Showing 581 - 600 results of 1,667 for search '"scalability"', query time: 0.06s Refine Results
  1. 581

    Development of RNA interference-based therapy for rare genetic diseases by Milya Urfa Ahmad, Syarifah Dewi

    Published 2024-08-01
    “…RNAi offers several advantages, including gene-specific targeting, versatility in treating diverse genetic disorders, and scalability for mass production. Nonetheless, challenges remain, such as side effects, difficulties in targeting specific cells, and high development cost. …”
    Get full text
    Article
  2. 582

    Optimizing Data Interoperability for System Efficiency: One Data Standard in the Government Environment by Herpita Wahyuni, Dyah Mutiarin, Ulung Pribadi, Wahyudi Kumorotomo, Herdin Arie Saputra

    Published 2024-10-01
    “…Benefit from strategic steps by aligning departments, training, and regular monitoring, as well as scalability and collaboration. One Employment Data organizers produce quality data through the coordination of various work units and one data policy.…”
    Get full text
    Article
  3. 583

    A comprehensive review of advances in thermoelectric generators: Novel materials and enhanced applications for sustainable transportation by Duc Tran Duy, Vinh Nguyen Duy, Nguyen Tien Tan, Vu Minh Dien, Pham Hoa Binh

    Published 2025-01-01
    “…Modern energy conversion systems need dependability and scalability to overcome obstacles. This manuscript systematically examines recent research on high-performance thermoelectric materials, including novel alloys, nanostructured composites, and flexible materials designed to enhance energy conversion efficiency and adaptability across diverse environments. …”
    Get full text
    Article
  4. 584

    Attendance Check System and Implementation for Wi-Fi Networks Supporting Unlimited Number of Concurrent Connections by Min Choi, Jong-Hyuk Park, Gangman Yi

    Published 2015-07-01
    “…We make use of Wi-Fi scan (rather than connect) to the manager's AP enabled smart devices, resulting in an enhanced scalability.…”
    Get full text
    Article
  5. 585

    Securing Cloud-Based Internet of Things: Challenges and Mitigations by Nivedita Singh, Rajkumar Buyya, Hyoungshick Kim

    Published 2024-12-01
    “…Cloud-based IoT systems, enabled by Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS) models, offer flexibility and scalability but also pose additional security risks. …”
    Get full text
    Article
  6. 586

    Advancements in Smart Nondestructive Evaluation of Industrial Machines: A Comprehensive Review of Computer Vision and AI Techniques for Infrastructure Maintenance by Samira Mohammadi, Sasan Sattarpanah Karganroudi, Vahid Rahmanian

    Published 2024-12-01
    “…The review also highlights challenges, including data availability and scalability. It proposes future research directions, including real-time monitoring and the integration of Artificial Intelligence (AI) with Internet of Things (IoT) devices for comprehensive inspections.…”
    Get full text
    Article
  7. 587

    A Survey on the Modeling of Magnetic Tunnel Junctions for Circuit Simulation by Hyein Lim, Seungjun Lee, Hyungsoon Shin

    Published 2016-01-01
    “…It is expected to provide high-speed operation, scalability, low-power dissipation, and high endurance. …”
    Get full text
    Article
  8. 588

    MOANA: Multi-objective ant nesting algorithm for optimization problems by Noor A. Rashed, Yossra H. Ali, Tarik A. Rashid, Seyedali Mirjalili

    Published 2025-01-01
    “…MOANA addresses key limitations of traditional evolutionary algorithms by improving scalability and diversity in multi-objective scenarios, positioning it as a robust solution for complex optimization tasks.…”
    Get full text
    Article
  9. 589

    Identity-based anonymous cloud auditing scheme with compact tags by Chenxin LU, Bing CHEN, Ning DING, Liquan CHEN, Ge WU

    Published 2022-12-01
    “…Cloud storage has the advantages of high efficiency and scalability.Users can save local storage cost and share data with others through cloud storage technology.However, when data is uploaded to cloud servers, its owner also loses the physical control, and hence there needs a corresponding mechanism to ensure the integrity of data stored in the cloud.The Provable Data Possession (PDP) mechanism allows users or a Third-Party Auditor (TPA) appointed by the user to verify data integrity.In practice, data is usually maintained by multiple users.Users may reveal their identities while making an integrity verification request in traditional auditing processes.Anonymous cloud auditing ensures anonymity of users against the TPA during auditing.Currently, in identity-based systems, anonymous cloud auditing schemes usually resort to identity-based ring signature or group signature schemes.As a result, the size of a tag is related to the number of users, which makes it not compact and causes high storage cost.In order to solve this issue, a general construction of identity-based anonymous cloud auditing scheme was proposed.With a signature scheme and an anonymous cloud auditing scheme, a concrete identity-based anonymous cloud auditing scheme based on the general construction was proposed.It combined theBLS signature and an anonymous cloud auditing scheme with compact tags.The main advantage of this solution is that the tags are compact, which can significantly reduce storage cost and improve storage efficiency.Furthermore, the uncheatability and anonymity of the scheme are proved.…”
    Get full text
    Article
  10. 590

