We consider the problem of allocating m indivisible chores to n agents with additive disvaluation (cost) functions. It is easy to show that there are picking sequences that give every agent (that uses the greedy picki...
详细信息
In the paper, we propose a mathematical model of virtual machines lifecycle in a cloud node as a queueing system with two types of customers and two phases of service with a service rate degradation. The number of ser...
详细信息
Privacy and transparency in vote counting are the most prevalent concerns these days due to the involvement of untrusted authorities in the counting process. As a result, the counting process faces significant privacy...
详细信息
Privacy and transparency in vote counting are the most prevalent concerns these days due to the involvement of untrusted authorities in the counting process. As a result, the counting process faces significant privacy, trust, and transparency hurdles. Hence, there is a need for an efficient and trusted mechanism to resolve such problems. Blockchain technology has the potential to bring transparency and trust in several applications. Therefore, in this work, we explore blockchain technology in conjunction with a secure partitioning scheme to promote transparency, trust, and privacy between users and participating authorities in a decentralized platform. This paper presents a chaincode-based implementation of our proposed secure and verifiable vote counting mechanism that enables trust and fairness over a decentralized platform. Multiple authorities participate in the vote counting process in a trusted manner to cooperate and coordinate in a decision process over a decentralized platform. Our research exhibits that blockchain technology can eliminate the trust gaps and increase transparency and fairness in the election and vote counting procedure. We register user votes in the blockchain platform based on the secret sharing mechanism to enable fairness and openness between counting authorities. Each vote is recorded into the distributed ledger to support openness and verifiability in our mechanism. The ledger is accessible to every registered user as per the permissioned blockchain policy. We created many authorities in the blockchain network and deployed multiple smart contracts on the Hyperledger platform to analyze the feasibility of our strategy. The performance results are obtained and reported using the Hyperledger Caliper benchmark tool. The results demonstrate that the proposed chaincode-based solution achieves the highest throughput at 200–400 tps for fetching and removing contracts. We achieve the optimal latency of 18.09 s for the vote distribution contract
We study the use of deep features extracted from a pre-trained Vision Transformer (ViT) as dense visual descriptors. We observe and empirically demonstrate that such features, when extracted from a self-supervised ViT...
详细信息
Graph theory plays a significant role in the applications of chemistry,pharmacy,communication,maps,and aeronautical *** molecules of chemical compounds are modelled as a graph to study the properties of the *** geomet...
详细信息
Graph theory plays a significant role in the applications of chemistry,pharmacy,communication,maps,and aeronautical *** molecules of chemical compounds are modelled as a graph to study the properties of the *** geometric structure of the compound relates to a few physical properties such as boiling point,enthalpy,π-electron energy,andmolecular *** article aims to determine the practical application of graph theory by solving one of the interdisciplinary problems describing the structures of benzenoid hydrocarbons and *** topological index is an invariant of a molecular graph associated with the chemical structure,which shows the correlation of chemical structures using many physical,chemical properties and biological *** study aims to introduce some novel degree-based entropy descriptors such as ENTSO,ENTGH,ENTHG,ENTSS,ENTNSO,ENTNReZ1,ENTNReZ2 and ENTNSS using the respective topological ***,the above-mentioned entropy measures and physico-chemical properties of benzenoid hydrocarbons are fitted using linear regression models and calculated for graphenylene structure.
We design new parallel algorithms for clustering in high-dimensional Euclidean spaces. These algorithms run in the Massively Parallel Computation (MPC) model, and are fully scalable, meaning that the local memory in e...
详细信息
Based on upper record values in a series of observations over time from a Pareto distribution, an exact and several approximate one-sided and two-sided prediction intervals for the next record value (or for another fu...
详细信息
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ...
详细信息
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny *** it comes to deploying IoT,everyone agrees that security is the biggest *** is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square *** research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted *** lightweight cryptography,the information sent between these gadgets may be *** order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance *** also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio.
In this paper, we obtain some criteria for the existence of the periodic solution for the second order nonlinear functional differential equations with delay and variable coefficients {equation presented}, by means of...
详细信息
A queuing system with repeated calls with Markovian modulated arrival process is considered. The classical model of the RQ-system is complicated by the presence of conflicts of requests in the system, 'impatient...
详细信息
暂无评论