{"title":"Blockchain-based refurbishment certification system for enhancing the circular economy","authors":"Cristina Regueiro , Aitor Gómez-Goiri , Nuno Pedrosa , Christos Semertzidis , Eider Iturbe , Jason Mansell","doi":"10.1016/j.bcra.2023.100172","DOIUrl":"10.1016/j.bcra.2023.100172","url":null,"abstract":"<div><p>As the global population continues to grow, the enormous stress on our environment and resources is becoming impossible to ignore. A focus on producing and consuming as cheaply as possible has created an economy in which objects are briefly used and then discarded as waste, featuring a linear lifecycle that creates an enormous amount of waste. The alternative to the linear economy “take-make-waste” is called the “circular economy”. Under this paradigm, materials are recycled to build new products or components that are designed and built to promote their reuse and refurbishment. This assures the continuous (re-)exploitation of existing resources, reducing the extraction of new raw materials. However, customers often reject these reused or refurbished products under the suspicion that they do not meet the same usability, safety, or performance levels of new products. In this sense, trustworthy records of historical details of refurbished products could increase consumers’ confidence in products and components of the “circular economy”, prioritizing trustworthiness, reliability, and transparency. This work presents a new certification tool based on blockchain technology to guarantee trusted, accurate, transparent, and traceable lifecycle information of products and their components and to generate trustworthy certificates to probe refurbished product historical details. This tool aims to enhance refurbished product visibility by creating the basis for making the circular economy a reality in any domain.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000477/pdfft?md5=36bb137d913f9ca6646ddf6645fa26d7&pid=1-s2.0-S2096720923000477-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139303585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BrickOS: specialized kernels for heterogeneous hardware resources","authors":"Jinyu Gu, Hao Li, Yubin Xia, Haibing Guan, Zuohua Ding, Yongwang Zhao, Haibo Chen","doi":"10.1360/ssi-2022-0413","DOIUrl":"https://doi.org/10.1360/ssi-2022-0413","url":null,"abstract":"The emerging field of human-machine-material integration requires new operating system kernels to support the ubiquitous computing, so as to manage and control massive heterogeneous hardware and serve dynamic and changeable application scenarios. This paper proposes a configurable specialized kernel architecture, named BrickOS, which can flexibly select the system components of the kernel according to the usage scenario. Developers can choose to run the system components in user mode to provide better security, or run in a shared-address-space kernel mode to improve performance. In order to ensure the security of system components running in the same address space, BrickOS provides a unified abstraction for the memory protection mechanism of the underlying hardware used for memory isolation in a single address space. The test results show that BrickOS can generate customized kernels that meet the requirements for different scenarios, with low inter-process call (IPC) overhead and good overall performance.","PeriodicalId":52316,"journal":{"name":"Scientia Sinica Informationis","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140280185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaofeng Hu , Baichuan Xu , Mingliang Chen , Kexin Li , Yang Xiao , Shengnan Liang , Chuanfu Zhang , Hui Ma , Hongbin Song
{"title":"Development and assessment of cutting-edge biotechnologies","authors":"Xiaofeng Hu , Baichuan Xu , Mingliang Chen , Kexin Li , Yang Xiao , Shengnan Liang , Chuanfu Zhang , Hui Ma , Hongbin Song","doi":"10.1016/j.jobb.2024.03.001","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.03.001","url":null,"abstract":"<div><p>The emergence of advanced biotechnologies has intensified in recent years. The rapid development of these biotechnologies has had a wide and profound impact globally, with the majority on the frontier of biosecurity technologies. The global biosecurity situation is currently highly challenging, with the characteristics of internationalization, extremely serious harm, and complex development. The misuse and abuse of biotechnologies are common, which thereby endanger biosecurity. The international community and governments have attached great importance to cutting-edge biotechnologies and are implementing laws and regulations to control and prevent biosecurity-related influences. By tracking the frontier progress of the new technologies generated from gene editing, gene drives, synthetic biology, and related cross-disciplines as applied in the biosecurity field, we analyzed the development trends in biotechnologies and their potential influence. On the one hand, this paper proposes that there is an urgent need for global cooperation to formulate management, control strategies, and measures for cutting-edge technologies in biosecurity to jointly promote their sound development. On the other hand, the international community should jointly shoulder the responsibility for safeguarding biosecurity and restrict the biotechnologies to rational applications within legal and ethical frameworks. This paper aims to provide a reference for the prevention of misuse and abuse of biotechnologies and support global cooperation in biosecurity governance.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000074/pdfft?md5=9abbd3566fd8f9b379370669cf9d0310&pid=1-s2.0-S2588933824000074-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140309764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain for secure and decentralized artificial intelligence in cybersecurity: A comprehensive review","authors":"","doi":"10.1016/j.bcra.2024.100193","DOIUrl":"10.1016/j.bcra.2024.100193","url":null,"abstract":"<div><p>As the use of artificial intelligence (AI) grows within the field of cybersecurity, so does the demand for secure and decentralized AI systems to protect against potential cyber threats. Blockchain technology has emerged as the ideal approach for increasing both the security and privacy of AI systems since it provides decentralized and immutable data storage. This systematic literature review focuses on the integration of blockchain technology with decentralized AI within cybersecurity. It provides a comprehensive taxonomy of blockchain technology and decentralized AI for cybersecurity, serving as the starting point for the study. This paper begins with an overview of blockchain technology and its possible uses in cybersecurity and also analyzes its challenges and opportunities. Decentralized AI is also covered in the study, along with its potential advantages and difficulties in decentralized AI cybersecurity. Building on that foundation, this study provides convincing findings highlighting the beneficial relationships between blockchain technology and decentralized AI for cybersecurity, contributing to a nuanced comprehension of their integration. Moreover, it offers real-world uses of blockchain-enabled, decentralized AI to discuss its usefulness in tackling cybersecurity concerns. Finally, this paper discusses future research directions for blockchain-enabled decentralized AI in cybersecurity, including potential applications and implications of this technology in the field, emphasizing the potential of blockchain-enabled decentralized AI in cybersecurity to enhance security, privacy, and trust in AI systems.