    Facial Emotion Recognition and Classification Using the Convolutional Neural Network-10 (CNN-10) by Emmanuel Gbenga Dada, David Opeoluwa Oyewola, Stephen Bassi Joseph, Onyeka Emebo, Olugbenga Oluseun Oluwagbemi

    Published 2023-01-01
    “…The motivation for applying the convolutional neural network-10 (CNN-10) model for facial expression recognition stems from its ability to detect spatial features, manage translation invariance, understand expressive feature representations, gather global context, and achieve scalability, adaptability, and interoperability with transfer learning methods. …”
    Get full text
    Article
  11. 591

    An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud by Hao Li, Lianbing Deng, Cheng Yang, Jianbo Liu

    Published 2020-02-01
    “…To solve these problems, we propose an enhanced media ciphertext-policy attribute-based encryption algorithm and introduce its two key components, the multiple access tree and the key chain. To increase the scalability of the proposed algorithm, we discussed the issues of multi-authorization, user revocation, and 1 − n multiple access tree. …”
    Get full text
    Article
  12. 592

    Application and prospect of blockchain in Metaverse by Xiaoling SONG, Yong LIU, Jingnan DONG, Yongfei HUANG

    Published 2022-08-01
    “…The metaverse is a new ecology that seamlessly integrates the virtual digital world and the real physical world, and has recently attracted widespread attention from all walks of life.With the maturity of various new IT technologies such as blockchain technology, artificial intelligence technology, VR/AR and sensing technology, mobile communication technology and ubiquitous computing technology, the further development of the Metaverse is possible.At present, research on the Metaverse mainly involves industrial projects, infrastructure, key technologies, privacy and security, etc.Although blockchain technology is covered in these studies, the specific points about the advantages of blockchain applied to the Metaverse are still lacked.Blockchain technology can not only provide an open and free decentralized environment for the Metaverse, but also act as a fair and reasonable digital asset distribution mechanism.The digital identity and digital asset management in the Metaverse empowered by blockchain was studied.The development process and characteristics of the Metaverse were analyzed.And the core technologies and challenges faced by the development of the Metaverse were discussed.Meanwhile, the key technologies of the blockchain were studied, and the feasibility of applying the blockchain to the Metaverse was analyzed from two aspects: the essential characteristics of the blockchain and the advantages of other technology integration.The Metaverse ecosystem architecture was further proposed, and the blockchain-based self-sovereign identity management model, blockchain-NFT workflow and its application in the Metaverse were analyzed in detail.Furthermore, combining the latest research progress of blockchain and the Metaverse, it was pointed out that the application of blockchain to the Metaverse will be from four aspects: infrastructure, communication and computing resource management mechanisms, regulation and privacy protection, and blockchain scalability and interoperability.Then the related challenges ahead and future research directions were presented at last.…”
    Get full text
    Article
  13. 593

    Exploring the Potential Applications of Blockchain Technology in Accounting Practice: A Systematic Literature Review by Rimal Mahdani, Hafizhah Risnafitri, Hafizhah Risnafitri, Mardiaton .

    Published 2024-02-01
    “…However, for widespread adoption to occur, it is imperative to overcome many difficulties like standardisation, interoperability, scalability, legal compliance, and data protection. …”
    Get full text
    Article
  14. 594

    Five-Axis Printing of Continuous Fibers on the Mold by Paweł Michalec, Marius Laux, Gidugu Lakshmi Srinivas, Robert Weidner, Mathias Brandstötter

    Published 2025-01-01
    “…Traditional CFRTPC placement techniques often face challenges with precision, scalability, and optimal fiber orientation, especially in customized, small-scale applications. …”
    Get full text
    Article
  15. 595

    A Wireless Sensor Network for Precise Volatile Organic Compound Monitoring by Gianfranco Manes, Giovanni Collodi, Rosanna Fusco, Leonardo Gelpi, Antonio Manes

