|
|
|
Shunfang Hu, Shaoping Jiang, Qing Miao, Fan Yang, Weihong Zhou and Peng Duan
With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting user privacy have become increasingly challenging. End devices in the IoT are often deployed in unattended environments and connected to open networks, making ...
ver más
|
|
|
|
|
|
|
Zeming Wei, Jiawen Fang, Zhicheng Hong, Yu Zhou, Shansi Ma, Junlang Zhang, Chufeng Liang, Gansen Zhao and Hua Tang
Blockchain is a distributed ledger technology that possesses characteristics such as decentralization, tamper resistance, and programmability. However, while blockchain ensures transaction openness and transparency, transaction privacy is also at risk of...
ver más
|
|
|
|
|
|
|
Pratik Thantharate and Anurag Thantharate
With the digitization of healthcare, an immense amount of sensitive medical data are generated and shared between various healthcare stakeholders?however, traditional health data management mechanisms present interoperability, security, and privacy chall...
ver más
|
|
|
|
|
|
|
Takashi Ando
For engines operating using heavy fuel oil (HFO), the nozzle rings of turbocharger turbines are prone to severe degradation because of contamination with unburned fuel deposits. This contamination may lead to increased excitation of blade resonance. A pr...
ver más
|
|
|
|
|
|
|
Lihong Li, Rui Zhu, Kun Song, Ou Zhang and Xue Jiang
The actual situation of carbon-emission reduction in China?s power sector has not yet achieved the expected benefits. The rent-seeking behavior of participants in power construction projects (PCPs) hinders the realization of low-carbon benefits. It is ne...
ver más
|
|
|
|
|
|
|
Hamed Taherdoost
Blockchain is the foundation of all cryptocurrencies, while machine learning (ML) is one of the most popular technologies with a wide range of possibilities. Blockchain may be improved and made more effective by using ML. Even though blockchain technolog...
ver más
|
|
|
|
|
|
|
Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe and Nicola Santoro
Consider a set of k identical asynchronous mobile agents located in an anonymous ring of n nodes. The classical Gather (or Rendezvous) problem requires all agents to meet at the same node, not a priori decided, within a finite amount of time. This proble...
ver más
|
|
|
|
|
|
|
Gonçalo Carvalho, Filipe Magalhães, Bruno Cabral, Vasco Pereira and Jorge Bernardino
Simulators allow for the simulation of real-world environments that would otherwise be financially costly and difficult to implement at a technical level. Thus, a simulation environment facilitates the implementation and development of use cases, renderi...
ver más
|
|
|
|
|
|
|
Mark Burgin and Rao Mikkilineni
Some researchers suggest that information is a form of matter, calling it the fifth state of matter or the fifth element. Recent results from the general theory of information (GTI) contradict this. This paper aims to explain and prove that the claims of...
ver más
|
|
|
|
|
|
|
Mikhail B. Abrosimov,Peter V. Razumovsky
Pág. 1 - 7
The article describes the results of the search for a minimal vertex and edge extensions of an undirected colored star graphs. This search is a part of the minimal extensions of a colored graphs problem research. A graph G* is called a vertex (edge) k-ex...
ver más
|
|
|
|