computerweekly.com 17-23 September 2019 16W hen people int.docxmccormicknadine86
computerweekly.com 17-23 September 2019 16
W hen people interact with each other, for example via financial transactions, sharing legal docu-ments or trading through supply chains, they need a high level of confidence that the data
recording their interaction is accurate and true.
A distributed ledger makes it possible to build applications
where multiple parties can execute transactions online without
the need to trust a central authority or indeed each other.
Over the past few years, the number of use cases for distributed
ledgers, and their more specialised form, blockchains, has been
increasing, as has the technology to support the underlying infra-
structure and build applications on top of it.
With a distributed ledger, every user has their own full, or in some
cases partial, copy of the database, referred to as a node, which
can be a physical device, a virtual machine or a software container.
Each node runs the relevant software to provide the infrastruc-
ture management and the relevant application, including the
ability to complete “smart contracts” that negotiate the direct
exchange of assets between participating nodes.
consensus
For a transaction to proceed, all nodes must verify a transaction
and agree its order on the ledger.
Doing so is termed “consensus”, which is necessary, for exam-
ple, to avoid double counting or overspending when it comes to
financial assets.
Consensus involves four steps, from the transaction being
initiated to it being committed on all nodes with a timestamp
InsIde blockchaIn and Its
varIous applIcatIons
Bob Tarzey explores the technology around
blockchain shaping how businesses use data
BUYER’S GUIDE TO BLOCKCHAIN | PART 2 OF 3
G
O
LD
EN
S
IK
O
R
K
A
/A
D
O
B
E
Home
http://www.computerweekly.com
https://searchcio.techtarget.com/definition/blockchain
https://searchservervirtualization.techtarget.com/definition/virtual-machine
https://www.techtarget.com/contributor/Bob-Tarzey
computerweekly.com 17-23 September 2019 17
Home
News
How IT departments
can find different
ways to upskill in
the new economy
Travel company Clarity
bakes ThoughtSpot
search and AI functions
into analytics tool
Digital factory
approach signals a new
departure for Network
Rail’s IT strategy
Editor’s comment
Buyer’s guide
to blockchain
Delivering cloud in the
financial services sector
How 5G will transform
your business
Downtime
providing a unique cryptographic signature. These steps can be
completed in seconds or minutes, depending on the technology.
Blockchains are distinguished from other distributed ledgers in
being updated by adding blocks of new transactions to create an
immutable tamper-proof log of sensitive activity.
The right to write blocks may require proof-of-work – which
can be time and resource intensive – the aim being to prevent, for
example, mass updates by bots.
Nomenclature has become confusing as the two terms, dis-
tributed ledger and blo ...
Benchmark and comparison between hyperledger and MySQLTELKOMNIKA JOURNAL
In this paper, we report the benchmarking results of Hyperledger, a Distributed Ledger, which is the derivation Blockchain Technology. Method to evaluate Hyperledger in a limited infrastructure is developed. Themeasured infrastructure consists of 8 nodes with a load of up to 20000 transactions/second. Hyperledger consistently runs all evaluation, namely, for 20,000 transactions, the run time 74.30s, latency 73.40ms latency, and 257 tps. The benchmarking of Hyperledger shows better than a database system in a high workload scenario. We found that the maximum size data volume in one transaction on the Hyperledger network is around ten (10) times of MySQL. Also, the time spent on processing a single transaction in the blockchain network is 80-200 times faster than MySQL. This initial analysis can provide an overview for practitioners in making decisions about the adoption of blockchain technology in their IT systems.
As enterprises across verticals explore the
opportunities for innovation and process
optimization using blockchain technologies, they
are looking for in technical aspects of deploying
and integrating blockchain technology, with their
existing IT systems.
Based on operating models and blockchain
platforms, there are variations in deployment and
operations aspects, along with factors like
integration & information security. This document
provides approach and factors to consider during
selection and implementation of blockchain
technologies
https://www.lntinfotech.com/Canada/
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...eraser Juan José Calderón
Blockchain for AI: Review and Open. Research Challenges
K. SALAH, M. H. REHMAN, N. NIZAMUDDIN and A. Al-Fuqaha
ABSTRACT
Recently, Artificial Intelligence (AI) and blockchain have become two of the most trending and disruptive technologies. Blockchain technology has the ability to automate payment in cryptocurrency and to provide access to a shared ledger of data, transactions, and logs in a decentralized, secure, and trusted manner. Also with smart contracts, blockchain has the ability to govern interactions among participants with no intermediary or a trusted third party. AI, on the other hand, offers intelligence and decision- making capabilities for machines similar to humans. In this paper, we present a detailed survey on blockchain applications for AI. We review the literature, tabulate, and summarize the emerging blockchain applications, platforms, and protocols specifically targeting AI area. We also identify and discuss open research challenges of utilizing blockchain technologies for AI.
computerweekly.com 17-23 September 2019 16W hen people int.docxmccormicknadine86
computerweekly.com 17-23 September 2019 16
W hen people interact with each other, for example via financial transactions, sharing legal docu-ments or trading through supply chains, they need a high level of confidence that the data
recording their interaction is accurate and true.
A distributed ledger makes it possible to build applications
where multiple parties can execute transactions online without
the need to trust a central authority or indeed each other.
