-
601
Survey of the future network technology and trend
Published 2021-01-01“…Several typical technologies about the future network were introduced.First, the background of each technology were introduced.Then, the current research progress and main results of each technology were expounded from eight aspects: network control and orchestration, programmable network, deterministic network, network computing and storage integration, network with artificial intelligence, network with blockchain, intelligent security network, space network.Finally the development trends and challenges of each technology were analyzed.It was expected that by 2030, the future network will support trillion-level, human-machine, all-time-space, safe, and intelligent connections and services.It is hoped that it can provide references and help for future network research.…”
Get full text
Article -
602
Exploration of teaching method incorporating ideological elements for the cutting-edge technology of cyberspace security
Published 2019-06-01“…,quantum communication,public key infrastructure,physical layer security,blockchain,trusted computing and privacy protection.Apart from teaching the related technologies,the remarkable achievements and efforts of Chinese scientists were shown and the future work was indicated.Students are grouped to do literature research,expand their knowledge,exchange the learning experience and explore the law of scientific research in these new aspects.Students can not only absorb the knowledge of cutting-edge technology,but also learn the method and spirit to address scientific problems.A useful reference for education and teaching method of course ideological for graduate students was provided.…”
Get full text
Article -
603
Nicolas Laurence, La contestation portée par les innovations monétaires comme moteur de changement institutionnel. Le cas des monnaies locales et des cryptomonnaies
Published 2022-12-01“…Local currencies convey a monetary contestation focused on social aspects and ecology at the territorial and local level, while cryptocurrencies, whose Bitcoin is the most emblematic initiative, thanks to the blockchain technology, contest the monetary system by offering transnational alternatives. …”
Get full text
Article -
604
Analysis and suggestions on the development of IoT technology
Published 2020-12-01“…The Internet of things (IoT) has been developing for a decade in China,which has rapidly evolved from the early sensor network technology,radio frequency identification (RFID) technology to the intelligent networking technology based on 5G.The Internet of everything is coming to our life.The application of IoT has also been gradually and comprehensively applied in from the area of financial IC card to the industry,government affairs,transportation,health care,education,and etc.The development of the IoT hot technologies represented by 5G and low-power wide-area network (LPWAN),and the deep integration of blockchain,edge computing and other technologies with the IoT,comprehensively promote the deep application of the IoT in the industry,which brings great development opportunities to all the industry.It was focused on the analysis of the status of 5G,IoT identification,edge computing,LPWAN,security technology,and etc.The development tendency of the IoT was also forecasted,and the corresponding policy suggestion to promote the development of IoT was put forward.…”
Get full text
Article -
605
Key technologies of 6G mobile network
Published 2022-07-01“…., were summarized.Finally, based on the summary, main problems of the four technologies were proposed for the future development.Besides, other candidate technologies of 6G network, including integrated sensing and communication, reconfigurable intelligence surface and new materials, blockchain, digital twin, and deterministic network technology, etc., were briefly discussed in the conclusion part.…”
Get full text
Article -
606
Assessment of the Distributed Ledger Technology for Energy Sector Industrial and Operational Applications Using the MITRE ATT&CK® ICS Matrix
Published 2023-01-01“…In recent times, Distributed Ledger Technology (DLT) has gained significant attention for its potential application in the energy sector. Utilizing blockchain and DLT has demonstrated the ability to enhance the resilience of the electric infrastructure, which will support a more flexible infrastructure and advance grid modernization. …”
Get full text
Article -
607
Digital solutions in the activities of small logistics enterprises (on the example of the Sverdlovsk region)
Published 2024-10-01“…The introduction of information technologies such as the Internet of Things, blockchain, sustainability technologies, robotization, big data analysis and artificial intelligence significantly allows to increase the efficiency of logistics companies, optimize routes and improve inventory management. …”
Get full text
Article -
608
Metaverso, Digital Twins e diritti fondamentali
Published 2024-07-01“…Il diritto deve affrontare la regolazione del metaverso, essendo alle porte la diffusione del web 4.0: la quarta generazione del World Wide Web che, utilizzando l'intelligenza artificiale e ambientale avanzata, l’Internet delle cose, le transazioni blockchain affidabili, i mondi virtuali e le funzionalità XR, permette agli oggetti e agli ambienti digitali e reali di integrarsi completamente e di comunicare tra loro; promette di consentire esperienze realmente intuitive e immersive, fondendo senza soluzione di continuità il mondo fisico e quello digitale. …”
Get full text
Article -
609
Digital and circularity in building. KETs for waste management in the European Union
Published 2023-06-01“… The article analyses the potential and limitations of using enabling technologies of the digital transition for construction and demolition waste in construction management (BIM, GIS, Virtual and Augmented Reality, Digital Manufacturing, Blockchain, Internet of Things, Digital Twin, Artificial Intelligence) in the context of the European Union. …”
Get full text
Article -
610
Possibilities of implementing smart contracts in the rent-a-car sector
Published 2024-01-01“…The paper presents the possibilities of applying blockchain technology and smart contracts in the rent-a-car sector of tourism. …”
Get full text
Article -
611
Two-layer grouped Byzantine fault tolerance algorithm for UAV swarm
