Pub Date : 2020-12-20DOI: 10.33166/aetic.2020.05.002
O. Dib, Khalifa Toumi
Due to the exponential rise of the Internet in the last two decades, the digital presence has seen an enormous increase. Today, billions of people, devices and objects are digitally connected making the interactions much easier than before. To securely establish this connectivity in the digital era, proving digital identities has become crucial. Due to this, a growing number of organizations are building solutions that establish, verify and manage digital identities. Yet, a solution whereby digital identities and their associated data are efficiently managed is still far from being achieved. To fully understand the reason behind this lack, this paper provides a detailed state of the art related to identity management systems. It overviews traditional systems, analyses their strengths and limitations. This work highly focuses on the novel decentralized identity systems based on blockchain; a complete study describing their architecture, components, lifecycle and workflow is detailed. Additionally, solutions enabling decentralized identity are discussed, analysed and compared according to the ten principles of self-sovereign identity. Lastly, the challenges hindering the shift toward the fully decentralized identity paradigm are discussed.
{"title":"Decentralized Identity Systems: Architecture, Challenges, Solutions and Future Directions","authors":"O. Dib, Khalifa Toumi","doi":"10.33166/aetic.2020.05.002","DOIUrl":"https://doi.org/10.33166/aetic.2020.05.002","url":null,"abstract":"Due to the exponential rise of the Internet in the last two decades, the digital presence has seen an enormous increase. Today, billions of people, devices and objects are digitally connected making the interactions much easier than before. To securely establish this connectivity in the digital era, proving digital identities has become crucial. Due to this, a growing number of organizations are building solutions that establish, verify and manage digital identities. Yet, a solution whereby digital identities and their associated data are efficiently managed is still far from being achieved. To fully understand the reason behind this lack, this paper provides a detailed state of the art related to identity management systems. It overviews traditional systems, analyses their strengths and limitations. This work highly focuses on the novel decentralized identity systems based on blockchain; a complete study describing their architecture, components, lifecycle and workflow is detailed. Additionally, solutions enabling decentralized identity are discussed, analysed and compared according to the ten principles of self-sovereign identity. Lastly, the challenges hindering the shift toward the fully decentralized identity paradigm are discussed.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48724356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-20DOI: 10.33166/aetic.2020.05.003
L. L. Dhirani, T. Newe
Hybrid Cloud Service Level Agreements (SLA) comprises of the legal terms and conditions for the cloud contract. Even though all the service level objectives, metrics and service descriptions are clearly outlined in the cloud SLA contract, sometimes vendors fail to meet the promised services and confusing terms lead to tenant-vendor cloud legal battles. Hybrid Cloud involves two different cloud models (public and private) working together, applications running under the hybrid cloud are subject to different availability sets, functionality and parameters developing SLA complexity and ambiguity. The new manufacturing environment (Industry 4.0 concept) is based on a fully connected, intelligent and automated factory, which will highly be dependent on cloud computing and IoT-based solutions for data analytics, storage and computational needs. In situations where Hybrid cloud services are not defined and managed properly may result in Industrial-IoT data security issues leading to financial and data losses. This paper discusses various aspects of the cloud service level agreement in Industry 4.0 for better understanding and implementation and puts a light on the issues that arise out of imprecise statements.
