首页 > 最新文献

International Journal of Networks and Systems最新文献

英文 中文
Designing a smart classroom with advanced Audiovisual equipment and soft collaboration capabilities for Higher Education 为高等教育设计配备先进视听设备和软协作功能的智能教室
Pub Date : 2024-05-07 DOI: 10.30534/ijns/2024/011332024
This is a technology-enabled classroom design which reflects a thoughtful integration of cutting-edge audiovisual solutions to enhance the learning environment. The inclusion of automated audio-visual solutions indicates a commitment to creating a seamless and efficient learning experience through technology. The incorporation of a voice lift application ensures clear and audible communication for the instructor, addressing potential challenges in large classroom settings. The use of Dante-based communication over Ethernet signifies a high-quality and reliable audio distribution system, enabling efficient communication within the classroom. The inclusion of features catering to individuals with disabilities demonstrates a commitment to creating an inclusive and accessible learning environment. The beamforming microphone array system with multiple elements is a sophisticated technology that allows for effective tracking of the active participant. This ensures that the audio focus adapts to the speaker's location. The automatic and steerable coverage type enhances the adaptability of the microphone array system, automatically focusing on the speaker. This feature contributes to an immersive and dynamic learning experience. The support for Power over Ethernet (PoE) simplifies the installation and management of AV devices in the classroom. It reduces the need for additional power outlets and cables, streamlining the overall setup. Overall, this design prioritizes advanced audiovisual technologies to create a unique, state-of-the-art, and inclusive technology-enabled classroom. The focus on clear communication, adaptability, and ease of use demonstrates a commitment to providing an optimal learning environment for both faculty and students
这是一个采用技术的教室设计,体现了对尖端视听解决方案的周到整合,以改善学习环境。自动视听解决方案的采用表明了通过技术创造无缝、高效学习体验的承诺。语音升降应用的加入确保了教师清晰可闻的交流,解决了大教室环境下的潜在挑战。通过以太网使用基于 Dante 的通信技术,标志着高质量、可靠的音频分配系统,可实现教室内的高效通信。为残疾人设计的功能表明,该系统致力于创造一个具有包容性和无障碍的学习环境。带有多个元件的波束成形麦克风阵列系统是一项复杂的技术,可有效跟踪活跃的参与者。这可确保音频焦点与发言者的位置相适应。自动和可转向的覆盖类型增强了麦克风阵列系统的适应性,可自动聚焦于发言者。这一功能有助于提供身临其境的动态学习体验。对以太网供电(PoE)的支持简化了教室中视听设备的安装和管理。它减少了对额外电源插座和电缆的需求,简化了整体设置。总之,该设计优先采用先进的视听技术,以创建一个独特、先进和具有包容性的技术化教室。对清晰的沟通、适应性和易用性的关注,体现了为师生提供最佳学习环境的承诺。
{"title":"Designing a smart classroom with advanced Audiovisual equipment and soft collaboration capabilities for Higher Education","authors":"","doi":"10.30534/ijns/2024/011332024","DOIUrl":"https://doi.org/10.30534/ijns/2024/011332024","url":null,"abstract":"This is a technology-enabled classroom design which reflects a thoughtful integration of cutting-edge audiovisual solutions to enhance the learning environment. The inclusion of automated audio-visual solutions indicates a commitment to creating a seamless and efficient learning experience through technology. The incorporation of a voice lift application ensures clear and audible communication for the instructor, addressing potential challenges in large classroom settings. The use of Dante-based communication over Ethernet signifies a high-quality and reliable audio distribution system, enabling efficient communication within the classroom. The inclusion of features catering to individuals with disabilities demonstrates a commitment to creating an inclusive and accessible learning environment. The beamforming microphone array system with multiple elements is a sophisticated technology that allows for effective tracking of the active participant. This ensures that the audio focus adapts to the speaker's location. The automatic and steerable coverage type enhances the adaptability of the microphone array system, automatically focusing on the speaker. This feature contributes to an immersive and dynamic learning experience. The support for Power over Ethernet (PoE) simplifies the installation and management of AV devices in the classroom. It reduces the need for additional power outlets and cables, streamlining the overall setup. Overall, this design prioritizes advanced audiovisual technologies to create a unique, state-of-the-art, and inclusive technology-enabled classroom. The focus on clear communication, adaptability, and ease of use demonstrates a commitment to providing an optimal learning environment for both faculty and students","PeriodicalId":516643,"journal":{"name":"International Journal of Networks and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141004164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting our Youth Online: A Comprehensive Review on Strategies to Safeguard Children from Online Threats 保护青少年上网:保护儿童免受网络威胁的策略综述
