: yesChengshi guidao jiaotong yanjiu
[Objective] With the increasingly clear trend of network construction in urban rail transit, the line-level power dispatch system, as the core business of urban rail transit, is receiving more and more attention on its research and development.
ZHANG Changkai   +4 more
doaj   +1 more source

Multi-source data security protection of smart grid based on combination key

open access: yesDianxin kexue, 2020
As an important infrastructure of power system,power communication network has deployed a large number of widely distributed business terminals and communication terminals,whose data security is related to the safe and stable operation of the entire ...
Jian GAO   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy