A Comparative Study Of Blockchain Algorithms For Non-Fungible Token
In terms of performance, scalability, and latency, NFTs are a crucial implementation for humans no matter in cryptocurrency or digital asset ownership protection. However, there are some concerns for the community to consider before using NFTs technology universalness. The most important issue that...
| Main Author: | Woo, Jan Yin |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2023
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/40194/ http://umpir.ump.edu.my/id/eprint/40194/1/CA19079.pdf |
Similar Items
A Study on Non-Fungible Tokens Marketplace for Secure Management
by: Rishabh, Singh, et al.
Published: (2024)
by: Rishabh, Singh, et al.
Published: (2024)
The Decentralized Non-Fungible Token Exchange with Secure Connections
by: Sharath, M.S., et al.
Published: (2024)
by: Sharath, M.S., et al.
Published: (2024)
Consensus algorithms blockchain: a comparative
study
by: hattab, Siham, et al.
Published: (2019)
by: hattab, Siham, et al.
Published: (2019)
Non-Fungible Tokens (NFTs) in Islamic perspective: challenges and way forward
by: Azlin Alisa Ahmad,
Published: (2024)
by: Azlin Alisa Ahmad,
Published: (2024)
Biophasor: Token supplemented cancellable biometrics
by: Teoh, , Andrew B. J, et al.
Published: (2006)
by: Teoh, , Andrew B. J, et al.
Published: (2006)
The dimensioning of non-token-bucket parameters for efficient and reliable QoS routing decisions in bluetooth ad hoc network
by: Hasbullah, Halabi, et al.
Published: (2008)
by: Hasbullah, Halabi, et al.
Published: (2008)
The scalability challenge of the blockchain:
a review
by: Rahiman, Musharaf Unissa, et al.
Published: (2019)
by: Rahiman, Musharaf Unissa, et al.
Published: (2019)
Implementing traffic conditioner using token bucket and leaky bucket / Chia Kai Yan
by: Chia , Kai Yan
Published: (2004)
by: Chia , Kai Yan
Published: (2004)
Blockchain Security Hole: Issues and Solutions
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004)
by: Pang, Ying Han, et al.
Published: (2004)
Blockchain-enabled cybersecurity framework for healthcare domain
by: Islam, Md Shohidul
Published: (2025)
by: Islam, Md Shohidul
Published: (2025)
Application Of The Blockchain Technology Within Healthcare
by: Lin, Michelle Hwei Yee
Published: (2021)
by: Lin, Michelle Hwei Yee
Published: (2021)
Factors influencing the acceptance of blockchain technology: real estate industry
by: Ng, Claudia, et al.
Published: (2021)
by: Ng, Claudia, et al.
Published: (2021)
FSKKP inventory system using blockchain technology
by: Nurfazliyana, Arshad
Published: (2019)
by: Nurfazliyana, Arshad
Published: (2019)
Student attendance system using blockchain technology
by: Nur Syafiqa Nabilah, Mohd Sanosi
Published: (2019)
by: Nur Syafiqa Nabilah, Mohd Sanosi
Published: (2019)
Blockchain-enabled cybersecurity provision for scalable heterogeneous network: A comprehensive survey
by: Islam, Md. Shohidul, et al.
Published: (2024)
by: Islam, Md. Shohidul, et al.
Published: (2024)
Cohesive token passing algorithm utilizing software agents
by: Abdulrazzak, A. Fua’ad, et al.
Published: (2010)
by: Abdulrazzak, A. Fua’ad, et al.
Published: (2010)
Reducing Risks and Enhancing Security and Privacy in IoT-based Health Monitoring Application using Blockchain Technology
by: Chitra, Batumalai, et al.
Published: (2022)
by: Chitra, Batumalai, et al.
Published: (2022)
University E-voting System Utilizing Blockchain Technology and Zero-Knowledge Proofs
by: Lim, Aun Xian
Published: (2022)
by: Lim, Aun Xian
Published: (2022)
Energy efficiency of the bitcoin mining hardware and related blockchain technology
by: Noor Faiqah Izzati, Afandi
Published: (2018)
by: Noor Faiqah Izzati, Afandi
Published: (2018)
Blockchain-based Management for Organ Donation and Transplantation
by: Harish, V., et al.
