[go: up one dir, main page]

 
 
applsci-logo

Journal Browser

Journal Browser

Internet of Things, Artificial Intelligence, and Blockchain Infrastructure: Applications, Security, and Perspectives

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: 31 March 2025 | Viewed by 53665

Special Issue Editor


E-Mail Website
Guest Editor
Department of Mathematics and Computer Science, University of Cagliari, Via Ospedale 72, 09124 Cagliari, Italy
Interests: data mining; machine learning; anomaly detection; recommender systems; security
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Modern societies are currently experiencing an increasing adoption of interconnected wireless devices, a revolutionary technological paradigm named the Internet of Things (IoT). This represents an ever-growing scenario that offers enormous opportunities in multiple areas of our societies, especially if we combine the IoT with another emerging technology named blockchain, since it allows us to public certify any data transactions without the need to use central authorities or intermediaries. This Special Issue aims to bring together scientists from different areas, with the goal to both present their recent research findings and exchange ideas related to the exploitation of the opportunities of these technologies, also when their exploitation involves other powerful technologies, such as those based on Artificial Intelligence (AI).

This Special Issue welcomes research papers showing fundamental and applied research on the aforementioned research scenario and high-quality survey papers.

Potential topics include but are not limited to:

  • Internet of Things security;
  • Wireless data exchange models;
  • Wireless multimedia sensor networks;
  • Localization of people and things;
  • User clustering and profiling;
  • Artificial Intelligence;
  • Blockchain;
  • Machine learning;
  • Deep neural networks;
  • Big data.

Dr. Roberto Saia
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • internet
  • Internet of Things
  • Artificial Intelligence
  • blockchain
  • machine learning
  • security

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (17 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

27 pages, 3219 KiB  
Article
Analyzing the Digital Infrastructure Enabling Project Management Success: A Hybrid FAHP-FTOPSIS Approach
by Mohammad Awni Khasawneh and Fikri Dweiri
Appl. Sci. 2024, 14(17), 8080; https://doi.org/10.3390/app14178080 - 9 Sep 2024
Viewed by 387
Abstract
This research paper examines the digital infrastructure required to achieve project management success by analyzing the enabling elements of this digital infrastructure in terms of three pillars: digital readiness, digital fitness, and digital tools. A comprehensive literature review was conducted to identify these [...] Read more.
This research paper examines the digital infrastructure required to achieve project management success by analyzing the enabling elements of this digital infrastructure in terms of three pillars: digital readiness, digital fitness, and digital tools. A comprehensive literature review was conducted to identify these enabling elements and to develop a list of project management success indicators through which the success of project management can be measured. To evaluate and rank the digital infrastructure enabling elements, a Multi-Criteria Analysis (MCA) was implemented using a hybrid approach combining Fuzzy Analytic Hierarchy Process (FAHP) and Fuzzy Technique for Order Preference by Similarity to Ideal Solution (FTOPSIS). The study used the digital infrastructure enabling elements as MCA alternatives and the project management success indicators identified in the literature review as MCA criteria. The results indicated that the enabling elements associated with digital tools are the most significant for project management success, with a FTOPSIS closeness coefficient (CCi) of 0.8525, followed by those related to digital fitness (CCi = 0.6481) and digital readiness (CCi = 0.1602). These findings have proven to be robust, as they remained consistent even when weights of the MCA criteria were adjusted in three new scenarios proposed in a scenario analysis. This research highlights the critical role of digital enabling elements in enhancing project management practice and achieving project management success. It also offers a strategic framework for organizations to develop and strengthen their digital infrastructure. Full article
Show Figures

Figure 1

Figure 1
<p>Research Methodology Diagram.</p>
Full article ">Figure 2
<p>The survey design process.</p>
Full article ">Figure 3
<p>Number of responses per sector.</p>
Full article ">Figure 4
<p>The scenario analysis for the eight enabling elements of digital infrastructure based on four scenarios (<b>a</b>) Original scenario; (<b>b</b>) Scenario A of equal criteria weights; (<b>c</b>) Scenario B whereby C1 (Compliance with the budget) is excluded; (<b>d</b>) Scenario C whereby C2 (Compliance with the schedule) is excluded.</p>
Full article ">
17 pages, 5806 KiB  
Article
Low-Cost IoT Air Quality Monitoring Station Using Cloud Platform and Blockchain Technology
by Ahmed K. Hassan, Mohamed S. Saraya, Amr M. T. Ali-Eldin and Mohamed M. Abdelsalam
Appl. Sci. 2024, 14(13), 5774; https://doi.org/10.3390/app14135774 - 2 Jul 2024
Viewed by 840
Abstract
Air pollution is a growing concern due to severe threats to public health and the environment. The need for reliable air quality monitoring solutions has never been more critical. This research paper introduces an innovative approach to addressing this challenge by deploying a [...] Read more.
Air pollution is a growing concern due to severe threats to public health and the environment. The need for reliable air quality monitoring solutions has never been more critical. This research paper introduces an innovative approach to addressing this challenge by deploying a low-cost Internet of Things (IoT) air monitoring station and providing a blockchain technology solution to enhance environmental data transparency, reliability, and accessibility. Our paper adopts a concept of merging IoT and blockchain technologies and collecting some parameters that help to assess air quality by using three sensors, DHT11, MQ7, and MQ135, to collect temperature, humidity, carbon monoxide, and carbon dioxide parameters, respectively, to measure the gases and thus indicate the air quality within the surrounding area. Collecting and sharing these types of valuable data will be very important for various stakeholders, such as governmental bodies, researchers, and the public. This approach is consistent with the principles of sustainable development, facilitating informed decision-making and promoting eco-friendly policies. This research explores the technical architecture of the IoT air monitoring stations, offering a promising solution for addressing air pollution concerns while promoting sustainable development goals. The proposed system is a model for leveraging emerging technologies to advance environmental monitoring and create smarter, livable cities. This approach aligns with the principles of sustainable development and eco-friendly initiatives. This research offers a promising model for enhancing environmental monitoring efforts and advancing the creation of smarter, more sustainable urban environments. The proposed IoT, cloud platform and blockchain-based system not only addresses pressing air pollution challenges but also sets a benchmark for leveraging emerging technologies in environmental science. Full article
Show Figures

