|
|
|
Carlo Impagliazzo, Muriel Cabianca, Maria Laura Clemente, Giuliana Siddi Moreau, Matteo Vocale and Lidia Leoni
This paper describes the development activity that has been carried out for a living laboratory for the city of Cagliari aimed at functioning as a learning center for local SMEs willing to improve their skills in IoT and create applications that will be ...
ver más
|
|
|
|
|
|
|
Francesco Ceresia
Background: Many scholars emphasize the way in which sustained organizational development requires a shift in focus from the individual traits of the entrepreneur to the building of an organization that utilizes the collective contributions of its employ...
ver más
|
|
|
|
|
|
|
Jintao Zhao, Wenlei Sun, Cheng Lu, Xuedong Zhang, Lixin Wang and Dajiang Wang
Wire and cable are important industrial products involving the national economy and people?s livelihood, which are hailed as the ?blood vessel? and ?nerve? of the national economy, providing the basic guarantee for the normal operation of modern economy ...
ver más
|
|
|
|
|
|
|
Jun Li, Chenyang Zhang, Jianyi Zhang and Yanhua Shao
To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obsc...
ver más
|
|
|
|
|
|
|
Mengchi Xing, Haojiang Deng and Rui Han
The 5G core network adopts a Control and User Plane Separation (CUPS) architecture to meet the challenges of low-latency business requirements. In this architecture, a balance between management costs and User Experience (UE) is achieved by moving User P...
ver más
|
|
|
|
|
|
|
Jiawei Han, Qingsa Li, Ying Xu, Yan Zhu and Bingxin Wu
Artificial intelligence-generated content (AIGC) technology has had disruptive results in AI, representing a new trend in research and application and promoting a new era of AI. The potential benefits of this technology are both profound and diverse. How...
ver más
|
|
|
|
|
|
|
Fang Wang, Xueliang Fu, Weijun Duan, Buyu Wang and Honghui Li
The utilization of ear tags for identifying breeding pigs is a widely used technique in the field of animal production. Ear tag dropout can lead to the loss of pig identity information, resulting in missing data and ambiguity in production management and...
ver más
|
|
|
|
|
|
|
Haleh Asgarinia, Andres Chomczyk Penedo, Beatriz Esteves and Dave Lewis
News about personal data breaches or data abusive practices, such as Cambridge Analytica, has questioned the trustworthiness of certain actors in the control of personal data. Innovations in the field of personal information management systems to address...
ver más
|
|
|
|
|
|
|
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num...
ver más
|
|
|
|
|
|
|
Alberto Francia, Stefano Mariani, Giuseppe Adduce, Sandro Vecchiarelli and Franco Zambonelli
Management of competencies is a crucial concern for both learners and workers as well as for training institutions and companies. For the former, it allows users to track and certify the acquired skills to apply for positions; for the latter, it enables ...
ver más
|
|
|
|