We show that all invertible n × n matrices over any finite field Fq can be generated in a Gray code fashion. More specifically, there exists a listing such that (1) each matrix appears exactly once, and (2) two c...
详细信息
Blockchain technology's decentralized and immutable data storage has changed a number of sectors. But typical blockchain networks scalability issues prevent them from being widely used for large-scale applications...
详细信息
While the field of 3D scene reconstruction is dominated by NeRFs due to their photorealistic quality, 3D Gaussian Splatting (3DGS) has recently emerged, offering similar quality with real-time rendering speeds. Howeve...
This article explores the importance of IT risk management, especially at XYZ Vocational School. The agency is equipped to manage business risks, emphasizing the need to improve decision-making and risk mitigation by ...
详细信息
Vehicular communication is the backbone of future Intelligent Transportation Systems(ITS).It offers a network-based solution for vehicle safety,cooperative awareness,and traffic management *** safety applications,Basi...
详细信息
Vehicular communication is the backbone of future Intelligent Transportation Systems(ITS).It offers a network-based solution for vehicle safety,cooperative awareness,and traffic management *** safety applications,Basic Safety Messages(BSM)containing mobility information is shared by the vehicles in their neighborhood to continuously monitor other nearby vehicles and prepare a local traffic *** are shared using mode 4 of Cellular V2X(C-V2X)communications in which resources are allocated in an ad hoc ***,the strict packet transmission requirements of BSM and hidden node problem causes packet collisions in a vehicular network,thus reducing the reliability of safety ***,as vehicles choose the transmission resources in a distributed manner in mode 4 of CV2X,the packet collision problem is further *** paper presents a novel solution in the form of a Space Division Multiple Access(SDMA)protocol that intelligently schedules BSM transmissions using vehicle position data to reduce concurrent transmissions from hidden node *** proposed protocol works by dividing road segments into clusters and *** sub-frames are allocated to a cluster and these sub-frames are reused after a certain *** a cluster,sub-channels are allocated to *** implement the proposed SDMA protocol and evaluate its performance in a highway vehicular *** results show that the proposed SDMA protocol outperforms standard Sensing-Based Semi Persistent Scheduling(SB-SPS)in terms of safety range and packet delay.
Aims:To identify virtual healthcare services and digital health technologies deployed in South Africa during coronavirus disease 2019(COVID-19)and the challenges associated with their ***:To determine the status of di...
详细信息
Aims:To identify virtual healthcare services and digital health technologies deployed in South Africa during coronavirus disease 2019(COVID-19)and the challenges associated with their ***:To determine the status of digital health utilization during COVID-19 in South Africa,the preferred reporting items for systematic reviews and meta-analyses model was used to perform a systematic and in-depth critical analysis of previously published studies in well-known and trusted online electronic databases using specific search keywords words that are relevant to this *** selected published peer-reviewed articles available from the onset of COVID-19 to July ***:Total of 24 articles were included into this *** study revealed that South Africa adopted digital technologies such as SMS-based solutions,mobile health applications,telemedicine and telehealth,WhatsApp-based systems,artificial intelligence and chatbots and robotics to provide healthcare services during COVID-19 *** innovative technologies have been used for various purposes including screening infectious and non-infectious diseases,disease surveillance and monitoring,medication and treatment compliance,creating awareness and *** study also revealed that teleconsultation and e-prescription,telelaboratory and telepharmacy,teleeducation and teletraining,teledermatology,teleradiology,telecardiology,teleophthalmology,teleneurology,telerehabilitation,teleoncology and telepsychiatry are among virtual healthcare services delivered through digital health technologies during COVID-19 in South ***,these smart digital health technologies face several impediments such as infrastructural and technological barriers,organization and financial barriers,policy and regulatory barriers as well as cultural ***:Although COVID-19 has invigorated the use of digital health technologies,there are still some *** outbreak of pandemics like COVID-19 in t
As the global e-commerce landscape continues to expand rapidly, the efficiency and security of supply chains have become critical areas of concern. With the increasing reliance on digital platforms and the interconnec...
详细信息
ISBN:
(纸本)9798350341737
As the global e-commerce landscape continues to expand rapidly, the efficiency and security of supply chains have become critical areas of concern. With the increasing reliance on digital platforms and the interconnected nature of supply chains, the vulnerability to cyber threats has escalated significantly. This research paper delves into the multifaceted domain of e-commerce supply chains with a primary focus on cyber-security considerations. The objective of this study is to assess the existing cyber-security measures and vulnerabilities within e-commerce supply chains while proposing effective strategies to mitigate potential risks. Through an extensive literature review, the paper highlights various cyber-security challenges faced by e-commerce enterprises, including data breaches, ransomware attacks, and supply chain disruptions caused by cyber-attacks on logistics partners. By analyzing real-world case studies and industry reports, the research provides valuable insights into the consequences of cyber-security lapses and their impact on supply chain resilience and consumer trust. The research also explores the technological advancements and best practices that can fortify e-commerce supply chains against cyber threats. It examines the role of encryption, multi-factor authentication, secure payment gateways, and cloud-based security solutions in safeguarding sensitive data and maintaining the integrity of supply chain operations. Additionally, the study investigates the importance of employee training and awareness programs to cultivate a cyber-security-oriented organizational culture. Furthermore, this paper considers the legal and regulatory aspects of cyber-security in the context of e-commerce supply chains. By examining international laws, industry standards, and compliance requirements, it highlights the responsibilities and obligations of e-commerce businesses to protect customer data and secure the flow of goods throughout the supply chain. The efficie
Real-time integration within the SAP HANA (High-Performance Analytics Appliance) environment through open-source components signifies a substantial financial investment in information technology (IT) projects. The pre...
详细信息
This study's objective is to evaluate the system's level of maturity by adopting the COBIT Framework 5. The COBIT Framework is one of the ISACA-issued frameworks that defines the concept of information technol...
详细信息
Code review is considered a key process in the software industry for minimizing bugs and improving code quality. Inspection of review process effectiveness and continuous improvement can boost development productivity...
详细信息
暂无评论