信息工程最新文献

筛选
英文 中文
Blockchain-based refurbishment certification system for enhancing the circular economy 基于区块链的翻新认证系统促进循环经济发展
IF 5.6 3区 计算机科学
Blockchain-Research and Applications Pub Date : 2024-03-01 DOI: 10.1016/j.bcra.2023.100172
Cristina Regueiro , Aitor Gómez-Goiri , Nuno Pedrosa , Christos Semertzidis , Eider Iturbe , Jason Mansell
{"title":"Blockchain-based refurbishment certification system for enhancing the circular economy","authors":"Cristina Regueiro ,&nbsp;Aitor Gómez-Goiri ,&nbsp;Nuno Pedrosa ,&nbsp;Christos Semertzidis ,&nbsp;Eider Iturbe ,&nbsp;Jason Mansell","doi":"10.1016/j.bcra.2023.100172","DOIUrl":"10.1016/j.bcra.2023.100172","url":null,"abstract":"<div><p>As the global population continues to grow, the enormous stress on our environment and resources is becoming impossible to ignore. A focus on producing and consuming as cheaply as possible has created an economy in which objects are briefly used and then discarded as waste, featuring a linear lifecycle that creates an enormous amount of waste. The alternative to the linear economy “take-make-waste” is called the “circular economy”. Under this paradigm, materials are recycled to build new products or components that are designed and built to promote their reuse and refurbishment. This assures the continuous (re-)exploitation of existing resources, reducing the extraction of new raw materials. However, customers often reject these reused or refurbished products under the suspicion that they do not meet the same usability, safety, or performance levels of new products. In this sense, trustworthy records of historical details of refurbished products could increase consumers’ confidence in products and components of the “circular economy”, prioritizing trustworthiness, reliability, and transparency. This work presents a new certification tool based on blockchain technology to guarantee trusted, accurate, transparent, and traceable lifecycle information of products and their components and to generate trustworthy certificates to probe refurbished product historical details. This tool aims to enhance refurbished product visibility by creating the basis for making the circular economy a reality in any domain.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000477/pdfft?md5=36bb137d913f9ca6646ddf6645fa26d7&pid=1-s2.0-S2096720923000477-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139303585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BrickOS: specialized kernels for heterogeneous hardware resources BrickOS:针对异构硬件资源的专用内核
Scientia Sinica Informationis Pub Date : 2024-03-01 DOI: 10.1360/ssi-2022-0413
Jinyu Gu, Hao Li, Yubin Xia, Haibing Guan, Zuohua Ding, Yongwang Zhao, Haibo Chen
{"title":"BrickOS: specialized kernels for heterogeneous hardware resources","authors":"Jinyu Gu, Hao Li, Yubin Xia, Haibing Guan, Zuohua Ding, Yongwang Zhao, Haibo Chen","doi":"10.1360/ssi-2022-0413","DOIUrl":"https://doi.org/10.1360/ssi-2022-0413","url":null,"abstract":"The emerging field of human-machine-material integration requires new operating system kernels to support the ubiquitous computing, so as to manage and control massive heterogeneous hardware and serve dynamic and changeable application scenarios. This paper proposes a configurable specialized kernel architecture, named BrickOS, which can flexibly select the system components of the kernel according to the usage scenario. Developers can choose to run the system components in user mode to provide better security, or run in a shared-address-space kernel mode to improve performance. In order to ensure the security of system components running in the same address space, BrickOS provides a unified abstraction for the memory protection mechanism of the underlying hardware used for memory isolation in a single address space. The test results show that BrickOS can generate customized kernels that meet the requirements for different scenarios, with low inter-process call (IPC) overhead and good overall performance.","PeriodicalId":52316,"journal":{"name":"Scientia Sinica Informationis","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140280185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development and assessment of cutting-edge biotechnologies 开发和评估尖端生物技术
