Showing 481 - 500 results of 812 for search '"decentralization"', query time: 0.06s Refine Results
  1. 481

    Research on MIX-based anonymous communications by LU Tian-bo, CHENG Xiao-ming, ZHANG Bing

    Published 2007-01-01
    “…Privacy and anonymity on the Internet are gaining increasing attention from both the scientific and the large Internet user community in recent years.Privacy does not only mean the confidentiality of information,but also mean not revealing who is communicating with whom,and how often.After describing the technology of MIX,a survey of ano-nymity technologies based on it was given.Finally WonGoo,a scalable and practical decentralized peer-to-peer protocol was presented that provides strong anonymity and high efficiency with layered encryption and random forwarding.…”
    Get full text
    Article
  2. 482

    Price and Service Competition of Dual-Channel Supply Chain with Consumer Returns by Lili Ren, Yong He, Houfei Song

    Published 2014-01-01
    “…According to the models, we analyze the optimal decisions in both centralized and decentralized scenarios. Then we design a new contract, coordinate the dual-channel supply chain, and enable both the retailer and the manufacturer to be a win-win.…”
    Get full text
    Article
  3. 483

    Small-Scale Natural Wastewater Treatment Systems: Principles and Regulatory Framework by Kiara Winans, Shanin Speas-Frost, Mike Jerauld, Mark Clark, Gurpal Toor

    Published 2012-06-01
    “…., septic systems or decentralized wastewater systems). Written by Kiara Winans, Shanin Speas-Frost, Mike Jerauld, Mark Clark, and Gurpal Toor, and published by the UF Department of Soil and Water Science, May 2012. …”
    Get full text
    Article
  4. 484

    Ethics of Blockchain by Design: Guiding a Responsible Future for Healthcare Innovation by Muthu Ramachandran

    Published 2024-12-01
    “…The rapid evolution of blockchain technology within healthcare presents unparalleled opportunities for advancements, including enhanced patient data security, decentralized systems for trustless operations, and transparent supply chain management. …”
    Get full text
    Article
  5. 485

    Small-Scale Natural Wastewater Treatment Systems: Principles and Regulatory Framework by Kiara Winans, Shanin Speas-Frost, Mike Jerauld, Mark Clark, Gurpal Toor

    Published 2012-06-01
    “…., septic systems or decentralized wastewater systems). Written by Kiara Winans, Shanin Speas-Frost, Mike Jerauld, Mark Clark, and Gurpal Toor, and published by the UF Department of Soil and Water Science, May 2012. …”
    Get full text
    Article
  6. 486

    Ecological System of Open Platform and Development of the Third Party Service Market by Xiaoling Chen

    Published 2014-08-01
    “…With the coming of mobile internet, the trend of traditional communication industry has become decentralized, clustering, ecological, and“open platform”has been irreversible. …”
    Get full text
    Article
  7. 487

    Advancing Pandemic Preparedness in Healthcare 5.0: A Survey of Federated Learning Applications by Saeed Hamood Alsamhi, Ammar Hawbani, Alexey V. Shvetsov, Santosh Kumar

    Published 2023-01-01
    “…We delve into FL’s applications and case studies in healthcare, highlighting its potential benefits, including privacy protection, decentralized decision-making, and implementation challenges. …”
    Get full text
    Article
  8. 488

    Evaluating the desirability of energy inequality mitigation strategies within underserved communities in sub-Saharan Africa by Desmond Eseoghene Ighravwe, Oludolapo Akanni Olanrewaju

    Published 2025-01-01
    “…On the other hand, the results from the VIKOR method indicated that decentralized renewable energy solutions were the most suitable strategy for addressing energy inequality. …”
    Get full text
    Article
  9. 489

    A Blockchain-Based Privacy Protection Model Under Quality Consideration in Spatial Crowdsourcing Platforms by Amal Albilali, Maysoon Abulkhair, Manal Bayousef, Faisal Albalwy

    Published 2024-01-01
    “…This paper proposes a novel efficient Privacy Protection Task Assignment (ePPTA) model that incorporates centralized and decentralized platforms. This innovative model combines the strengths of centralized efficiency and decentralized privacy, and introduces a unique mechanism that significantly enhances privacy protection and ensures data integrity. …”
    Get full text
    Article
  10. 490