{"title":"Hybrid Cloud SLAs for Industry 4.0: Bridging the Gap","authors":"L. L. Dhirani, T. Newe","doi":"10.33166/aetic.2020.05.003","DOIUrl":"https://doi.org/10.33166/aetic.2020.05.003","url":null,"abstract":"Hybrid Cloud Service Level Agreements (SLA) comprises of the legal terms and conditions for the cloud contract. Even though all the service level objectives, metrics and service descriptions are clearly outlined in the cloud SLA contract, sometimes vendors fail to meet the promised services and confusing terms lead to tenant-vendor cloud legal battles. Hybrid Cloud involves two different cloud models (public and private) working together, applications running under the hybrid cloud are subject to different availability sets, functionality and parameters developing SLA complexity and ambiguity. The new manufacturing environment (Industry 4.0 concept) is based on a fully connected, intelligent and automated factory, which will highly be dependent on cloud computing and IoT-based solutions for data analytics, storage and computational needs. In situations where Hybrid cloud services are not defined and managed properly may result in Industrial-IoT data security issues leading to financial and data losses. This paper discusses various aspects of the cloud service level agreement in Industry 4.0 for better understanding and implementation and puts a light on the issues that arise out of imprecise statements.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41475862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.33166/AETIC.2020.04.004
F. Noor, Hatem ElBoghdadi
Metaheuristic algorithms are powerful methods for solving compute intensive problems. neural Networks, when trained well, are great at prediction and classification type of problems. Backpropagation is the most popular method utilized to obtain the weights of Neural Nets though it has some limitations of slow convergence and getting stuck in a local minimum. In order to overcome these limitations, in this paper, a hybrid method combining the parallel distributed bat algorithm with backpropagation is proposed to compute the weights of the Neural Nets. The aim is to use the hybrid method in applications of a distributed nature. Our study uses the Matlab® software and Arduino® microcontrollers as a testbed. To test the performance of the testbed, an application in the area of speech recognition is carried out. Due to the resource limitations of Arduino microcontrollers, the core speech pre-processing of LPC (linear predictive coding) feature extractions are done in Matlab® and only the LPC parameters are passed to the Neural Nets, which are implemented on Arduino microcontrollers. The experimental results show that the proposed scheme does produce promising results.
{"title":"Neural Nets Distributed on Microcontrollers using Metaheuristic Parallel Optimization Algorithm","authors":"F. Noor, Hatem ElBoghdadi","doi":"10.33166/AETIC.2020.04.004","DOIUrl":"https://doi.org/10.33166/AETIC.2020.04.004","url":null,"abstract":"Metaheuristic algorithms are powerful methods for solving compute intensive problems. neural Networks, when trained well, are great at prediction and classification type of problems. Backpropagation is the most popular method utilized to obtain the weights of Neural Nets though it has some limitations of slow convergence and getting stuck in a local minimum. In order to overcome these limitations, in this paper, a hybrid method combining the parallel distributed bat algorithm with backpropagation is proposed to compute the weights of the Neural Nets. The aim is to use the hybrid method in applications of a distributed nature. Our study uses the Matlab® software and Arduino® microcontrollers as a testbed. To test the performance of the testbed, an application in the area of speech recognition is carried out. Due to the resource limitations of Arduino microcontrollers, the core speech pre-processing of LPC (linear predictive coding) feature extractions are done in Matlab® and only the LPC parameters are passed to the Neural Nets, which are implemented on Arduino microcontrollers. The experimental results show that the proposed scheme does produce promising results.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45180413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.33166/AETIC.2020.04.005
K. Sagayam, Shibin D, Hien Dang, M. Wahab, R. Ambar
Biofeedback therapy trains the patient to control voluntarily the involuntary process of their body. This non-invasive and non-drug treatment is also used as a means to rehabilitate the physical impairments that may follow a stroke, a traumatic brain injury or even in neurological aspects within occupational therapy. The idea behind this study is based on using immersive gaming as a tool for physical rehabilitation that combines the idea of biofeedback and physical computing to get a patient emotionally involved in a game that requires them to do the exercises in order to interact with the game. This game is aimed towards addressing the basic treatment for ‘Frozen Shoulder’. In this work, the physical motions are captured by the wearable ultrasonic sensor attached temporarily to the various limbs of the patient. The data received from the sensors are then sent to the game via serial wireless communication. There are two main aspects to this study: motion capturing and game design. The current status of the application is a single ultrasonic detector. The experimental result shows that physio-therapeutic patients are benefited through the IoT based virtual reality game.