Pub Date : 2024-03-11 DOI: 10.30534/ijns/2024/041322024
The evidence about the potential benefits and hazards associated with children's internet usage is expanding along with the global interest in this topic. In order to facilitate comparative study of research findings from lower- and middle-income nations like South Africa, Serbia, the Philippines, Brazil, and Argentina, the Global Kids Online program provides tools and guidelines to national researchers. This study looks at how present child rights laws, particularly those pertaining to the internet, correspond with the expanding body of data. It also looks at ways to influence future policy orientations. It provides information and recommendations for protecting children online based on current research and policy studies [1
随着全球对这一话题的关注,有关儿童使用互联网的潜在益处和危害的证据也在不断增加。为了便于对南非、塞尔维亚、菲律宾、巴西和阿根廷等中低收入国家的研究成果进行比较研究,全球儿童在线计划为各国研究人员提供了工具和指南。本研究探讨了现行的儿童权利法律,尤其是与互联网相关的法律,如何与不断扩大的数据体系保持一致。它还探讨了影响未来政策导向的方法。它以当前的研究和政策研究为基础,提供了保护儿童上网的信息和建议[1
{"title":"Protecting our Youth Online: A Comprehensive Review on Strategies to Safeguard Children from Online Threats","authors":"","doi":"10.30534/ijns/2024/041322024","DOIUrl":"https://doi.org/10.30534/ijns/2024/041322024","url":null,"abstract":"The evidence about the potential benefits and hazards associated with children's internet usage is expanding along with the global interest in this topic. In order to facilitate comparative study of research findings from lower- and middle-income nations like South Africa, Serbia, the Philippines, Brazil, and Argentina, the Global Kids Online program provides tools and guidelines to national researchers. This study looks at how present child rights laws, particularly those pertaining to the internet, correspond with the expanding body of data. It also looks at ways to influence future policy orientations. It provides information and recommendations for protecting children online based on current research and policy studies [1","PeriodicalId":516643,"journal":{"name":"International Journal of Networks and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140254036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and Decentralized Voting System using Block Chain Technology 使用区块链技术的安全和去中心化投票系统
Pub Date : 2024-03-10 DOI: 10.30534/ijns/2024/021322024
In today's democracies, increasing restrictions due to the inconvenience of physically traveling to vote is a big problem. These recommendations support the development of remote electronic voting as a solution to increase voter turnout by eliminating the need for travel. The document demonstrates the effectiveness of remote electronic voting, noting that it not only speeds up results but also reduces the risks inherent in voting by ballot paper. The article acknowledges the important role of security, trust, and transparency in promoting confidence, arguing that the implementation of electronic elections in remote areas should be well possible in these areas, especially given the high risks associated with elections. The discussion also delves into the integration of blockchain technology and introduces the concept of block sealing, demonstrating its adaptation to meet the specific requirements of the election process. One of the main recommendations made is the adoption of a blockchain organizational model that provides ownership and oversight by the governing body. This governance model is seen as a measure that will increase accountability and increase public confidence in the integrity of elections. However, the document acknowledges that many challenges need to be addressed, including cybersecurity threats. He emphasized that legal, ethical, and social issues must be taken into account to maintain and strengthen public trust. The combination of new technology and a strong administrative foundation is considered necessary for the success of remote e-voting. This review concludes by advocating continuous research and development efforts to refine and fortify remote voting systems. The intricate interplay between technology, governance, and public perception emerges as a key focus for realizing the full potential of remote electronic voting in shaping the future of democratic processes. We present the wording utilized in blockchain-based existing ballot frameworks in this segment. They are sorted in light of the agreement calculations, blockchain system, cryptography, qualities of a fruitful framework, and the advancement instruments used to carry out blockchain e-casting ballot frameworks