Journal of Biosafety and Biosecurity Pub Date : 2024-03-01 DOI: 10.1016/j.jobb.2024.03.001
Xiaofeng Hu , Baichuan Xu , Mingliang Chen , Kexin Li , Yang Xiao , Shengnan Liang , Chuanfu Zhang , Hui Ma , Hongbin Song
{"title":"Development and assessment of cutting-edge biotechnologies","authors":"Xiaofeng Hu ,&nbsp;Baichuan Xu ,&nbsp;Mingliang Chen ,&nbsp;Kexin Li ,&nbsp;Yang Xiao ,&nbsp;Shengnan Liang ,&nbsp;Chuanfu Zhang ,&nbsp;Hui Ma ,&nbsp;Hongbin Song","doi":"10.1016/j.jobb.2024.03.001","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.03.001","url":null,"abstract":"<div><p>The emergence of advanced biotechnologies has intensified in recent years. The rapid development of these biotechnologies has had a wide and profound impact globally, with the majority on the frontier of biosecurity technologies. The global biosecurity situation is currently highly challenging, with the characteristics of internationalization, extremely serious harm, and complex development. The misuse and abuse of biotechnologies are common, which thereby endanger biosecurity. The international community and governments have attached great importance to cutting-edge biotechnologies and are implementing laws and regulations to control and prevent biosecurity-related influences. By tracking the frontier progress of the new technologies generated from gene editing, gene drives, synthetic biology, and related cross-disciplines as applied in the biosecurity field, we analyzed the development trends in biotechnologies and their potential influence. On the one hand, this paper proposes that there is an urgent need for global cooperation to formulate management, control strategies, and measures for cutting-edge technologies in biosecurity to jointly promote their sound development. On the other hand, the international community should jointly shoulder the responsibility for safeguarding biosecurity and restrict the biotechnologies to rational applications within legal and ethical frameworks. This paper aims to provide a reference for the prevention of misuse and abuse of biotechnologies and support global cooperation in biosecurity governance.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000074/pdfft?md5=9abbd3566fd8f9b379370669cf9d0310&pid=1-s2.0-S2588933824000074-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140309764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain for secure and decentralized artificial intelligence in cybersecurity: A comprehensive review 区块链用于网络安全中的安全和去中心化人工智能:全面回顾
IF 6.9 3区 计算机科学
Blockchain-Research and Applications Pub Date : 2024-02-29 DOI: 10.1016/j.bcra.2024.100193
{"title":"Blockchain for secure and decentralized artificial intelligence in cybersecurity: A comprehensive review","authors":"","doi":"10.1016/j.bcra.2024.100193","DOIUrl":"10.1016/j.bcra.2024.100193","url":null,"abstract":"<div><p>As the use of artificial intelligence (AI) grows within the field of cybersecurity, so does the demand for secure and decentralized AI systems to protect against potential cyber threats. Blockchain technology has emerged as the ideal approach for increasing both the security and privacy of AI systems since it provides decentralized and immutable data storage. This systematic literature review focuses on the integration of blockchain technology with decentralized AI within cybersecurity. It provides a comprehensive taxonomy of blockchain technology and decentralized AI for cybersecurity, serving as the starting point for the study. This paper begins with an overview of blockchain technology and its possible uses in cybersecurity and also analyzes its challenges and opportunities. Decentralized AI is also covered in the study, along with its potential advantages and difficulties in decentralized AI cybersecurity. Building on that foundation, this study provides convincing findings highlighting the beneficial relationships between blockchain technology and decentralized AI for cybersecurity, contributing to a nuanced comprehension of their integration. Moreover, it offers real-world uses of blockchain-enabled, decentralized AI to discuss its usefulness in tackling cybersecurity concerns. Finally, this paper discusses future research directions for blockchain-enabled decentralized AI in cybersecurity, including potential applications and implications of this technology in the field, emphasizing the potential of blockchain-enabled decentralized AI in cybersecurity to enhance security, privacy, and trust in AI systems.