-
581
Development of RNA interference-based therapy for rare genetic diseases
Published 2024-08-01“…RNAi offers several advantages, including gene-specific targeting, versatility in treating diverse genetic disorders, and scalability for mass production. Nonetheless, challenges remain, such as side effects, difficulties in targeting specific cells, and high development cost. …”
Get full text
Article -
582
Optimizing Data Interoperability for System Efficiency: One Data Standard in the Government Environment
Published 2024-10-01“…Benefit from strategic steps by aligning departments, training, and regular monitoring, as well as scalability and collaboration. One Employment Data organizers produce quality data through the coordination of various work units and one data policy.…”
Get full text
Article -
583
A comprehensive review of advances in thermoelectric generators: Novel materials and enhanced applications for sustainable transportation
Published 2025-01-01“…Modern energy conversion systems need dependability and scalability to overcome obstacles. This manuscript systematically examines recent research on high-performance thermoelectric materials, including novel alloys, nanostructured composites, and flexible materials designed to enhance energy conversion efficiency and adaptability across diverse environments. …”
Get full text
Article -
584
Attendance Check System and Implementation for Wi-Fi Networks Supporting Unlimited Number of Concurrent Connections
Published 2015-07-01“…We make use of Wi-Fi scan (rather than connect) to the manager's AP enabled smart devices, resulting in an enhanced scalability.…”
Get full text
Article -
585
Securing Cloud-Based Internet of Things: Challenges and Mitigations
Published 2024-12-01“…Cloud-based IoT systems, enabled by Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS) models, offer flexibility and scalability but also pose additional security risks. …”
Get full text
Article -
586
Advancements in Smart Nondestructive Evaluation of Industrial Machines: A Comprehensive Review of Computer Vision and AI Techniques for Infrastructure Maintenance
Published 2024-12-01“…The review also highlights challenges, including data availability and scalability. It proposes future research directions, including real-time monitoring and the integration of Artificial Intelligence (AI) with Internet of Things (IoT) devices for comprehensive inspections.…”
Get full text
Article -
587
A Survey on the Modeling of Magnetic Tunnel Junctions for Circuit Simulation
Published 2016-01-01“…It is expected to provide high-speed operation, scalability, low-power dissipation, and high endurance. …”
Get full text
Article -
588
MOANA: Multi-objective ant nesting algorithm for optimization problems
Published 2025-01-01“…MOANA addresses key limitations of traditional evolutionary algorithms by improving scalability and diversity in multi-objective scenarios, positioning it as a robust solution for complex optimization tasks.…”
Get full text
Article -
589
Identity-based anonymous cloud auditing scheme with compact tags
Published 2022-12-01“…Cloud storage has the advantages of high efficiency and scalability.Users can save local storage cost and share data with others through cloud storage technology.However, when data is uploaded to cloud servers, its owner also loses the physical control, and hence there needs a corresponding mechanism to ensure the integrity of data stored in the cloud.The Provable Data Possession (PDP) mechanism allows users or a Third-Party Auditor (TPA) appointed by the user to verify data integrity.In practice, data is usually maintained by multiple users.Users may reveal their identities while making an integrity verification request in traditional auditing processes.Anonymous cloud auditing ensures anonymity of users against the TPA during auditing.Currently, in identity-based systems, anonymous cloud auditing schemes usually resort to identity-based ring signature or group signature schemes.As a result, the size of a tag is related to the number of users, which makes it not compact and causes high storage cost.In order to solve this issue, a general construction of identity-based anonymous cloud auditing scheme was proposed.With a signature scheme and an anonymous cloud auditing scheme, a concrete identity-based anonymous cloud auditing scheme based on the general construction was proposed.It combined theBLS signature and an anonymous cloud auditing scheme with compact tags.The main advantage of this solution is that the tags are compact, which can significantly reduce storage cost and improve storage efficiency.Furthermore, the uncheatability and anonymity of the scheme are proved.…”
Get full text
Article -
590
Facial Emotion Recognition and Classification Using the Convolutional Neural Network-10 (CNN-10)
Published 2023-01-01“…The motivation for applying the convolutional neural network-10 (CNN-10) model for facial expression recognition stems from its ability to detect spatial features, manage translation invariance, understand expressive feature representations, gather global context, and achieve scalability, adaptability, and interoperability with transfer learning methods. …”
Get full text
Article -
591
An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud
Published 2020-02-01“…To solve these problems, we propose an enhanced media ciphertext-policy attribute-based encryption algorithm and introduce its two key components, the multiple access tree and the key chain. To increase the scalability of the proposed algorithm, we discussed the issues of multi-authorization, user revocation, and 1 − n multiple access tree. …”
Get full text
Article -
592
Application and prospect of blockchain in Metaverse