在当今的民主国家,由于不便亲自前往投票而造成的限制越来越多,这是一个大问题。这些建议支持发展远程电子投票,以此作为无需旅行即可提高投票率的解决方案。该文件证明了远程电子投票的有效性,指出它不仅能加快投票结果的产生,还能降低纸质选票投票的固有风险。文章承认安全、信任和透明度在促进信心方面的重要作用,认为在偏远地区实施电子选举应该是完全可能的,特别是考虑到与选举相关的高风险。讨论还深入探讨了区块链技术的整合,并介绍了区块封存的概念,展示了其适应性,以满足选举过程的具体要求。提出的主要建议之一是采用区块链组织模式,由管理机构提供所有权和监督。这种治理模式被认为是一种能加强问责制和提高公众对选举公正性信心的措施。不过,该文件也承认需要应对许多挑战,包括网络安全威胁。他强调,必须考虑到法律、道德和社会问题,以维护和加强公众的信任。新技术与坚实的行政基础相结合被认为是远程电子投票取得成功的必要条件。本综述最后主张继续开展研发工作,完善和加强远程投票系统。技术、管理和公众认知之间错综复杂的相互作用是充分发挥远程电子投票在塑造未来民主进程中的潜力的关键所在。我们在本部分介绍了基于区块链的现有投票框架中使用的措辞。它们按照协议计算、区块链系统、密码学、有效框架的特质以及用于执行区块链电子投票框架的推进工具进行分类。
{"title":"Secure and Decentralized Voting System using Block Chain Technology","authors":"","doi":"10.30534/ijns/2024/021322024","DOIUrl":"https://doi.org/10.30534/ijns/2024/021322024","url":null,"abstract":"In today's democracies, increasing restrictions due to the inconvenience of physically traveling to vote is a big problem. These recommendations support the development of remote electronic voting as a solution to increase voter turnout by eliminating the need for travel. The document demonstrates the effectiveness of remote electronic voting, noting that it not only speeds up results but also reduces the risks inherent in voting by ballot paper. The article acknowledges the important role of security, trust, and transparency in promoting confidence, arguing that the implementation of electronic elections in remote areas should be well possible in these areas, especially given the high risks associated with elections. The discussion also delves into the integration of blockchain technology and introduces the concept of block sealing, demonstrating its adaptation to meet the specific requirements of the election process. One of the main recommendations made is the adoption of a blockchain organizational model that provides ownership and oversight by the governing body. This governance model is seen as a measure that will increase accountability and increase public confidence in the integrity of elections. However, the document acknowledges that many challenges need to be addressed, including cybersecurity threats. He emphasized that legal, ethical, and social issues must be taken into account to maintain and strengthen public trust. The combination of new technology and a strong administrative foundation is considered necessary for the success of remote e-voting. This review concludes by advocating continuous research and development efforts to refine and fortify remote voting systems. The intricate interplay between technology, governance, and public perception emerges as a key focus for realizing the full potential of remote electronic voting in shaping the future of democratic processes. We present the wording utilized in blockchain-based existing ballot frameworks in this segment. They are sorted in light of the agreement calculations, blockchain system, cryptography, qualities of a fruitful framework, and the advancement instruments used to carry out blockchain e-casting ballot frameworks","PeriodicalId":516643,"journal":{"name":"International Journal of Networks and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140254866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Operational Security, Safe Quantum, Space Communications and Data Privacy Cyber Security 操作安全、安全量子、空间通信和数据隐私 网络安全
Pub Date : 2024-03-10 DOI: 10.30534/ijns/2024/011322024
In recent years the internet has become an important part of daily life for people around the world. 18 On the other hand, as the effectiveness of the internet increases, cybercrimes also increase. Over the last 15 years, cybersecurity has emerged as a way to accelerate the pace of change in cyberspace. Cybersecurity refers to the procedures a country or organization can use to protect its assets and information in cyberspace. Twenty years ago the term "cybersecurity" was little known to the public [1]. Cybersecurity affects not only people but also organizations or governments. In recent years, everything has been going well and it has used many technologies such as cybernetics, cloud computing, smartphones, and Internet of Things technology. Cyber attacks raise concerns about privacy, security, and financial security. Cybersecurity is a set of technologies, processes, and practices designed to prevent attacks, damage, and unauthorized access to networks, computers, operations, and machines. The main purpose of this article is to provide detailed information about types of cybersecurity, why cybersecurity is important, cybersecurity frameworks, cybersecurity tools, and problem points of cybersecurity [2].