Over the past few years, the number of use cases for distributed
ledgers, and their more specialised form, blockchains, has been
increasing, as has the technology to support the underlying infra-
structure and build applications on top of it.
With a distributed ledger, every user has their own full, or in some
cases partial, copy of the database, referred to as a node, which
can be a physical device, a virtual machine or a software container.
Each node runs the relevant software to provide the infrastruc-
ture management and the relevant application, including the
ability to complete “smart contracts” that negotiate the direct
exchange of assets between participating nodes.
consensus
For a transaction to proceed, all nodes must verify a transaction
and agree its order on the ledger.
Doing so is termed “consensus”, which is necessary, for exam-
ple, to avoid double counting or overspending when it comes to
financial assets.
Consensus involves four steps, from the transaction being
initiated to it being committed on all nodes with a timestamp
InsIde blockchaIn and Its
varIous applIcatIons
Bob Tarzey explores the technology around
blockchain shaping how businesses use data
BUYER’S GUIDE TO BLOCKCHAIN | PART 2 OF 3
G
O
LD
EN
S
IK
O
R
K
A
/A
D
O
B
E
Home
http://www.computerweekly.com
https://searchcio.techtarget.com/definition/blockchain
https://searchservervirtualization.techtarget.com/definition/virtual-machine
https://www.techtarget.com/contributor/Bob-Tarzey
computerweekly.com 17-23 September 2019 17
Home
News
How IT departments
can find different
ways to upskill in
the new economy
Travel company Clarity
bakes ThoughtSpot
search and AI functions
into analytics tool
Digital factory
approach signals a new
departure for Network
Rail’s IT strategy
Editor’s comment
Buyer’s guide
to blockchain
Delivering cloud in the
financial services sector
How 5G will transform
your business
Downtime
providing a unique cryptographic signature. These steps can be
completed in seconds or minutes, depending on the technology.
Blockchains are distinguished from other distributed ledgers in
being updated by adding blocks of new transactions to create an
immutable tamper-proof log of sensitive activity.
The right to write blocks may require proof-of-work – which
can be time and resource intensive – the aim being to prevent, for
example, mass updates by bots.
Nomenclature has become confusing as the two terms, dis-
tributed ledger and blo ...
Benchmark and comparison between hyperledger and MySQLTELKOMNIKA JOURNAL
In this paper, we report the benchmarking results of Hyperledger, a Distributed Ledger, which is the derivation Blockchain Technology. Method to evaluate Hyperledger in a limited infrastructure is developed. Themeasured infrastructure consists of 8 nodes with a load of up to 20000 transactions/second. Hyperledger consistently runs all evaluation, namely, for 20,000 transactions, the run time 74.30s, latency 73.40ms latency, and 257 tps. The benchmarking of Hyperledger shows better than a database system in a high workload scenario. We found that the maximum size data volume in one transaction on the Hyperledger network is around ten (10) times of MySQL. Also, the time spent on processing a single transaction in the blockchain network is 80-200 times faster than MySQL. This initial analysis can provide an overview for practitioners in making decisions about the adoption of blockchain technology in their IT systems.
As enterprises across verticals explore the
opportunities for innovation and process
optimization using blockchain technologies, they
are looking for in technical aspects of deploying
and integrating blockchain technology, with their
existing IT systems.
Based on operating models and blockchain
platforms, there are variations in deployment and
operations aspects, along with factors like
integration & information security. This document
provides approach and factors to consider during
selection and implementation of blockchain
technologies
https://www.lntinfotech.com/Canada/
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...eraser Juan José Calderón
Blockchain for AI: Review and Open. Research Challenges
K. SALAH, M. H. REHMAN, N. NIZAMUDDIN and A. Al-Fuqaha
ABSTRACT
Recently, Artificial Intelligence (AI) and blockchain have become two of the most trending and disruptive technologies. Blockchain technology has the ability to automate payment in cryptocurrency and to provide access to a shared ledger of data, transactions, and logs in a decentralized, secure, and trusted manner. Also with smart contracts, blockchain has the ability to govern interactions among participants with no intermediary or a trusted third party. AI, on the other hand, offers intelligence and decision- making capabilities for machines similar to humans. In this paper, we present a detailed survey on blockchain applications for AI. We review the literature, tabulate, and summarize the emerging blockchain applications, platforms, and protocols specifically targeting AI area. We also identify and discuss open research challenges of utilizing blockchain technologies for AI.
BEST BLOCKCHAIN DEVELOPMENT PLATFORMS TO WATCH OUT FOR IN 2023SSTech System
Blockchain is becoming a popular choice day by day. Blockchain emerged as a mainstream technology with tremendous growth. Above is a list of the top blockchain development platforms and blockchain-embedded ecosystems suitable for your business.
Read more: https://www.sstechsystem.com/blockchain-development-platforms/
The blockchain is a disruptive technology that allows for the fully distributed, decentralized recording of transactions without the need for an intermediary. The blockchain technology originated as part of the bitcoin digital currency system, which was first described in 2008 by an individual or a group using the pseudonym Satoshi Nakamoto.
Blockchain technology has leapt to prominence in the past year, notably with the establishment of the open source Hyperledger Project hosted by the Linux Foundation. This talk examines Blockchain's impact on financial services and asset management. Using Cloudsoft Application Management Platform (AMP), we show how we can rapidly deploy and manage a Hyperledger Fabric running on a Bluemix Private Cloud across San Jose, London, and Singapore, creating a geographically distributed Blockchain network. Finally we drill down on the Apache Brooklyn blueprint that models this fabric and makes it possible.
https://cloudsoft.io/gethlf/
IBM InterConnect 2017 | Session 2444A
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain
InitVerse Blockchain,Blockchain is an information technology for decentralized data storage, data sharing, and data exchange, which does not need to be controlled by a central organization or individual.
In this detailed PDF, we delve into a curated collection of top blockchain platforms, providing insights into their functionalities, and importance for your business. From large enterprise to innovative startups, this list will be a useful spectrum of platforms, catering to different needs and applications.
Blockchain Computing: Prospects and Challenges for Digital Transformation Pr...eraser Juan José Calderón
Blockchain Computing: Prospects and Challenges for Digital Transformation . Professor Syed Akhter Hossain.
Abstract:
A revolutionary trustable sharable computing outcome, the blockchain is essentially a distributed database of records or public ledger of all transactions originated from digital events and shared among participating parties within a computing framework. Each transaction of the chain in the public ledger is verified by consensus of a majority of the participants in the system and its constituents. Once recorded, information can never be erased and neither altered. The blockchain contains a certain and verifiable record of every single transaction ever made during the business operations. In general sense, the blockchain could be described simply as being a way of storing the information of a transaction, between multiple parties in a trustable way. Recording, sharing, storing and redistributing contents in a secure and decentralized way. Being owned, run and monitored by everybody and without anyone controlling it. Besides, avoiding any kind of modifications or abuses from a central authority. Blockchain technology is non-controversial and has worked flawlessly over the last few years and is being successfully applied to both financial and non-financial world applications and listed as as the most important invention since the Internet itself. Besides, digital transformation is taking off as rapid agent for change as part of the global business convergence. In this article, detail of blockchain technologies is presented from the pe
Short presentation on why a new paradigm is needed for applications & online services offered on the Internet. The Web3 vision relies on the Blockchain technology and the principle of decentralization as cornerstones, to enforce data privacy & require user consent.
FIWARE Wednesday Webinars - Integrating FIWARE with Blockchain/DLTsFIWARE
Integrating FIWARE with Blockchain/DLTs - 1 July 2020
Corresponding webinar recording: https://youtu.be/ITSxtlCmNhQ
This webinar will be an introduction to Blockchain and how FIWARE can be integrated with Blockchain/DLTs with a demo. In addition, it will also explain upcoming DLT components in the FIWARE ecosystem and an idea/state of art to leverage DLTs in 'Powered by FIWARE' systems.
Chapter: Blockchain
Difficulty: 3
Audience: Technical Domain Specific
Speaker: Har Preet Singh (Technical Expert and Evangelist, FIWARE Foundation)
Big data as a service (BDaaS) platform is widely used by various
organizations for handling and processing the high volume of data generated
from different internet of things (IoT) devices. Data generated from these IoT
devices are kept in the form of big data with the help of cloud computing
technology. Researchers are putting efforts into providing a more secure and
protected access environment for the data available on the cloud. In order to
create a safe, distributed, and decentralised environment in the cloud,
blockchain technology has emerged as a useful tool. In this research paper, we
have proposed a system that uses blockchain technology as a tool to regulate
data access that is provided by BDaaS platforms. We are securing the access
policy of data by using a modified form of ciphertext policy-attribute based
encryption (CP-ABE) technique with the help of blockchain technology. For
secure data access in BDaaS, algorithms have been created using a mix of CPABE with blockchain technology. Proposed smart contract algorithms are
implemented using Eclipse 7.0 IDE and the cloud environment has been
simulated on CloudSim tool. Results of key generation time, encryption time,
and decryption time has been calculated and compared with access control
mechanism without blockchain technology.
In this presentation, I highlighted the significance of adopting development methods for the successful development of IoT-based systems. By adopting systematic development methods, we can ensure that IoT systems are built with a structured approach, minimizing risks and enhancing overall reliability. I discussed the benefits of utilizing development methods, such as improved project management, streamlined development processes, and the ability to consistently deliver high-quality IoT solutions.
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfMahdi_Fahmideh
Digital Forensics for Artificial
Intelligence (AI ) Systems:
AI systems make decisions impacting our daily life Their actions might cause accidents, harm or, more generally, violate
regulations either intentionally or not and consequently might be considered suspects for various events. In this lecture we explore how digital forensics can be performed for AI based systems.
More Related Content
Similar to Adoption Blockchain Smart Contracts in Developing Information Systems.pdf
BEST BLOCKCHAIN DEVELOPMENT PLATFORMS TO WATCH OUT FOR IN 2023SSTech System
Blockchain is becoming a popular choice day by day. Blockchain emerged as a mainstream technology with tremendous growth. Above is a list of the top blockchain development platforms and blockchain-embedded ecosystems suitable for your business.
Read more: https://www.sstechsystem.com/blockchain-development-platforms/
The blockchain is a disruptive technology that allows for the fully distributed, decentralized recording of transactions without the need for an intermediary. The blockchain technology originated as part of the bitcoin digital currency system, which was first described in 2008 by an individual or a group using the pseudonym Satoshi Nakamoto.
