The present study endeavors to undertake a comprehensive investigation of the shortcomings of Blockchain technology, while assessing its advantages and drawbacks. Blockchain is a type of Distributed Ledger technology ...
详细信息
The present study endeavors to undertake a comprehensive investigation of the shortcomings of Blockchain technology, while assessing its advantages and drawbacks. Blockchain is a type of Distributed Ledger technology (DLT) that relies on a network of peers to achieve consensus. Furthermore, other DLTs with similar functions might offer more viable solutions to replace Blockchain. One of these alternatives is Hashgraph, which employs a unique mechanism to manage distributed ledgers, claiming to be faster, more secure, and impartial. As a result, a thorough comparative analysis was conducted between these two technologies to determine which would emerge as the dominant technology in the market. The fundamental features of DLTs include decentralization, security, transparency, and integrity, albeit not all DLTs possess the same structures or functionalities.
This research study investigates the advancements and performance of Convolutional Sparse coding (CSC) strategies in semantic segmentation, with a particular focus on the Multi-Layer Convolutional Sparse coding (ML-CS...
详细信息
The resource scheduling of computing power networks is a complex project, and the scheduling strategies used will directly affect the efficiency of subsequent processing of computing tasks. This article focuses on the...
详细信息
This paper discusses the research on the application of integrated sensing and communication (ISAC) techniques in multi-antenna systems. With the advancement of communication technology, multi-antenna systems become c...
详细信息
ISBN:
(纸本)9798350379860;9798350379877
This paper discusses the research on the application of integrated sensing and communication (ISAC) techniques in multi-antenna systems. With the advancement of communication technology, multi-antenna systems become common in wireless communication, and ISAC technology brings new opportunities for wireless communication by integrating sensing and communication. The article first introduces the background and application of ISAC technology, analyzes the research gaps and challenges, and then outlines the classification, network architecture and key technologies of ISAC. The article focuses on the development of multi-antenna technology and its application in communication and sensing, as well as the combination of ISAC and multi-antenna technology, including integrated waveform design and performance optimization control methods.
In large-scale distributed computing systems, coded computing has attracted considerable attention since it can effectively mitigate the impact of stragglers. Nonetheless, several emerging issues seriously restrict th...
详细信息
With the rapid digital transformation of education, smart campuses have emerged as a pivotal component of modern educational systems. This study presents a comprehensive architectural framework that integrates Interne...
详细信息
Traditional recommendation systems typically rely solely on user content information to predict product ratings while ignoring the impact of other factors on recommendation effectiveness. Proposes a recommendation alg...
详细信息
This paper considers the trouble of records compression and supply coding by evaluating the use of arithmetic and Huffman coding. Arithmetic coding is a good, most reliable coding approach used for statistics compress...
This paper considers the trouble of records compression and supply coding by evaluating the use of arithmetic and Huffman coding. Arithmetic coding is a good, most reliable coding approach used for statistics compression. It assigns shorter message lengths to symbols that appear extra often in the statistics movement and can reach better compression ratios than maximum different coding strategies. Huffman coding then uses a Tree information shape to manner the source facts and assigns a unique binary code to every symbol within the facts. It is quicker and easier to put in force than arithmetic coding and yields exact average compression ratios. Each coding strategy is compared and discussed in-depth in phrases of compression ratio overall performance, velocity of encode/decode, and complexity. From the assessment and dialogue, it's miles concluded that mathematics coding is a slightly better desire for records compression/supply coding than Huffman coding, with overall higher performance and compression ratio. In contrast, Huffman's coding change into discovered to be quicker and less complicated.
Cloud computing is spreading rapidly, but little research has been conducted to understand the effects of the protective perspective on acceptance by individuals. The goal of this study was to explore the impact of pr...
详细信息
Cloud computing is spreading rapidly, but little research has been conducted to understand the effects of the protective perspective on acceptance by individuals. The goal of this study was to explore the impact of protective behavior on individuals' adoption of cloud computing. Specifically, the study will concentrate on personal cloud storage service (CSS), widely recognized as a protective technology. Our theoretical framework endeavored to combine protection motivation theory with the extended unified theory of acceptance and use of technology and focused on the effect of threat in the context of CSS. This study tested two proposed models (Model A, Model B) by structural equation modeling using data from 392 individuals. Data were collected for people in voluntary CSS-usage settings through an online survey. Model A and model B explained 61.0% and 60.4% of the variance in the behavioral intention to accept CSS, respectively. Results showed that CSS adoption is a protective measure against data loss and identified that threat influence CSS adoption. Threat elements directly do not influence behavioral intention to adopt CSS. Threat elements mostly acted as antecedents of independent variables;perceived severity and perceived vulnerability directly influenced technology attributes (performance expectancy, effort expectancy), and showed slightly different results in contextual attributes (facilitating conditions, social influence) and consumer attributes (hedonic motivation, habits). Our study offers a unique perspective for researchers and professionals in understanding the impact of threat factors on informationtechnology domains where protective technologies are operated. Thus, we recommend that academics and business practitioners in the realm of cloud computing should consider user's protective motivation view of adopting CSS when designing, developing, delivering and spreading it.
This paper addresses the Flexible Job Shop Scheduling Problem (FJSP) by developing a mathematical model with the goal of minimizing the maximum makespan, and presenting a solution approach using an improved genetic al...
详细信息
暂无评论