1,274 research outputs found

    Blockchain Technology for Enhancing Supply Chain Performance and Reducing the Threats Arising from the COVID-19 Pandemic

    Get PDF
    A rigorous examination of the most recent advancements in blockchain technology (BCT) and artificial intelligence (AI)-enabled supply chain networks is provided in this book. The edited book brings together the perspectives of a number of authors who have presented their most recent views on blockchain technology and its applications in a variety of disciplines. The submitted papers contribute to a better understanding of how blockchain technology can improve the efficacy of human activities during a pandemic, improve traceability and visibility in the automotive supply chain, support food safety and reliability through digitalisation of the food supply chain, and increase the performance of next-generation digital supply chains, among other things. The book attempts to address and prepare a way to address the complicated issues that supply chains are encountering as a result of the global pandemic

    Navigating Environmental Challenges through Supply Chain Quality Management 4.0 in Circular Economy: A Comprehensive Review

    Get PDF
    The infusion of circular economy (CE) principles into supply chain management has garnered significant attention from both scholars and industry professionals. Quality management and Industry 4.0 (SCQM 4.0) have emerged as central themes due to their potential to elevate supply chain efficiency and sustainability. In pursuit of this goal, a thorough literature review is conducted, with a specific focus on quality management within circular supply chains, placing a significant emphasis on Industry 4.0 (I4.0) technologies. By analyzing 126 papers spanning from 1998 to 2023, this systematic review discerns prevailing trends, identifies research gaps, and charts future avenues for investigation. These results highlight the growing academic interest in utilizing I4.0 technology to improve quality control in circular supply chains. SCQM 4.0 is thus proposed to aid in a better comprehension of Supply Chain Quality Management 4.0, which incorporates infrastructure practices rooted in various disruptive technologies and supply chain operations that link with sustainable performance with three key metrics of input management, waste handling, and preservation concentrating solely on the environmental aspect. Based on this research, we offer a four-tiered SCQM 4.0 practice path to achieve a CE

    SugarChain: Blockchain technology meets Agriculture -- The case study and analysis of the Indian sugarcane farming

    Full text link
    Not only in our country and Asia, but the agriculture sector is also lagging all over the world while using new technologies and innovations. Farmers are not getting the accurate price and compensation of their products because of several reasons. The intermediate persons or say middlemen are controlling the prices and product delivery on their own. Due to lack of education, technological advancement, market knowledge, post-harvesting processes, and middleman involvement, farmers are always deprived of their actual pay and efforts. The use of blockchain technology can help such farmers to automate the process with high trust. We have presented our case study and analysis for the Indian sugarcane farming with data collected from farmers. The system implementation, testing, and result analysis has been shown based on the case study. The overall purpose of our research is to emphasize and motivate the agricultural products and benefit the farmers with the use of blockchain technology.Comment: 17 page

    Cyber Security

    Get PDF
    This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security

    Configuring and Implementing IPS Solutions for IoT Devices using NST

    Get PDF
    The necessity to ensure that Internet of Things (IoT) networks are secure is one of the biggest issues that has arisen as a result of the growing demand for technology that uses the IoT. Considering how many gadgets are linked to the internet, safeguarding their networks is a growing worry. Due to the IoT's network's complexity and resource constraints, traditional intrusion detection systems encounter a number of problems. The main objectives of this project are to design, develop, and evaluate a hybrid level placement method for an IDS based on multi- agent systems, BC technology (Block-Chain), and DL algorithms (Deep Learning). The breakdown of data administration, data collection, analysis, and reaction into its component parts reveals the overall system design. The National Security Laboratory's knowledge discovery and data mining dataset is used to test the system as part of the validation procedure. These results demonstrate how deep learning algorithms are effective at identifying risks at the network and transport levels. The experiment shows that deep learning techniques function well when used to find intrusions in a network environment for the Internet of Things

    Blockchain applications in agribusiness: a systematic review

    Get PDF
    Blockchain is a technology that can be applied in different sectors to solve various problems. As a complex system, agribusiness presents many possibilities to take advantage of blockchain technology. The main goal of this paper is to identify the purposes for which blockchain has been applied in the agribusiness sector, for which a PRISMA-based systematic review was carried out. The scientific literature corpus was accessed and selected from Elsevier’s Scopus and ISI of Knowledge’s Web of Science (WoS) platforms, using the PRISMA protocol procedures. Seventy-one articles were selected for analysis. Blockchain application in agribusiness is a novel topic, with the first publication dating from 2016. The technological development prevails more than blockchain applications since it has been addressed mainly in the Computer Sciences and Engineering. Blockchain applications for agribusiness management of financial, energy, logistical, environmental, agricultural, livestock, and industrial purposes have been reported in the literature. The findings suggest that blockchain brings many benefits when used in agribusiness supply chains. We concluded that the research on blockchain applications in agribusiness is only at an early stage, as many prototypes are being developed and tested in the laboratory. In the near future, blockchain will be increasingly applied across all economic sectors, including agribusiness, promoting greater reliability and agility in information with a reduced cost. Several gaps for future studies were observed, with significant value for science, industry, and society

    Multi-Agent Systems and Complex Networks: Review and Applications in Systems Engineering

    Get PDF
    Systems engineering is an ubiquitous discipline of Engineering overlapping industrial, chemical, mechanical, manufacturing, control, software, electrical, and civil engineering. It provides tools for dealing with the complexity and dynamics related to the optimisation of physical, natural, and virtual systems management. This paper presents a review of how multi-agent systems and complex networks theory are brought together to address systems engineering and management problems. The review also encompasses current and future research directions both for theoretical fundamentals and applications in the industry. This is made by considering trends such as mesoscale, multiscale, and multilayer networks along with the state-of-art analysis on network dynamics and intelligent networks. Critical and smart infrastructure, manufacturing processes, and supply chain networks are instances of research topics for which this literature review is highly relevant

    IEEE Access Special Section Editorial: Big Data Technology and Applications in Intelligent Transportation

    Get PDF
    During the last few years, information technology and transportation industries, along with automotive manufacturers and academia, are focusing on leveraging intelligent transportation systems (ITS) to improve services related to driver experience, connected cars, Internet data plans for vehicles, traffic infrastructure, urban transportation systems, traffic collaborative management, road traffic accidents analysis, road traffic flow prediction, public transportation service plan, personal travel route plans, and the development of an effective ecosystem for vehicles, drivers, traffic controllers, city planners, and transportation applications. Moreover, the emerging technologies of the Internet of Things (IoT) and cloud computing have provided unprecedented opportunities for the development and realization of innovative intelligent transportation systems where sensors and mobile devices can gather information and cloud computing, allowing knowledge discovery, information sharing, and supported decision making. However, the development of such data-driven ITS requires the integration, processing, and analysis of plentiful information obtained from millions of vehicles, traffic infrastructures, smartphones, and other collaborative systems like weather stations and road safety and early warning systems. The huge amount of data generated by ITS devices is only of value if utilized in data analytics for decision-making such as accident prevention and detection, controlling road risks, reducing traffic carbon emissions, and other applications which bring big data analytics into the picture

    Cyber Security

    Get PDF
    This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security
    • …
    corecore