RH Logo
Hubs
About
Live
Leaderboard

My Hubs
All
ResearchHub Feeds
My Hubs
All

Trending Users

Author Profile Avatar
Eric Cuellar
Author Profile Avatar
Emeka A. Ezewudo
Author Profile Avatar
ayotune adebayo
Author Profile Avatar
Alejandro Escandon
Author Profile Avatar
David Goliat
Author Profile Avatar
Michael Princ
Author Profile Avatar
Anthony Jasmin
Author Profile Avatar
Titus Osikhiana Ogahbrai
Author Profile Avatar
Manav Gonyal
Author Profile Avatar
Khizar Hayat

Trending Papers in Computational Engineering, Finance, And Science

Trending
Today
Trending
Today

Sign in to discover all of the research papers you care about, live as they're published.

152
From Paper: Memory FORESHADOW: Memory FOREnSics of HArDware CryptOcurrency wallets – A Tool and Visualization Framework
Published: Sep 2020
From Paper: Memory FORESHADOW: Memory FOREnSics of HArDware CryptOcurrency wallets – A Tool and Visualization Framework
Published: Sep 2020
Nefarious actors are attracted to cryptocurrency because of its privacy focused properties. Anyone may view the full ledger of transactions due to the blockchain being public. However, linking a series of transactions to a given computer or individual can prove difficult with just this information.
Slide 1 of 1
  • Paper Preview Page 1
57
From Paper: Design of a dynamic key management plan for intelligent building energy management system based on wireless sensor network and blockchain technology
Published: Sep 2020
From Paper: Design of a dynamic key management plan for intelligent building energy management system based on wireless sensor network and blockchain technology
Published: Sep 2020
The blockchain integrates various computer technologies into a novel decentralized basic framework and distributed computing paradigm.
Slide 1 of 1
  • Paper Preview Page 1
0
Authors: M. Ileri, Atalay, et al
Published: Feb 2016
Authors: M. Ileri, Atalay, et al
Published: Feb 2016
Rate of growth of the amount of data generated using the high throughput sequencing (HTS) platforms now exceeds the growth stipulated by Moore's Law. The HTS data is expected to surpass those of other "big data" domains such as astronomy, before the year 2025. In addition to sequencing genomes for research purposes, genome and exome sequencing in clinical settings will be a routine part of health care. The analysis of such large amounts of data, however, is not without computational challenges. This burden is even more increased due to the periodic updates to reference genomes, which typically require re-analysis of existing data. Here we propose Coin-Application Mediator Interface (Coinami) to distribute the workload for mapping reads to reference genomes using a volunteer grid computer approach similar to Berkeley Open Infrastructure for Network Computing (BOINC). However, since HTS read mapping requires substantial computational resources and fast analysis turnout is desired, Coinami uses the HTS read mapping as proof-of-work to generate valid blocks to main its own cryptocurrency system, which may help motivate volunteers to dedicate more resources. The Coinami protocol includes mechanisms to ensure that jobs performed by volunteers are correct, and provides genomic data privacy. The prototype implementation of Coinami is available at http://coinami.github.io/.
3
Authors: Zhenjie Zhang, Yuanming Zhang, Jiawei Lu, Fei Gao, Gang Xiao
Published: Jun 2020
Authors: Zhenjie Zhang, Yuanming Zhang, Jiawei Lu, Fei Gao, Gang Xiao
Published: Jun 2020
In cloud manufacturing, manufacturing business processes are virtualized and encapsulated into manufacturing services. Enterprises can customize their manufacturing business applications on cloud manufacturing platform. To facilitate the customization, a global manufacturing business process is generally built and transformed into a feature model. However, since most global manufacturing business processes have a large number of nodes and complex dependency relationships, it is difficult to transform them into feature models. Therefore, we propose a novel complex manufacturing business process decomposition approach in cloud manufacturing. The approach is beneficial to construct a desired feature model. Firstly, combined with the domain engineering theory, the complex manufacturing business process customization approach in cloud manufacturing is elaborated. Secondly, the complex manufacturing business process decomposition approach is proposed. A global manufacturing business process network (GMBPN) is constructed according to the input and output relationships of manufacturing business activities. Based on the GMBPN, a two-phase decomposition algorithm is presented. In the community detection phase, the nodes in the GMBPN with functional similarity are clustered into the same community with an adaptive strategy. In the sub-process reconstruction phase, the corresponding sub-process is reconstructed in each community. We evaluate the decomposition algorithm with an actual elevator design business process. Experimental results show the proposed algorithm is effective to find the optimal decomposition results.