Figure 1

Figure 1
<p>Generic view of IoT air monitoring solution [<a href="#B11-applsci-14-05774" class="html-bibr">11</a>].</p>
Full article ">Figure 2
<p>Block diagram of proposed system.</p>
Full article ">Figure 3
<p>MQ135 gas sensor.</p>
Full article ">Figure 4
<p>MQ7 gas sensor.</p>
Full article ">Figure 5
<p>DHT11 temperature and humidity sensor.</p>
Full article ">Figure 6
<p>Arduino Uno board.</p>
Full article ">Figure 7
<p>ESP8266 Wi-Fi module.</p>
Full article ">Figure 8
<p>Experimental setup.</p>
Full article ">Figure 9
<p>Circuit diagram of the air quality monitoring station.</p>
Full article ">Figure 10
<p>Hardware implementation of the air quality monitoring station.</p>
Full article ">Figure 11
<p>ThingSpeak air monitoring station overview.</p>
Full article ">Figure 12
<p>Ganache development tool GUI.</p>
Full article ">Figure 13
<p>Ganache development tool logs.</p>
Full article ">Figure 14
<p>Smart contract data exchange time between two IoT stations.</p>
Full article ">Figure 15
<p>Smart contract data exchange times of different numbers of IoT stations.</p>
Full article ">
16 pages, 754 KiB  
Article
HMM-Based Blockchain Visual Automatic Deployment System
by Junkai Yi, Jin Wang, Lingling Tan and Taifu Yuan
Appl. Sci. 2024, 14(13), 5722; https://doi.org/10.3390/app14135722 - 30 Jun 2024
Viewed by 647
Abstract
The traditional blockchain deployment process is too complicated and has high technical requirements for blockchain deployers. Deploying a blockchain requires building a complex software-dependent environment, being able to use Linux commands for cumbersome parameter configurations, as well as the need to consider whether [...] Read more.
The traditional blockchain deployment process is too complicated and has high technical requirements for blockchain deployers. Deploying a blockchain requires building a complex software-dependent environment, being able to use Linux commands for cumbersome parameter configurations, as well as the need to consider whether the hardware meets the requirements for running a blockchain. To address these current challenges in blockchain deployment both domestically and internationally, a web-based automatic deployment system with an interactive front-end and back-end has been developed. This system streamlines the process by automatically configuring and deploying blockchains while providing deployers with a graphical interface to monitor the entire deployment procedure. Meanwhile, in order to improve the efficiency of blockchain deployment, a Hidden Markov Model has been designed for blockchain deployment, which can predict the best deployment method for blockchain deployment under the current software environment. As one of the excellent blockchain platforms in China, Chainmaker has the outstanding features of independent control, flexible assembly, software and hardware integration, open source, and openness. The system takes Chainmaker as an experimental object and after a lot of tests, it can easily build a blockchain network on the server. Full article
Show Figures

Figure 1

Figure 1
<p>Functional design diagram of the blockchain visualization automation deployment system based on Hidden Markov Model.</p>
Full article ">Figure 2
<p>Hidden Markov Model in the blockchain deployment process.</p>
Full article ">Figure 3
<p>Principle of multi-machine deployment of blockchain.</p>
Full article ">Figure 4
<p>Schematic sketch of MVVM.</p>
Full article ">Figure 5
<p>Automated deployment flowchart.</p>
Full article ">Figure 6
<p>Interaction process between the front-end and the back-end in this system.</p>
Full article ">Figure 7
<p>Architectural diagram of the overall front-end.</p>
Full article ">Figure 8
<p>Quick guide interface of the blockchain automation deployment system.</p>
Full article ">Figure 9
<p>Node management interface.</p>
Full article ">Figure 10
<p>Selection of the final deployment of the blockchain.</p>
Full article ">Figure 11
<p>Environment detection includes hardware scanning and software scanning. (<b>a</b>) Software scan result. (<b>b</b>) Hardware scan result.</p>
Full article ">Figure 12
<p>Fill in the deployment information.</p>
Full article ">Figure 13
<p>Four-node automated multi-computer deployment of the blockchain.</p>
Full article ">
23 pages, 9822 KiB  
Article
Wire and Cable Quality Traceability System Based on Industrial Internet of Things and Blockchain
by Jintao Zhao, Wenlei Sun, Cheng Lu, Xuedong Zhang, Lixin Wang and Dajiang Wang
Appl. Sci. 2024, 14(2), 943; https://doi.org/10.3390/app14020943 - 22 Jan 2024
Cited by 1 | Viewed by 1075
Abstract
Wire and cable are important industrial products involving the national economy and people’s livelihood, which are hailed as the “blood vessel” and “nerve” of the national economy, providing the basic guarantee for the normal operation of modern economy and society. The data traceability [...] Read more.
Wire and cable are important industrial products involving the national economy and people’s livelihood, which are hailed as the “blood vessel” and “nerve” of the national economy, providing the basic guarantee for the normal operation of modern economy and society. The data traceability of their production and circulation process is a key factor in ensuring their quality and safety management. We aim to solve the problems of unsafe data transmission, weak quality control, and information islands in the process of wire and cable quality traceability in order to improve the production management efficiency of wire and cable manufacturing enterprises and to reduce the cost of consumer quality traceability of wire and cable products. We analyzed the technical characteristics and advantages of Industrial Internet of Things (IIoT) identity resolution and the blockchain. Key technologies are introduced, a traceability method that integrates the two is proposed, and a quality traceability framework based on the IIoT identity resolution system and blockchain technology is constructed. By analyzing the quality information composition of the wire and cable supply chain, a new quality traceability model based on the wire and cable supply chain is established. Finally, through the verification of the developed quality traceability system, the quality traceability function and quality information of each production link of wire and cable are successfully realized. This paper fills a gap in the field of cable product quality traceability using the combination of IIoT and blockchain technology. According to this model, it also has some potential for the traceability of other industrial products. Full article
Show Figures

