Showing 581 - 600 results of 705 for search '"Blockchain"', query time: 0.04s Refine Results
  1. 581

    الرموز غير القابلة للإستبدال (NFT: Non-fungible token) ونشر الكتب الإلكترونية: دراسة وصفية استكشافية by ایة الله فایز عبدالملک جودة

    Published 2023-12-01
    “…وتختلف عملية سك الكتب minting من سوق لآخر حسب البلوكتشين Blockchain المستخدمه، وكذلك تتفاوت رسوم الغاز gas fees.…”
    Get full text
    Article
  2. 582

    Enhancing Intelligent Transport Systems Through Decentralized Security Frameworks in Vehicle-to-Everything Networks by Usman Tariq, Tariq Ahamed Ahanger

    Published 2025-01-01
    “…Second, it utilizes a consortium blockchain to provide secure and transparent information exchange among authorized participants. …”
    Get full text
    Article
  3. 583

    Review of cryptographic application security evaluation techniques for new critical infrastructures by Gaolei LI, Jianhua LI, Zhihong ZHOU, Hao ZHANG

    Published 2023-12-01
    “…The construction of new critical infrastructure, represented by high-speed full-time signal coverage, intelligent and fine-grained urban management, and deep space and deep sea scientific innovation experimental fields, has entered a new stage with the deep integration and development of new technologies such as 5G/6G, artificial intelligence, and blockchain in various fields.The security evaluation of cryptography applications, as a key technological resource for ensuring the security of national information, integration, and innovation infrastructure, has risen to the level of international law and national development strategy.It is urgent to construct a comprehensive, fine-grained, and self-evolving cryptography security evaluation system throughout the data lifecycle.The typical APT attacks and ransomware attacks faced by new critical infrastructure in industries such as energy, medicine, and transportation in recent years were considered.And then the growing demand for security evaluation of cryptography applications was analyzed in the face of new business requirements such as preventing endogenous data security risks, achieving differentiated privacy protection, and supporting authenticated attack traceability.The new challenges were also examined, which were brought by new information infrastructure (including big data, 5G communication, fundamental software, etc.), integration infrastructure (including intelligent connected vehicles, intelligent connected industrial control systems, etc.), and innovation infrastructure (including big data, artificial intelligence, blockchain, etc.) to the security evaluation of cryptography applications.Furthermore, the new requirements were revealed about domestically produced cryptography algorithms and protocols deployed on high-performance computing chips, ultra-high-speed communication modules, and large-capacity storage media for cryptography application security evaluation technology.Finally, the development of automated and intelligent cryptography application security evaluation technology was explored.…”
    Get full text
    Article
  4. 584

    Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions by Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev, Shafiullah Khan, Noha Alnazzawi

    Published 2025-01-01
    “…The review emphasizes the integration of advanced security technologies, including machine learning (ML), federated learning (FL), blockchain, blockchain–ML, deep learning (DL), encryption, cryptography, IT/OT convergence, and digital twins, as essential for enhancing the security and real-time data protection of CPS in IIoT–edge computing. …”
    Get full text
    Article
  5. 585

    Integrating sustainability into cybersecurity: insights from machine learning based topic modeling by Krishnashree Achuthan, Sriram Sankaran, Swapnoneel Roy, Raghu Raman

    Published 2025-01-01
    “…These strategies advocate for an evolved approach that incorporates advanced technologies such as AI, IoT, and blockchain into resilient, sustainable cybersecurity frameworks. …”
    Get full text
    Article
  6. 586

    Inteligência artificial utilizada na auditoria de recursos públicos destinados para alimentação escolar by Renata Salles Silva, Wilson de Souza Melo Junior, Ana Gleice da Silva Santos, Charles Bezerra do Prado

