Search results
1 – 10 of 10Zhizhao Zhang, Tianzhi Yang and Yuan Liu
The purpose of this work is to bridge FL and blockchain technology through designing a blockchain-based smart agent system architecture and applying in FL. and blockchain…
Abstract
Purpose
The purpose of this work is to bridge FL and blockchain technology through designing a blockchain-based smart agent system architecture and applying in FL. and blockchain technology through designing a blockchain-based smart agent system architecture and applying in FL. FL is an emerging collaborative machine learning technique that trains a model across multiple devices or servers holding private data samples without exchanging their data. The locally trained results are aggregated by a centralized server in a privacy-preserving way. However, there is an assumption where the centralized server is trustworthy, which is impractical. Fortunately, blockchain technology has opened a new era of data exchange among trustless strangers because of its decentralized architecture and cryptography-supported techniques.
Design/methodology/approach
In this study, the author proposes a novel design of a smart agent inspired by the smart contract concept. Specifically, based on the proposed smart agent, a fully decentralized, privacy-preserving and fair deep learning blockchain-FL framework is designed, where the agent network is consistent with the blockchain network and each smart agent is a participant in the FL task. During the whole training process, both the data and the model are not at the risk of leakage.
Findings
A demonstration of the proposed architecture is designed to train a neural network. Finally, the implementation of the proposed architecture is conducted in the Ethereum development, showing the effectiveness and applicability of the design.
Originality/value
The author aims to investigate the feasibility and practicality of linking the three areas together, namely, multi-agent system, FL and blockchain. A blockchain-FL framework, which is based on a smart agent system, has been proposed. The author has made several contributions to the state-of-the-art. First of all, a concrete design of a smart agent model is proposed, inspired by the smart contract concept in blockchain. The smart agent is autonomous and is able to disseminate, verify the information and execute the supported protocols. Based on the proposed smart agent model, a new architecture composed by these agents is formed, which is a blockchain network. Then, a fully decentralized, privacy-preserving and smart agent blockchain-FL framework has been proposed, where a smart agent acts as both a peer in a blockchain network and a participant in a FL task at the same time. Finally, a demonstration to train an artificial neural network is implemented to prove the effectiveness of the proposed framework.
Details
Keywords
Hristo Trifonov and Donal Heffernan
The purpose of this paper is to describe how emerging open standards are replacing traditional industrial networks. Current industrial Ethernet networks are not interoperable;…
Abstract
Purpose
The purpose of this paper is to describe how emerging open standards are replacing traditional industrial networks. Current industrial Ethernet networks are not interoperable; thus, limiting the potential capabilities for the Industrial Internet of Things (IIoT). There is no forthcoming new generation fieldbus standard to integrate into the IIoT and Industry 4.0 revolution. The open platform communications unified architecture (OPC UA) time-sensitive networking (TSN) is a potential vendor-independent successor technology for the factory network. The OPC UA is a data exchange standard for industrial communication, and TSN is an Institute of Electrical and Electronics Engineers standard for Ethernet that supports real-time behaviour. The merging of these open standard solutions can facilitate cross-vendor interoperability for Industry 4.0 and IIoT products.
Design/methodology/approach
A brief review of the history of the fieldbus standards is presented, which highlights the shortcomings for current industrial systems in meeting converged traffic solutions. An experimental system for the OPC UA TSN is described to demonstrate an approach to developing a three-layer factory network system with an emphasis on the field layer.
Findings
From the multitude of existing industrial network schemes, there is a convergence pathway in solutions based on TSN Ethernet and OPC UA. At the field level, basic timing measurements in this paper show that the OPC UA TSN can meet the basic critical timing requirements for a fieldbus network.
Originality/value
This paper uniquely focuses on the specific fieldbus standards elements of industrial networks evolution and traces the developments from the early history to the current developing integration in IIoT context.