近年来,互联网已成为世界各地人们日常生活的重要组成部分。18 另一方面,随着互联网效能的提高,网络犯罪也随之增加。在过去的 15 年里,网络安全作为一种加快网络空间变革步伐的方式应运而生。网络安全是指一个国家或组织可以用来保护其在网络空间的资产和信息的程序。20 年前,"网络安全 "一词还鲜为人知[1]。网络安全不仅影响人,也影响组织或政府。近年来,一切都进展顺利,并使用了许多技术,如控制论、云计算、智能手机和物联网技术。网络攻击引发了人们对隐私、安全和金融安全的担忧。网络安全是一套技术、流程和实践,旨在防止对网络、计算机、操作和机器的攻击、破坏和未经授权的访问。本文的主要目的是详细介绍网络安全的类型、网络安全为何重要、网络安全框架、网络安全工具以及网络安全的问题点[2]。
{"title":"Operational Security, Safe Quantum, Space Communications and Data Privacy Cyber Security","authors":"","doi":"10.30534/ijns/2024/011322024","DOIUrl":"https://doi.org/10.30534/ijns/2024/011322024","url":null,"abstract":"In recent years the internet has become an important part of daily life for people around the world. 18 On the other hand, as the effectiveness of the internet increases, cybercrimes also increase. Over the last 15 years, cybersecurity has emerged as a way to accelerate the pace of change in cyberspace. Cybersecurity refers to the procedures a country or organization can use to protect its assets and information in cyberspace. Twenty years ago the term \"cybersecurity\" was little known to the public [1]. Cybersecurity affects not only people but also organizations or governments. In recent years, everything has been going well and it has used many technologies such as cybernetics, cloud computing, smartphones, and Internet of Things technology. Cyber attacks raise concerns about privacy, security, and financial security. Cybersecurity is a set of technologies, processes, and practices designed to prevent attacks, damage, and unauthorized access to networks, computers, operations, and machines. The main purpose of this article is to provide detailed information about types of cybersecurity, why cybersecurity is important, cybersecurity frameworks, cybersecurity tools, and problem points of cybersecurity [2].","PeriodicalId":516643,"journal":{"name":"International Journal of Networks and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140255025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Potential Impact of 5G Technology on Various Aspects of Technology Development 5G 技术对技术发展各方面的潜在影响
Pub Date : 2024-03-10 DOI: 10.30534/ijns/2024/031322024
The introduction of fifth-generation (5G) wireless systems marks an important milestone in the development of wireless communications. This development has the potential to revolutionize many industries and improve our daily lives. Our research paper aims to come up with an inclusive overview of the prospects and developments in 5G wireless systems. It provides an in-depth look at key issues, trends, and testing directions that will shape 5G network development and deployment in the years to come. Our research papers cover a wide range of topics, including networking, spectrum usage, device-to-device communication, massive MIMO, edge computing, security, and 5G technologies. We review the present state of research and ongoing projects, providing insight into the future of 5G wireless systems and their impact on society. As experts, we guarantee that our content will be effective, unique, engaging, and tailored to your specific needs and requirements. The demand for quick, more dependable wireless connections continues to increase, making the development and implementation of fifth-generation (5G) wireless networks more difficult. In this article, we provide a comprehensive overview of ongoing and future research in 5G wireless technology, highlighting key challenges and solutions. We are investigating the multiple input multiple output (MIMO) field where no antenna can be used to improve spectral efficiency and coverage. We examine the optimization of antenna configurations, beamforming strategies, and resource allocation strategies to maximize the advantage of large MIMO when addressing network devices and systems. Additionally, we are exploring the potential of millimeter wave (mm-Wave) communications to provide maximum data and bandwidth, and the integration of shared networks (HetNets) to improve service and capacity. We will also touch on the emergence of edge computing leading to poor quality applications and reduced network collaboration in 5G networks, and the importance of network connectivity that allows the physical network infrastructure to be divided into several sessions with different characteristics. By solving problems in these areas, we strive to unlock the full potential of 5G networks to transform the industry and pave the way for advanced and intelligent connectivity in the future.
