8 research outputs found

    Web3 Decentralized Business Models

    Get PDF
    This paper presents key characteristics of Web3 and how the traditional business model canvas (BMC) requires updates to support managers in the Web3 industry. The characteristics of Web3 include Dapps, wal- lets, interoperability, tokenization, distributed ownership, decentralized communities, creator economy, and token economy. This study investigates how a business model in Web3 is different from the traditional BMC by Osterwalder and Pigneur (2010) based on a Delphi study with a panel of eight experts from the Web3 industry. The contribution of the research outlines a nascent Web3 business model with nine building blocks, including two new blocks specific to the nascent Web3 business models: value co-creation and value distribution. Furthermore, the model expands on the blocks of community and customer, tokenomics, and incentive and reward structures.This paper presents key characteristics of Web3 and how the traditional business model canvas (BMC) requires update to support managers in the Web3 industry. The characteristics of Web3 include Dapps, wallets, interoperability, tokenization, distributed ownership, decentralized communities, creator economy, and token economy. This study investigates how a business model in Web3 is different from the traditional BMC by Osterwalder and Pigneur (2010) based on a Delphi study with a panel of eight experts from the Web3 industry. The contribution of the research outlines a nascent Web3 business model canvas with seven building blocks, which are complemented by two overarching components specific to the nascent Web3 business models: value co-creation and value distribution. Furthermore, the model expands on the blocks of community and customer, tokenomics, and incentive and reward structures

    Formalizing and safeguarding blockchain-based BlockVoke protocol as an ACME extension for fast certificate revocation

    Get PDF
    Certificates are integral to the security of today’s Internet. Protocols like BlockVoke allow secure, timely and efficient revocation of certificates that need to be invalidated. ACME, a scheme used by the non-profit Let’s Encrypt Certificate Authority to handle most parts of the certificate lifecycle, allows automatic and seamless certificate issuance. In this work, we bring together both protocols by describing and formalizing an extension of the ACME protocol to support BlockVoke, combining the benefits of ACME’s certificate lifecycle management and BlockVoke’s timely and secure revocations. We then formally verify this extension through formal methods such as Colored Petri Nets (CPNs) and conduct a risk and threat analysis of the ACME/BlockVoke extension using the ISSRM domain model. Identified risks and threats are mitigated to secure our novel extension. Furthermore, a proof-of-concept implementation of the ACME/BlockVoke extension is provided, bridging the gap towards deployment in the real world

    A bioinspired methodology based on an artificial immune system for damage detection in structural health monitoring

    Get PDF
    Among all the aspects that are linked to a structural health monitoring (SHM) system, algorithms, strategies, or methods for damage detection are currently playing an important role in improving the operational reliability of critical structures in several industrial sectors. This paper introduces a bioinspired strategy for the detection of structural changes using an artificial immune system (AIS) and a statistical data-driven modeling approach by means of a distributed piezoelectric active sensor network at different actuation phases. Damage detection and classification of structural changes using ultrasonic signals are traditionally performed using methods based on the time of flight. The approach followed in this paper is a data-based approach based on AIS, where sensor data fusion, feature extraction, and pattern recognition are evaluated. One of the key advantages of the proposed methodology is that the need to develop and validate a mathematical model is eliminated. The proposed methodology is applied, tested, and validated with data collected from two sections of an aircraft skin panel. The results show that the presented methodology is able to accurately detect damage.Postprint (published version