Figure 1

Figure 1
<p>Handle identification code coding rules.</p>
Full article ">Figure 2
<p>Handle system resolution architecture.</p>
Full article ">Figure 3
<p>Basic block structure.</p>
Full article ">Figure 4
<p>Smart contract.</p>
Full article ">Figure 5
<p>Middleware for blockchain and IIoT architecture model diagram.</p>
Full article ">Figure 6
<p>Identity data storage scheme based on blockchain technology.</p>
Full article ">Figure 7
<p>Identify data resolution smart contract process.</p>
Full article ">Figure 8
<p>Technical framework for the integration of identity resolution and blockchain.</p>
Full article ">Figure 9
<p>Wire and cable core quality traceability data model.</p>
Full article ">Figure 10
<p>Flowchart of cable quality traceability for the integration of identity resolution and blockchain.</p>
Full article ">Figure 11
<p>Cable quality traceability model for the integration of identity resolution and blockchain.</p>
Full article ">Figure 12
<p>Identity Resolution System Monitoring Diagram.</p>
Full article ">Figure 13
<p>Blockchain operation monitoring diagram.</p>
Full article ">Figure 14
<p>Product management information diagram.</p>
Full article ">Figure 15
<p>Warning diagram of the tampering prevention system.</p>
Full article ">Figure 16
<p>Traceability of quality information in the manufacturing stage of photoelectric composite cable.</p>
Full article ">Figure 17
<p>Information tracing in the stage of photoelectric composite cable acquisition and storage.</p>
Full article ">Figure 18
<p>Main cable product market access requirements.</p>
Full article ">Figure 19
<p>Consumer Complaints and Claims window.</p>
Full article ">Figure 20
<p>System query and resolution processing capacity gradient change curve.</p>
Full article ">Figure 21
<p>System transaction performance test curve.</p>
Full article ">
25 pages, 7876 KiB  
Article
Securing Construction Workers’ Data Security and Privacy with Blockchain Technology
by Alvina Ekua Ntefua Saah, Jurng-Jae Yee and Jae-Ho Choi
Appl. Sci. 2023, 13(24), 13339; https://doi.org/10.3390/app132413339 - 18 Dec 2023
Cited by 2 | Viewed by 2856
Abstract
The construction industry, characterized by its intricate network of stakeholders and diverse workforce, grapples with the challenge of managing information effectively. This study delves into this issue, recognizing the universal importance of safeguarding data, particularly amid rising concerns around unauthorized access and breaches. [...] Read more.
The construction industry, characterized by its intricate network of stakeholders and diverse workforce, grapples with the challenge of managing information effectively. This study delves into this issue, recognizing the universal importance of safeguarding data, particularly amid rising concerns around unauthorized access and breaches. Aiming to harness the potential of blockchain technology to address these challenges, this study used hypothetical biographical and safety data of construction workers securely stored on a Hyperledger Fabric blockchain. Developed within the Amazon Web Services (AWS) cloud platform, this blockchain infrastructure emerged as a robust solution for enhancing data security and privacy. Anchored in the core principles of data security, the model emerges as a potent defender against the vulnerabilities of traditional data management systems. Beyond its immediate implications, this study exemplifies the marriage of blockchain technology and the construction sector, and its potential for reshaping workforce management, especially in high-risk projects and optimizing risk assessment, resource allocation, and safety measures to mitigate work-related injuries. Practical validation through transaction testing using Hyperledger Explorer validates the model’s feasibility and operational effectiveness, thus serving as a blueprint for the industry’s data management. Ultimately, this research not only showcases the promise of blockchain technology in addressing construction data security challenges but also underscores its practical applicability through comprehensive testing, thus heralding a new era of data management that harmonizes security and efficiency for stakeholders’ benefit. Full article
Show Figures

Figure 1

Figure 1
<p>Data structure of a block in a blockchain.</p>
Full article ">Figure 2
<p>Overall framework of this study.</p>
Full article ">Figure 3
<p>System structure for proposed Hyperledger Fabric blockchain.</p>
Full article ">Figure 4
<p>AWS infrastructure showing EC2, VPC, and Subnet.</p>
Full article ">Figure 5
<p>AWS-based blockchain integration on Ubuntu computer.</p>
Full article ">Figure 6
<p>Fabric components of the proposed blockchain.</p>
Full article ">Figure 7
<p>Screenshot of part of the Transaction History API tested in POSTMAN.</p>
Full article ">Figure 8
<p>A blockchain-based model for enhancing the privacy and safety of construction workers’ information. (<b>i</b>) Membership registration; (<b>ii</b>) Information management; (<b>iii</b>) Ordering Service; (<b>iv</b>) Consensus mechanism; (<b>v</b>) Decentralized ledger of construction workers’ biodata and safety data.</p>
Full article ">Figure 9
<p>Testing of conceptual blockchain system using Hyperledger Explorer.</p>
Full article ">Figure 10
<p>Security groups developed on developed blockchain.</p>
Full article ">Figure 11
<p>Database snapshot and security status.</p>
Full article ">
17 pages, 1073 KiB  
Article
Trust Model of Privacy-Concerned, Emotionally Aware Agents in a Cooperative Logistics Problem
by Javier Carbo and Jose Manuel Molina
Appl. Sci. 2023, 13(15), 8681; https://doi.org/10.3390/app13158681 - 27 Jul 2023
Viewed by 933
Abstract
In this paper, we propose a trust model to be used in a hypothetical mixed environment where humans and unmanned vehicles cooperate. We address the inclusion of emotions inside a trust model in a coherent way to investigate the practical approaches to current [...] Read more.
In this paper, we propose a trust model to be used in a hypothetical mixed environment where humans and unmanned vehicles cooperate. We address the inclusion of emotions inside a trust model in a coherent way to investigate the practical approaches to current psychological theories. The most innovative contribution of this work is the elucidation of how privacy issues play a role in the cooperation decisions of the emotional trust model. Both emotions and trust were cognitively modeled and managed with the beliefs, desires and intentions (BDI) paradigm in autonomous agents implemented in GAML (the programming language of the GAMA agent platform), that communicate using the IEEE FIPA standard. The trusting behavior of these emotional agents was tested in a cooperative logistics problem wherein agents have to move objects to destinations and some of the objects and places are associated with privacy issues. Simulations of the logistic problem show how emotions and trust contribute to improving the performance of agents in terms of both time savings and privacy protection. Full article
Show Figures