第五代(5G)无线系统的推出标志着无线通信发展的一个重要里程碑。这一发展有可能彻底改变许多行业,改善我们的日常生活。我们的研究论文旨在对 5G 无线系统的前景和发展进行全面概述。它深入探讨了未来几年 5G 网络发展和部署的关键问题、趋势和测试方向。我们的研究论文涵盖广泛的主题,包括网络、频谱使用、设备间通信、大规模多输入多输出(MIMO)、边缘计算、安全和 5G 技术。我们回顾了研究现状和正在进行的项目,深入探讨了 5G 无线系统的未来及其对社会的影响。作为专家,我们保证我们的内容将是有效的、独特的、引人入胜的,并且是根据您的特定需求和要求量身定制的。对快速、更可靠的无线连接的需求不断增加,使得第五代(5G)无线网络的开发和实施变得更加困难。在本文中,我们将全面概述 5G 无线技术的当前和未来研究,重点介绍关键挑战和解决方案。我们正在研究多输入多输出(MIMO)领域,在这一领域,没有天线也能提高频谱效率和覆盖范围。我们研究了天线配置、波束成形策略和资源分配策略的优化,以便在处理网络设备和系统时最大限度地发挥大型 MIMO 的优势。此外,我们还将探索毫米波(mm-Wave)通信在提供最大数据和带宽方面的潜力,以及共享网络(HetNets)在改善服务和容量方面的整合。我们还将探讨边缘计算的出现导致 5G 网络应用质量低下和网络协作减少的问题,以及网络连接的重要性,这种网络连接可将物理网络基础设施划分为具有不同特性的多个会话。通过解决这些领域的问题,我们将努力释放 5G 网络的全部潜力,从而改变整个行业,并为未来先进的智能连接铺平道路。
{"title":"Potential Impact of 5G Technology on Various Aspects of Technology Development","authors":"","doi":"10.30534/ijns/2024/031322024","DOIUrl":"https://doi.org/10.30534/ijns/2024/031322024","url":null,"abstract":"The introduction of fifth-generation (5G) wireless systems marks an important milestone in the development of wireless communications. This development has the potential to revolutionize many industries and improve our daily lives. Our research paper aims to come up with an inclusive overview of the prospects and developments in 5G wireless systems. It provides an in-depth look at key issues, trends, and testing directions that will shape 5G network development and deployment in the years to come. Our research papers cover a wide range of topics, including networking, spectrum usage, device-to-device communication, massive MIMO, edge computing, security, and 5G technologies. We review the present state of research and ongoing projects, providing insight into the future of 5G wireless systems and their impact on society. As experts, we guarantee that our content will be effective, unique, engaging, and tailored to your specific needs and requirements. The demand for quick, more dependable wireless connections continues to increase, making the development and implementation of fifth-generation (5G) wireless networks more difficult. In this article, we provide a comprehensive overview of ongoing and future research in 5G wireless technology, highlighting key challenges and solutions. We are investigating the multiple input multiple output (MIMO) field where no antenna can be used to improve spectral efficiency and coverage. We examine the optimization of antenna configurations, beamforming strategies, and resource allocation strategies to maximize the advantage of large MIMO when addressing network devices and systems. Additionally, we are exploring the potential of millimeter wave (mm-Wave) communications to provide maximum data and bandwidth, and the integration of shared networks (HetNets) to improve service and capacity. We will also touch on the emergence of edge computing leading to poor quality applications and reduced network collaboration in 5G networks, and the importance of network connectivity that allows the physical network infrastructure to be divided into several sessions with different characteristics. By solving problems in these areas, we strive to unlock the full potential of 5G networks to transform the industry and pave the way for advanced and intelligent connectivity in the future.","PeriodicalId":516643,"journal":{"name":"International Journal of Networks and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140255369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on Supply Chain Management using Blockchain 利用区块链进行供应链管理综述
Pub Date : 2024-01-08 DOI: 10.30534/ijns/2024/091312024
Supply chain management is a process of transporting goods and products from source to destination. There are several problems that we encounter with current supply chain management (SCM) systems which include security, traceability, transaction transparency, stakeholder involvement, fraud, and instabilities. Blockchain emerges as a technology that can effectively and transparently manage data and foster trust. It can also help with payments made without the need for a third party or transaction authorization and verification in the supply chain. This study presents an overview of the literature on blockchain in the context of supply chains, including its benefits and challenges.