    Efektivní algoritmy pro problémy se sociálním vlivem u velkých sítí

    Get PDF
    In recent years, the dizzying explosion of data and information results from social networks with millions to billions of users, such as Facebook, YouTube, Twitter, and LinkedIn. Users can use online social networks (OSNs) to quickly trade information, communicate with other users, and keep their information up-to-date. The challenge of spreading information on social networks that arises in practice requires effective information management solutions, such as disseminating useful information, maximizing the influence of information transmission, and preventing disinformation, rumors, and viruses from being disseminated. Motivated by the above issues, we investigate the problem of information diffusion on OSNs. We study this problem based on two models, Independent Cascade (IC) and Linear Threshold (LT), and classical Influence Maximization (IM) in online social networks. In addition, we investigate various aspects of IM problems, such as budget variations, topics of interest, multiple competitors, and others. Moreover, we also investigate and apply the theory of combinatorial optimization problems to solve one of the current concerns in social networks, maximizing the influence on the groups and topics in social networks. In general, the main goals of the Ph.D thesis proposal are as follows. 1. We investigate the Multi-Threshold problem for IM, which is a variant of the IM problem with threshold constraints. We propose an efficient algorithm that IM for multiple thresholds in the social network. In particular, we develop a novel algorithmic framework that can use the solution to a smaller threshold to find that of larger ones. 2. We study the Group Influence Maximization problem and introduce an efficient group influence maximization algorithm with more advantages than each node’s influence in networks, using a novel sampling technique to estimate the epsilon group function. We also devised an approximation algorithm to estimate multiple candidate solutions with theoretical guarantee. 3. We investigate an approach for Influence Maximization problem with k-topic under constraints in social network. More specifically, we also study a streaming algorithm that combines an optimization algorithm to improve the approximation algorithm and theoretical guarantee in terms of solution quality and running time.V posledních letech je závratná exploze dat a informací výsledkem sociálních sítí s miliony až miliardami uživatelů, jako jsou Facebook, YouTube, Twitter a LinkedIn. Uživatelé mohou využívat online sociální sítě (OSNs) k rychlému obchodování s informacemi, komunikaci s ostatními uživateli a udržování jejich informací v aktuálním stavu. Výzva šíření informací na sociálních sítích, která se v praxi objevuje, vyžaduje efektivní řešení správy informací, jako je šíření užitečných informací, maximalizace vlivu přenosu informací a zabránění šíření dezinformací, fám a virů. Motivováni výše uvedenými problémy zkoumáme problém šíření informací na OSN. Tento problém studujeme na základě dvou modelů, Independent Cascade (IC) a Linear Threshold (LT) a klasické Influence Maximization (IM) v online sociálních sítích. Kromě toho zkoumáme různé aspekty problémů s rychlým zasíláním zpráv, jako jsou změny rozpočtu, témata zájmu, více konkurentů a další. Kromě toho také zkoumáme a aplikujeme teorii kombinatorických optimalizačních problémů k vyřešení jednoho ze současných problémů v sociálních sítích, maximalizujeme vliv na skupiny a témata v sociálních sítích. Obecně lze říci, že hlavní cíle Ph.D. návrh diplomové práce je následující. 1. Zkoumáme problém Multi-Threshold pro IM, což je varianta problému IM s prahovými omezeními. Navrhujeme účinný algoritmus, který IM pro více prahů v sociální síti. Zejména vyvíjíme nový algoritmický rámec, který může použít řešení pro menší práh k nalezení prahu většího. 2. Studujeme problém maximalizace vlivu skupiny a zavádíme účinný algoritmus maxima- lizace vlivu skupiny s více výhodami, než je vliv každého uzlu v sítích, pomocí nové vzorkovací techniky k odhadu funkce skupiny epsilon. Navrhujeme také aproximační algoritmus pro odhad více kandidátních řešení s teoretickou zárukou. 3. Zkoumáme přístup pro maximalizaci vlivu s k-téma pod omezeními v rozsáhlé síti. Konkrétněji budeme studovat novou metriku, která kombinuje optimalizační algoritmus pro zlepšení aproximačního algoritmu z hlediska kvality řešení a doby běhu na základě kliky a komunity v komplexních sítích.460 - Katedra informatikyvyhově

    Design and validation of structural health monitoring system based on bio-inspired algorithms

    Get PDF
    The need of ensure the proper performance of the structures in service has made of structural health monitoring (SHM) a priority research area. Researchers all around the world have focused efforts on the development of new ways to continuous monitoring the structures and analyze the data collected from the inspection process in order to provide information about the current state and avoid possible catastrophes. To perform an effective analysis of the data, the development of methodologies is crucial in order to assess the structures with a low computational cost and with a high reliability. These desirable features can be found in biological systems, and these can be emulated by means of computational systems. The use of bio-inspired algorithms is a recent approach that has demonstrated its effectiveness in data analysis in different areas. Since these algorithms are based in the emulation of biological systems that have demonstrated its effectiveness for several generations, it is possible to mimic the evolution process and its adaptability characteristics by using computational algorithms. Specially in pattern recognition, several algorithms have shown good performance. Some widely used examples are the neural networks, the fuzzy systems and the genetic algorithms. This thesis is concerned about the development of bio-inspired methodologies for structural damage detection and classification. This document is organized in five chapters. First, an overview of the problem statement, the objectives, general results, a brief theoretical background and the description of the different experimental setups are included in Chapter 1 (Introduction). Chapters 2 to 4 include the journal papers published by the author of this thesis. The discussion of the results, some conclusions and the future work can be found on Chapter 5. Finally, Appendix A includes other contributions such as a book chapter and some conference papers.La necesidad de asegurar el correcto funcionamiento de las estructuras en servicio ha hecho de la monitorización de la integridad estructural un área de gran interés. Investigadores en todas las partes del mundo centran sus esfuerzos en el desarrollo de nuevas formas de monitorización contínua de estructuras que permitan analizar e interpretar los datos recogidos durante el proceso de inspección con el objetivo de proveer información sobre el estado actual de la estructura y evitar posibles catástrofes. Para desarrollar un análisis efectivo de los datos, es necesario el desarrollo de metodologías para inspeccionar la estructura con un bajo coste computacional y alta fiabilidad. Estas características deseadas pueden ser encontradas en los sistemas biológicos y pueden ser emuladas mediante herramientas computacionales. El uso de algoritmos bio-inspirados es una reciente técnica que ha demostrado su efectividad en el análisis de datos en diferentes áreas. Dado que estos algoritmos se basan en la emulación de sistemas biológicos que han demostrado su efectividad a lo largo de muchas generaciones, es posible imitar el proceso de evolución y sus características de adaptabilidad al medio usando algoritmos computacionales. Esto es así, especialmente, en reconocimiento de patrones, donde muchos de estos algoritmos brindan excelentes resultados. Algunos ejemplos ampliamente usados son las redes neuronales, los sistemas fuzzy y los algoritmos genéticos. Esta tesis involucra el desarrollo de unas metodologías bio-inspiradas para la detección y clasificación de daños estructurales. El documento está organizado en cinco capítulos. En primer lugar, se incluye una descripción general del problema, los objetivos del trabajo, los resultados obtenidos, un breve marco conceptual y la descripción de los diferentes escenarios experimentales en el Capítulo 1 (Introducción). Los Capítulos 2 a 4 incluyen los artículos publicados en diferentes revistas indexadas. La revisión de los resultados, conclusiones y el trabajo futuro se encuentra en el Capítulo 5. Finalmente, el Anexo A incluye otras contribuciones tales como un capítulo de libro y algunos trabajos publicados en conferencias