Details
Keywords
Vladimirs Reiskarts and Konstantins Savenkovs
This study aims to explore the need for highly technological complexes for control and monitoring, as well as, new concepts and methodologies for maritime resource exploration and…
Abstract
Purpose
This study aims to explore the need for highly technological complexes for control and monitoring, as well as, new concepts and methodologies for maritime resource exploration and exploitation, which are in great demand nowadays.
Design/methodology/approach
This paper provides an analysis of demand, means of creation and development of the methodology and infrastructure for global monitoring, pollution control and supervision of smart systems for activities in exploration, future resource exploitation in deep-water and coastal areas based on Smarthub architecture, Unmanned Aircraft System (UAS), Continuous Acquisition and Life-Cycle Support (CALS) and Blockchain technologies.
Findings
Observational, experimental, simulation, derivational, hybrid descriptive and analytical models, as well as, surrogate models were created, analyzed and implemented for assigned tasks realization. Concept of distributed system for marine environmental monitoring, control and supervising as pilot technology in the context of Technology Readiness Levels (TRL) 3–5 was designed and evaluated.
Originality/value
The activities described in this article should be realized in the design and development of a complex, reliable, robust and sustainable monitoring and inspection system for the control and evaluation of the impact and risk assessment of the exploration and future exploitation of maritime resources.
Details
Keywords
Julián Monsalve-Pulido, Jose Aguilar, Edwin Montoya and Camilo Salazar
This article proposes an architecture of an intelligent and autonomous recommendation system to be applied to any virtual learning environment, with the objective of efficiently…
Abstract
This article proposes an architecture of an intelligent and autonomous recommendation system to be applied to any virtual learning environment, with the objective of efficiently recommending digital resources. The paper presents the architectural details of the intelligent and autonomous dimensions of the recommendation system. The paper describes a hybrid recommendation model that orchestrates and manages the available information and the specific recommendation needs, in order to determine the recommendation algorithms to be used. The hybrid model allows the integration of the approaches based on collaborative filter, content or knowledge. In the architecture, information is extracted from four sources: the context, the students, the course and the digital resources, identifying variables, such as individual learning styles, socioeconomic information, connection characteristics, location, etc. Tests were carried out for the creation of an academic course, in order to analyse the intelligent and autonomous capabilities of the architecture.
Details
Keywords
Nsikak P. Owoh and M. Mahinderjit Singh
The proliferation of mobile phones with integrated sensors makes large scale sensing possible at low cost. During mobile sensing, data mostly contain sensitive information of…
Abstract
The proliferation of mobile phones with integrated sensors makes large scale sensing possible at low cost. During mobile sensing, data mostly contain sensitive information of users such as their real-time location. When such information are not effectively secured, users’ privacy can be violated due to eavesdropping and information disclosure. In this paper, we demonstrated the possibility of unauthorized access to location information of a user during sensing due to the ineffective security mechanisms in most sensing applications. We analyzed 40 apps downloaded from Google Play Store and results showed a 100% success rate in traffic interception and disclosure of sensitive information of users. As a countermeasure, a security scheme which ensures encryption and authentication of sensed data using Advanced Encryption Standard 256-Galois Counter Mode was proposed. End-to-end security of location and motion data from smartphone sensors are ensured using the proposed security scheme. Security analysis of the proposed scheme showed it to be effective in protecting Android based sensor data against eavesdropping, information disclosure and data modification.
Details
Keywords
Armando Calabrese, Antonio D'Uffizi, Nathan Levialdi Ghiron, Luca Berloco, Elaheh Pourabbas and Nathan Proudlove
The primary objective of this paper is to show a systematic and methodological approach for the digitalization of critical clinical pathways (CPs) within the healthcare domain.
Abstract
Purpose
The primary objective of this paper is to show a systematic and methodological approach for the digitalization of critical clinical pathways (CPs) within the healthcare domain.
Design/methodology/approach
The methodology entails the integration of service design (SD) and action research (AR) methodologies, characterized by iterative phases that systematically alternate between action and reflective processes, fostering cycles of change and learning. Within this framework, stakeholders are engaged through semi-structured interviews, while the existing and envisioned processes are delineated and represented using BPMN 2.0. These methodological steps emphasize the development of an autonomous, patient-centric web application alongside the implementation of an adaptable and patient-oriented scheduling system. Also, business processes simulation is employed to measure key performance indicators of processes and test for potential improvements. This method is implemented in the context of the CP addressing transient loss of consciousness (TLOC), within a publicly funded hospital setting.