Blockchain technology has leapt to prominence in the past year, notably with the establishment of the open source Hyperledger Project hosted by the Linux Foundation. This talk examines Blockchain's impact on financial services and asset management. Using Cloudsoft Application Management Platform (AMP), we show how we can rapidly deploy and manage a Hyperledger Fabric running on a Bluemix Private Cloud across San Jose, London, and Singapore, creating a geographically distributed Blockchain network. Finally we drill down on the Apache Brooklyn blueprint that models this fabric and makes it possible.
https://cloudsoft.io/gethlf/
IBM InterConnect 2017 | Session 2444A
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain
InitVerse Blockchain,Blockchain is an information technology for decentralized data storage, data sharing, and data exchange, which does not need to be controlled by a central organization or individual.
In this detailed PDF, we delve into a curated collection of top blockchain platforms, providing insights into their functionalities, and importance for your business. From large enterprise to innovative startups, this list will be a useful spectrum of platforms, catering to different needs and applications.
Blockchain Computing: Prospects and Challenges for Digital Transformation Pr...eraser Juan José Calderón
Blockchain Computing: Prospects and Challenges for Digital Transformation . Professor Syed Akhter Hossain.
Abstract:
A revolutionary trustable sharable computing outcome, the blockchain is essentially a distributed database of records or public ledger of all transactions originated from digital events and shared among participating parties within a computing framework. Each transaction of the chain in the public ledger is verified by consensus of a majority of the participants in the system and its constituents. Once recorded, information can never be erased and neither altered. The blockchain contains a certain and verifiable record of every single transaction ever made during the business operations. In general sense, the blockchain could be described simply as being a way of storing the information of a transaction, between multiple parties in a trustable way. Recording, sharing, storing and redistributing contents in a secure and decentralized way. Being owned, run and monitored by everybody and without anyone controlling it. Besides, avoiding any kind of modifications or abuses from a central authority. Blockchain technology is non-controversial and has worked flawlessly over the last few years and is being successfully applied to both financial and non-financial world applications and listed as as the most important invention since the Internet itself. Besides, digital transformation is taking off as rapid agent for change as part of the global business convergence. In this article, detail of blockchain technologies is presented from the pe
Short presentation on why a new paradigm is needed for applications & online services offered on the Internet. The Web3 vision relies on the Blockchain technology and the principle of decentralization as cornerstones, to enforce data privacy & require user consent.
FIWARE Wednesday Webinars - Integrating FIWARE with Blockchain/DLTsFIWARE
Integrating FIWARE with Blockchain/DLTs - 1 July 2020
Corresponding webinar recording: https://youtu.be/ITSxtlCmNhQ
This webinar will be an introduction to Blockchain and how FIWARE can be integrated with Blockchain/DLTs with a demo. In addition, it will also explain upcoming DLT components in the FIWARE ecosystem and an idea/state of art to leverage DLTs in 'Powered by FIWARE' systems.
Chapter: Blockchain
Difficulty: 3
Audience: Technical Domain Specific
Speaker: Har Preet Singh (Technical Expert and Evangelist, FIWARE Foundation)
Big data as a service (BDaaS) platform is widely used by various
organizations for handling and processing the high volume of data generated
from different internet of things (IoT) devices. Data generated from these IoT
devices are kept in the form of big data with the help of cloud computing
technology. Researchers are putting efforts into providing a more secure and
protected access environment for the data available on the cloud. In order to
create a safe, distributed, and decentralised environment in the cloud,
blockchain technology has emerged as a useful tool. In this research paper, we
have proposed a system that uses blockchain technology as a tool to regulate
data access that is provided by BDaaS platforms. We are securing the access
policy of data by using a modified form of ciphertext policy-attribute based
encryption (CP-ABE) technique with the help of blockchain technology. For
secure data access in BDaaS, algorithms have been created using a mix of CPABE with blockchain technology. Proposed smart contract algorithms are
implemented using Eclipse 7.0 IDE and the cloud environment has been
simulated on CloudSim tool. Results of key generation time, encryption time,
and decryption time has been calculated and compared with access control
mechanism without blockchain technology.
Similar to Adoption Blockchain Smart Contracts in Developing Information Systems.pdf (20)
In this presentation, I highlighted the significance of adopting development methods for the successful development of IoT-based systems. By adopting systematic development methods, we can ensure that IoT systems are built with a structured approach, minimizing risks and enhancing overall reliability. I discussed the benefits of utilizing development methods, such as improved project management, streamlined development processes, and the ability to consistently deliver high-quality IoT solutions.
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfMahdi_Fahmideh
Digital Forensics for Artificial
Intelligence (AI ) Systems:
AI systems make decisions impacting our daily life Their actions might cause accidents, harm or, more generally, violate
regulations either intentionally or not and consequently might be considered suspects for various events. In this lecture we explore how digital forensics can be performed for AI based systems.
Application of Blockchain Technologies in Digital ForensicsMahdi_Fahmideh
This lecture, from course CIS8708-Digital Forensics (Guide to Computer Forensics and Investigations), discusses the role of blockchain technologies in digital forensics investigation
Certificate for Contributions as a Reviewer for the Journal of Software and S...Mahdi_Fahmideh
The success of any academic journal depends on the volunteer effort and commitment to service by reviewers. The leading Journal of Software and Systems Modeling (SoSyM) gave me a certification for my contributions as a reviewer.