Figure 1

Figure 1
<p>FIPA CFP interaction protocol for delegating a task.</p>
Full article ">Figure 2
<p>Sequentially linked FIPA CFP interaction protocol for a given task several times.</p>
Full article ">Figure 3
<p>Parameter definition in the CUI simulation.</p>
Full article ">Figure 4
<p>Initial situation in a scenario in which carrier agents move to the destinations of their boxes.</p>
Full article ">Figure 5
<p>Ongoing situation in which carrier agents move to the destinations of their boxes.</p>
Full article ">Figure 6
<p>Comparison of the three alternatives when the percentage of initially idle carrier agents increases.</p>
Full article ">Figure 7
<p>Comparison of the three alternatives when the probability of privacy issues increases.</p>
Full article ">
19 pages, 674 KiB  
Article
Online Voting Scheme Using IBM Cloud-Based Hyperledger Fabric with Privacy-Preservation
by Ross Clarke, Luke McGuire, Mohamed Baza, Amar Rasheed and Maazen Alsabaan
Appl. Sci. 2023, 13(13), 7905; https://doi.org/10.3390/app13137905 - 5 Jul 2023
Cited by 2 | Viewed by 1946
Abstract
The current traditional paper ballot voting schemes suffer from several limitations such as processing delays due to counting paper ballots, lack of transparency, and manipulation of the ballots. To solve these limitations, an electronic voting (e-voting) scheme has received massive interest from both [...] Read more.
The current traditional paper ballot voting schemes suffer from several limitations such as processing delays due to counting paper ballots, lack of transparency, and manipulation of the ballots. To solve these limitations, an electronic voting (e-voting) scheme has received massive interest from both governments and academia. In e-voting, individuals can cast their vote online using their smartphones without the need to wait in long lines. Additionally, handicapped voters who face limited wheelchair access in many polling centers could now participate in elections hassle-free. The existing e-voting schemes suffer from several limitations as they are either centralized, based on public blockchains, or utilize local private blockchains. This results in privacy issues (using public blockchains) or large financial costs (using local/private blockchains) due to the amount of computing power and technical knowledge needed to host blockchains locally. To address the aforementioned limitations, in this paper, we propose an online voting scheme using IBM cloud-based Hyperledger Fabric. Our scheme allows voters to cast their encrypted votes in a secure manner. Then any participant can obtain the ballot results in a decentralized and transparent manner, without sacrificing the privacy of individual voters. We implement the proposed scheme using IBM cloud-based Hyperledger Fabric. The experimental results identify the performance characteristics of our scheme and demonstrate that it is feasible to run an election consisting of thousands of participants using cloud-based Fabric. Full article
Show Figures

Figure 1

Figure 1
<p>Illustration of our considered scheme model. (Author’s own processing).</p>
Full article ">Figure 2
<p>The individual ballot format and the aggregated ballot. The sum of the <span class="html-italic">i</span>-th element in the ballot gives the number of votes for the candidate <math display="inline"><semantics><msub><mi>C</mi><mi>i</mi></msub></semantics></math>. (Author’s own processing).</p>
Full article ">Figure 3
<p>Our considered blockchain network design. In (1), Endorser simulates the transaction from the proposal. In (2), Orderer writes block from the transaction. In (3), Committers validate blocks and append them to the ledger. (Author’s own processing).</p>
Full article ">Figure 4
<p>Deployment model of Hyperledger Caliper. Caliper generates and sends a set number of transactions at a defined send rate to the blockchain. In each run of Caliper, these transactions all represent the same type of transaction, as defined by our developed smart contract (read or write). When Caliper finishes one job, another can be started to simulate another type of transaction. (Author’s own processing).</p>
Full article ">Figure 5
<p>Impact of Transaction Send Rate on Throughput and Latency: 1000 Transactions. (<b>a</b>) GetBallot; (<b>b</b>) CastVote. (Author’s own processing).</p>
Full article ">Figure 6
<p>Varying the number of total transactions’ impact on throughput and latency: <tt>GetBallot</tt> and <tt>CastBallot</tt>. (<b>a</b>) GetBallot (Throughput); (<b>b</b>) GetBallot (Latency); (<b>c</b>) CastVote (Throughput); (<b>d</b>) CastVote (Latency). (Author’s own processing).</p>
Full article ">Figure 7
<p>Varying transaction send rates’ impact on Transaction Error Rate. (<b>a</b>) GetBallot; (<b>b</b>) CastVote. (Author’s own processing).</p>
Full article ">
16 pages, 4461 KiB  
Article
Exploiting the Rolling Shutter Read-Out Time for ENF-Based Camera Identification
by Ericmoore Ngharamike, Li-Minn Ang, Kah Phooi Seng and Mingzhong Wang
Appl. Sci. 2023, 13(8), 5039; https://doi.org/10.3390/app13085039 - 17 Apr 2023
Cited by 3 | Viewed by 1782
Abstract
The electric network frequency (ENF) is a signal that varies over time and represents the frequency of the energy supplied by a mains power system. It continually varies around a nominal value of 50/60 Hz as a result of fluctuations over time in [...] Read more.
The electric network frequency (ENF) is a signal that varies over time and represents the frequency of the energy supplied by a mains power system. It continually varies around a nominal value of 50/60 Hz as a result of fluctuations over time in the supply and demand of power and has been employed for various forensic applications. Based on these ENF fluctuations, the intensity of illumination of a light source powered by the electrical grid similarly fluctuates. Videos recorded under such light sources may capture the ENF and hence can be analyzed to extract the ENF. Cameras using the rolling shutter sampling mechanism acquire each row of a video frame sequentially at a time, referred to as the read-out time (Tro) which is a camera-specific parameter. This parameter can be exploited for camera forensic applications. In this paper, we present an approach that exploits the ENF and the Tro to identify the source camera of an ENF-containing video of unknown source. The suggested approach considers a practical scenario where a video obtained from the public, including social media, is investigated by law enforcement to ascertain if it originated from a suspect’s camera. Our experimental results demonstrate the effectiveness of our approach. Full article
Show Figures

