Search
Search Results
-
Event Identification for Supply Chain Risk Management Through News Analysis by Using Large Language Models
Event identification is important in many areas of the business world. In the supply chain risk management domain, the timely identification of risk...
-
Security among UPFs belonging to Different 5G/B5G/6G Networks
Recently, 5G/B5G/6G networks (5G for short) have been gloriously developed to give us colorful lives and make our daily activities more convenient...
-
Television shows ideation, and testing with smart digital twins to advance ratings
Generating ideas for immersive television shows is fundamental to the television industry. TV channel managers are looking to stay ahead of their...
-
A robust ECC based authentication protocol for satellite-to-satellite communication network
Harnessing satellite resources to designate a communication network has felicitous the flexibility to bounteous applications, including broadcasting,...
-
Distributed neuro-fuzzy routing for energy-efficient IoT smart city applications in WSN
Wireless sensor networks (WSNs) enable seamless data gathering and communication, facilitating efficient and real-time decision-making in IoT...
-
An enhanced energy and distance based optimized clustering and dynamic adaptive cluster-based routing in software defined vehicular network
Software-Defined Vehicular Networks (SDVN) have been established to facilitate secure and adaptable vehicle communication within the dynamic...
-
-
A novel PLS technique for secure ESM based MIMO systems
Multiple-input multiple-output systems with spatial modulation has evolved into an energy efficient and less complex wireless transmission system due...
-
The impact of supply chain digitalization on supply chain performance: a moderated mediation model
Despite extensive attention that researchers and practitioners have paid to supply chain digitalization, our understanding of how to leverage supply...
-
Digital Sustainability for Energy-Efficient Behaviours: A User Representation and Touchpoint Model
In response to climate change, nations have been tasked with reducing energy consumption and lessening their carbon footprint through targeted...
-
Virtual Experiences, Real Memories? A Study on Information Recall and Recognition in the Metaverse
There are high expectations towards extended reality (XR), namely the “metaverse”. However, human performance in the metaverse has been called into...
-
DOCA: a UAV-assisted multi-hop D2D resource allocation scheme for 5G and beyond using machine learning
Device-to-Device (D2D) relayed communication helps in extending the coverage range of cellular networks. Relay devices support multi-hop D2D...
-
A Taxonomy of Home Automation: Expert Perspectives on the Future of Smarter Homes
Recent advancements in digital technologies, including artificial intelligence (AI), Internet of Things (IoT), and information and communication...
-
An anonymous broadcasting system with accountability based on group signatures
Advanced anonymous communication schemes have been proposed to protect the privacy of network users, enabling them to communicate anonymously on the...
-
Fighting Fire with Fire: Combating Criminal Abuse of Cryptocurrency with a P2P Mindset
As part of the P2P sharing economy, cryptocurrencies offer both creative and criminal opportunities. To deal with offenders, solutions such as...
-
Data Ingestion Validation Through Stable Conditional Metrics with Ranking and Filtering
We introduce an advanced method for validating data quality, which is crucial for ensuring reliable analytics insights. Traditional data quality...