    Published 2025-02-01
    “…As ferramentas, como OSA, ALICE, Querido Diário, Argus, GRAA, EY Blockchain Analyzer e PwC Cash.ai, desempenham papéis cruciais na auditoria, contribuindo para transparência, prevenção de fraudes e eficácia na gestão de recursos destinados à alimentação escolar. …”
    Get full text
    Article
  7. 587

    Agriculture data sharing review by Jorge Chamorro-Padial, Jordi Virgili-Gomá, Rosa Gil, Mercè Teixidó, Roberto García

    Published 2025-01-01
    “…Our findings reveal a shift from traditional to innovative research themes, such as the increasing focus on the Internet of Things (IoT), Blockchain, and Digital Storage. This indicates a trend toward modernizing agricultural practices through technology. …”
    Get full text
    Article
  8. 588

    A Review of ICT Integration in Agricultural Extension Services. A Global Perspective by Byamukama, Willbroad, Ssemakula, Edward, Ssekandi, Joesph, Arinda, Shaman, Businge, Phelix, Kalibwani, Rebecca, Atukunda, Christian, Turyasingura, Benson

    Published 2025
    “…Future prospects include AI-driven predictive analytics, blockchain for transparent supply chains, and augmented/virtual reality for training.…”
    Get full text
    Article
  9. 589

    Development and prospect of sidelink technology by Boyuan ZHANG, Xueyan HUANG, Zhenshan ZHAO, Shichang ZHANG, Teng MA, Liang LIU

    Published 2022-03-01
    “…Sidelink technology has been widely used in V2X scenarios.The potential technical consideration for Rel-18 feature set will be given out, including the traditional enhancement orientation for traditional sidelink technology, such as carrier aggregation and sidelink-unlisence.The scenario extension for sidelink relay, such as UE to UE relay and multi-connection in relay scenario, the application of sidelink technology in accurate positioning scenario.In addition, how to combine sidelink technical with other latest technology was discussed, such as reflective intelligent surface (RIS) and blockchain technology, to solve its own shortage.…”
    Get full text
    Article
  10. 590

    Shamir-based virtual machine placement policy by Junfeng TIAN, Zilong WANG, Xinfeng HE, Zhen LI

    Published 2019-10-01
    “…In order to alleviate the harm of co-location attack in cloud environment,a virtual machine placement strategy based on Shamir was proposed,and a virtual machine placement framework was designed.The security of key data was ensured by the blockchain in the proposed placement strategy.The virtual machine placement policy could effectively improve the security of the virtual machine and the load balancing capability of the cloud environment,and reduce resource waste.Finally,the effectiveness of the scheme is proved by simulation experiments.…”
    Get full text
    Article
  11. 591

    (Meta)verse as the next escaper from competition public enforcement by Luca Megale

    Published 2022-11-01
    “…Moving on, it is asserted as tacit collusion might be a crucial issue due to algorithms and blockchain. Metaverse might also be characterized by repeating concerns. …”
    Get full text
    Article
  12. 592

    Impact of technical and professional developments on audit risks Review study by Waheed Mahmood Ramo, Abdulwahid Ghazi Mohammed

    Published 2021-03-01
    “… The research provides an attempt to identify the effects of technical and professional developments on audit risks, important of these developments are cloud computing, blockchain, electronic commerce, fair value and corporate governance. …”
    Get full text
    Article
  13. 593

    Curadurías y cuerpos expandidos: sobre exhibiciones de arte en espacios virtuales by Guadalupe Baliño, Danila Desirée  Nieto

    Published 2023-01-01
    “…Based on the analysis of two different experiences of art exhibition on virtual spaces, which emerged in 2020 in Argentina, Hábito Galería and Aura NFT, we will propose points of analysis to think about some drifts about the experience of the body in the spectators and users of art in the virtual exhibition spaces, taking into account online and web curatorial operations, and within the framework of a complex context marked by the strategies left by the COVID 19 pandemic in terms of visibility, production and distribution of art, and the new forms in relation to new technologies in communication, the digital art market and its registration in the blockchain.…”
    Get full text
    Article
  14. 594

