|
|
|
Wangxi Jiang, Xiaoxiong Wu, Mingyang Song, Jiwei Qin and Zhenhong Jia
Blockchain technology is well known due to the advent of Bitcoin. With the development of recent years, blockchain technology has been widely used in medicine, digital currency, energy, etc. The practical Byzantine fault-tolerant (PBFT) algorithm is a co...
ver más
|
|
|
|
|
|
Abuzar Zafar, Fahad Samad, Hassan Jamil Syed, Ashraf Osman Ibrahim, Manar Alohaly and Muna Elsadig
The internet of things (IoT) is a complex system that includes multiple technologies and services. However, its heterogeneity can result in quality-of-service (QoS) issues, which may lead to security challenges. Software-defined network (SDN) provides un...
ver más
|
|
|
|
|
|
Yohannes Geleta, Amare Haileslassie, Belay Simane, Engdawork Assefa and Amare Bantider
Individuals and communities use and value water in multiple and complex ways. In Sub-Saharan Africa (SSA), the pluralistic nature of water values is poorly documented, and the existing and potential value trade-offs are unidentified. This study was under...
ver más
|
|
|
|
|
|
Bijayita Thapa, Eduardo B. Fernandez, Ionut Cardei and Maria M. Larrondo-Petrie
Sensors and actuators are fundamental units in Cyber?Physical and Internet of Things systems. Because they are included in a variety of systems, using many technologies, it is very useful to characterize their functions abstractly by describing them as A...
ver más
|
|
|
|
|
|
Nikola Andelic, Sandi Baressi ?egota and Zlatan Car
Malware detection using hybrid features, combining binary and hexadecimal analysis with DLL calls, is crucial for leveraging the strengths of both static and dynamic analysis methods. Artificial intelligence (AI) enhances this process by enabling automat...
ver más
|
|
|