Role of ontologies in beach safety management analytics systemsMahdi_Fahmideh
Events at public beaches are one of the most popular recreational activities of local communities and international visitors in all places around the world. Amongst others, the beach safety management in protected areas needs support for continuous analysis and decision making on incidents at the beach areas. There is a lack of available standard models to assist data scientists to represent analytics models including different spheres of interplay domain variables related to beach safety management. Using the Design Science Research Methodology (DSRM), we developed ontological models that facilitate a unified representation and maintenance analytics models. We contribute to the ontology design theory for analytics models underlying analytics systems for the beach safety management domain. Our research findings can be used in the general class of ontology design problem for analytics systems in practice.
The 27th Australasian Conference on Information SystemsMahdi_Fahmideh
Many organisations are currently moving their legacy systems to the cloud as it offers reduced cost, improved operational efficiency, on-demand, and pay-as-you-go service models. While any cloud migration scenario to make legacies cloud-enabled may have their own characteristics, there is no universally superior or applicable method for all scenarios. In situations like this, designing customization methods that fit characteristics of migration scenarios would be pivotal for successful adoption of cloud computing. The literature review reveals that issues surrounding method tailoring for the cloud migration have so far been missing and this is despite the call made by previous researches to adopt a tailoring perspective to the cloud enablement. To effectively address this shortcoming, this study applied the idea of situational method engineering to develop a framework which facilitates the design and maintenance of bespoke cloud migration methods. The paper demonstrates the applicability of the proposed framework via presenting two scenarios.
A Model-Driven Approach to Support Cloud Migration Process- A Language Infras...Mahdi_Fahmideh
Adoption of cloud computing as a new outsourcing strategy has grown rapidly among IT-based organisations in recent years. Research around migrating legacy systems to cloud environments is proliferated with a variety of approaches that often narrow down in technical details. However, an overarching and integrated view of cloud migration process does not exist in the current literature. As an at-tempt to ameliorate this shortcoming, this research applies a metamodeling approach and develops a generic cloud migration process model derived from the extant cloud migration literature. The proposed metamodel is not dependent or restricted to any specific cloud platform; rather it is an abstraction of phases, activities, tasks, and work-products that are incorporated in a typical migration process. It underpins a high-level and conceptual view of cloud migration process and acts as a reusable knowledge repository to design situation-specific migration process models for a given migration scenario at hand.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Adoption Blockchain Smart Contracts in Developing Information Systems.pdf
1. Adoption Blockchain Smart Contracts in Developing Information Systems
Speaker: Mahdi Fahmideh (PhD in Information Systems)
Senior Lecturer in Cyber Security, University of Southern Queensland (UniSQ), Australia
E-email: Mahdi dot Fahmideh at usq.edu.au
1
7th Iranian Conference on Advances in Enterprise Architecture (ICAEA 2023)
November 2023
2. Career history
Algorithms and Data Structures
Postdoctoral Researcher (Oct 2016 – Dec 2018)
Undergrad/post-grad subjects in IS and SE
(March 2015 – present)
Mahdi
PhD
Business School
(September 2013- July 2017)
ranked 4th in Australia, 45th in the world, 2018 QS World University Rankings
(School of Systems,
Management and Leadership)
teaches
was-a
at
is-a
ABCD technologies (Artificial intelligence, Blockchain, Cloud computing, and big Data)
Data Management and Security
Software
Development Methodologies
Backend Web
Programming
Lecturer @
(2019-2021)
Professional Practice
and Research Project
System Analysis
and Design
Post-doc (2012 – present)
- 6 ERA-Core lead-author A*
Being a role model for
IS/SE community,
improving people’s lives
with IT
Industry (software developer)
(2002-2012, e.g., publishing, insurance,
defense, accounting sectors)
Design science
researcher
nominated for 2020 OCTAL
Award at
Early career researcher
is-a
served as a
Guest Editor-Elsevier Journal IST
-Guest Editor-Elsevier Journal of Pervasive and Mobile
Computing
-Reviewer (ACM Computing Surveys)
-Track chair (e.g., EEMMSAD Conference 2021)
-Program committee
Senior Lecturer @
(2021- ?)
3. Blockchain technology
Blockchain based (software) information systems uses
concepts and technologies popularized by cryptocurrencies
such as Bitcoin—highly decentralized, open transaction
ledgers with immutable content.
Increasing adoption of blockchain technology in different
domains such as finance, supply chain management,
healthcare, and voting systems to enhance transparency,
security, and trust in digital transactions and data management.
(some) IT-based organizations have found compelling
blockchain use cases, some other still figuring out..
3
4. Blockchain technology
Technical application: Digital transformation to
ABCD technologies (i.e., modern Internet-based
computing technologies of Artificial Intelligence,
Blockchain smart contracts, Cloud computing, and
big Data).