    Discussion on the common sense of the Internet of things by Yu SUN

    Published 2020-12-01
    “…The development of Internet of things (IoT) in China is in the second decade.First of all,the outcome of the IoT was reviewed.The industry formation and system structure of IoT were introduced.Then,the development process,trends and key points of the next generation of IoT were summarized in the aspect of the service platform,sensor industry,access links and fusion with technologies such as cloud computing,edge computing,big data,identity resolution,blockchain,satellite navigation system,5G and so on.Finally,the problems and possible ideas of the development of IoT in China were put forward in the fields of the application positioning,theoretical research,standard-setting and security.Hope to provide reference for colleagues to understand the IoT.…”
    Get full text
    Article
  15. 595

    DIGITALIZATION OF CRYPTOSPHERE OF THE EAEU COUNTRIES: STATUS AND PROSPECTS by O. Makhalina, V. Makhalin

    Published 2019-06-01
    “…Conclusions and recommendations have been formulated: 1.it is necessary to develop a single regulatory framework for the regulation of the crypto sphere in the EAEU countries. 2.digitalization of the cryptosphere should be carried out according to the General scheme; 3.to make maximum use of blockchain technology to create a digital economy in the EAEU countries.…”
    Get full text
    Article
  16. 596

    The Fourth Industrial Revolution: Another Industrial Revolution Leaving Black Women Behind? by Malaika Mahlatsi

    Published 2020-03-01
    “…This fusion of advances in complex technologies, including but not limited to robotics, quantum computing, blockchain, artificial intelligence (AI) and the internet of things (IoT), would affect all disciplines and industries of the modern world. …”
    Get full text
    Article
  17. 597

    Survey of Bitcoin de-anonymization technology by CHENG Jie, JIN Wei, XIA Qing, LI Miao, DAI Wei, ZHANG Yafeng, DAI Peng, LI Yucheng

    Published 2024-11-01
    “…The Bitcoin system, based on blockchain technology, features decentralization, borderlessness, and anonymity, drawing widespread attention from academia and industry. …”
    Get full text
    Article
  18. 598

    The Fourth Industrial Revolution: Another Industrial Revolution Leaving Black Women Behind? by Malaika Mahlatsi

    Published 2020-03-01
    “…This fusion of advances in complex technologies, including but not limited to robotics, quantum computing, blockchain, artificial intelligence (AI) and the internet of things (IoT), would affect all disciplines and industries of the modern world. …”
    Get full text
    Article
  19. 599

    DISTRIBUTED LEDGER TECHNOLOGY IN THE BANKING SECTOR: ANALYSIS OF THE VALUE OF Information technology IN REDUCING THE FINANCIAL LOSS OF THE COMMERCIAL BANK by A. Mikhaylova

    Published 2017-10-01
    “…The potential results from the introduction of the «Blockchain» into the business process «Lending» are defined.…”
    Get full text
    Article
  20. 600

    Equity decentralized consensus algorithm based on incentive compatibility by Youliang TIAN, Yansen YUAN, Hongfeng GAO, Yang YANG, Jinbo XIONG

    Published 2022-12-01
    “…The PoW consensus algorithm has been proved to be incentive incompatible, existing computing centralization under high reward differences and slow convergence of forks in extreme cases.Based on this, an incentive-compatiblebased consensus algorithm SSPoW was proposed.By introducing local solutions to calculate the computing power aggregated on the block chain, the explicit quantification of computing power was used to speed up the convergence of the fork, thus satisfying the consistency of the blockchain.Incentive compatibility was achieved by improving the reward scheme, which reduced the problem of computing centralization caused by high reward differences.Simulation results prove that the proposed algorithm could effectively reduce the reward differences and is more efficient than the traditional PoW consensus algorithm, which has positive implications for improving system security and consensus efficiency.…”
    Get full text
    Article