供应链管理是一个将货物和产品从源头运送到目的地的过程。目前的供应链管理(SCM)系统存在一些问题,包括安全性、可追溯性、交易透明度、利益相关者参与、欺诈和不稳定性。区块链是一种能够有效、透明地管理数据并促进信任的技术。区块链还可以帮助进行支付,而无需第三方或供应链中的交易授权和验证。本研究概述了供应链背景下的区块链文献,包括其优势和挑战。
{"title":"A Review on Supply Chain Management using Blockchain","authors":"","doi":"10.30534/ijns/2024/091312024","DOIUrl":"https://doi.org/10.30534/ijns/2024/091312024","url":null,"abstract":"Supply chain management is a process of transporting goods and products from source to destination. There are several problems that we encounter with current supply chain management (SCM) systems which include security, traceability, transaction transparency, stakeholder involvement, fraud, and instabilities. Blockchain emerges as a technology that can effectively and transparently manage data and foster trust. It can also help with payments made without the need for a third party or transaction authorization and verification in the supply chain. This study presents an overview of the literature on blockchain in the context of supply chains, including its benefits and challenges.","PeriodicalId":516643,"journal":{"name":"International Journal of Networks and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140512306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review On E-Commerce Application with Leveraged Cryptosystems and Big Data 利用密码系统和大数据的电子商务应用回顾
Pub Date : 2024-01-08 DOI: 10.30534/ijns/2024/061312024
The fast improvements in technology and the growing desire for safe and easy online purchasing have caused a dramatic shift in the e-commerce market in recent years. The merging of big data analysis and encryption, two potent instruments that are transforming how companies run and customers interact in the digital marketplace, is at the core of this change. In e-commerce applications, cryptography, the study of secure communication, is essential for maintaining transaction integrity, protecting user privacy, and securing sensitive data. Businesses may optimize pricing strategies, improve auction efficiency, and obtain important consumer insights by practicing big data analysis, which is the art of gleaning insights from large volumes of bidding data. This in-depth analysis explores the diverse applications of big data analysis and cryptography in the e-commerce industry, delving into their complex worlds. We look at the underlying ideas behind these technologies, the range of applications they can be used for, and how they affect the entire e-commerce ecosystem
近年来,技术的飞速进步以及人们对安全、便捷的在线购物的日益渴望,导致电子商务市场发生了巨大变化。大数据分析和加密技术这两种强有力的工具正在改变着数字市场中公司的运营方式和客户的互动方式,而两者的融合正是这一变革的核心所在。在电子商务应用中,研究安全通信的密码学对于维护交易完整性、保护用户隐私和敏感数据的安全至关重要。大数据分析是从大量竞价数据中获取洞察力的一门艺术,企业可以通过大数据分析优化定价策略、提高拍卖效率并获得重要的消费者洞察力。这篇深入分析探讨了大数据分析和密码学在电子商务行业的各种应用,深入探讨了它们的复杂世界。我们将探讨这些技术背后的基本理念、它们的应用范围以及它们对整个电子商务生态系统的影响。
{"title":"Review On E-Commerce Application with Leveraged Cryptosystems and Big Data","authors":"","doi":"10.30534/ijns/2024/061312024","DOIUrl":"https://doi.org/10.30534/ijns/2024/061312024","url":null,"abstract":"The fast improvements in technology and the growing desire for safe and easy online purchasing have caused a dramatic shift in the e-commerce market in recent years. The merging of big data analysis and encryption, two potent instruments that are transforming how companies run and customers interact in the digital marketplace, is at the core of this change. In e-commerce applications, cryptography, the study of secure communication, is essential for maintaining transaction integrity, protecting user privacy, and securing sensitive data. Businesses may optimize pricing strategies, improve auction efficiency, and obtain important consumer insights by practicing big data analysis, which is the art of gleaning insights from large volumes of bidding data. This in-depth analysis explores the diverse applications of big data analysis and cryptography in the e-commerce industry, delving into their complex worlds. We look at the underlying ideas behind these technologies, the range of applications they can be used for, and how they affect the entire e-commerce ecosystem","PeriodicalId":516643,"journal":{"name":"International Journal of Networks and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139640627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Blue Brain Technology Frontiers 探索蓝脑技术前沿
Pub Date : 2024-01-08 DOI: 10.30534/ijns/2024/081312024
Scientists are indeed conducting research in the field of creating artificial brains that can mimic human cognitive functions and store memories. One such project is the ‖Blue Brain‖ project, a collaboration between IBM and scientists at Switzerland’s Ecole Polytechnique Federale de Lausanne’s Brain and Mind Institute. The aim of this Blue Brain project is to simulate the biological systems contained in the brain and create a working 3-dimensional model that replicates the electro- chemical interactions occurring within the brain. This model intends to recreate various cognitive functions such as language, learning, perception, and memory, as well as investigate brain disorders like depression and autism. If successful, the project’s simulations may provide views into the convoluted relationships between genetic, molecular, and cognitive parts of the brain. It’s important to note that while the Blue Brain project represents a significant step forward in understanding the brain, it is not focused on uploading a human brain into a machine or achieving a complete replication of human consciousness. The concept of uploading a human brain into a machine, commonly known as mind uploading or whole brain emulation, is a topic of speculation and philosophical debate. Currently, there is no scientific consensus on whether such a feat is theoretically possible or how it could be achieved. Even though major advancements are being made in neuroscience and artificial intelligence, the complexities in the human brain and consciousness present significant challenges for any attempt to create a complete and functioning virtual replica. It’s worth noting that ethical, philosophical, and societal considerations are also crucial when discussing the potential implications of these technologies. The development of artificial brains and the possibility of mind uploading raise profound questions about identity, person hood, and the nature of consciousness. These topics continue to be subjects of ongoing scientific and philosophical discourse.
