167   Artículos

 
en línea
Jun Li, Chenyang Zhang, Jianyi Zhang and Yanhua Shao    
To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obsc... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Christine Dewi, Danny Manongga, Hendry, Evangs Mailoa and Kristoko Dwi Hartomo    
Face mask detection is a technological application that employs computer vision methodologies to ascertain the presence or absence of a face mask on an individual depicted in an image or video. This technology gained significant attention and adoption du... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Esraa Othman, Iva Cibilic, Vesna Posloncec-Petric and Dina Saadallah    
Environmental noise is a major environmental concern in metropolitan cities. The rapid social and economic growth in the 20th century is not always accompanied by adequate land planning and environmental management measures. As a consequence of rapid urb... ver más
Revista: Urban Science    Formato: Electrónico

 
en línea
Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi and Amna Eleyan    
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yuxing Wang, Nan Liu, Zhiwen Pan and Xiaohu You    
Network slicing is a key technology for 5G networks, which divides the traditional physical network into multiple independent logical networks to meet the diverse requirements of end-users. This paper focuses on the resource allocation problem in the sce... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ross Clarke, Luke McGuire, Mohamed Baza, Amar Rasheed and Maazen Alsabaan    
The current traditional paper ballot voting schemes suffer from several limitations such as processing delays due to counting paper ballots, lack of transparency, and manipulation of the ballots. To solve these limitations, an electronic voting (e-voting... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Qiang Li    
Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication tr... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Pengxuan Wang, Yixi Wang, Weijun Gao, Tongyu Xu, Xindong Wei, Chunyan Shi, Zishu Qi and Li Bai    
In cold regions, due o the impact of climatic conditions, the heat load in winter and the cooling load in summer are unbalanced. In the long-term operation of the ground-source heat pump (GSHP), the soil heat imbalance phenomenon has still not been succe... ver más
Revista: Buildings    Formato: Electrónico

 
en línea
Yiming Zhu, Dehua Zhou, Yuan Li, Beibei Song and Chuansheng Wang    
Recently, significant progress has been made in the field of public key encryption with keyword search (PEKS), with a focus on optimizing search methods and improving the security and efficiency of schemes. Keyword frequency analysis is a powerful tool f... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Xinxin Zhou, Yujie Chen, Yingying Li, Bingjie Liu and Zhaoyuan Yu    
As a kind of first aid healthcare service, emergency medical services (EMSs) present high spatiotemporal sensitivity due to significant changes in the time-dependent urban environment. Taking full advantage of big spatiotemporal data to realize multiperi... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

« Anterior     Página: 1 de 11     Siguiente »