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S209672092400006X/pdfft?md5=3fe5d5283406aab834399c6c4a38dcd5&pid=1-s2.0-S209672092400006X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140465891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The barriers to sustainable risk transfer in the cyber-insurance market 网络保险市场可持续风险转移的障碍
IF 3.9
Journal of Cybersecurity Pub Date : 2024-02-20 DOI: 10.1093/cybsec/tyae003
Henry R K Skeoch, Christos Ioannidis
{"title":"The barriers to sustainable risk transfer in the cyber-insurance market","authors":"Henry R K Skeoch, Christos Ioannidis","doi":"10.1093/cybsec/tyae003","DOIUrl":"https://doi.org/10.1093/cybsec/tyae003","url":null,"abstract":"Efficient risk transfer is an important condition for ensuring the sustainability of a market according to the established economics literature. In an inefficient market, significant financial imbalances may develop and potentially jeopardize the solvency of some market participants. The constantly evolving nature of cyber-threats and lack of public data sharing mean that the economic conditions required for quoted cyber-insurance premiums to be considered efficient are highly unlikely to be met. This paper develops Monte Carlo simulations of an artificial cyber-insurance market and compares the efficient and inefficient outcomes based on the informational setup between the market participants. The existence of diverse loss distributions is justified by the dynamic nature of cyber-threats and the absence of any reliable and centralized incident reporting. It is shown that the limited involvement of reinsurers when loss expectations are not shared leads to increased premiums and lower overall capacity. This suggests that the sustainability of the cyber-insurance market requires both better data sharing and external sources of risk tolerant capital.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139945993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Behind the curve: technology challenges facing the homeland intelligence and counterterrorism workforce 曲线背后:国土情报和反恐工作人员面临的技术挑战
IF 3.9
Journal of Cybersecurity Pub Date : 2024-02-07 DOI: 10.1093/cybsec/tyae002
Michelle Black, Lana Obradovic, Deanna House
{"title":"Behind the curve: technology challenges facing the homeland intelligence and counterterrorism workforce","authors":"Michelle Black, Lana Obradovic, Deanna House","doi":"10.1093/cybsec/tyae002","DOIUrl":"https://doi.org/10.1093/cybsec/tyae002","url":null,"abstract":"Those charged with protecting the homeland through intelligence analysis, particularly in counterterrorism, must be capable of rapidly adopting innovative technologies to detect and prevent exploitation and disruption of vulnerable critical infrastructures. However, implementing these responses requires a highly skilled technical workforce that is continually provided with timely educational and training programs. Yet, questions remain regarding the technical aptitude necessary to respond to today’s terrorism threats and the Department of Homeland Security’s ability to provide consistent and rigorous standards for technology training and education. By surveying analysts, we examine what, if any, educational and training programs have been provided to adapt and remain technologically competitive and effectively utilize emerging technologies. We find a distinct need to focus on improvements that involve clarifying terms, building a technology and cybersecurity roadmap for analysts, allocating additional training time for employees, and building partnerships with private industry.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139773215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emerging bedaquiline resistance: A threat to the global fight against drug-resistant tuberculosis 新出现的贝达喹啉抗药性:对全球抗击耐药结核病斗争的威胁
Journal of Biosafety and Biosecurity Pub Date : 2024-02-07 DOI: 10.1016/j.jobb.2024.01.001