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S209672092400006X/pdfft?md5=3fe5d5283406aab834399c6c4a38dcd5&pid=1-s2.0-S209672092400006X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140465891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The barriers to sustainable risk transfer in the cyber-insurance market","authors":"Henry R K Skeoch, Christos Ioannidis","doi":"10.1093/cybsec/tyae003","DOIUrl":"https://doi.org/10.1093/cybsec/tyae003","url":null,"abstract":"Efficient risk transfer is an important condition for ensuring the sustainability of a market according to the established economics literature. In an inefficient market, significant financial imbalances may develop and potentially jeopardize the solvency of some market participants. The constantly evolving nature of cyber-threats and lack of public data sharing mean that the economic conditions required for quoted cyber-insurance premiums to be considered efficient are highly unlikely to be met. This paper develops Monte Carlo simulations of an artificial cyber-insurance market and compares the efficient and inefficient outcomes based on the informational setup between the market participants. The existence of diverse loss distributions is justified by the dynamic nature of cyber-threats and the absence of any reliable and centralized incident reporting. It is shown that the limited involvement of reinsurers when loss expectations are not shared leads to increased premiums and lower overall capacity. This suggests that the sustainability of the cyber-insurance market requires both better data sharing and external sources of risk tolerant capital.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139945993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Behind the curve: technology challenges facing the homeland intelligence and counterterrorism workforce","authors":"Michelle Black, Lana Obradovic, Deanna House","doi":"10.1093/cybsec/tyae002","DOIUrl":"https://doi.org/10.1093/cybsec/tyae002","url":null,"abstract":"Those charged with protecting the homeland through intelligence analysis, particularly in counterterrorism, must be capable of rapidly adopting innovative technologies to detect and prevent exploitation and disruption of vulnerable critical infrastructures. However, implementing these responses requires a highly skilled technical workforce that is continually provided with timely educational and training programs. Yet, questions remain regarding the technical aptitude necessary to respond to today’s terrorism threats and the Department of Homeland Security’s ability to provide consistent and rigorous standards for technology training and education. By surveying analysts, we examine what, if any, educational and training programs have been provided to adapt and remain technologically competitive and effectively utilize emerging technologies. We find a distinct need to focus on improvements that involve clarifying terms, building a technology and cybersecurity roadmap for analysts, allocating additional training time for employees, and building partnerships with private industry.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139773215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emerging bedaquiline resistance: A threat to the global fight against drug-resistant tuberculosis","authors":"Prakasini Satapathy , Ramaiah Itumalla , Ahmad Neyazi , Abdul Mobin Nabizai Taraki , Mahalaqua Nazli Khatib , Shilpa Gaidhane , Quazi Syed Zahiruddin , Sarvesh Rustagi , Mehrab Neyazi","doi":"10.1016/j.jobb.2024.01.001","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.01.001","url":null,"abstract":"<div><p>Bedaquiline resistance is increasingly observed in the treatment of rifampicin-resistant tuberculosis (TB), yet standardized regimens for managing bedaquiline-resistant TB are lacking. Studies indicate a high proportion of bedaquiline-resistant cases have previously been treated for TB, and often involve strains resistant to quinolones. Regular monitoring of the culture status in patients receiving bedaquiline resistance treatment is advised. Methods such as experimental evolution, protein modeling, genome sequencing, and phenotypic analysis have been instrumental in identifying the mechanisms of bedaquiline resistance. Specifically, variants in the Rv0678 transcriptional repressor of the MmpS5-MmpL5 efflux system are linked to this type of resistance. Bayesian probability estimates show promise in determining the genotypic–phenotypic association for bedaquiline resistance, suggesting potential utility in clinical practice. Future research should explore the practical application of Bayesian probabilities in managing bedaquiline resistance. Sequencing-based technologies are anticipated to play a vital role in the early detection and management of drug-resistant TB strains.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000037/pdfft?md5=d5f9804ce3df9bf26151600a69d3d566&pid=1-s2.0-S2588933824000037-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139744271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Green Architecture and Conservation of Bulgarian Cultural Heretage","authors":"B. Kadinov","doi":"10.7546/engsci.lx.23.04.07","DOIUrl":"https://doi.org/10.7546/engsci.lx.23.04.07","url":null,"abstract":"","PeriodicalId":56520,"journal":{"name":"Engineering Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140462558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Use of Wood in Modern Residential Architecture. Applicability in the Bulgarian Conditions","authors":"G. Georgiev, A. Kovachev","doi":"10.7546/engsci.lx.23.04.03","DOIUrl":"https://doi.org/10.7546/engsci.lx.23.04.03","url":null,"abstract":"","PeriodicalId":56520,"journal":{"name":"Engineering Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140462454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Tkachenko, Y. Miroshnichenko, B. Drenchev, O. Tkachenko, V. Miroshnichenko
{"title":"Application of the General Analytic Approach Used for Modeling Transients in Open Thermodynamic Systems to Numerical Evaluation of Some Basic Quantum and Astrophysical Parameters","authors":"I. Tkachenko, Y. Miroshnichenko, B. Drenchev, O. Tkachenko, V. Miroshnichenko","doi":"10.7546/engsci.lx.23.04.01","DOIUrl":"https://doi.org/10.7546/engsci.lx.23.04.01","url":null,"abstract":"","PeriodicalId":56520,"journal":{"name":"Engineering Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140462654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}