    Managing Intellectual Property to Foster Agricultural Development

    Get PDF
    Over the past decades, consideration of IPRs has become increasingly important in many areas of agricultural development, including foreign direct investment, technology transfer, trade, investment in innovation, access to genetic resources, and the protection of traditional knowledge. The widening role of IPRs in governing the ownership of—and access to—innovation, information, and knowledge makes them particularly critical in ensuring that developing countries benefit from the introduction of new technologies that could radically alter the welfare of the poor. Failing to improve IPR policies and practices to support the needs of developing countries will eliminate significant development opportunities. The discussion in this note moves away from policy prescriptions to focus on investments to improve how IPRs are used in practice in agricultural development. These investments must be seen as complementary to other investments in agricultural development. IPRs are woven into the context of innovation and R&D. They can enable entrepreneurship and allow the leveraging of private resources for resolving the problems of poverty. Conversely, IPRs issues can delay important scientific advancements, deter investment in products for the poor, and impose crippling transaction costs on organizations if the wrong tools are used or tools are badly applied. The central benefit of pursuing the investments outlined in this note is to build into the system a more robust capacity for strategic and flexible use of IPRs tailored to development goals

    Conception d’un outil de gestion de la performance d’un système de gestion de la destination touristique

    Get PDF
    Cette recherche porte sur la performance des systèmes d’information inter organisationnels dans le domaine du tourisme et, plus particulièrement, sur la performance des systèmes d’information utilisés par les organismes de gestion de la destination touristique. La démarche suivie dans l’élaboration d’un outil d’évaluation de la performance d'un système de gestion de la destination représente la principale contribution de la thèse. Cet outil analyse les effets du système de gestion de la destination sur les processus opérationnels et de gestion et ensuite, établit un lien entre l’amélioration de ces processus et la satisfaction des détenteurs d’enjeux. L’outil d’évaluation de la performance du système de gestion de la destination devient un outil de gestion qui met en évidence les possibilités d’amélioration du système de gestion de la destination.Abstract: This research focuses on the performance of inter-organizational information systems in the field of tourism and, more specifically, on the performance of information systems used by destination management organizations (DMOs). The interest for these systems, the destination management systems (DMS), comes from the importance of investments and the challenges they represent for the tourism industry and for the development of the regional economy. Empirical research analysis revealed the limited success of DMS, the disappointing participation of tourism product suppliers and destination promoters in DMS, and the key challenges faced by managers at the destination management organization, resulting in the following managerial question: "How to help managers of tourist destinations manage the performance of a destination management system, taking into account the achievement of the objectives of the stakeholders? ". Given the diversity of its theoretical foundations, the research on the evaluation of information systems presents several models and still reports difficulties in assessing the impact of information technologies. To evaluate the performance of DMS, the conceptual framework of this thesis combines a process model of IS business value (Melville, Kraemer and Gurbaxani, 2004) with an integrated method of organizational performance measurement (Neely, Adams and Kennerley, 2002). The prism of the performance of Neely et al. (2002) was designed to take into account a significant number of stakeholders. The research framework was developed to produce rich data for discovery purposes. It uses an exploratory qualitative approach based on inductive reasoning and favors the case study method to answer a descriptive question. The choice of a single case with multiple groups (Embedded Case Study Research) facilitates a new understanding of the performance of a given DMS, from different perspectives, being those of the stakeholders involved. Twenty-six semi-structured interviews were conducted, of which eighteen were conducted within the DMO and eight were conducted with the tourist SMEs of the destination chosen for the study. The data were coded using CAQDAS Atlas.ti reflective software and aggregated using a matrix analysis. […
    corecore