Advances in web technologies and engineering book series,
Год журнала:
2024,
Номер
unknown, С. 147 - 160
Опубликована: Сен. 27, 2024
This
chapter
looks
into
does
artificial
intelligence
(AI)
and
blockchain
technology
(BT)
can
save
costs
in
finance
assiduity?
It
seeks
to
identify
inefficiencies,
probe
the
functions
of
AI
blockchain,
give
styles
for
perpetration.
Data
are
collected
from
workers
fiscal
sector,
which
is
also
anatomized
using
SPSS.
The
chapter's
results
show
that
there
numerous
openings
ameliorate
effectiveness,
particularly
areas
credit
underwriting,
loan
servicing,
title
insurance.
still,
relinquishment
DT
depends
on
prostrating
artistic,
legal,
data
norms
obstacles.
In
end,
combining
BT
may
affect
sector
cost
reductions
service
advancements,
significantly
impacting
organizational
procedures,
technology,
policy.
Advances in medical technologies and clinical practice book series,
Год журнала:
2024,
Номер
unknown, С. 280 - 296
Опубликована: Апрель 26, 2024
Since
its
launch,
Healthcare
4.0
has
made
it
possible
to
create
and
enhance
the
quality
of
healthcare
services
by
integrating
cutting-edge
technologies.
We
have
focused
this
study
on
a
few
studies
that
potential
significantly
impact
advancing
systems
in
future.
identified
critical
research
gaps
introduced
IoT
Application
Service
Stacks,
representing
state-of-the-art
contemporary
systems.
Additionally,
we
discussed
most
recent
paradigm
for
wireless
body
area
networks
importance
how
advanced
technology
helps
next-generation
health
applications,
such
as
big
data
analytics,
software-defined
networking,
blockchain,
cloud
computing,
edge/fog
telehealthcare,
machine
learning.
conducted
comparative
analysis
several
architectural
implementations,
considering
their
benefits,
drawbacks,
needs
service.
greatly
emphasize
significance
various
developing
technologies,
outlining
prospects
they
present
ability
improve
solutions
deliver
higher-quality
services.
The
primary
objective
chapter
is
focus
fundamentals
establishing
security
privacy
future
system.
Advances in medical technologies and clinical practice book series,
Год журнала:
2024,
Номер
unknown, С. 297 - 311
Опубликована: Апрель 26, 2024
The
primary
objective
of
this
chapter
is
to
provide
a
framework
for
smart
healthcare
in
5G
and
focus
on
requirements
an
intelligent
medical
system
design.
Advancements
technology
Internet
access
have
connected
people
various
devices
that
can
interact
with
one
another.
Today,
bridge
the
gaps
many
fields,
including
medicine.
Smart
transitioning
from
specialist
clinic
approach
more
dispersed,
patient-centred
model.
Technological
developments
facilitated
several
technologically
accelerated
evolutions
sector.
4G
other
communications
technologies
are
currently
employed
apps
services.
These
innovations
critical
services
future.
Several
applications
produce
vast
amounts
data
formats
sizes
as
business
grows.
Such
diverse
necessitates
unique
considerations
terms
end-to-end.
Current
communication
systems
will
need
help
meet
demands
dynamic
time
sensitive.
As
result,
infrastructures
being
conceived.
5G-enabled
conglomeration
IoT
strategies
demand
efficiency
system.
networking
solutions
confront
difficulties
such
supporting
gadgets,
standardization,
safety.
It
gives
complete
assessment
5G-supported
society
4.0.
Advances in logistics, operations, and management science book series,
Год журнала:
2024,
Номер
unknown, С. 176 - 233
Опубликована: Янв. 19, 2024
The
rapid
advancement
of
Industry
4.0
technologies
has
ushered
in
a
new
era
supply
chain
management
(SCM)
that
places
sustainability
at
its
core.
This
chapter
goes
deep
into
the
critical
intersection
metrics
and
measurement
4.0-enabled
SCM,
exploring
dynamic
landscape
where
cutting-edge
technology
meets
environmental,
social,
economic
responsibility.