6
Authors: M. Takemiya, B. Vanieiev
Published: Jul 2018
Authors: M. Takemiya, B. Vanieiev
Published: Jul 2018
Therefore, a viable solution for digital identity should enable users to have full control over their personal information and share only the information that they wish to share with each service. Blockchain technology can help to realize a self-sovereign identity that puts the user in control of her information, by enabling a decentralized way to handle public key infrastructure.
Digital identity is the cornerstone of a digital economy. However, proving identity remotely is difficult to do. To complicate things further, identity is usually not a global, absolute construct, but the information shared with different parties differs, based on the relationship to the user.
22
Money velocity is difficult to measure in our existing system, which is why we represent it with a constant. However, being able to measure money velocity is critical for calculating inflation and assessing the influence of fiscal/monetary policies on consumer behavior. CBDCs enable regulators to have atomic metrics on money velocity to best inform decisions.
CBDCs can be used to programmatically enforce monetary policy at the cash level, instead of doing so through interest rates (loan level). For example, taxes or cash back can be done at purchase. Stimulus money spending can be limited to certain industries (e.g. food and hospitality) and given a time decay to incentivize immediate spending. Bespoke policies may be implemented that were not previously possible.
4
Authors: Jonathan Barend Schuchert, Jörg Lewald
Published: Nov 2020
Authors: Jonathan Barend Schuchert, Jörg Lewald
Published: Nov 2020
Computer game playing has been suggested to be an effective training to enhance perceptual and cognitive abilities. Focusing on potential improvements in auditory selective spatial attention induced by computer gaming, we compared a passive waiting-control group with two gaming groups, playing either a first-person audio-only action game requiring spatial attention and sound localization or a platform side-scroller video game without audiospatial components, which has been shown to improve cognitive performance in previous studies. Prior to and immediately after game training for 1 month for at least 30 min per day (total training time ≥15 h), healthy young adults were tested in an audiospatial task simulating a “cocktail-party” situation with multiple speakers at different positions. The proportion of correct target localizations was significantly increased after audio and video gaming compared with the control group. However, there were no significant differences between gaming groups, with similarly strong effects of action audio game and non-action video game trainings on auditory selective spatial attention. Thus, it seems as if successful training of “cocktail-party” listening can be induced not only by modality-specific near-transfer learning within the audiospatial domain, but also by far transfer of trained cognitive skills across sensory modalities, which may enhance domain-general processes supporting selective attention.
3
From Paper: Urban flood simulation based on the SWMM model
Published: May 2015
From Paper: Urban flood simulation based on the SWMM model
Published: May 2015
Flood forecasting is regarded as one of the important flood mitigation methods, and is widely used in catchment flood mitigation, but is not widely used in urban flooding mitigation. This paper, employing the SWMM model, one of the widely used urban flood planning and management models, simulates the urban flooding. The results show the SWMM model is promising for urban flood forecasting, but as it has no surface runoff routing, the urban flooding could not be forecast precisely.
3
Authors: Kowalska Beata, Kowalski Dariusz, Suchorab Paweł, Iwanek Małgorzata
Published: Jan 2018
Authors: Kowalska Beata, Kowalski Dariusz, Suchorab Paweł, Iwanek Małgorzata
Published: Jan 2018
Application of the automatic calibration, utilizing genetic algorithms for calculations, which is included in WaterGEMS software, enabled to reflect the actual conditions in a water supply networkbetter. Moreover, the possibility of using the automatic calibration module facilitates and accelerates the calibration process, which is required each time changes are introduced to the existing model.
3
Authors: Yiran Bai, Na Zhao, Ruoyu Zhang, Xiaofan Zeng
Published: Dec 2018
Authors: Yiran Bai, Na Zhao, Ruoyu Zhang, Xiaofan Zeng
Published: Dec 2018
In general, the combined model (infiltration + storage) performs better than any other scenarios in runoff reduction. The research shows that LID facilities can greatly mitigate flood, thus the urban flooding disasters caused by extreme rainstorms can be prevented.
Load More Papers