Prakasini Satapathy , Ramaiah Itumalla , Ahmad Neyazi , Abdul Mobin Nabizai Taraki , Mahalaqua Nazli Khatib , Shilpa Gaidhane , Quazi Syed Zahiruddin , Sarvesh Rustagi , Mehrab Neyazi
{"title":"Emerging bedaquiline resistance: A threat to the global fight against drug-resistant tuberculosis","authors":"Prakasini Satapathy ,&nbsp;Ramaiah Itumalla ,&nbsp;Ahmad Neyazi ,&nbsp;Abdul Mobin Nabizai Taraki ,&nbsp;Mahalaqua Nazli Khatib ,&nbsp;Shilpa Gaidhane ,&nbsp;Quazi Syed Zahiruddin ,&nbsp;Sarvesh Rustagi ,&nbsp;Mehrab Neyazi","doi":"10.1016/j.jobb.2024.01.001","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.01.001","url":null,"abstract":"<div><p>Bedaquiline resistance is increasingly observed in the treatment of rifampicin-resistant tuberculosis (TB), yet standardized regimens for managing bedaquiline-resistant TB are lacking. Studies indicate a high proportion of bedaquiline-resistant cases have previously been treated for TB, and often involve strains resistant to quinolones. Regular monitoring of the culture status in patients receiving bedaquiline resistance treatment is advised. Methods such as experimental evolution, protein modeling, genome sequencing, and phenotypic analysis have been instrumental in identifying the mechanisms of bedaquiline resistance. Specifically, variants in the Rv0678 transcriptional repressor of the MmpS5-MmpL5 efflux system are linked to this type of resistance. Bayesian probability estimates show promise in determining the genotypic–phenotypic association for bedaquiline resistance, suggesting potential utility in clinical practice. Future research should explore the practical application of Bayesian probabilities in managing bedaquiline resistance. Sequencing-based technologies are anticipated to play a vital role in the early detection and management of drug-resistant TB strains.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000037/pdfft?md5=d5f9804ce3df9bf26151600a69d3d566&pid=1-s2.0-S2588933824000037-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139744271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Green Architecture and Conservation of Bulgarian Cultural Heretage 绿色建筑与保加利亚文化遗产保护
Engineering Sciences Pub Date : 2024-02-02 DOI: 10.7546/engsci.lx.23.04.07
B. Kadinov
{"title":"Green Architecture and Conservation of Bulgarian Cultural Heretage","authors":"B. Kadinov","doi":"10.7546/engsci.lx.23.04.07","DOIUrl":"https://doi.org/10.7546/engsci.lx.23.04.07","url":null,"abstract":"","PeriodicalId":56520,"journal":{"name":"Engineering Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140462558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use of Wood in Modern Residential Architecture. Applicability in the Bulgarian Conditions 现代住宅建筑中的木材使用。在保加利亚条件下的适用性
Engineering Sciences Pub Date : 2024-02-02 DOI: 10.7546/engsci.lx.23.04.03
G. Georgiev, A. Kovachev
{"title":"Use of Wood in Modern Residential Architecture. Applicability in the Bulgarian Conditions","authors":"G. Georgiev, A. Kovachev","doi":"10.7546/engsci.lx.23.04.03","DOIUrl":"https://doi.org/10.7546/engsci.lx.23.04.03","url":null,"abstract":"","PeriodicalId":56520,"journal":{"name":"Engineering Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140462454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of the General Analytic Approach Used for Modeling Transients in Open Thermodynamic Systems to Numerical Evaluation of Some Basic Quantum and Astrophysical Parameters 将用于开放热力学系统瞬态建模的一般分析方法应用于一些基本量子参数和天体物理参数的数值评估
Engineering Sciences Pub Date : 2024-02-02 DOI: 10.7546/engsci.lx.23.04.01
I. Tkachenko, Y. Miroshnichenko, B. Drenchev, O. Tkachenko, V. Miroshnichenko
{"title":"Application of the General Analytic Approach Used for Modeling Transients in Open Thermodynamic Systems to Numerical Evaluation of Some Basic Quantum and Astrophysical Parameters","authors":"I. Tkachenko, Y. Miroshnichenko, B. Drenchev, O. Tkachenko, V. Miroshnichenko","doi":"10.7546/engsci.lx.23.04.01","DOIUrl":"https://doi.org/10.7546/engsci.lx.23.04.01","url":null,"abstract":"","PeriodicalId":56520,"journal":{"name":"Engineering Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140462654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信