-
1
METHODICAL ASPECTS OF TEACHING EFFICIENCY IN SMART-UNIVERSITY
Published 2016-05-01Get full text
Article -
2
Beyond indicators, new methods in Smart city assessment
Published 2018-03-01“…That is why the elaboration of smart city assessment tools and performance measurement systems are needed in order to sort out real smart cities and effective smart city methods and solutions. …”
Get full text
Article -
3
RESEARCH STATUS OF SMART ROLLING BEARING MONITORING METHODS
Published 2021-01-01Get full text
Article -
4
Smart Data for Genomic Information Systems: the SILE Method
Published 2018-12-01“…Under such a Big Data problem perspective, they are forced to delve into a lake of complex data spread in over thousand heterogeneous repositories, represented in multiple formats and with different levels of quality; but when data are used to solve a concrete problem only a small part of that “data lake” is really significant; this is what we call the “smart” data perspective. By using conceptual models and the principles of data quality management, adapted to the genomic domain, we propose a systematic approach called SILE method to move from a Big Data to a Smart Data perspective. …”
Get full text
Article -
5
-
6
Authentication Method for Privacy Protection in Smart Grid Environment
Published 2014-01-01“…The purpose of this study is to analyze the security vulnerabilities and security requirement within smart grid and the authentication and access control method for privacy protection within home network. …”
Get full text
Article -
7
Digital advertising in smart cities – methods for raising consumer engagement
Published 2024-02-01“…The main objective is to propose methods for raising the efficiency of mobile ads with regard to their surrounding area. …”
Get full text
Article -
8
Pattern-Based Test Suite Reduction Method for Smart Contracts
Published 2025-01-01“…The article presents the test suite reduction method for smart contracts, which exploits the knowledge of their design manner. …”
Get full text
Article -
9
Thermal Runaway Detection Method for Smart Electric Bicycle Charger
Published 2025-01-01Get full text
Article -
10
Method of structural-parametric adaptation of "smart city" to digital economy
Published 2023-12-01“…The interaction between a "smart city" and digital economy can be explored and analyzed within the framework of the structural-parametric adaptation method. …”
Get full text
Article -
11
Smart Grids Data Aggregation Method on Paillier Homomorphic Encryption
Published 2024-12-01“…When the number of security parameters was 30,000, the encryption time required by this method was 21.71 seconds. When the number of smart meters (SMs) was 80, the signature verification time required by this method was 2.31 seconds.…”
Get full text
Article -
12
Smart contracts: the new method of interaction between the law and technology
Published 2024-12-01Get full text
Article -
13
RETRACTED: Automated method for assessing the degree of intellectualization in the “Smart City”
Published 2024-01-01Get full text
Article -
14
Model and construction method of the ontology of knowledge graph of smart city
Published 2020-03-01“…Specific to problems such as insufficient data resource sharing and difficulty in implementing artificial intelligence applications in the current construction process of smart cities,based on resource description framework of knowledge graph,ontology knowledge system carrier,and digital twins,a knowledge graph model of smart city with data of people as the core was proposed,and a construction method of ontology and sub-ontology in multi-domain knowledge graph supporting the model was also proposed.The idea of “sky,earth and people” model was innovatively proposed,which will play a positive role in how the data of smart city serve urban residents,how to implement artificial intelligence algorithm models and smart city applications.…”
Get full text
Article -
15
The Way of Yield Increasing and Cost Reducing in Agriculture: Smart Irrigation and Fertigation
Published 2018-10-01Get full text
Article -
16
An evaluation of methods for detecting false data injection attacks in the smart grid
Published 2024-12-01“…In this paper, we analyze four different false data injection attacks on PMU measurements and investigate different methods to detect such attacks. Classical bad data detection methods are not sufficient to detect stealthy attacks. …”
Get full text
Article -
17
Variable-Gain State-of-Charge Balancing Method for Smart Battery Packs
Published 2025-01-01“…In the variable-gain method, the control gain is adapted in real-time based on the instantaneous SOC deviation, enabling faster convergence without compromising dc-link voltage stability. …”
Get full text
Article -
18
-
19
Smart Fuzzing method based on comparison algorithm of control flow sequences
Published 2013-04-01“…Flowing the way introduced in the research of evolutionary fuzzing system (EFS),a smart fuzzing method was proposed based on the node comparison algorithm among control flow sequences.Through mapping program execution flow sequences onto the control flow sequences,the isomorphism relationship between dada search space and program logic space was established.The analyzed results prove that the method is capa of mining a mass of information from group data effectively,and is able to fully util ze the parallelism of genetic algorithm to guide the fuzzing test.…”
Get full text
Article -
20
Vulnerability detection method for blockchain smart contracts based on metamorphic testing
Published 2023-10-01“…Aimed at the defects of existing test methods, a vulnerability detection method for blockchain smart contracts based on metamorphic testing was proposed, which could generate test cases for specific functions in blockchain smart contracts to detect possible vulnerabilities.According to the possible security vulnerabilities, different metamorphosis relationships were designed and then metamorphic testing was performed.Through verifying whether the metamorphic relationship between the source test case and the subsequent test case was satisfied, whether the smart contract had related security vulnerabilities was judged.The experimental results show that the proposed method can effectively detect the security vulnerabilities in the smart contracts.…”
Get full text
Article