Showing 1 - 20 results of 6,470 for search 'smart (method OR methods)', query time: 0.17s Refine Results
  1. 1
  2. 2

    Beyond indicators, new methods in Smart city assessment by Boglárka BARSI

    Published 2018-03-01
    “…That is why the elaboration of smart city assessment tools and performance measurement systems are needed in order to sort out real smart cities and effective smart city methods and solutions. …”
    Get full text
    Article
  3. 3
  4. 4

    Smart Data for Genomic Information Systems: the SILE Method by Ana León Palacio, Óscar Pastor López

    Published 2018-12-01
    “…Under such a Big Data problem perspective, they are forced to delve into a lake of complex data spread in over thousand heterogeneous repositories, represented in multiple formats and with different levels of quality; but when data are used to solve a concrete problem only a small part of that “data lake” is really significant; this is what we call the “smart” data perspective. By using conceptual models and the principles of data quality management, adapted to the genomic domain, we propose a systematic approach called SILE method to move from a Big Data to a Smart Data perspective. …”
    Get full text
    Article
  5. 5
  6. 6

    Authentication Method for Privacy Protection in Smart Grid Environment by Do-Eun Cho, Sang-Soo Yeo, Si-Jung Kim

    Published 2014-01-01
    “…The purpose of this study is to analyze the security vulnerabilities and security requirement within smart grid and the authentication and access control method for privacy protection within home network. …”
    Get full text
    Article
  7. 7

    Digital advertising in smart cities – methods for raising consumer engagement by Nikola VANGELOV

    Published 2024-02-01
    “…The main objective is to propose methods for raising the efficiency of mobile ads with regard to their surrounding area. …”
    Get full text
    Article
  8. 8

    Pattern-Based Test Suite Reduction Method for Smart Contracts by Tomasz Górski

    Published 2025-01-01
    “…The article presents the test suite reduction method for smart contracts, which exploits the knowledge of their design manner. …”
    Get full text
    Article
  9. 9
  10. 10

    Method of structural-parametric adaptation of "smart city" to digital economy by K. A. Radkevich, S. V. Kruglikov

    Published 2023-12-01
    “…The interaction between a "smart city" and digital economy can be explored and analyzed within the framework of the structural-parametric adaptation method. …”
    Get full text
    Article
  11. 11

    Smart Grids Data Aggregation Method on Paillier Homomorphic Encryption by Shaodong Zhao

    Published 2024-12-01
    “…When the number of security parameters was 30,000, the encryption time required by this method was 21.71 seconds. When the number of smart meters (SMs) was 80, the signature verification time required by this method was 2.31 seconds.…”
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Model and construction method of the ontology of knowledge graph of smart city by Genlin ZANG, Yaqiang WANG, Qingrong WU, Chunli ZHAN, Yi LI

    Published 2020-03-01
    “…Specific to problems such as insufficient data resource sharing and difficulty in implementing artificial intelligence applications in the current construction process of smart cities,based on resource description framework of knowledge graph,ontology knowledge system carrier,and digital twins,a knowledge graph model of smart city with data of people as the core was proposed,and a construction method of ontology and sub-ontology in multi-domain knowledge graph supporting the model was also proposed.The idea of “sky,earth and people” model was innovatively proposed,which will play a positive role in how the data of smart city serve urban residents,how to implement artificial intelligence algorithm models and smart city applications.…”
    Get full text
    Article
  15. 15
  16. 16

    An evaluation of methods for detecting false data injection attacks in the smart grid by Sarita Paudel

    Published 2024-12-01
    “…In this paper, we analyze four different false data injection attacks on PMU measurements and investigate different methods to detect such attacks. Classical bad data detection methods are not sufficient to detect stealthy attacks. …”
    Get full text
    Article
  17. 17

    Variable-Gain State-of-Charge Balancing Method for Smart Battery Packs by Jonathan Silva de Oliveira, Bruno de Araujo Coutinho, Pedro Ivo de Oliveira Tironi, Allan Fagner Cupertino, Erick Matheus da Silveira Brito, Heverton Augusto Pereira

    Published 2025-01-01
    “…In the variable-gain method, the control gain is adapted in real-time based on the instantaneous SOC deviation, enabling faster convergence without compromising dc-link voltage stability. …”
    Get full text
    Article
  18. 18
  19. 19

    Smart Fuzzing method based on comparison algorithm of control flow sequences by Ying WANG, Yi-xian YANG, Xin-xin NIU, Li-ze GU

    Published 2013-04-01
    “…Flowing the way introduced in the research of evolutionary fuzzing system (EFS),a smart fuzzing method was proposed based on the node comparison algorithm among control flow sequences.Through mapping program execution flow sequences onto the control flow sequences,the isomorphism relationship between dada search space and program logic space was established.The analyzed results prove that the method is capa of mining a mass of information from group data effectively,and is able to fully util ze the parallelism of genetic algorithm to guide the fuzzing test.…”
    Get full text
    Article
  20. 20

    Vulnerability detection method for blockchain smart contracts based on metamorphic testing by Jinfu CHEN, Zhenxin WANG, Saihua CAI, Qiaowei FENG, Yuhao CHEN, Rongtian XU, KwakuKudjo Patrick

    Published 2023-10-01
    “…Aimed at the defects of existing test methods, a vulnerability detection method for blockchain smart contracts based on metamorphic testing was proposed, which could generate test cases for specific functions in blockchain smart contracts to detect possible vulnerabilities.According to the possible security vulnerabilities, different metamorphosis relationships were designed and then metamorphic testing was performed.Through verifying whether the metamorphic relationship between the source test case and the subsequent test case was satisfied, whether the smart contract had related security vulnerabilities was judged.The experimental results show that the proposed method can effectively detect the security vulnerabilities in the smart contracts.…”
    Get full text
    Article