Published 2022-08-01“…The metaverse is a new ecology that seamlessly integrates the virtual digital world and the real physical world, and has recently attracted widespread attention from all walks of life.With the maturity of various new IT technologies such as blockchain technology, artificial intelligence technology, VR/AR and sensing technology, mobile communication technology and ubiquitous computing technology, the further development of the Metaverse is possible.At present, research on the Metaverse mainly involves industrial projects, infrastructure, key technologies, privacy and security, etc.Although blockchain technology is covered in these studies, the specific points about the advantages of blockchain applied to the Metaverse are still lacked.Blockchain technology can not only provide an open and free decentralized environment for the Metaverse, but also act as a fair and reasonable digital asset distribution mechanism.The digital identity and digital asset management in the Metaverse empowered by blockchain was studied.The development process and characteristics of the Metaverse were analyzed.And the core technologies and challenges faced by the development of the Metaverse were discussed.Meanwhile, the key technologies of the blockchain were studied, and the feasibility of applying the blockchain to the Metaverse was analyzed from two aspects: the essential characteristics of the blockchain and the advantages of other technology integration.The Metaverse ecosystem architecture was further proposed, and the blockchain-based self-sovereign identity management model, blockchain-NFT workflow and its application in the Metaverse were analyzed in detail.Furthermore, combining the latest research progress of blockchain and the Metaverse, it was pointed out that the application of blockchain to the Metaverse will be from four aspects: infrastructure, communication and computing resource management mechanisms, regulation and privacy protection, and blockchain scalability and interoperability.Then the related challenges ahead and future research directions were presented at last.…”
Get full text
Article -
593
Exploring the Potential Applications of Blockchain Technology in Accounting Practice: A Systematic Literature Review
Published 2024-02-01“…However, for widespread adoption to occur, it is imperative to overcome many difficulties like standardisation, interoperability, scalability, legal compliance, and data protection. …”
Get full text
Article -
594
Five-Axis Printing of Continuous Fibers on the Mold
Published 2025-01-01“…Traditional CFRTPC placement techniques often face challenges with precision, scalability, and optimal fiber orientation, especially in customized, small-scale applications. …”
Get full text
Article -
595
A Wireless Sensor Network for Precise Volatile Organic Compound Monitoring
Published 2012-04-01“…The paper describes the WSN platform, detailing various units (gateways, nodes, detectors) and shows the features of scalability and reconfigurability, with minimal intrusiveness or obtrusiveness. …”
Get full text
Article -
596
Automated vulnerability discovery method for 5G core network protocol
Published 2024-02-01“…With the widespread development of fifth-generation (5G) mobile communication technology, concerns regarding 5G network security have also increased.Blackbox fuzzing is a commonly used method for automated vulnerability discovery in software security.However, applying dynamic approaches like fuzzing to discover vulnerabilities in the complex design of 5G core network protocols poses challenges such as low efficiency, poor versatility, and lack of scalability.Therefore, a novel static method to examine the open-source solution of the 5G core network was proposed.Through this method, a series of memory leak security issues caused by improper variable life cycle management were identified, which can lead to denial-of-service attacks on the 5G core network.To summarize these weaknesses, a general vulnerability model and an automated vulnerability discovery method called HoI were presented, which utilized hybrid analysis based on control and data flow.By successfully discovering five zero-day bugs in Open5GS, an open-source solution for the 5G core network, vulnerabilities that cover practical application scenarios of multiple interface protocols in the 5G core network were identified.These vulnerabilities have wide-ranging impact, are highly detrimental, and can be easily exploited.They have been reported to the vendor and assigned four Common Vulnerabilities and Exposures (CVE) numbers, demonstrating the effectiveness of this automated vulnerability discovery method.…”
Get full text
Article -
597
MeTa Learning-Based Optimization of Unsupervised Domain Adaptation Deep Networks
Published 2025-01-01“…Future work will explore scalability in diverse real-world scenarios and further optimize the meta-learning framework. …”
Get full text
Article -
598
Research and application of Web of things resource management framework
Published 2022-06-01“…Web of things (WoT) connects all things together through the Web and realizes the sharing of resources, such as data or services provided by things, to fully implement their potential value.However, these resources are distributed in various places and belong to different organizations.The WoT resource management based on central infrastructure can no longer meet the new situation of continuous expansion of application scale, rapid changes in demand, and continuous increase of data types.In response to these new problems and new requirements, WoTRMF (Web of things resource management framework) was proposed.Firstly, based on this framework, the WoT resource management mechanism from the following aspects was reviewed, including distributed management of resources, efficient publish and discovery of resources, cost-effective, secure and efficient sharing of resources, and a unified resource management platform.Then, according to the requirement of distributed management, a P2P technology based on geographic location was proposed to realize distributed automatic management of WoT resources, so as to meet the high availability requirements of WoT applications and improve the efficiency of resource management.Aiming at the requirement of efficient resource publishing/discovery, an intelligent WoT resource publishing mechanism based on probabilistic topics was proposed to realize automatic classification and orderly publishing and storage of resources.Aiming at the security access requirements of resources, a secure and trusted WoT resource sharing mechanism based on blockchain was proposed.According to the requirement of unified resource management, the functional implementation model of WoTRMF was given.Finally, through the application case of WoTRMF framework in smart city security management, its characteristics of openness, flexibility, scalability and intelligence were analyzed.…”
Get full text
Article -
599
Harnessing the power of seaweed: unveiling the potential of marine algae in drug discovery
Published 2023-12-01“…However, challenges related to compound identification, extraction methods, scalability of seaweed cultivation, and understanding the mechanisms of action still need to be addressed. …”
Get full text
Article -
600
Homo Sapiens Chromosomal Location Ontology: A Framework for Genomic Data in Biomedical Knowledge Graphs
Published 2025-01-01“…Unlike existing ontologies that primarily focus on genomic feature identification or annotation, HSCLO is specifically engineered to optimize the interoperability and scalability of genomic data within biomedical knowledge graphs. …”
Get full text
Article