GUISE 发表于 2025-3-28 17:36:18
Conference proceedings 20222021. Due to COVID-19 pandemic the conference was held virtually.. With the globalization of trade and transportation and the consequent multi-modal solutions used, additional challenges are faced by organizations and countries. Intelligent Transport Systems make transport safer, more efficient, and打包 发表于 2025-3-28 21:14:22
http://reply.papertrans.cn/48/4702/470137/470137_42.pngEssential 发表于 2025-3-29 01:55:24
Wine Traceability and Counterfeit Reduction: Blockchain-Based Application for a Wine Supply Chainis making a decision to purchase the wine. This application shows the enormous potential of blockchain technology to reduce counterfeiting levels and assure the final consumer with the origin of the wine, potentially avoiding health risks that counterfeit wine can cause, and thus increasing the wine brand reputation.harbinger 发表于 2025-3-29 05:19:24
Enabling Citizen-Centric ITS Services Through Blockchain and Human Incentivesrs can lead to the optimization of such indicators. The accumulated incentives are registered in a Blockchain network in order to ensure the unchanging and reliable registration of route proposals accepted by drivers. Additionally, we describe an application developed as a proof of concept and as a basis for future work.Reverie 发表于 2025-3-29 09:27:49
http://reply.papertrans.cn/48/4702/470137/470137_45.png弯曲的人 发表于 2025-3-29 13:02:20
http://reply.papertrans.cn/48/4702/470137/470137_46.pngjudicial 发表于 2025-3-29 17:58:16
http://reply.papertrans.cn/48/4702/470137/470137_47.png盟军 发表于 2025-3-29 21:56:13
http://reply.papertrans.cn/48/4702/470137/470137_48.png流出 发表于 2025-3-30 00:52:34
http://reply.papertrans.cn/48/4702/470137/470137_49.png细胞 发表于 2025-3-30 05:10:57
Louis Calvin Touko Tcheumadjeu,Katrin Stuerz-Mutalibow,Janis Hoeing,Dennis Harmann,Julian Glaab,Robe. Our experimental results demonstrate that the proposed attack can be implemented to successfully compromise the existing forensic methods with 100% probability for non-flat videos while producing the high quality content. The results indicate the need for attack-prone video source camera identific