    Published 2012-04-01
    “…The paper describes the WSN platform, detailing various units (gateways, nodes, detectors) and shows the features of scalability and reconfigurability, with minimal intrusiveness or obtrusiveness. …”
    Get full text
    Article
  16. 596

    Automated vulnerability discovery method for 5G core network protocol by Peixiang WU, Zhilong ZHANG, Libo CHEN, Yijun WANG, Zhi XUE

    Published 2024-02-01
    “…With the widespread development of fifth-generation (5G) mobile communication technology, concerns regarding 5G network security have also increased.Blackbox fuzzing is a commonly used method for automated vulnerability discovery in software security.However, applying dynamic approaches like fuzzing to discover vulnerabilities in the complex design of 5G core network protocols poses challenges such as low efficiency, poor versatility, and lack of scalability.Therefore, a novel static method to examine the open-source solution of the 5G core network was proposed.Through this method, a series of memory leak security issues caused by improper variable life cycle management were identified, which can lead to denial-of-service attacks on the 5G core network.To summarize these weaknesses, a general vulnerability model and an automated vulnerability discovery method called HoI were presented, which utilized hybrid analysis based on control and data flow.By successfully discovering five zero-day bugs in Open5GS, an open-source solution for the 5G core network, vulnerabilities that cover practical application scenarios of multiple interface protocols in the 5G core network were identified.These vulnerabilities have wide-ranging impact, are highly detrimental, and can be easily exploited.They have been reported to the vendor and assigned four Common Vulnerabilities and Exposures (CVE) numbers, demonstrating the effectiveness of this automated vulnerability discovery method.…”
    Get full text
    Article
  17. 597

    MeTa Learning-Based Optimization of Unsupervised Domain Adaptation Deep Networks by Hsiau-Wen Lin, Trang-Thi Ho, Ching-Ting Tu, Hwei-Jen Lin, Chen-Hsiang Yu

    Published 2025-01-01
    “…Future work will explore scalability in diverse real-world scenarios and further optimize the meta-learning framework. …”
    Get full text
    Article
  18. 598

    Research and application of Web of things resource management framework by Yangqun LI, Dengyin ZHANG

    Published 2022-06-01
    “…Web of things (WoT) connects all things together through the Web and realizes the sharing of resources, such as data or services provided by things, to fully implement their potential value.However, these resources are distributed in various places and belong to different organizations.The WoT resource management based on central infrastructure can no longer meet the new situation of continuous expansion of application scale, rapid changes in demand, and continuous increase of data types.In response to these new problems and new requirements, WoTRMF (Web of things resource management framework) was proposed.Firstly, based on this framework, the WoT resource management mechanism from the following aspects was reviewed, including distributed management of resources, efficient publish and discovery of resources, cost-effective, secure and efficient sharing of resources, and a unified resource management platform.Then, according to the requirement of distributed management, a P2P technology based on geographic location was proposed to realize distributed automatic management of WoT resources, so as to meet the high availability requirements of WoT applications and improve the efficiency of resource management.Aiming at the requirement of efficient resource publishing/discovery, an intelligent WoT resource publishing mechanism based on probabilistic topics was proposed to realize automatic classification and orderly publishing and storage of resources.Aiming at the security access requirements of resources, a secure and trusted WoT resource sharing mechanism based on blockchain was proposed.According to the requirement of unified resource management, the functional implementation model of WoTRMF was given.Finally, through the application case of WoTRMF framework in smart city security management, its characteristics of openness, flexibility, scalability and intelligence were analyzed.…”
    Get full text
    Article
  19. 599

    Harnessing the power of seaweed: unveiling the potential of marine algae in drug discovery by Leonel Pereira, Ana Valado

    Published 2023-12-01
    “…However, challenges related to compound identification, extraction methods, scalability of seaweed cultivation, and understanding the mechanisms of action still need to be addressed. …”
    Get full text
    Article
  20. 600

    Homo Sapiens Chromosomal Location Ontology: A Framework for Genomic Data in Biomedical Knowledge Graphs by Taha Mohseni Ahooyi, Benjamin Stear, J. Alan Simmons, Christopher M. Nemarich, Jonathan C. Silverstein, Deanne M. Taylor

    Published 2025-01-01
    “…Unlike existing ontologies that primarily focus on genomic feature identification or annotation, HSCLO is specifically engineered to optimize the interoperability and scalability of genomic data within biomedical knowledge graphs. …”
    Get full text
    Article