Published 2022-01-01“…To reduce the communication complexity and improve the robustness of blockchain network, a two-layer grouped Byzantine fault tolerance algorithm for unmanned ariel vehicle (UAV) swarm was proposed.First, nodes were divided into several groups according to the formation results of UAV swarm.A portion of high-reputation nodes were selected from each group to form a committee, and other nodes were used as shared nodes.Threshold signature techniques were employed to reduce communication complexity.In that way, nodes from other groups only needed to communicate with the committee nodes of the current group, thus greatly reducing the average communication delay.In addition, the hierarchical structure, which made the identity of the primary node hidden in the committee, reduced the risk of being adaptively attacked by the Byzantine nodes and improves the robustness of the system.Experimental results demonstrates that the proposed algorithm significantly reduces the delay of the consensus process and can effectively ensure the aliveness of the system compared with the comparison algorithm.…”
Get full text
Article -
612
High-speed hardware architecture design and implementation of Ed25519 signature verification algorithm
Published 2022-03-01“…Aiming at the high performance requirements of signature verification for specific scenarios such as blockchain, a high-speed hardware architecture of Ed25519 was proposed.To reduce the number of calculations for point addition and point double, a multiple point multiplication algorithm based on interleaving NAF was conducted by using pre-computation and lookup tables.The modular multiplication operation was realized by using the Karatsuba multiplication and fast reduction method, and the point addition and point double operation was designed without modular addition and subtraction, which could effectively improve the performance of point addition and point double.Given that modular exponentiation was the most time-consuming operation in the decompression process, a new modular exponentiation approach was developed by parallelizing modular inverse and modular multiplication, and therefore the performance of the de-compression operation could be improved.The proposed architecture fully considers the use of resources and is implemented on the Zynq-7020 FPGA platform with 13 695 slices, achieving 8 347 verifications per second at 81.6 MHz.…”
Get full text
Article -
613
PENERAPAN ARTIFICIAL INTELLIGENCE (AI) DALAM PERAMALAN AKUNTANSI TINJAUAN LITERATUR DAN AGENDA PENELITIAN MASA DEPAN
Published 2025-01-01“…Development opportunities are identified in blockchain integration, hybrid models, and preprocessing automation. …”
Get full text
Article -
614
Evaluation of Crypto Assets in terms of Digital Legacy Dimension and Inheritance Tax
Published 2024-06-01“…Internet technology, which has become an indispensable part of human life after the acceleration of the digitalisation process, shopping applications, social media accounts, cloud computing and finally cryptocurrencies with blockchain technology have opened the doors to an almost completely digital world. …”
Get full text
Article -
615
Secure and efficient two-party ECDSA signature scheme
Published 2021-02-01“…To solve the easy disclosure of signature private key and excessive concentration of signature rights, a secure and efficient two-party ECDSA signature scheme was proposed for the blockchain based network trading systems.By pre-computing one-time pad Beaver’s triple, and utilizing the Beaver’s triple based secure two-party multiplication technology, some computationally intensive homomorphic encryption operations and oblivious transfer operations with high communication overhead were effectively avoided, and thereby an efficient two-party ECDSA signing was realized, which could ensure that the two signing parties output valid ECDSA signature without reconstructing the complete private key.The proposed scheme was proved to be provably secure under the hybrid model of the universally composable framework.Theoretical analysis and simulation results demonstrate that the proposed scheme has significant advantages in terms of signing efficiency and bandwidth requirements when compared with the existing two two-party ECDSA signature schemes.…”
Get full text
Article -
616
Digital technologies: drivers of economic growth during COVID-19 pandemic
Published 2022-05-01“…It was revealed that cloud technologies, digital platforms and blockchain technologies can act as the main drivers of the growth of the pandemic economy. …”
Get full text
Article -
617
Verifiable access control scheme based on unpaired CP-ABE in fog computing
Published 2021-08-01“…Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.…”
Get full text
Article -
618
Artificial intelligence in green management and sustainability: A bibliometric survey
Published 2025-01-01“…The results show that the focus of AI and sustainability research has shifted from, for example, water management to broader environmental concerns and then to new analytical tools such as deep learning and blockchain. The most prolific and collaborative researchers come from India, China and the US and publish in already established international journals. …”
Get full text
Article -
619
Driving Competitive Edge in Sarawak's Manufacturing Industry: Leveraging Supply Chain Management, Smart Integration, and Circular Economy Practices
Published 2024-12-01“…Key technologies like AI, blockchain, and IoT should be adopted to create faster, cost-efficient, customer-centric processes and products. …”
Get full text
Article -
620
Survey on the causal consistency of data
Published 2020-03-01“…Causal consistency is one of the important projects to ensure data consistency in distributed storage.The current research focuses on causal consistency including optimization of clock method,design of the protocol and the optimization of operation transaction sequence.In the actual cloud environment,in addition to clock skew and query amplification,there are also insecure factors such as Trojans and untrusted third parties,which will destroy the causal consistency metadata stored by users,and the consistency of user’s operating results,even affect the availability of the storage environment.From the perspective of performance improvement and security in distributed storage,the clock synchronization,data replications,analysis and design of server protocol,related research progress of the serialization of operational affairs were introduced combined with consensus mechanisms such as blockchain.At the same time,their principlest,advantages,limitations,and different utilities in terms of security constraints were discussed,and then the future development trends and follow-up research directions were point out at last,which would provide a reference and help for the research in this field.…”
Get full text
Article