Figure 1

Figure 1
<p>Block diagram of the proposed camera identification approach.</p>
Full article ">Figure 2
<p>The process of ENF signal estimation from the frames of a video.</p>
Full article ">Figure 3
<p>Framework of the proposed MUSIC approach.</p>
Full article ">Figure 4
<p>Rolling shutter mechanism video acquisition process [<a href="#B48-applsci-13-05039" class="html-bibr">48</a>].</p>
Full article ">Figure 5
<p>Sample of the ENF signal extracted from a video file (red) using a <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>T</mi> </mrow> <mrow> <mi>r</mi> <mi>o</mi> </mrow> </msub> </mrow> </semantics></math> value of 19.8 ms (iPhone 6s) and matched against the reference signal (black). The bottom right corner shows the measure of similarity and dissimilarity between the extracted signal and the reference signal.</p>
Full article ">Figure 6
<p>Sample of the ENF signal extracted from a video file (red) using a <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>T</mi> </mrow> <mrow> <mi>r</mi> <mi>o</mi> </mrow> </msub> </mrow> </semantics></math> value of 13.4 ms (Sony Cybershot DSC-RX 100 II) and matched against the reference signal (black). The bottom right corner shows the measure of similarity and dissimilarity between the extracted signal and the reference signal.</p>
Full article ">Figure 7
<p>Sample of the ENF signal extracted from a video file (red) using a <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>T</mi> </mrow> <mrow> <mi>r</mi> <mi>o</mi> </mrow> </msub> </mrow> </semantics></math> value of 30.9 ms (iPhone 6) and matched against the reference signal (black). The bottom right corner shows the measure of similarity and dissimilarity between the extracted signal and the reference signal.</p>
Full article ">Figure 8
<p>NCC of the extracted ENF and the reference ENF.</p>
Full article ">Figure 9
<p>RMSE of the extracted ENF and the reference ENF.</p>
Full article ">Figure 10
<p>MAE of the extracted ENF and the reference ENF.</p>
Full article ">
15 pages, 2204 KiB  
Article
Machine Learning Prediction of the Long-Term Environmental Acoustic Pattern of a City Location Using Short-Term Sound Pressure Level Measurements
by Juan M. Navarro and Antonio Pita
Appl. Sci. 2023, 13(3), 1613; https://doi.org/10.3390/app13031613 - 27 Jan 2023
Cited by 7 | Viewed by 2073
Abstract
To manage noise pollution, cities use monitoring systems over wireless acoustic sensor networks. These networks are mainly composed of fixed-location sound pressure level sensors deployed in outdoor sites of the city for long-term monitoring. However, due to high economic and human resource costs, [...] Read more.
To manage noise pollution, cities use monitoring systems over wireless acoustic sensor networks. These networks are mainly composed of fixed-location sound pressure level sensors deployed in outdoor sites of the city for long-term monitoring. However, due to high economic and human resource costs, it is not feasible to deploy fixed metering stations on every street in a city. Therefore, these continuous measurements are usually complemented with short-term measurements at different selected locations, which are carried out by acoustic sensors mounted on vehicles or at street level. In this research, the application of artificial neural networks is proposed for estimation of the long-term environmental acoustic pattern of a location based on the information collected during a short time period. An evaluation has been carried out through a comparison of eight artificial neural network architectures using real data from the acoustic sensor network of Barcelona, Spain, showing higher accuracy in prediction when the complexity of the model increases. Moreover, time slots with better performance can be detected, helping city managers to deploy temporal stations optimally. Full article
Show Figures

Figure 1

Figure 1
<p>Map showing location and pattern category (indicated by different colors) of the nodes of the WASN of BCN. Category 1 in black, Category 2 in magenta, Category 3 in cyan and Category 4 in brown.</p>
Full article ">Figure 2
<p>Artificial neural network architecture (adapted from Dastres and Soori [<a href="#B34-applsci-13-01613" class="html-bibr">34</a>]).</p>
Full article ">Figure 3
<p>Statistical distributions of the Accuracy variable for each hourly time slot, represented though box and whisker plot and sorted by the median value of the Accuracy in decreasing order.</p>
Full article ">Figure 4
<p>Statistical distributions of the variable Accuracy for every ANN Model ordered by mean value (red circle) represented though box and whisker plots. The colors group the models by their quantity of hidden layers.</p>
Full article ">Figure 5
<p>Statistical distributions of F1-Score (<b>a</b>) and Balanced Accuracy (<b>b</b>) performance metrics for every environmental acoustic pattern, represented as box and whisker plots.</p>
Full article ">Figure 6
<p>Statistical distributions of the F1-Score variable for every hourly time slot, broken down into the four environmental acoustic behaviors (subfigures (<b>a</b>–<b>d</b>) for category patterns 1, 2, 3, and 4, respectively) represented though box and whisker plot.</p>
Full article ">
18 pages, 1554 KiB  
Article
Blockchain Secured Dynamic Machine Learning Pipeline for Manufacturing
by Fatemeh Stodt, Jan Stodt and Christoph Reich
Appl. Sci. 2023, 13(2), 782; https://doi.org/10.3390/app13020782 - 5 Jan 2023
Cited by 7 | Viewed by 3317
Abstract
ML-based applications already play an important role in factories in areas such as visual quality inspection, process optimization, and maintenance prediction and will become even more important in the future. For ML to be used in an industrial setting in a safe and [...] Read more.
ML-based applications already play an important role in factories in areas such as visual quality inspection, process optimization, and maintenance prediction and will become even more important in the future. For ML to be used in an industrial setting in a safe and effective way, the different steps needed to use ML must be put together in an ML pipeline. The development of ML pipelines is usually conducted by several and changing external stakeholders because they are very complex constructs, and confidence in their work is not always clear. Thus, end-to-end trust in the ML pipeline is not granted automatically. This is because the components and processes in ML pipelines are not transparent. This can also cause problems with certification in areas where safety is very important, such as the medical field, where procedures and their results must be recorded in detail. In addition, there are security challenges, such as attacks on the model and the ML pipeline, that are difficult to detect. This paper provides an overview of ML security challenges that can arise in production environments and presents a framework on how to address data security and transparency in ML pipelines. The framework is presented using visual quality inspection as an example. The presented framework provides: (a) a tamper-proof data history, which achieves accountability and supports quality audits; (b) an increase in trust by protocol for the used ML pipeline, by rating the experts and entities involved in the ML pipeline and certifying legitimacy for participation; and (c) certification of the pipeline infrastructure, the ML model, data collection, and labelling. After describing the details of the new approach, the mitigation of the previously described security attacks will be demonstrated, and a conclusion will be drawn. Full article
Show Figures

Figure 1

Figure 1
<p>System overview.</p>
Full article ">Figure 2
<p>Private Blockchain.</p>
Full article ">Figure 3
<p>Sidechain Process.</p>
Full article ">Figure 4
<p>Visual Metal Surface Quality Inspection.</p>
Full article ">Figure 5
<p>ML Pipeline and Stakeholder.</p>
Full article ">
19 pages, 1602 KiB  
Article
A Knowledge Sharing and Individually Guided Evolutionary Algorithm for Multi-Task Optimization Problems
by Xiaoling Wang, Qi Kang, Mengchu Zhou, Zheng Fan and Aiiad Albeshri
Appl. Sci. 2023, 13(1), 602; https://doi.org/10.3390/app13010602 - 1 Jan 2023
Cited by 1 | Viewed by 1744
Abstract
Multi-task optimization (MTO) is a novel emerging evolutionary computation paradigm. It focuses on solving multiple optimization tasks concurrently while improving optimization performance by utilizing similarities among tasks and historical optimization knowledge. To ensure its high performance, it is important to choose proper individuals [...] Read more.
Multi-task optimization (MTO) is a novel emerging evolutionary computation paradigm. It focuses on solving multiple optimization tasks concurrently while improving optimization performance by utilizing similarities among tasks and historical optimization knowledge. To ensure its high performance, it is important to choose proper individuals for each task. Most MTO algorithms limit each individual to one task, which weakens the effects of information exchange. To improve the efficiency of knowledge transfer and choose more suitable individuals to learn from other tasks, this work proposes a general MTO framework named individually guided multi-task optimization (IMTO). It divides evolutions into vertical and horizontal ones, and each individual is fully explored to learn experience from the execution of other tasks. By using the concept of skill membership, individuals with higher solving ability are selected. Besides, to further improve the effect of knowledge transfer, only inferior individuals are selected to learn from other tasks at each generation. The significant advantage of IMTO over the multifactorial evolutionary framework and baseline solvers is verified via a series of benchmark studies. Full article
Show Figures