    Overview of blockchain assets theft attacks and defense technology by Beiyuan YU, Shanyao REN, Jianwei LIU

    Published 2023-02-01
    “…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
    Get full text
    Article
  11. 491

    Zero-Trust Access Control Mechanism Based on Blockchain and Inner-Product Encryption in the Internet of Things in a 6G Environment by Shoubai Nie, Jingjing Ren, Rui Wu, Pengchong Han, Zhaoyang Han, Wei Wan

    Published 2025-01-01
    “…Within the framework of 6G networks, the rapid proliferation of Internet of Things (IoT) devices, coupled with their decentralized and heterogeneous characteristics, presents substantial security challenges. …”
    Get full text
    Article
  12. 492

    MANAGEMENT OF TRAINING ACTIVITIES AT POLITICAL SCHOOLS IN THE NORTH CENTRAL REGION TO MEET THE STANDARDS OF POLITICAL SCHOOLS by Vuong Quang Minh, Thai Van Thanh

    Published 2024-12-01
    “…Managing training activities is both a core mission of political schools and a pivotal tool to create breakthroughs in enhancing the quality of decentralized training programs. This management plays a vital role in assessing and accrediting political schools according to the standards outlined in Regulation No. 11-QĐ/TW, issued on May 19, 2021, by the Secretariat of the 13th Central Committee of the Communist Party of Vietnam. …”
    Get full text
    Article
  13. 493

    Trouble dans la guerre : The Heat of the Day d’Elizabeth Bowen, un roman d’espionnage au féminin by Céline Magot

    Published 2008-09-01
    “…But what may, at first, seem to be a conventional wartime spy novel in fact turns out to be a decentred version of the genre: by placing female characters at the centre of the plot, the traditional characteristics of the spy story become, in turn, feminised. …”
    Get full text
    Article
  14. 494

    Three-dimensional guidance control for vehicle convoy and interception by Yihua Dong, Yuefen Tan, Jingang Zhao, Wencheng Wang

    Published 2025-01-01
    “…Based on the differential equations for the range, the pitch angle and the yaw angle between successive vehicles, the deviated pursuit and the proportional navigation are proposed to derive decentralized control strategy for vehicle convoy and interception control. …”
    Get full text
    Article
  15. 495

    Higher education in the United States: Historical excursions by Jack H. Schuster

    Published 2002-11-01
    “…Even though its origin is intimately linked to the religious groups of English settlers, nowadays it is characterized by increasing opportunities of access for students and by a decentralized system which allows institutional diversity. …”
    Get full text
    Article
  16. 496

    The Levellers’ Conception of Legitimate Authority by Eunice Ostrensky

    Published 2018-01-01
    “…In this sense, the Levellers hold that a highly participative community should exert sovereignty, and that decentralized government is a means to achieve that goal.…”
    Get full text
    Article
  17. 497

    On the Solution of the Eigenvalue Assignment Problem for Discrete-Time Systems by El-Sayed M. E. Mostafa, Abdallah W. Aboutahoun, Fatma F. S. Omar

    Published 2017-01-01
    “…The conjugate gradient method is further extended to tackle the eigenvalue assignment problem for the two cases of decentralized control systems and control systems with time delay. …”
    Get full text
    Article
  18. 498

    L’ONU face à la société de l’information by Louise Lassonde

    Published 2007-03-01
    “…It emphasizes the major role plaid by cities and local governments in promoting innovative ideas and new mechanisms, such as digital solidarity through decentralized cooperation. Finally it raises two questions on the implementation and follow-up of the commitments made at the Summit.…”
    Get full text
    Article
  19. 499

    Coordination in a Single-Retailer Two-Supplier Supply Chain under Random Demand and Random Supply with Disruption by Fei Hu, Cheng-Chew Lim, Zudi Lu, Xiaochen Sun

    Published 2013-01-01
    “…We also analyze the decentralized scenario, and a combination of overproduction risk sharing and buy-back contracts with a side payment from/to the backup supplier is provided to coordinate the supply chain. …”
    Get full text
    Article
  20. 500

    Archives of Autogestion by Timothy Gibbs

    Published 2024-12-01
    “…One strategy to decentre and create a more polycentric model of the history of international development is to focus on influential alternative models of development practice formulated at specific moments in particular places in the Global South. …”
    Get full text
    Article