{"title":"IoT Based Virtual Reality Game for Physio-therapeutic Patients","authors":"K. Sagayam, Shibin D, Hien Dang, M. Wahab, R. Ambar","doi":"10.33166/AETIC.2020.04.005","DOIUrl":"https://doi.org/10.33166/AETIC.2020.04.005","url":null,"abstract":"Biofeedback therapy trains the patient to control voluntarily the involuntary process of their body. This non-invasive and non-drug treatment is also used as a means to rehabilitate the physical impairments that may follow a stroke, a traumatic brain injury or even in neurological aspects within occupational therapy. The idea behind this study is based on using immersive gaming as a tool for physical rehabilitation that combines the idea of biofeedback and physical computing to get a patient emotionally involved in a game that requires them to do the exercises in order to interact with the game. This game is aimed towards addressing the basic treatment for ‘Frozen Shoulder’. In this work, the physical motions are captured by the wearable ultrasonic sensor attached temporarily to the various limbs of the patient. The data received from the sensors are then sent to the game via serial wireless communication. There are two main aspects to this study: motion capturing and game design. The current status of the application is a single ultrasonic detector. The experimental result shows that physio-therapeutic patients are benefited through the IoT based virtual reality game.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41313541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.33166/aetic.2020.03.004
Md. Azmol Fuad, Faed Ahmed Arnob, Abu Tahir Nizam, Md. Motaharul Islam
In recent years, there have been a rise in the number of problems in the existing traffic management system particularly in the developing countries such as Bangladesh, India and Vietnam. Due to this, many accidents have occurred every now and then. Violating the traffic rules such as unpermitted change of lanes and over speeding are the two main reasons for increased number of accidents. In this paper, an attempt is made to solve the problem using Raspberry-pi and OpenCV contour detection technology. A prototype device has been developed to solve the problems regarding lane-based rule violations. The device will be installed in traffic surveillance cameras which will be connected to the metropolitan traffic servers. The device will communicate with the server via Gigabit Ethernet. It will also increase the time efficiency and reduce the manual monitoring cost. Moreover, it will help the traffic management department to find the person responsible for traffic rule violation and assist them to apply the laws strictly. The main contribution of this article is to develop a device that will detect any kind of unpermitted lane changes by any vehicles and identify the license plates. The proposed model has about 80% accuracy according to our evaluation.
{"title":"A Novel Traffic System for Detecting Lane-Based Rule Violation","authors":"Md. Azmol Fuad, Faed Ahmed Arnob, Abu Tahir Nizam, Md. Motaharul Islam","doi":"10.33166/aetic.2020.03.004","DOIUrl":"https://doi.org/10.33166/aetic.2020.03.004","url":null,"abstract":"In recent years, there have been a rise in the number of problems in the existing traffic management system particularly in the developing countries such as Bangladesh, India and Vietnam. Due to this, many accidents have occurred every now and then. Violating the traffic rules such as unpermitted change of lanes and over speeding are the two main reasons for increased number of accidents. In this paper, an attempt is made to solve the problem using Raspberry-pi and OpenCV contour detection technology. A prototype device has been developed to solve the problems regarding lane-based rule violations. The device will be installed in traffic surveillance cameras which will be connected to the metropolitan traffic servers. The device will communicate with the server via Gigabit Ethernet. It will also increase the time efficiency and reduce the manual monitoring cost. Moreover, it will help the traffic management department to find the person responsible for traffic rule violation and assist them to apply the laws strictly. The main contribution of this article is to develop a device that will detect any kind of unpermitted lane changes by any vehicles and identify the license plates. The proposed model has about 80% accuracy according to our evaluation.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46344682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.33166/aetic.2020.03.002
Ana Elsa Hinojosa Herrera, C. Walshaw, C. Bailey
Failure Mode & Effect Analysis (FMEA) is a method that has been used to improve reliability of products, processes, designs, and software for different applications. In this paper we extend its usage for data veracity and validity improvement in the context of big data analysis and discuss its application in an electronics manufacturing test procedure which consists of a sequence of tests. Finally, we describe another methodology, developed as a result of the DVV-FMEA application which is aimed at improving the tests' repeatability and failure detection capabilities as well as monitoring their reliability.