Figure 1

Figure 1
<p>The flowchart of individually guided multi-task optimization (IMTO).</p>
Full article ">Figure 2
<p>Individually guided multi-task optimization (IMTO) when solving two optimization problems.</p>
Full article ">Figure 3
<p>Comparison of six algorithms in terms of the average computational time (s) via 20 runs in test suite 2.</p>
Full article ">Figure 4
<p>Convergence traces of IMTO and MFO on multitasking problem <span class="html-italic">P</span><sub>5</sub> in test suite 1. (<b>a</b>) Convergence traces of IMGA and MFEA, (<b>b</b>) Convergence traces of IMPSO and MFPSO, and (<b>c</b>) Convergence traces of IMDE and MFDE.</p>
Full article ">Figure 5
<p>Convergence traces of IMTO and baseline solvers on multitasking problem <span class="html-italic">P</span><sub>5</sub> in test suite 1. (<b>a</b>) Convergence traces of IMGA and B-GA, <b>(b</b>) Convergence traces of IMPSO and B-PSO, (<b>c</b>) Convergence traces of IMDE and B-DE, and (<b>d</b>) Convergence traces of IMABC and B-ABC.</p>
Full article ">
11 pages, 1983 KiB  
Communication
Effective Selfish Mining Defense Strategies to Improve Bitcoin Dependability
by Chencheng Zhou, Liudong Xing, Qisi Liu and Honggang Wang
Appl. Sci. 2023, 13(1), 422; https://doi.org/10.3390/app13010422 - 29 Dec 2022
Cited by 6 | Viewed by 2571
Abstract
Selfish mining is a typical malicious attack targeting the blockchain-based bitcoin system, an emerging crypto asset. Because of the non-incentive compatibility of the bitcoin mining protocol, the attackers are able to collect unfair mining rewards by intentionally withholding blocks. The existing works on [...] Read more.
Selfish mining is a typical malicious attack targeting the blockchain-based bitcoin system, an emerging crypto asset. Because of the non-incentive compatibility of the bitcoin mining protocol, the attackers are able to collect unfair mining rewards by intentionally withholding blocks. The existing works on selfish mining mostly focused on cryptography design, and malicious behavior detection based on different approaches, such as machine learning or timestamp. Most defense strategies show their effectiveness in the perspective of reward reduced. No work has been performed to design a defense strategy that aims to improve bitcoin dependability and provide a framework for quantitively evaluating the improvement. In this paper, we contribute by proposing two network-wide defensive strategies: the dynamic difficulty adjustment algorithm (DDAA) and the acceptance limitation policy (ALP). The DDAA increases the mining difficulty dynamically once a selfish mining behavior is detected, while the ALP incorporates a limitation to the acceptance rate when multiple blocks are broadcast at the same time. Both strategies are designed to disincentivize dishonest selfish miners and increase the system’s resilience to the selfish mining attack. A continuous-time Markov chain model is used to quantify the improvement in bitcoin dependability made by the proposed defense strategies. Statistical analysis is applied to evaluate the feasibility of the proposed strategies. The proposed DDAA and ALP methods are also compared to an existing timestamp-based defense strategy, revealing that the DDAA is the most effective in improving bitcoin’s dependability. Full article
Show Figures

Figure 1

Figure 1
<p>State transition diagram (0: initial state, 0′: double branches, 1: one-block lead, 2: two-block lead, 3: three-block lead, and 4: attack success).</p>
Full article ">Figure 2
<p>Bitcoin dependability before and after the application of the DDAA under sets <span class="html-italic">a</span> and <span class="html-italic">a</span>′.</p>
Full article ">Figure 3
<p>Bitcoin dependability before and after application of the DDAA under sets <span class="html-italic">b</span> and <span class="html-italic">b</span>′.</p>
Full article ">Figure 4
<p>Bitcoin dependability before and after application of the DDAA under sets <span class="html-italic">c</span> and <span class="html-italic">c</span>′.</p>
Full article ">Figure 5
<p><span class="html-italic">p</span>-value results when <span class="html-italic">β</span> varies from 1.1 to 1.6 under the DDAA.</p>
Full article ">Figure 6
<p>Bitcoin dependability before and after the application of the ALP.</p>
Full article ">Figure 7
<p><span class="html-italic">p</span>-value results when <span class="html-italic">γ</span> varies from 0.6 to 0.9 under the ALP.</p>
Full article ">Figure 8
<p>Bitcoin dependability under the DDAA, ALP, and TM.</p>
Full article ">
17 pages, 910 KiB  
Article
LAN Intrusion Detection Using Convolutional Neural Networks
by Hanan Zainel and Cemal Koçak
Appl. Sci. 2022, 12(13), 6645; https://doi.org/10.3390/app12136645 - 30 Jun 2022
Cited by 9 | Viewed by 2550
Abstract
The world’s reliance the use of the internet is growing constantly, and data are considered the most precious parameter nowadays. It is critical to keep information secure from unauthorized people and organizations. When a network is compromised, information is taken. An intrusion detection [...] Read more.
The world’s reliance the use of the internet is growing constantly, and data are considered the most precious parameter nowadays. It is critical to keep information secure from unauthorized people and organizations. When a network is compromised, information is taken. An intrusion detection system detects both known and unexpected assaults that allow a network to be breached. In this research, we model an intrusion detection system trained to identify such attacks in LANs, and any computer network that uses data. We accomplish this by employing neural networks, a machine learning technique. We also investigate how well our model performs in multiclass categorization scenarios. On the NSL-KDD dataset, we investigate the performance of Convolutional Neural Networks such as CNN and CNN with LSTM. Our findings suggest that utilizing Convolutional Neural Networks to identify network intrusions is an effective strategy. Full article
Show Figures

