In recent years, a variety of paints have been developed in response to the diversification of color design. Due to the powder manufacturing process, different sizes of powders may randomly attach to each powder. Sinc...
详细信息
This study examines whether the speaker's state during active listening can be estimated using sensors. Few studies work on active listening, where the elderly get refreshed through their talking. This study extra...
详细信息
When people seek food, their emotions shift, and not all foods are appealing in all moods. It is incredibly tough to learn people's eating habits and provide advice depending on their emotions at the time. The goa...
详细信息
Convolutional Neural Networks (CNN) have emerged as a highly efficient deep learning algorithm for processing, classifying, and analyzing images. Currently, there is a high demand for networks that are robust to noise...
详细信息
There have always been many challenges to understand and use nominal data as effectively as numerical data. The judgment-based scaling of nominal data is not as efficient as a formula-based transformation of numerical...
详细信息
Identifying devices of interest within Internet Protocol (IP) networks is essential for Cyber security and network management. However, the large variety and number of devices within networks, and the ubiquitous encry...
详细信息
With the popularity and self-contained functions of Android operating system, malicious attackers have targeted it primarily. Along with attackers are gradually skilled in avoid deep learning detectors, many in-depth ...
详细信息
We evaluate data durability in erasure coding using a proposed method called peak shift method of drive failure risk. The proposed method creates data protection groups of drives with different drive failure risks suc...
We evaluate data durability in erasure coding using a proposed method called peak shift method of drive failure risk. The proposed method creates data protection groups of drives with different drive failure risks such as different operation times so that the predicted peaks of the drive failure risks are not concentrated at the same time. This reduces the probability of multiple drive failures occurring at the same time, thereby reducing the probability of data loss. Under the supposed conditions, the data loss probability can be reduced by up to one order of magnitude by using existing drives that have been in operation for about 700 days.
Decentralized identification is an interesting topic for Internet-based systems. Although the use of centralized systems for identification is prevalent, there is still a need for decentralized identification systems ...
Decentralized identification is an interesting topic for Internet-based systems. Although the use of centralized systems for identification is prevalent, there is still a need for decentralized identification systems that do not rely on a centralized entity. We propose using Distributed Ledger Technology (DLT) to fulfill the needs. Although DLT and Distributed Hash Table (DHT) can be used as technologies in Decentralized Identifiers (DIDs), immutability and the growth of transactions are still challenging. This paper investigates DIDs under the W3C standard and DLT-based technology as one of the solutions for verifiable data registries in DIDs. We evaluate our proposed solution by comparing three models wrt. query time for verifiable data registries. Our proposed architecture for data registry achieves better query time by concealing old transactions from the main DLT.
To revolutionize digital money administration, this paper provides an architectural design for an e-wallet platform powered by blockchain technology. The suggested design makes use of the privacy and security capabili...
To revolutionize digital money administration, this paper provides an architectural design for an e-wallet platform powered by blockchain technology. The suggested design makes use of the privacy and security capabilities of blockchain to give consumers a safe and user-focused payment method. The system's key parts are described, namely safe payment processing, distributed administration of identities, and smart contracts. The paper discusses the possible advantages of blockchain technology in the field of finance, with an emphasis on resolving security issues and improving consumer privacy. Although the design is still conceptual at this time, it presents an encouraging basis for the creation of a safe and open e-wallet technology that fits the changing decentralized financial environment.
暂无评论