{"title":"Failure Mode & Effect Analysis and another Methodology for Improving Data Veracity and Validity","authors":"Ana Elsa Hinojosa Herrera, C. Walshaw, C. Bailey","doi":"10.33166/aetic.2020.03.002","DOIUrl":"https://doi.org/10.33166/aetic.2020.03.002","url":null,"abstract":"Failure Mode & Effect Analysis (FMEA) is a method that has been used to improve reliability of products, processes, designs, and software for different applications. In this paper we extend its usage for data veracity and validity improvement in the context of big data analysis and discuss its application in an electronics manufacturing test procedure which consists of a sequence of tests. Finally, we describe another methodology, developed as a result of the DVV-FMEA application which is aimed at improving the tests' repeatability and failure detection capabilities as well as monitoring their reliability.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44388205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-15DOI: 10.20944/preprints202005.0247.v1
Md Amiruzzaman, M. Abdullah-Al-Wadud, Rizal Bin Mohd. Nor, N. A. Aziz
This study presents a prediction model based on Logistic Growth Curve (LGC) to evaluate the effectiveness of Movement Control Order (MCO) on COVID-19 pandemic spread. The evaluation assesses and predicts the growth models. The estimated model is a forecast-based model that depends on partial data from the COVID-19 cases in Malaysia. The model is studied on the effectiveness of the three phases of MCO implemented in Malaysia, where the model perfectly fits with the R2 value 0.989. Evidence from this study suggests that results of the prediction model match with the progress and effectiveness of the MCO to flatten the curve, and thus is helpful to control the spike in number of active COVID-19 cases and spread of COVID-19 infection growth.
{"title":"Evaluation of the Effectiveness of Movement Control Order to Limit the Spread of COVID-19","authors":"Md Amiruzzaman, M. Abdullah-Al-Wadud, Rizal Bin Mohd. Nor, N. A. Aziz","doi":"10.20944/preprints202005.0247.v1","DOIUrl":"https://doi.org/10.20944/preprints202005.0247.v1","url":null,"abstract":"This study presents a prediction model based on Logistic Growth Curve (LGC) to evaluate the effectiveness of Movement Control Order (MCO) on COVID-19 pandemic spread. The evaluation assesses and predicts the growth models. The estimated model is a forecast-based model that depends on partial data from the COVID-19 cases in Malaysia. The model is studied on the effectiveness of the three phases of MCO implemented in Malaysia, where the model perfectly fits with the R2 value 0.989. Evidence from this study suggests that results of the prediction model match with the progress and effectiveness of the MCO to flatten the curve, and thus is helpful to control the spike in number of active COVID-19 cases and spread of COVID-19 infection growth.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46579984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.33166/aetic.2020.02.001
Neville Palmer
In the subject of computer networking students must understand the concepts and be confident in configuring and securing a range of network devices and systems. Challenges are faced in assessing practical networking and security exercises in a laboratory environment utilising multivariate devices and operating systems that involve real or simulated systems operating in real or virtualized environments. The working environment for a practical exercise must be pre-configured and once an exercise has been completed the results extracted to enable formative or summative assessment of the outcomes. Using manual methods this process can be time consuming and it would therefore be beneficial to implement some form of automation. To facilitate this a new application has been developed that automates the configuration management and assessment processes within a computer networking laboratory. The new application has been successfully used to assess the extent to which students have been able to configure secure networks using case-study based exercises. The development challenges of the application and rationale for the implementation of the prototype application are discussed. A test methodology is presented in which the application is used to assess the outcomes of a computer networking exercise, comparing the results obtained from the application with those of a proprietary simulator. This demonstrates that the prototype application is able to successfully and accurately automate the assessment of the practice of networking and security in the context of defined parameters. Further work is suggested to improve the assessment mechanism employed by the application, seek enhancements and to conduct additional tests.