科学家们确实正在研究如何创造出能够模仿人类认知功能和存储记忆的人造大脑。其中一个项目是 "蓝脑 "项目,该项目由 IBM 与瑞士洛桑联邦理工学院脑与思维研究所的科学家合作开展。蓝脑 "项目的目的是模拟大脑中的生物系统,并创建一个可工作的三维模型,以复制大脑中发生的电子-化学相互作用。该模型旨在重现语言、学习、感知和记忆等各种认知功能,并研究抑郁症和自闭症等脑部疾病。如果取得成功,该项目模拟的大脑基因、分子和认知部分之间错综复杂的关系可能会让人豁然开朗。值得注意的是,虽然 "蓝脑 "项目代表着人类在了解大脑方面向前迈出了重要一步,但它的重点并不是将人脑上传到机器中或实现人类意识的完全复制。将人脑上载到机器中的概念,通常被称为 "思想上载 "或 "全脑仿真",是一个充满猜测和哲学争论的话题。目前,科学界尚未就这一壮举在理论上是否可行或如何实现达成共识。尽管神经科学和人工智能领域正在取得重大进展,但人脑和意识的复杂性给任何创造一个完整的、功能正常的虚拟复制品的尝试带来了巨大挑战。值得注意的是,在讨论这些技术的潜在影响时,伦理、哲学和社会因素也至关重要。人造大脑的开发和思想上传的可能性提出了关于身份、人罩和意识本质的深刻问题。这些话题将继续成为科学和哲学讨论的主题。
{"title":"Exploring Blue Brain Technology Frontiers","authors":"","doi":"10.30534/ijns/2024/081312024","DOIUrl":"https://doi.org/10.30534/ijns/2024/081312024","url":null,"abstract":"Scientists are indeed conducting research in the field of creating artificial brains that can mimic human cognitive functions and store memories. One such project is the ‖Blue Brain‖ project, a collaboration between IBM and scientists at Switzerland’s Ecole Polytechnique Federale de Lausanne’s Brain and Mind Institute. The aim of this Blue Brain project is to simulate the biological systems contained in the brain and create a working 3-dimensional model that replicates the electro- chemical interactions occurring within the brain. This model intends to recreate various cognitive functions such as language, learning, perception, and memory, as well as investigate brain disorders like depression and autism. If successful, the project’s simulations may provide views into the convoluted relationships between genetic, molecular, and cognitive parts of the brain. It’s important to note that while the Blue Brain project represents a significant step forward in understanding the brain, it is not focused on uploading a human brain into a machine or achieving a complete replication of human consciousness. The concept of uploading a human brain into a machine, commonly known as mind uploading or whole brain emulation, is a topic of speculation and philosophical debate. Currently, there is no scientific consensus on whether such a feat is theoretically possible or how it could be achieved. Even though major advancements are being made in neuroscience and artificial intelligence, the complexities in the human brain and consciousness present significant challenges for any attempt to create a complete and functioning virtual replica. It’s worth noting that ethical, philosophical, and societal considerations are also crucial when discussing the potential implications of these technologies. The development of artificial brains and the possibility of mind uploading raise profound questions about identity, person hood, and the nature of consciousness. These topics continue to be subjects of ongoing scientific and philosophical discourse.","PeriodicalId":516643,"journal":{"name":"International Journal of Networks and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140512326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safeguarding Networks: The Role of Cryptography 保护网络:密码学的作用
Pub Date : 2024-01-08 DOI: 10.30534/ijns/2024/111312024
Due to complex network threats, network security faces unprecedented challenges in a rapidly changing environment. These details highlight the importance of cryptography in protecting networks from today's threats. The development of technology has led to the increase in connected devices, the expansion of parking areas and the need for security measures. Honest and confidential information is protected by encryption technology using complex methods and algorithms. The brief reviews state-of-the-art cryptographic techniques and highlights the importance of quantum-resistant mechanisms against the threat of quantum computing. It explores how cryptography can be used together with technologies such as blockchain, artificial intelligence and the Internet of Things, and emphasizes its importance in ensuring the security of these areas. It envisions the development and implementation of post-quantum cryptography, covers concepts such as homomorphic encryption and zero-knowledge proofs, and addresses issues of cryptographic efficiency and creative control. It aims to protect networks from new threats and ensure secure data exchange by meeting the need for strong cryptographic protection in the evolving business environment.
