Blockchain applications for secured and resilient supply chains: A systematic literature review and future research agenda
Firms are using blockchain technology to prevent fraudulent activities through consensus
mechanisms and help identify data tampering through its underlying characteristics, such as …
mechanisms and help identify data tampering through its underlying characteristics, such as …
[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …
sources in the cloud during transit and processing. For instance, data provenance, which …
Semi-supervised few-shot learning approach for plant diseases recognition
Background Learning from a few samples to automatically recognize the plant leaf diseases
is an attractive and promising study to protect the agricultural yield and quality. The existing …
is an attractive and promising study to protect the agricultural yield and quality. The existing …
Technology assessment: Enabling Blockchain in hospitality and tourism sectors
The tourism and hospitality sector's inequitable environment demands an unassailable and
disruptive technology that optimizes its operational efficiencies. Thus, this paper aims to …
disruptive technology that optimizes its operational efficiencies. Thus, this paper aims to …
Leveraging blockchain to improve nutraceutical supply chain resilience under post-pandemic disruptions
Due to the pandemic, there has been an increase in the use of dietary supplements to boost
the body's immune system. A demand–supply mismatch exists as a result of the unexpected …
the body's immune system. A demand–supply mismatch exists as a result of the unexpected …
[HTML][HTML] Entropy-based redundancy analysis and information screening
The ongoing data explosion introduced unprecedented challenges to the information
security of communication networks. As images are one of the most commonly used …
security of communication networks. As images are one of the most commonly used …
Privacy in targeted advertising on mobile devices: a survey
Targeted advertising has transformed the marketing landscape for a wide variety of
businesses, by creating new opportunities for advertisers to reach prospective customers by …
businesses, by creating new opportunities for advertisers to reach prospective customers by …
Differential game model of information sharing among supply chain finance based on blockchain technology
M Xu, S Ma, G Wang - Sustainability, 2022 - mdpi.com
In the development of traditional supply-chain finance, the information asymmetry of all
parties in the supply chain has become the primary problem hindering its development …
parties in the supply chain has become the primary problem hindering its development …
A time-saving path planning scheme for autonomous underwater vehicles with complex underwater conditions
Autonomous underwater vehicle (AUV) shows great potential in the Internet of Underwater
Things (IoUT) system, in which the path planning algorithm plays a fundamental role …
Things (IoUT) system, in which the path planning algorithm plays a fundamental role …
Few-shot imbalanced classification based on data augmentation
X Chao, L Zhang - Multimedia Systems, 2023 - Springer
Few-shot imbalanced classification tasks are commonly faced in the real-world applications
due to the unbalanced data distribution and few samples of rare classes. As known, the …
due to the unbalanced data distribution and few samples of rare classes. As known, the …