Findings
The methodology integrating SD and AR enables the detection of pivotal bottlenecks within diagnostic CPs and proposes optimal corrective measures to ensure uninterrupted patient care, all the while advancing the digitalization of diagnostic CP management. This study contributes to theoretical discussions by emphasizing the criticality of process optimization, the transformative potential of digitalization in healthcare and the paramount importance of user-centric design principles, and offers valuable insights into healthcare management implications.
Originality/value
The study’s relevance lies in its ability to enhance healthcare practices without necessitating disruptive and resource-intensive process overhauls. This pragmatic approach aligns with the imperative for healthcare organizations to improve their operations efficiently and cost-effectively, making the study’s findings relevant.
Details
Keywords
Manzoor Hassan Malik and Nirmala Velan
The aims of the paper are to investigate IT software and service export function for India. First, cointegration tests have been used to investigate the long-run equilibrium…
Abstract
Purpose
The aims of the paper are to investigate IT software and service export function for India. First, cointegration tests have been used to investigate the long-run equilibrium relationship of the given variables. Second, long-run coefficients and associated error correction mechanism are estimated.
Design/methodology/approach
Annual time series data on IT software and service exports, human capital, exchange rate, investment in IT, external demand and openness index have been used for the present study during the period 1980–2017. The data are collected from the National Association of Software and Service Companies (NASSCOM), Planning Commission of India, University Grants Commission (UGC) of India, real effective exchange rate (REER) database and World Bank development indicators. Auto regressive distributed lag (ARDL) model is used to analyze both short-run and long-run dynamic behaviour of economic variables with appropriate asymptotic inferences.
Findings
Results of the analysis show the stable long-run equilibrium relationship among the given variables. It is found that external demand, exchange rate, human capital and openness index have a substantial long-run impact on the IT software and service exports. We also found that the coefficient of error correction term is negative and significant at 1% of the level of significance, which confirms the existence of stable long-run relationship which means adjustment will take place when there is a short-run deviation to its long-run equilibrium after a shock.
Research limitations/implications
There may be other determinants of software and service exports apart from those considered by the present study. Due to the non-availability of data, the study considers only important determinants that determine the software and service exports in India. The IT exports are an emerging and dynamic field of economic activity and the rate of change is so rapid that the relevance of individual factors may change over time. The study period is also limited to available data.
Practical implications
The paper has implications for achieving sustainability in IT software and service exports growth. It is recommended that policies directed at improving the performance of IT software and service exports should largely consider the long-run behaviour of these variables.
Originality/value
This paper focuses on originality in the analysis of the relationship among the given variables including IT software and service exports, human capital, exchange rate, investment in IT, external demand and openness index in India. All the work has been done in original by the authors, and the work used has been acknowledged properly.
Details
Keywords
Tatjana Thimm and Ralf Seepold
The purpose of this paper is to find out tourism movement patterns via the tracking of tourists with the help of positioning systems like GPS in the rural area of the Lake…
Abstract
Purpose
The purpose of this paper is to find out tourism movement patterns via the tracking of tourists with the help of positioning systems like GPS in the rural area of the Lake Constance destination in Germany. In doing so past, present and future of tourist tracking is illustrated.
Design/methodology/approach
The tracking is realized via common smartphones extended by an app, with dedicated sensors like position loggers and a survey. The three different approaches are applied in order to compare and cross-check results (triangulation of data and methods).
Findings
Movement patterns turned out to be diverse and individualistic within the rural destination of Lake Constance and following an ants trail in sub-destinations like the city of Constance. Repeat visitors and first-time visitors alike always visit the bigger cities and main day-trip destinations of the Lake. A possible prediction tool enables new avenues of governing tourism movement patterns.