Figure 1

Figure 1
<p>Intrusion Detection System model.</p>
Full article ">Figure 2
<p>Flow of IDS model.</p>
Full article ">Figure 3
<p>NSL-KDD dataset.</p>
Full article ">Figure 4
<p>(<b>a</b>) Custom CNN model confusion matrix. (<b>b</b>) CNN model with LSTM confusion matrix.</p>
Full article ">

Review

Jump to: Research

28 pages, 7707 KiB  
Review
Blockchain Integration in the Era of Industrial Metaverse
by Dimitris Mourtzis, John Angelopoulos and Nikos Panopoulos
Appl. Sci. 2023, 13(3), 1353; https://doi.org/10.3390/app13031353 - 19 Jan 2023
Cited by 59 | Viewed by 8282
Abstract
Blockchain can be realized as a distributed and decentralized database, also known as a “distributed ledger,” that is shared among the nodes of a computer network. Blockchain is a form of democratized and distributed database for storing information electronically in a digital format. [...] Read more.
Blockchain can be realized as a distributed and decentralized database, also known as a “distributed ledger,” that is shared among the nodes of a computer network. Blockchain is a form of democratized and distributed database for storing information electronically in a digital format. Under the framework of Industry 4.0, the digitization and digitalization of manufacturing and production systems and networks have been focused, thus Big Data sets are a necessity for any manufacturing activity. Big Data sets are becoming a useful resource as well as a byproduct of the activities/processes taking place. However, there is an imminent risk of cyberattacks. The contribution of blockchain technology to intelligent manufacturing can be summarized as (i) data validity protection, (ii) inter- and intra-organizational communication organization, and (iii) efficiency improvement of manufacturing processes. Furthermore, the need for increased cybersecurity is magnified as the world is heading towards a super smart and intelligent societal model, also known as “Society 5.0,” and the industrial metaverse will become the new reality in manufacturing. Blockchain is a cutting-edge, secure information technology that promotes business and industrial innovation. However, blockchain technologies are bound by existing limitations regarding scalability, flexibility, and cybersecurity. Therefore, in this literature review, the implications of blockchain technology for addressing the emerging cybersecurity barriers toward safe and intelligent manufacturing in Industry 5.0 as a subset of Society 5.0 are presented. Full article
Show Figures

Figure 1

Figure 1
<p>The operating principle of blockchain.</p>
Full article ">Figure 2
<p>Layered infrastructure of blockchain.</p>
Full article ">Figure 3
<p>Historical evolution of blockchain: key milestones.</p>
Full article ">Figure 4
<p>Evolution from Blockchain 1.0 up to Blockchain 5.0.</p>
Full article ">Figure 5
<p>Peer-to-peer transactions in bitcoin.</p>
Full article ">Figure 6
<p>Example of block data structure for the Ethereum blockchain.</p>
Full article ">Figure 7
<p>Smart contract execution between peers.</p>
Full article ">Figure 8
<p>Consensus Mechanisms in Blockchain Technology [<a href="#B13-applsci-13-01353" class="html-bibr">13</a>].</p>
Full article ">Figure 9
<p>Relictum Pro Framework.</p>
Full article ">Figure 10
<p>Keyword network for “blockchain,” “digital,” and “twin.”</p>
Full article ">Figure 11
<p>Keyword network for “blockchain” and “cybersecurity.”</p>
Full article ">Figure 12
<p>Keyword network for “blockchain” and “Society 5.0.”</p>
Full article ">Figure 13
<p>Keyword network for “blockchain” and “metaverse.”</p>
Full article ">Figure 14
<p>Blockchain for technical aspects in metaverse.</p>
Full article ">
16 pages, 688 KiB  
Review
A Review of Deep Learning Applications for the Next Generation of Cognitive Networks
by Raymundo Buenrostro-Mariscal, Pedro C. Santana-Mancilla, Osval Antonio Montesinos-López, Juan Ivan Nieto Hipólito and Luis E. Anido-Rifón
Appl. Sci. 2022, 12(12), 6262; https://doi.org/10.3390/app12126262 - 20 Jun 2022
Cited by 8 | Viewed by 2543
Abstract
Intelligence capabilities will be the cornerstone in the development of next-generation cognitive networks. These capabilities allow them to observe network conditions, learn from them, and then, using prior knowledge gained, respond to its operating environment to optimize network performance. This study aims to [...] Read more.
Intelligence capabilities will be the cornerstone in the development of next-generation cognitive networks. These capabilities allow them to observe network conditions, learn from them, and then, using prior knowledge gained, respond to its operating environment to optimize network performance. This study aims to offer an overview of the current state of the art related to the use of deep learning in applications for intelligent cognitive networks that can serve as a reference for future initiatives in this field. For this, a systematic literature review was carried out in three databases, and eligible articles were selected that focused on using deep learning to solve challenges presented by current cognitive networks. As a result, 14 articles were analyzed. The results showed that applying algorithms based on deep learning to optimize cognitive data networks has been approached from different perspectives in recent years and in an experimental way to test its technological feasibility. In addition, its implications for solving fundamental challenges in current wireless networks are discussed. Full article
Show Figures

Figure 1

Figure 1
<p>Connected environments through cognitive data networks.</p>
Full article ">Figure 2
<p>Search strategy flow diagram.</p>
Full article ">
28 pages, 2725 KiB  
Review
Review of Offline Payment Function of CBDC Considering Security Requirements
by Yeonouk Chu, Jaeho Lee, Sungjoong Kim, Hyunjoong Kim, Yongtae Yoon and Hyeyoung Chung
Appl. Sci. 2022, 12(9), 4488; https://doi.org/10.3390/app12094488 - 28 Apr 2022
Cited by 17 | Viewed by 9964
Abstract
Due to the growth of the internet and communication technologies, electronic financial systems are becoming popular. Physical cash is losing its preeminence, and digital numbers on computers represent money. However, electronic financial systems, mostly operated by private entities, have defects to be compensated [...] Read more.
Due to the growth of the internet and communication technologies, electronic financial systems are becoming popular. Physical cash is losing its preeminence, and digital numbers on computers represent money. However, electronic financial systems, mostly operated by private entities, have defects to be compensated for, such as high charges for using the system, security issues, and the problem of exclusion. As a solution, many countries around the world are considering central bank digital currency. For central bank digital currency to be utilized as a national legal tender, it must be universal and accessible regardless of time and place, similar to physical cash. Therefore, offline payment functions that extend the accessibility of central bank digital currency are becoming attractive. However, due to the characteristics of the electronic financial system, central bank digital currency is vulnerable to possible malicious behaviors in offline situations, such as blackouts and system shutdowns. This paper reviews research studies that deal with security matters related to the offline payment function of central bank digital currency. Offline payment solutions, including central bank digital currency and other electronic financial systems, such as electronic cash and cryptocurrency, are reviewed, and supplemental methods to improve the offline payment solutions of central bank digital currency based on trusted execution environment devices are suggested. Full article
Show Figures