{"title":"Automating the Assessment of Networking and Security in Higher Education","authors":"Neville Palmer","doi":"10.33166/aetic.2020.02.001","DOIUrl":"https://doi.org/10.33166/aetic.2020.02.001","url":null,"abstract":"In the subject of computer networking students must understand the concepts and be confident in configuring and securing a range of network devices and systems. Challenges are faced in assessing practical networking and security exercises in a laboratory environment utilising multivariate devices and operating systems that involve real or simulated systems operating in real or virtualized environments. The working environment for a practical exercise must be pre-configured and once an exercise has been completed the results extracted to enable formative or summative assessment of the outcomes. Using manual methods this process can be time consuming and it would therefore be beneficial to implement some form of automation. To facilitate this a new application has been developed that automates the configuration management and assessment processes within a computer networking laboratory. The new application has been successfully used to assess the extent to which students have been able to configure secure networks using case-study based exercises. The development challenges of the application and rationale for the implementation of the prototype application are discussed. A test methodology is presented in which the application is used to assess the outcomes of a computer networking exercise, comparing the results obtained from the application with those of a proprietary simulator. This demonstrates that the prototype application is able to successfully and accurately automate the assessment of the practice of networking and security in the context of defined parameters. Further work is suggested to improve the assessment mechanism employed by the application, seek enhancements and to conduct additional tests.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47266369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.33166/aetic.2020.02.004
Ivano Folgosa, P. Excell
The development of a low-cost solution for the connection of wireless sensor nodes to the Internet is presented. The solution has the additional benefit of extremely low power consumption and hence very long battery life and low maintenance cost. The core of the solution is the Atmel ATtiny series of wireless transceivers and the designs of minimised printed circuit boards for three versions of the node are presented. To provide the fixed node at minimum cost, the Raspberry Pi microcomputer was used, attached to the Nordic Semiconductor nRF24L01+ transceiver module. Software to implement the system in each of the nodes was developed from zero-cost sources, the software being tailored for the particular application and devices selected. A World Wide Web interface for the Raspberry Pi was created, having an intuitive display and offering functionalities relevant for general automation tasks, data display and manual control, in conjunction with wirelessly connected clients. The Web interface can serve as the basis for a home automation system, a topic which is becoming more and more important and popular nowadays, but industrial applications are equally feasible.
{"title":"A Low-Cost Wireless Interface Linking a Microcontroller to a Microcomputer Server","authors":"Ivano Folgosa, P. Excell","doi":"10.33166/aetic.2020.02.004","DOIUrl":"https://doi.org/10.33166/aetic.2020.02.004","url":null,"abstract":"The development of a low-cost solution for the connection of wireless sensor nodes to the Internet is presented. The solution has the additional benefit of extremely low power consumption and hence very long battery life and low maintenance cost. The core of the solution is the Atmel ATtiny series of wireless transceivers and the designs of minimised printed circuit boards for three versions of the node are presented. To provide the fixed node at minimum cost, the Raspberry Pi microcomputer was used, attached to the Nordic Semiconductor nRF24L01+ transceiver module. Software to implement the system in each of the nodes was developed from zero-cost sources, the software being tailored for the particular application and devices selected. A World Wide Web interface for the Raspberry Pi was created, having an intuitive display and offering functionalities relevant for general automation tasks, data display and manual control, in conjunction with wirelessly connected clients. The Web interface can serve as the basis for a home automation system, a topic which is becoming more and more important and popular nowadays, but industrial applications are equally feasible.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44094779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-15DOI: 10.33166/aetic.2019.05.000
{"title":"AETiC Special Issue on Next Generation Blockchain Architecture, Infrustracture and Applications","authors":"","doi":"10.33166/aetic.2019.05.000","DOIUrl":"https://doi.org/10.33166/aetic.2019.05.000","url":null,"abstract":"","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48487327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}