Beginning
with
an
introduction
to
4.0's
transformative
role
authors
elucidate
importance
this
context.
research's
scope
objectives
are
outlined,
emphasizing
need
decipher
intricacies
ecosystem.
provide
comprehensive
elucidation
key
concepts,
definitions,
unique
contributions
research
endeavour.
A
central
focus
is
alignment
SCM
United
Nations'
Sustainable
Development
Goals
(SDGs),
illuminating
how
emerging
can
act
as
catalysts
for
achieving
these
global
objectives.
Advances in medical technologies and clinical practice book series,
Год журнала:
2024,
Номер
unknown, С. 87 - 103
Опубликована: Апрель 26, 2024
The
primary
object
of
this
chapter
is
to
discuss
the
morals
and
difficulties
we
would
face
while
dealing
with
unprecedented
situation
another
sentient
coexisting
on
Earth
us
focus
explainable
AI
tools
frameworks
comprehend
better
analyze
predictions
that
machine
learning
models
can
make.
Develop
systems
inclusive
from
bottom
up
using
help
identify
fix
bias,
drift,
other
data
model
deficiencies.
Data
scientists
may
modify
datasets
or
designs
debug
performance
Explanations
in
Auto
ML
Tables,
Vertex
predictions,
Notebooks.
Users
gain
confidence
improve
transparency
ease
understanding
patterns
identified
represented
by
explanation.
Simplify
training
evaluation
monitoring
control
manage
within
company.
It
tracks
a
few
made
for
AI.
some
forecasts
our
provide
As
result
technological
advancements,
starting
play
more
significant
role
healthcare
industry.
However,
substantial
drawbacks
area
prevent
incorporating
into
existing
systems.
Artificial
intelligence
(AI)
works
“black
box,”
making
it
difficult
grasp
model's
inner
workings
due
its
complexity.
result,
specialists
need
industry
understand
how
generates
results.
Additionally,
authors
specifically
one
humanities
will
AI:
effects
decisions
no
human
advances
applications
across
comprehensive-broader
range
clinical
queries.
Zero-day
threats
are
a
more
severe
and
constantly
developing
menace
to
various
participants
including
large
companies,
government
offices,
educational
establishments.
These
entities
may
contain
valuable
information
essential
operations
that
attract
cyber
attackers.
exploits
especially
devastating
as
they
target
weaknesses
an
organization’s
vendors
not
even
aware
of,
making
them
have
no
protection
against
them.
This
paper
focuses
on
the
background
use
of
zero-day
exploitation
structure
technologies
these
complex
malware
attacks.
We
examine
two
notable
real-life
cases:
case
‘HAFNIUM
targeting
Exchange
Servers
with
exploits’
was
investigated
by
Microsoft
365
Security
Threat
Intelligence,
‘Log4j
vulnerability’
reported
National
Cyber
Centre.
cases
show
critical
effects
vulnerabilities
measures
taken
combat
Additionally,
this
outlines
different
strategies
can
be
used
prevent
attacks
help
modern
technologies.
fast
patch
release,
effective
IDS/IPS,
security
model
involves
constant
vigilance
behavioral
analytics.
Thus,
studying
lifecycle
exploits,
one
enhance
organization
invisible
traditional
systems.
extensive
survey
is
designed
useful
in
understanding
characteristics
vulnerabilities,
for
their
mitigation,
threat
development
field
cybersecurity.
it
possible
strengthen
develop
time
analyzing
previous
events
predicting
potential
problems.
Advances in logistics, operations, and management science book series,
Год журнала:
2024,
Номер
unknown, С. 89 - 132
Опубликована: Янв. 19, 2024
This
chapter
explores
the
convergence
of
Industry
4.0
technologies
and
sustainable
supply
chain
practices,
presenting
a
comprehensive
overview
these
digital
advancements'
transformative
potential.
The
begins
by
defining
intersection
between
sustainability
4.0,
emphasizing
pivotal
role
in
fostering
environmentally
socially
responsible
chains.
With
clear
objectives
mind,
exploration
delves
into
impact
key
on
practices.
discussion
spans
utilization
internet
things
(IoT)
for
real-time
monitoring,
big
data
analytics
informed
decision-making,
integration
robotics
to
enhance
ethical
manufacturing.
