Zobrazeno 1 - 10
of 70
pro vyhledávání: '"Kentaroh Toyoda"'
Publikováno v:
IEEE Access, Vol 8, Pp 141611-141621 (2020)
Private Ethereum blockchain-based systems are demanded in many industry sectors. However, the throughput performance of these systems does not meet their expectations. Many researchers have analyzed the performance of private blockchains, but their s
Externí odkaz:
https://doaj.org/article/d25fea062b3443a6ad97a130370e6e06
Publikováno v:
IEEE Access, Vol 8, Pp 219744-219756 (2020)
Federated learning (FL) is a promising decentralized deep learning technique that allows users to collaboratively update models without sharing their own data. However, due to its decentralized nature, no one can monitor workers' behavior, and they m
Externí odkaz:
https://doaj.org/article/71eeca7998bf435a9d75c7985ea82274
Publikováno v:
Cryptography, Vol 6, Iss 4, p 57 (2022)
(1) Background: To solve the blockchain scaling issue, sharding has been proposed; however, this approach has its own scaling issue: the cross-shard communication method. To resolve the cross-shard communication scaling issue, rollups have been propo
Externí odkaz:
https://doaj.org/article/5599334628e64f0b92923498a653d9a0
Publikováno v:
IEEE Access, Vol 7, Pp 42726-42734 (2019)
Blink duration is one of the useful indicators to estimate drowsiness and fatigue. A Doppler sensor could be a key device to realize the non-contact blink duration estimation, which is very useful for the drowsiness and fatigue monitoring in real lif
Externí odkaz:
https://doaj.org/article/45e20f5f466b40f1b5b6798c53e9c03b
Publikováno v:
IEEE Access, Vol 7, Pp 74835-74848 (2019)
Bitcoin is one of the most popular decentralized cryptocurrencies to date. However, it has been widely reported that it can be used for investment scams, which are referred to as high yield investment programs (HYIP). Although from the security foren
Externí odkaz:
https://doaj.org/article/010cc123c53844fd897570feba20c13f
Publikováno v:
IEEE Access, Vol 6, Pp 60369-60379 (2018)
Demands for vital sign monitoring are increasing in the field of health care. In particular, the R-R Interval (RRI) estimation has been studied extensively, since the RRI variation is highly related with the stress of a subject. Various Doppler senso
Externí odkaz:
https://doaj.org/article/ac3e578b633e46b2958419fa7f140f14
Publikováno v:
IEEE Access, Vol 5, Pp 6746-6756 (2017)
Spam over Internet telephony (SPIT) is recognized as a new threat for voice communication services such as voice over Internet protocol (VoIP). Due to the privacy reason, it is desired to detect SPITters (SPIT callers) in a VoIP service without train
Externí odkaz:
https://doaj.org/article/dd2eb37eb34f416aa1a41b2a2acf7637
Publikováno v:
IEEE Access, Vol 5, Pp 17465-17477 (2017)
For more than a decade now, radio frequency identification (RFID) technology has been quite effective in providing anti-counterfeits measures in the supply chain. However, the genuineness of RFID tags cannot be guaranteed in the post supply chain, si
Externí odkaz:
https://doaj.org/article/5594b1ae06ee4a9fb36a6d9e68077001
Publikováno v:
Journal of Telecommunications and Information Technology, Iss 1 (2016)
Automatic Meter Reading (AMR) system is expected to be used for real time load monitoring to optimize power generation and energy efficiency. Recently, it has been a serious problem that user’s lifestyle may be revealed by a tool to estimate consum
Externí odkaz:
https://doaj.org/article/0e26d3f7c51142b5bc66d1244d966944
Publikováno v:
Journal of Telecommunications and Information Technology, Iss 3 (2014)
Recently, forest fire monitoring system in wireless sensor networks has received much attention. The conventional scheme receives fire alert data quickly to inform about fire forest event. However, since two or more nodes may detect a fire, high prio
Externí odkaz:
https://doaj.org/article/51626083732a4b48a5ce4c060a9ead49