Blockchain can address challenges in adoption of
AI, Cloud computing, and big Data technologies
(and vice versa)
4
Cloud computing
Blockchain
5. Blockchain technology (continue)
Advantages of blockchain for information systems
Decentralization: Blockchain operates on a decentralized network - distributed ledger technology
(DLT)- eliminating the need for a central authority and allowing peer-to-peer transactions,
reducing the risk of single points of failure
Immutability: Once information is recorded on the blockchain, it cannot be altered or deleted,
ensuring data integrity and providing a reliable audit trail for all transactions
Enhanced security: Cryptographic techniques and consensus algorithms in blockchain provide
robust security, protecting data from unauthorized access and tampering, making it highly secure
for sensitive information
Transparency and traceability: Blockchain offers transparency by allowing all participants in
the network to view the transactions. This transparency, combined with the immutability of
records, enhances traceability, enabling a clear and accountable history of all transactions
And more ?
5
6. Key building elements/components of blockchain
• In a simple view, blockchain is an accounting book or digital
distributed database. It has a chain of blocks (i.e., records) that are
sequentially linked together.
• A block contains transactional data, a time stamp, and a hash value
of its previous block.
• The data records in a block are non-reversible, transparent, and
immutable.
• Each block depends on its predecessor block and is secured via
cryptography techniques.
• A block is created by a node (a computer in the distributed ledger
network).
• The chain of blocks is stored on a distributed network of nodes
where each node contains a copy of the entire blockchain
• The chain is visible and verifiable by all nodes in the network
• Once a block with its own timestamp is appended to the chain, the
creator node broadcasts that block to all the other nodes in the peer-
to-peer distributed network.
• Some nodes are validators, responsible for validating a newly added
block to the chain.
6
Components of blockchain technology
7. Key building blocks of blockchain
A key element of blockchain technology is the ability to create smart
contracts (e.g., e.g., Solidity on Ethereum platform)
• translating the clauses of a business contract into code and
embedding them into software or hardware to make them automated
and self-execute
• an automatable and enforceable agreement. Automatable by
computer, although some parts may require human input and control.
Enforceable either by legal enforcement of rights and obligations or
via tamper-proof execution of computer code (Clack et al. 2016)
• Reserve the necessary logic for the creation and validation of
transactions and enable users to read, update, and delete the
data that is stored in blockchain platforms
• Reducing the cost of contracting between transacting parties
and avoiding malicious actions during contract execution
7
Components of Blockchain technology (continue)
14. 14
(platforms) technologies to develop blockchain based systems
Example technologies to develop blockchain based systems
Technology Type Aim
On-chain
components
implementation
BigChainDB Blockchain platform A big data distributed platform with a support of blockchain characteristics
Californium CoAP Development framework Securing data transfer between IoT device data and blockchain platforms
Chain Core Blockchain platform Issuing and transferring financial assets on a permissioned blockchain infrastructure.
Corda Open source distributed ledger Enabling the development of smart contracts with a support for pluggable consensus mechanisms and minimizing transaction cost
Credit Distributed ledger dev. framework Developing permission based smart contracts
Domus Tower Blockchain platform Implementing consortium blockchain with a focus on finance domain functionalities
Elements Open source blockchain platform Enhancing Bitcoin functionalities at the communication and protocol levels
Ethereum Blockchain platform Enhancing Bitcoin functionalities and implementing smart contracts.
Eris:db Distributed ledger Enhancing Bitcoin functionalities
HydraChain Blockchain platform An extension to Ethereum platform for creating permissioned, private, and consortium blockchain
Hyperledger Fabric Open source blockchain platform Providing support for smart contract implementation and test in different application domains
Hyperledger Iroha Distributed ledger Developing smart contracts for mobile-based applications
Hyperledger Sawtooth Lake Open source blockchain platform Providing support for smart contract development with specific support for decoupling transaction business logic from the consensus layer
JUICE Tool Enabling the implementation and monitoring of Solidity smart contracts running on Ethereum platform
Multichain Open source blockchain platform Supporting Bitcoin functionalities for multi-asset financial transactions
Stellar Distributed ledger Enabling distributed payments infrastructure with RESTful HTTP API servers
Symbiont Assembly Distributed ledger A distributed ledger based on Apache Kafka to develop smart contracts
Truffle Framework Compilation, test, integration, and deployment of smart contracts
Bitcoin Testnet Framework Testing smart contracts without changing real system data or transactions
Hyperledger Besu Open source development framework A Java-based Ethereum client to develop and deploy applications to run on the public Ethereum public network or private permissioned network
Mininet Tool An emulator to analyse transaction blockchain transaction delays
Off-chain
components
implementation
JSON RPC Protocol Remote procedure call used by Ethereum clients to interact with Ethereum nodes
Web3j Library A lightweight Java and Android library for working with smart contracts and integrating with Ethereum platform
CouchDB Database A document-based NoSQL database that uses JSON to store data, JavaScript as its query language, and commonly used with Hyperledger Fabric
Raspberry Pi Toolkit Collection of hardware and programming language to develop blockchain-based IoT systems
REST API API To query data and test HTTP requests as well as call blockchain platform APIs
Bluetooth, ZigBee Hardware Hardware Communication protocols
Apache Tomcat Platform Hosting and implementing back-end and front-end applications interaction with off-chain components
15. Key challenges in developing information systems leveraging blockchain
technologies
Business enterprises are interested in taking benefits of blockchain technologies to empower their systems
Blockchain based systems as a complex socio-technical IT artefact
As a DLT underpinned by fundamental assumptions such as decentralization, peer-to-peer (P2P) transmission, transparency with pseudonymity,
irreversibility of records, and computational logic.