Research limitations/implications
The tracking techniques can be developed further into the direction of “quantified self” using gamification in order to make the tracking app even more attractive.
Practical implications
An algorithm-based prediction tool would offer new perspectives to the management of tourism movements.
Social implications
Further research is needed to overcome the feeling of invasiveness of the app to allow tracking with that approach.
Originality/value
This study is original and innovative because of the first-time use of a smartphone app in tourist tracking, the application on a rural destination and the conceptual description of a prediction tool.
Details
Keywords
Deepak Kumar, B.V. Phani, Naveen Chilamkurti, Suman Saurabh and Vanessa Ratten
The review examines the existing literature on blockchain-based small and medium enterprise (SME) finance and highlights its trend, themes, opportunities and challenges. Based on…
Abstract
Purpose
The review examines the existing literature on blockchain-based small and medium enterprise (SME) finance and highlights its trend, themes, opportunities and challenges. Based on these factors, the authors create a framework for the existing literature on blockchain-based SME financing and lay down future research paths.
Design/methodology/approach
The review follows a systematic approach. It includes 53 articles encompassing multiple dimensions of blockchain-based SME finance, including peer-to-peer lending platforms, supply chain finance (SCF), decentralized lending protocols and tokenization of assets. The review critically evaluates these approaches' theoretical underpinnings, empirical evidence and practical implementations.
Findings
The review demonstrates that blockchain-based SME finance holds significant promise in addressing the credit gap by leveraging blockchain technology's decentralized and transparent nature. Benefits identified include reduced information asymmetry, improved access to financing, enhanced credit assessment processes and increased financial inclusion. However, the literature acknowledges several challenges and limitations, such as regulatory uncertainties, scalability issues, operational complexities and potential security risks.
Originality/value
The article contributes to the growing knowledge of blockchain-based SME finance by synthesizing and evaluating the existing literature. It also provides a framework for the existing literature in the area and future research paths. The study offers insights for researchers, policymakers and practitioners seeking to understand the potential of blockchain technology in filling the SME credit gap and fostering economic development through improved access to finance for SMEs.
Details
Keywords
Ahmed H. Al-Dmour, Masam Abood and Hani H. Al-Dmour
This study aims at investigating the extent of SysTrust’s framework (principles and criteria) as an internal control approach for assuring the reliability of accounting…
Abstract
Purpose
This study aims at investigating the extent of SysTrust’s framework (principles and criteria) as an internal control approach for assuring the reliability of accounting information system (AIS) were being implemented in Jordanian business organizations.
Design/methodology/approach
The study is based on primary data collected through a structured questionnaire from 239 out of 328 shareholdings companies. The survey units were the shareholding companies in Jordan, and the single key respondents approach was adopted. The extents of SysTrust principles were also measured. Previously validated instruments were used where required. The data were analysed using t-test and ANOVA.
Findings
The results indicated that the extent of SysTrust being implemented could be considered to be moderate at this stage. This implies that there are some variations among business organizations in terms of their level of implementing of SysTrust principles and criteria. The results also showed that the extent of SysTrust principles being implemented was varied among business organizations based on their business sector. However, there were not found varied due to their size of business and a length of time in business (experience).
Research limitations/implications
This study is only conducted in Jordan as a developing country. Although Jordan is a valid indicator of prevalent factors in the wider MENA region and developing countries, the lack of external validity of this research means that any generalization of the research findings should be made with caution. Future research can be orientated to other national and cultural settings and compared with the results of this study.
Practical implications
The study provides evidence of the need for management to recognize the importance of the implementation of SysTrust principles and criteria as an internal control for assuring the reliability of AIS within their organizations and be aware which of these principles are appropriate to their size and industry sector.
Originality/value
The findings would be valuable for academic researchers, managers and professional accounting to acquire a better undemanding of the current status of the implementation of the SysTrust principles (i.e., availability, security, integrity processing, confidentiality, and privacy) as an internal control method for assuring the reliability of AIS by testing the phenomenon in Jordan as a developing country.
Details