Published: (2024)
by: Harish, V., et al.
Published: (2024)
An advanced and secure framework for conducting online examination using blockchain method
by: Sattar, Md Rahat Ibne, et al.
Published: (2023)
by: Sattar, Md Rahat Ibne, et al.
Published: (2023)
Comparative study on 4G/LTE cryptographic algorithms based on different factors
by: Ghanim, Alyaa, et al.
Published: (2014)
by: Ghanim, Alyaa, et al.
Published: (2014)
Comparative performance of machine learning algorithms for cryptocurrency forecasting
by: Hitam, Nor Azizah, et al.
Published: (2018)
by: Hitam, Nor Azizah, et al.
Published: (2018)
A comparative study of clonal selection algorithm for
effluent removal forecasting in septic sludge
treatment plant
by: Ting, Sie Chun, et al.
Published: (2015)
by: Ting, Sie Chun, et al.
Published: (2015)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
Multi-queue CPU Process Prioritization using a Dynamic Quantum Time Algorithm Compared with Varying Time Quantum and Round-Robin Algorithms
by: Mohammed, Maysoon A., et al.
Published: (2016)
by: Mohammed, Maysoon A., et al.
Published: (2016)
Comparative performance of deep learning and machine learning algorithms on imbalanced handwritten data
by: Amri, A’inur A’fifah, et al.
Published: (2018)
by: Amri, A’inur A’fifah, et al.
Published: (2018)
A refuse management system and blockchain: a practical view
by: Sham, Rohana, et al.
Published: (2020)
by: Sham, Rohana, et al.
Published: (2020)
The rise of “blockchain”: bibliometric analysis of blockchain study
by: Firdaus, Ahmad, et al.
Published: (2019)
by: Firdaus, Ahmad, et al.
Published: (2019)
A Comparative Study of FP-growth Variations
by: Aiman Moyaid, Said, et al.
Published: (2009)
by: Aiman Moyaid, Said, et al.
Published: (2009)
Lightweight block ciphers: A comparative study
by: Salim, Sufya, et al.
Published: (2012)
by: Salim, Sufya, et al.
Published: (2012)
Evaluating Technology (Social Media and Apps) And Blockchain for Cost-
Savings and Efficiencies in Event Management
by: Rakesh, Sarpal, et al.
Published: (2024)
by: Rakesh, Sarpal, et al.
Published: (2024)
An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption
by: Keshav Kumar, Choudhary, et al.
Published: (2024)
by: Keshav Kumar, Choudhary, et al.
Published: (2024)
A comparative study to analyze bone : CT data
by: Elfadil, Aboubaker Abbas
Published: (2008)
by: Elfadil, Aboubaker Abbas
Published: (2008)
Two Phase Shortest Path Algorithm for Non-Negative Undirected Graphs
by: Qureshi, MA., et al.
Published: (2010)
by: Qureshi, MA., et al.
Published: (2010)
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2021)
by: Noor Syahirah, Nordin, et al.
Published: (2021)
A comparative analysis of algorithms for fast computation of Zernike moments
by: Chong, C
Published: (2003)
by: Chong, C
Published: (2003)
A comparative study for outlier detection techniques in data mining
by: Bakar, Zuriana Abu, et al.
Published: (2006)
by: Bakar, Zuriana Abu, et al.
Published: (2006)
A O(|E|) Time Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs
by: Qureshi, M.A., et al.
Published: (2010)
by: Qureshi, M.A., et al.
Published: (2010)
Similar Items
-
A Study on Non-Fungible Tokens Marketplace for Secure Management
by: Rishabh, Singh, et al.
Published: (2024) -
The Decentralized Non-Fungible Token Exchange with Secure Connections
by: Sharath, M.S., et al.
Published: (2024) -
Consensus algorithms blockchain: a comparative
study
by: hattab, Siham, et al.
Published: (2019) -
Non-Fungible Tokens (NFTs) in Islamic perspective: challenges and way forward
by: Azlin Alisa Ahmad,
Published: (2024) -
Biophasor: Token supplemented cancellable biometrics
by: Teoh, , Andrew B. J, et al.
Published: (2006)