These assumptions raise a set of important challenges when developing systems leveraging blockchain
❑ Security and privacy: visibility of blocks and smart contracts’ codes to users (public blockchain), attacks to smart contracts
❑ Scalability and performance: increased number of transactions and participant nodes grows, blockchain system performance can be degraded
❑ Interoperability and standards: different protocols, consensus algorithms, and data formats
❑ Energy consumption: gas fee (or gas consumption) necessitates significant computational resources and energy consumption
❑ Maintenance: updating deployed smart contract code, such as incorporating new features, addressing flaws, or enhancing code efficiency of
smart contracts
❑ Regulatory and legal: evolving regulatory landscape can be a barrier to adoption, as blockchain systems often operate across borders and must
comply with various legal requirements
❑ Other challenges..?
15
16. Reports of blockchain adoption failures
Examples of blockchain adoption failures
• MtGox attack in 2014 led to a declared loss of $600 million
• Bitfinex attack in 2016 led to a loss of $65 million, and a DAO
(decentralized autonomous organization) attack in 2016 caused the
withdrawal of Ether digital currency funds worth $50–60 million
• Ethereum: the DAO hack and Parity Wallet hack caused a loss of USD
$150 M in total
• EOS and Axie Infinity [3], were stolen, respectively, USD $58,000 and
USD$600 million, using faked tokens
• What are reasons in blockchain adoption failures?
• These failures are commonly attributed to a lack of adoption of a
systematic development approach, a project management flaw that
is aptly phrased as un-ruled and hurried software development
• Examples: poor quality assurance, smart contract scope creep,
inconsistent development, lack of accountability,
16
17. Information systems development methods (ISD methods or ISDMs)
(a.k.a. software engineering methodologies)
❑ Analogy: to build or buy a property (e.g., house, unit apartment, etc), we
need to adopt a method to organise and anticipate requirements, steps,
and risks.
❑ To build information systems (or software systems), we need to adopt
systematic development methods
❑ Ad-hoc system development vs. systematic (yet tailorable) system
development
❑ Adopting a systematic methods for managing the complexity of
IoT platform development vs. ad-hoc use of implementation
techniques and technologies to build systems which are likely to
deliver a vulnerable and poor-quality platform
❑ Information system development methods (development methods for
short): entire suite of system development lifecycle activities, e.g.,
planning, analysis, design, building, testing, and maintenance, undertaken
by humans individually/collectively to create a working information
system
❑ As the core centrepiece of quality management initiatives to build
sustainable information systems in a cost-effective manner
❑ Examples: Agile methods, object oriented methods, agent oriented
methods, etc 17
18. ISD methods for developing systems leveraging blockchain technologies
❑ Why ISD methods?
❑ A long-standing acknowledgment that the adoption of ISD methods, amongst other factors, plays a crucial role in the successful
implementation and effective maintenance of systems coupled with emerging technologies
❑ Research and practice have largely benefited from ISD methods as the core centrepiece of quality management initiatives to build
sustainable information systems in a cost-effective manner
❑ A blockchain based system is, after all, essentially a type of information system development endeavour!
❑ Conventional ISD methods applicable to blockchain development?
❑ In contrast to the conventional system development which takes place predominantly within an individual system- the socio-technical
nature of blockchain based systems raises a range of new important complexities
❑ Blockchain-based systems often require decentralized, consensus-driven architectures and smart contracts, diverging from the
centralized nature of conventional ISD methods.
❑ Unique characteristics like cryptographic security and peer-to-peer networks
❑ Some complexities are rooted in the immaturity of current technologies BUT some are intrinsic to blockchain technology
❑ Development of blockchain based systems can be much more complicated than that typically deemed in the conventional system
development wisdom
18
19. Benefits of applying ISD methods to build blockchain based systems
❑ Structured and systematic
❑ providing guidelines, relevant tasks, modeling techniques, and best practices to manage complexity, minimize errors, and improve the overall
quality of the blockchain based system
❑ Requirements driven
❑ by capturing and prioritizing various stakeholders’ requirements and expectations (what smart contracts are feasible?), ensuring that the
developed blockchain based system meets their needs
❑ Risk mitigation
❑ inherent risks in blockchain based systems such as security vulnerabilities, data privacy concerns, interoperability challenges, and scalability
issues can be better handled by development methods throughout development lifecycle as they help identify potential risks, assess their
impact, and devise techniques to mitigate them
❑ Integration and interoperability
❑ blockchain based systems may involve various off-chain and on-chain components leveraging different (non) blockchain technologies. ISD
methods can help with the design and implementation necessary interfaces, protocols, and data exchange mechanisms for seamless
integration among different blockchain based systems
❑ Quality assurance
❑ organizations can enhance the quality of their blockchain based systems, e.g., reliability, performance, and security
19
20. Constituents of ISD methods
20
Development
process
Roles Models
What activities/tasks
incorporated into blockchain
sys development
process?
What
roles, e.g., developers,
stakeholders, might
be involved in blockchain
based sys. development?
What
models, e.g., diagrams,
notations, might be
produced during blockchain
based sys. Development?
