Research on Power Supply Chain Security Risk Monitoring based on Particle Swarm Optimization DOI
Junyi Li,

Yating Jin,

Huiying Weng

et al.

2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC), Journal Year: 2023, Volume and Issue: unknown

Published: Oct. 27, 2023

Language: Английский

Securing the Digital Supply Chain Cyber Threats and Vulnerabilities DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan

et al.

Advances in logistics, operations, and management science book series, Journal Year: 2023, Volume and Issue: unknown, P. 156 - 223

Published: Dec. 29, 2023

The digital supply chain has become an integral part of modern business operations, enabling efficient and streamlined processes. However, with the rapid advancement technology, landscape increasingly vulnerable to cyber threats attacks. This chapter explores critical issue cybersecurity within context chain, aiming equip professionals practitioners knowledge strategies safeguard their operations. Lastly, sheds light on emerging technologies future trends concludes a call action for securing chain. It also highlights challenges directions in urging stay vigilant adapt evolving technologies. Overall, this serves as comprehensive guide empowering readers fortify operations against ensure resilience networks.

Language: Английский

Citations

21

Designing the Location–Routing Problem for a Cold Supply Chain Considering the COVID-19 Disaster DOI Open Access
Sina Abbasi,

Maryam Moosivand,

Ilias Vlachos

et al.

Sustainability, Journal Year: 2023, Volume and Issue: 15(21), P. 15490 - 15490

Published: Oct. 31, 2023

In this study, a location routing problem (LRP) model was considered for the distribution network of multiple perishable food items in cold supply chain (CSC) where vehicles can refuel at gas stations during light COVID-19 disaster. Fuel consumption is assumed to vary depending on cargo transported between nodes when using non-standard fuel fleet. The formulated as mixed-integer linear programming (MILP) reduce production carbon dioxide (CO2). validated several numerical examples which were solved software, LINGO 17.0. results show that could be reduced case. Due complexity problem, genetically simulated annealing algorithms developed solve actual size problems, and their performance also evaluated.

Language: Английский

Citations

17

Enhanced Network Intrusion Detection System Using PCGSO-Optimized BI-GRU Model in AI-Driven Cybersecurity DOI
Priyan Malarvizhi Kumar,

Kavya Vedantham,

S. Jeeva

et al.

Published: Feb. 7, 2024

Language: Английский

Citations

6

Blockchain-Based and Value-Driven Enterprise Data Governance: A Collaborative Framework DOI Open Access
Zhi Li,

Fuhe Liang,

Henan Hu

et al.

Sustainability, Journal Year: 2023, Volume and Issue: 15(11), P. 8578 - 8578

Published: May 25, 2023

The traditional mode of cooperation between enterprises still suffers from major problems, including data privacy leakage, falsification, and inefficient collaboration in sharing. These challenges make it difficult for to ensure that their cooperative suppliers adopt sustainable practices standards identification operation processes. This paper proposes a “Value–Standard–Process” collaborative framework blockchain-based enterprise governance helps high degree security, reliability tasks, transparency value transformation. First, this new manufacturing the sharing economy, non-linear dynamic evaluation balancing mechanism with multiple attributes, trusted manufacturing, smart contract generation value-driven collaboration. Second, explains these three components implementation overall framework. Third, verifies applicability achievability proposed through experiments. Establishing multi-level facilitates effective flow production factors promotes trust digital economy sustainability.

Language: Английский

Citations

12

Integrating ESG Principles into Smart Logistics: Toward Sustainable Supply Chains DOI

Leogrande Angelo

Published: Jan. 1, 2025

Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI

Language: Английский

Citations

0

Navigating the Maze: Exploring Blockchain Privacy and Its Information Retrieval DOI Creative Commons
Archana Chhabra, Rahul Saha, Gulshan Kumar

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 32089 - 32110

Published: Jan. 1, 2024

Blockchain networks provide a reliable and secure mode of communication due to their decentralized distributed nature. The emergence amalgamated blockchain-based internet-of-things (IoT) systems has generated huge amount data be online. Though blockchains show potential for ensuring transparency, traceability, immutable records, the privacy online in becomes question. blockchain transactions is at stake as various breaching methods are used by attackers such linking transactions, deanonymization, etc. However, benefits make technology dominator present future technological paradigms. other side coin deals with information retrieval (PIR), which necessary retrieve private from servers without much revealing. conjunction PIR very critical an important aspect solutions. In this survey, we pioneer analyzing factors existing We discuss parameters enhancement techniques comprehensively. applicability domains including e-commerce, supply chain, healthcare, IoT. also PIR-related issues solutions literature. highlight open research problems collaborating improve blockchains. Our survey beneficial academia industries aware status address identified loopholes better.