Advances in logistics, operations, and management science book series,
Год журнала:
2024,
Номер
unknown, С. 342 - 405
Опубликована: Янв. 19, 2024
The
advent
of
Industry
4.0,
characterized
by
the
integration
digital
technologies
into
industrial
processes,
has
ushered
in
a
transformative
era
for
manufacturing
and
beyond.
This
chapter
delves
future
trends
research
directions
that
will
shape
landscape
4.0
coming
years.
One
prominent
trend
is
continued
proliferation
internet
things
(IoT)
its
convergence
with
artificial
intelligence
(AI).
As
IoT
devices
become
more
interconnected
intelligent,
they
enable
real-time
data
analysis,
predictive
maintenance,
adaptive
manufacturing,
fostering
increased
efficiency
cost-effectiveness
across
industries.
Moreover,
rise
edge
computing
set
to
redefine
processing
analytics.
deployment
powerful
resources
closer
source
promises
reduced
latency
enhanced
decision-making
capabilities,
particularly
critical
applications
like
autonomous
remote
robotics.
The
current
era
in
which
we
live
is
centered
on
information
technology
because
the
renaissance
of
and
its
expansion
multiple
scales
fields.
People
who
have
a
high
knowledge
passion
for
it
seek
to
disseminate
this
process
correctly,
computers
now
become
one
most
essential
devices
government
operations.
Large
companies
already
begun
use
businesses,
has
helped
direct
some
procedures
joint
e-government,
allows
people
access
services
from
home
their
computers.
It
also
not
hidden
that
with
increase
computer
use,
electronic
crimes
increased,
contributed
formation
laws.
In
various
countries
deal
them.
As
evolves,
sophistication
impact
these
cyber
threats
continue
grow,
posing
significant
challenges
cybersecurity.
This
research
discusses
role
against
cybercrime,
regulations,
allowable
behavior
using
Saudi
Arabia.
analyzes
cybercrime
Kingdom
system
combating
cybercrime.
Advances in information security, privacy, and ethics book series,
Год журнала:
2024,
Номер
unknown, С. 1 - 52
Опубликована: Июль 26, 2024
Generative
AI
techniques
have
been
popular
since
they
can
generate
data
or
content
that
could
be
hardly
distinguished
from
genuine
ones.
This
chapter
comprehensively
reviews
generative
for
cybersecurity
and
its
definition,
history,
applications
in
different
fields.
It
covers
basic
ideas
such
as
models,
probability
distributions,
latent
spaces.
Also,
it
goes
into
more
detail
on
some
of
the
approaches
like
GANs,
VAEs,
combination
RL.
The
explores
structure
training
processes
GANs
VAEs
demonstrates
their
application
tasks
image
synthesis,
enhancement,
novelty
detection.
interaction
between
RL
models
challenges,
including
exploration-exploitation
trade-off.
focuses
development
with
help
DL
analyses
benefits
deep
usage
various
Evaluation
measures
problems
measuring
are
discussed,
focusing
methods
improving
measurement
accuracy.
Finally,
new
directions,
transformer-based
self-supervised
learning,
to
look
at
future
AI.
emphasis
is
made
understanding
these
due
versatility,
about
possible
further
developments
findings
other
fields
studies
provided.
Advances in digital crime, forensics, and cyber terrorism book series,
Год журнала:
2024,
Номер
unknown, С. 191 - 234
Опубликована: Сен. 12, 2024
Collaboration
in
providing
threat
intelligence
and
disseminating
information
enables
cyber
security
professionals
to
embrace
digital
most
successfully,
whose
risks
are
ever-changing.
This
article
dwells
on
the
capacity
of
machine
change
by
categorising
indicators
compromise
(IOC)
actors,
then
highlights
limits
traditional
methods.
Among
Artificial
tools
such
as
generative
adversarial
networks
(GANs)
Variational
autoencoders
(VAEs),
which
key
innovators,
one
can
create
synthetic
or
fake
data
that
emulates
real
attack
scenarios
past.
allows
cyber-related
be
analysed
differently
from
before.
In
addition,
this
feature
secure
stakeholder
collaborations.
It
is
also
meant
mainly
for
factual
protects
private
but
exchange
helpful
information.
clear
fact
showcasing
real-world
examples
demonstrates
Al's
automation
through
cybersecurity
detection.