由于复杂的网络威胁,网络安全在瞬息万变的环境中面临着前所未有的挑战。这些细节凸显了密码学在保护网络免受当今威胁方面的重要性。技术的发展导致联网设备的增加、停车区域的扩大以及对安全措施的需求。诚实和机密的信息通过使用复杂方法和算法的加密技术得到保护。简介回顾了最先进的加密技术,并强调了抗量子机制在应对量子计算威胁方面的重要性。它探讨了密码学如何与区块链、人工智能和物联网等技术结合使用,并强调了密码学在确保这些领域安全方面的重要性。它设想了后量子加密技术的发展和实施,涵盖了同态加密和零知识证明等概念,并探讨了加密效率和创造性控制等问题。它旨在保护网络免受新的威胁,并通过满足在不断发展的商业环境中对强大加密保护的需求来确保数据交换的安全。
{"title":"Safeguarding Networks: The Role of Cryptography","authors":"","doi":"10.30534/ijns/2024/111312024","DOIUrl":"https://doi.org/10.30534/ijns/2024/111312024","url":null,"abstract":"Due to complex network threats, network security faces unprecedented challenges in a rapidly changing environment. These details highlight the importance of cryptography in protecting networks from today's threats. The development of technology has led to the increase in connected devices, the expansion of parking areas and the need for security measures. Honest and confidential information is protected by encryption technology using complex methods and algorithms. The brief reviews state-of-the-art cryptographic techniques and highlights the importance of quantum-resistant mechanisms against the threat of quantum computing. It explores how cryptography can be used together with technologies such as blockchain, artificial intelligence and the Internet of Things, and emphasizes its importance in ensuring the security of these areas. It envisions the development and implementation of post-quantum cryptography, covers concepts such as homomorphic encryption and zero-knowledge proofs, and addresses issues of cryptographic efficiency and creative control. It aims to protect networks from new threats and ensure secure data exchange by meeting the need for strong cryptographic protection in the evolving business environment.","PeriodicalId":516643,"journal":{"name":"International Journal of Networks and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140512489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of 5G on IoT Ecosystems 5G 对物联网生态系统的影响
Pub Date : 2024-01-08 DOI: 10.30534/ijns/2024/071312024
The convergence of 5G and IoT is revolutionizing industries by enhancing connectivity, scalability, and security. This synergy enables efficient edge computing, reducing latency and optimizing data processing. Security measures like authentication and encryption are crucial for protecting sensitive data. The integration of 5G and IoT opens innovative business avenues, transforming manufacturing, logistics, healthcare, and more. Businesses can optimize operations, automate processes, and enhance customer experiences, making it essential to embrace this transformative potential for staying competitive and capitalizing on advancements.
5G 与物联网的融合正在通过增强连接性、可扩展性和安全性为各行各业带来变革。这种协同作用可实现高效的边缘计算,减少延迟并优化数据处理。身份验证和加密等安全措施对保护敏感数据至关重要。5G 与物联网的融合开辟了创新的商业途径,改变了制造、物流、医疗保健等行业。企业可以优化运营、实现流程自动化并提升客户体验,因此必须抓住这一变革潜力,以保持竞争力并利用先进技术。
{"title":"The Impact of 5G on IoT Ecosystems","authors":"","doi":"10.30534/ijns/2024/071312024","DOIUrl":"https://doi.org/10.30534/ijns/2024/071312024","url":null,"abstract":"The convergence of 5G and IoT is revolutionizing industries by enhancing connectivity, scalability, and security. This synergy enables efficient edge computing, reducing latency and optimizing data processing. Security measures like authentication and encryption are crucial for protecting sensitive data. The integration of 5G and IoT opens innovative business avenues, transforming manufacturing, logistics, healthcare, and more. Businesses can optimize operations, automate processes, and enhance customer experiences, making it essential to embrace this transformative potential for staying competitive and capitalizing on advancements.","PeriodicalId":516643,"journal":{"name":"International Journal of Networks and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140512155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Networks and Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1