Language: Английский

Citations

2

IoT cryptography with privacy-preserving ElGamal public key cryptosystem using oppositional artificial flora optimization algorithm DOI

Devi Paramasivam,

Sathyalakshmi Sivaji,

Venkata Subramanian Dayanandan

et al.

Multimedia Tools and Applications, Journal Year: 2024, Volume and Issue: unknown

Published: May 9, 2024

Language: Английский

Citations

1

Research on Transparency and Optimization of Aviation Materials Supply Chain based on Blockchain DOI

Chunpeng Zhang

2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT), Journal Year: 2024, Volume and Issue: unknown, P. 334 - 339

Published: April 6, 2024

This research delves into the transformative impact of blockchain technology on aviation material supply chain, with a focus enhancing transparency and optimization. Using AC Airlines as case study, paper illustrates substantial benefits derived from implementation in chain management. The results indicate noteworthy 33% reduction procurement cycle time, showcasing efficiency gains achieved through blockchain. Additionally, there is remarkable 40% decrease average inventory costs, underscoring financial advantages associated adoption. study emphasizes significant improvement throughout critical factor industry. Blockchain not only streamlines processes but also enhances visibility, contributing to better decision-making risk findings further reveal 66% increase emergency response efficiency, demonstrating pivotal role facilitating quick effective responses unforeseen events. A key highlight this 75% cut annual incident signifying resilience mitigation capabilities offered by argues for blockchain's potential strengthen overall resilience, positioning it strategic tool gaining competitive advantage sector.

Language: Английский

Citations

1

Sustainable Entrepreneurship in Emerging Economies (BRICS) DOI
Sachin Prakash Srivastava, Sonali Srivastava,

Himanshu Varshney

et al.

Advances in business strategy and competitive advantage book series, Journal Year: 2024, Volume and Issue: unknown, P. 255 - 284

Published: Nov. 29, 2024

Emerging economies often face challenges of suboptimal resource allocation, socioeconomic disparities, and deficiencies in healthcare social welfare provisions. India's journey to become the third-largest start-up ecosystem globally clearly demonstrates how entrepreneurship has successfully tackled these difficulties. Nevertheless, using sustainable business concepts entrepreneurial activities is crucial for sustainably addressing challenges. Conventional beliefs chase only profit motives, but promotes a fundamental change belief that businesses may achieve financial gain while safeguarding environment by focusing on people, profit, planet. This chapter elucidated significance alleviating economic inadequacies developing nations. Additionally, it explores growing opportunities arise from implementing circular economy SDG objectives.

Language: Английский

Citations

1

Security challenges in civil registration: safeguarding vital information in an evolving landscape DOI Creative Commons

Peter Kennedy Okoth

World Journal of Advanced Research and Reviews, Journal Year: 2023, Volume and Issue: 19(1), P. 1051 - 1071

Published: July 26, 2023

Civil registration is a fundamental process that captures vital events such as births, deaths, marriages, and divorces, enabling governments to create accurate demographic databases deliver essential services their citizens. However, in today's digital age, civil systems face numerous security challenges jeopardize the integrity confidentiality of information. This paper highlights some key encountered outlines potential strategies address them. Firstly, digitization processes has opened new avenues for cyber threats. Malicious actors may attempt compromise databases, manipulate or steal records, disrupt through cyberattacks. Robust cybersecurity measures, including encryption, firewalls, intrusion detection systems, regular audits, are safeguard sensitive data ensure continuity operations. Secondly, issue identity theft poses significant challenge security. Fraudulent practices, creation fake identities alteration existing can undermine trustworthiness system lead misallocation resources. The implementation verification mechanisms, biometrics unique identifiers, enhance accuracy while reducing risk fraud. Thirdly, ensuring privacy individuals' personal information critical systems. With increasing interconnectedness data, there heightened unauthorized access breaches. Strong protection regulations, robust controls, encryption techniques help mitigate these risks, fostering public trust confidence processes. Moreover, inclusivity must be addressed effectiveness reliability Marginalized populations, refugees, migrants, those residing remote areas, barriers accessing services, leaving them vulnerable identity-related challenges. Deploying mobile units, leveraging innovative technologies, promoting community engagement improve extend benefits all individuals.

Language: Английский

Citations

2