What tools, technologies,
techniques, heuristics,
guidelines, principles are
provided to operationalise and
support the development
process, roles, models,?
adapted from Sabine’s model (with kind permission)
❑ An ISD method, regardless of its application domain, can be
characterised in three core aspects
21. Research approach
❑ Design science research approach
❑ Design and validate an integrated ISD method providing a cohesive understating of blockchain system development
❑ A foundation for researchers and practitioners looking forward to utilizing the ISD methods in the context of
blockchain development
❑ Literature sources:
❑ Leading Information Systems venues, e.g., senior basket of AIS
❑ Leading Software Engineering venues
❑ Over 50 studies from academic and multi-vocal literature
❑ 10 * domain expert reviews with experience in developing blockchain systems in different industry sectors
❑ Two case studies (application domains: food trust and token exchanger)
22. Generic method for development of blockchain based systems
Analysis
- Assess readiness
Preliminary design
- Identify participants
- Approve agreement
- Decide on/off blockchain
- Select platform
- Define smart contract skeleton
- Define incentive protocols
- Resolve dispution
- Define smart contract changes
Detailed design
- Create consensus protocols
- Define interactions
- Optimize gas consumption
- Design permissions
- Design security
- Design replications
- Configure system
- Publish smart contracts
Maintenance
- Integrator
- Auditor
- Blockchain user
- Legal professional
Smart contract
developer
- Decide on blockchain type
- Analyze technology - Test smart contracts
- Implement smart contracts
- Integrate with off blockchain
Construction Transition
- Develop use cases
Retirement
Architect
Models
Generated output Phase Role
Sequences
- Security
- Core blockchain developer
- Smart contract developer
Legend
-Use case
-Prototype
-Requirements
-Smart contracts
-Base architecture
-Forking
-Data flow
-Interactions
-Consensus
-Transactions
-Executable smart
contracts
Role
Development
process
Modeling
-Miner
-Node operator
-Monitor nodes
-Evaluate contract
correctness
-Terminate
23. Generic method for development of blockchain based systems (continue)
❑ Example roles
Sample list of situational factors for consideration in feasibility analysis task (called later readiness assessment)
Category Situational factor Possible values for the factor
Organization
Management commitment Low, medium, high
Organizational restructuring Hierarchical, functional, horizontal, divisional, matrix, team-based, network
Business change Rarely, occasionally, frequent, always
Energy and gas consumption cost Low, medium, high
Software team Development skills in cryptography, law/legislation Low, medium, high
Technical
Immutability of data Stable, volatile
Data format Homogeneous, mixture, substance
Visibility/transparency Public, private, protected, package private
Transaction fee Free, low cost, variable, expensive
Data provenance Source, temporal, meta-data result
Transactionality Low, medium, high
transaction performance Critical, fairly important, low, moderate
Roll-back performance Critical, fairly important, low, moderate
Demanding infrastructure None, emergent, operating, matured
Vendor lock-in Impossible, unlikely, even chance, certain
Hosting modes Cloud, dedicated servers, virtual private,
Smart contract tool availability Yes, no
24. Generic method for development of blockchain based systems (continue)
❑ Example tasks related to
preliminary design and
construction phases
❑ Define smart contract
skeleton and implement
smart contracts
25. Generic method for development of blockchain based systems (continue)
❑ Example roles
26. Generic method for development of blockchain based systems (continue)
❑ Example modellings
27. Implications for research and practice
❑ Tailoring methods specific to blockchain development scenario. Recognizing the need for customized
development methods based on blockchain project is acknowledged. The persistent notion of a "silver bullet"
or a one-size-fits-all solution remains impractical in developing blockchain-based systems. Organisations and
software teams may employ in-house development approaches, yet these may be limited, concentrating on
specific blockchain development tasks while overlooking others.
❑ Situational method engineering (SME). Tailoring/creating project-specific development methods via
selecting appropriate method fragments from a method base and assembling them to construct a highly
customized method for a given project.
❑ Identifying value-driven smart contracts. What requirements are valuable and they instigate a variety of
stakeholders with diverging goals and commitment levels if they are addressed by BBS, for example, smart
contracts?
❑ Value driven blockchain smart contracts, i.e., requirements (engineering) analysis for blockchain smart
contract development
❑ Integrating and migrating legacy systems to blockchain platforms. Legacy software systems operating and
storing critical organizational data may predate blockchain technology. How and what new practices a
software team should incorporate into the development process to make legacy systems blockchain-enabled.
❑ Using generative AI as a facilitator for transforming legacy codes to smart contracts
28. Selected references
❑ C. D. Clack, V. A. Bakshi, and L. Braine. 2016. Smart contract templates: Foundations, design landscape and research directions. Retrieved from
https://arxiv.org/abs/1608.00771.
❑ S. Porru, A. Pinna, M. Marchesi, and R. Tonelli. 2017. Blockchain-oriented software engineering: challenges and new directions. In Proceedings of the
IEEE/ACM 39th International Conference on Software Engineering Companion (ICSEC’17). IEEE, 169–171.
❑ M. Fahmideh, J. Grundy, A. Ahmad, J. Shen, J. Yan, D. Mougouei, P. Wang et al. Engineering Blockchain-based Software Systems: Foundations, Survey, and
Future Directions, ACM Computing Surveys 55, no. 6 (2022): 1-44.
❑ M. Fahmideh, B. Abedin, J. Shen, Toward an integrated framework of developing blockchain systems, decision support systems (to appear)