Figure 1

Figure 1
<p>Different forms of the CBDC systems (classification standards from Ref [<a href="#B26-applsci-12-04488" class="html-bibr">26</a>]).</p>
Full article ">Figure 2
<p>The process of the transaction proposed by Camenisch et al. [<a href="#B72-applsci-12-04488" class="html-bibr">72</a>].</p>
Full article ">Figure 3
<p>Operation of the protocol on a device using TEE technology proposed by Christodorescu et al. [<a href="#B95-applsci-12-04488" class="html-bibr">95</a>].</p>
Full article ">Figure 4
<p>A sequence diagram of the detailed transaction process between the sender and the receiver using the offline payment protocol suggested by Christodorescu et al. [<a href="#B95-applsci-12-04488" class="html-bibr">95</a>].</p>
Full article ">Figure 5
<p>Flowchart of the method to sync every regular time to satisfy the security requirement of unforgeability.</p>
Full article ">Figure 6
<p>Flowchart of the method to limit the number of transactions to satisfy the security requirements to prevent DDoS attacks.</p>
Full article ">
22 pages, 1434 KiB  
Review
Blockchain Applications in Forestry: A Systematic Literature Review
by Zhaoyuan He and Paul Turner
Appl. Sci. 2022, 12(8), 3723; https://doi.org/10.3390/app12083723 - 7 Apr 2022
Cited by 15 | Viewed by 7021
Abstract
Blockchain applications have received a lot of attention in recent years. They provide enormous benefits and advantages to many different sectors. To date, there have not been any systematic studies comprehensively reviewing current blockchain-based applications in the forestry sector. This paper examines published [...] Read more.
Blockchain applications have received a lot of attention in recent years. They provide enormous benefits and advantages to many different sectors. To date, there have not been any systematic studies comprehensively reviewing current blockchain-based applications in the forestry sector. This paper examines published work on blockchain-based applications in the forestry sector. A systematic review was conducted to identify, analyze, and discuss current literature on current blockchain applications deployed (and/or proposed) in the forestry sector, grouping results into three domains of forest management, traceability of forest-based products, and forest fire detection based on content analysis. The analyses highlight reported benefits, opportunities, and challenges of blockchain applications in the forestry sector. The study results show that blockchain has great potential in sustainable forestry, minimizing illegal logging, conserving biodiversity, and many other areas in forestry. It also shows that blockchain in forestry is still immature and complex, since it requires specialists to adopt. This paper contributes towards filling the existing research gap through this systematic review on blockchain applications in forestry. This review offers insights into a deep understanding of blockchain applications for managers, practitioners, and consultants interested in forestry. The paper identifies existing research gaps on related topics of blockchain applications in forestry and makes recommendations on potential future directions for research into blockchain in forestry. Full article
Show Figures

Figure 1

Figure 1
<p>Blockchain data structure, adapted from [<a href="#B16-applsci-12-03723" class="html-bibr">16</a>,<a href="#B17-applsci-12-03723" class="html-bibr">17</a>,<a href="#B18-applsci-12-03723" class="html-bibr">18</a>].</p>
Full article ">Figure 2
<p>The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) flowchart of this systematic literature review, based on the PRISMA 2020 guideline.</p>
Full article ">Figure 3
<p>Distribution of publications by years.</p>
Full article ">Figure 4
<p>Distribution of included studies by publication types.</p>
Full article ">Figure 5
<p>Taxonomy of blockchain applications in forestry.</p>
Full article ">

Planned Papers

The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.

Title: A holistic research on Incentivised Consensus and non-incentivised consensus
Authors: Aniruddha Bhattacharjya; Venkatram Nidumolu
Affiliation: Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram-522502, Guntur, Andhra Pradesh, India; [email protected]; Department of Electronic Engineering, Tsinghua University, Beijing, China (As Chinese Government Scholarship (CGS) holder for PhD study from 2015 to 2019 October); Department of ECE, Koneru Lakshmaiah Education Foundation, Vaddeswaram-522502, Guntur, Andhra Pradesh, India;
Abstract: Here we have done research on dissimilar incentivised consensus algorithms. These algorithms can be clustered into three major types: Proof of Work (PoW), Proof of Stake (PoS), and Hybrid Con-sensus. Also we have done deep research on the present non-incentivised consensusalgorithms that are being used in private blockchain systems which are very useful for non-crypto-currency ap-plications. We have found that these algorithms are mostly depend on classical consensus algo-rithms. But they are having very distinctive features sothat they can be added in the related blockchain systems. Security comparisons are done here for future research. Their structural properties and performances are also compared to highlight better one for future research and re-al-time usage. Here we have we have shown an exemplary decision tree-based figure for utilizing it to filter out or to filter in consensus algorithms that is perfect match for the specified criteria. This type of a figure will be a very essential tool for those who is eager to test the appropriateness of a specific consensus algorithm under specific conditions. Keywords: PoW, PoS, Chained POS, BFT POS, Delegated POS, PEERCOIN, Casper The Friendly Ghost (CTFG), OUROBOROS, Proof of Research (POR), Proof of Stake-Velocity (POSV).

Title: Use of Deep Learning to improve player engagement in a video game through a dynamic difficulty adjustment based on skills classification
Authors: dwin Alejandro Romero Mendez; Pedro C. Santana-Mancilla; Osval A. Montesinos-López; Miguel Garcia-Ruiz; Luis E. Anido-Rifón
Affiliation: School of Telematics, Universidad de Colima, Colima 28040, Mexico School of Computer Science and Technology, Algoma University, Sault Ste. Marie, ON P6A 2G4, Canada atlanTTic Research Center, School of Telecommunications Engineering, University of Vigo, 36310 Vigo, Spain

Title: Data Science Applied to the Analysis of Points of Interest in the Lisbon City
Authors: Joao C. Ferreira; Adriana Preuss; Beatriz Lopes; Ricardo Mororó; Bruno Francisco; Jose A. Afonso
Affiliation: Department of Information Sciences, Technologies and Architecture (ISTAR), ISCTE-Instituto Universitário de Lisboa, 1649-026 Lisboa, Portugal; CMEMS/LABBELS, University of Minho, 4800-058 Guimarães, Portugal

Back to TopTop