Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (117)

Search Parameters:
Keywords = general ledger

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
36 pages, 5130 KB  
Article
SecureEdge-MedChain: A Post-Quantum Blockchain and Federated Learning Framework for Real-Time Predictive Diagnostics in IoMT
by Sivasubramanian Ravisankar and Rajagopal Maheswar
Sensors 2025, 25(19), 5988; https://doi.org/10.3390/s25195988 - 27 Sep 2025
Abstract
The burgeoning Internet of Medical Things (IoMT) offers unprecedented opportunities for real-time patient monitoring and predictive diagnostics, yet the current systems struggle with scalability, data confidentiality against quantum threats, and real-time privacy-preserving intelligence. This paper introduces Med-Q Ledger, a novel, multi-layered framework [...] Read more.
The burgeoning Internet of Medical Things (IoMT) offers unprecedented opportunities for real-time patient monitoring and predictive diagnostics, yet the current systems struggle with scalability, data confidentiality against quantum threats, and real-time privacy-preserving intelligence. This paper introduces Med-Q Ledger, a novel, multi-layered framework designed to overcome these critical limitations in the Medical IoT domain. Med-Q Ledger integrates a permissioned Hyperledger Fabric for transactional integrity with a scalable Holochain Distributed Hash Table for high-volume telemetry, achieving horizontal scalability and sub-second commit times. To fortify long-term data security, the framework incorporates post-quantum cryptography (PQC), specifically CRYSTALS-Di lithium signatures and Kyber Key Encapsulation Mechanisms. Real-time, privacy-preserving intelligence is delivered through an edge-based federated learning (FL) model, utilizing lightweight autoencoders for anomaly detection on encrypted gradients. We validate Med-Q Ledger’s efficacy through a critical application: the prediction of intestinal complications like necrotizing enterocolitis (NEC) in preterm infants, a condition frequently necessitating emergency colostomy. By processing physiological data from maternal wearable sensors and infant intestinal images, our integrated Random Forest model demonstrates superior performance in predicting colostomy necessity. Experimental evaluations reveal a throughput of approximately 3400 transactions per second (TPS) with ~180 ms end-to-end latency, a >95% anomaly detection rate with <2% false positives, and an 11% computational overhead for PQC on resource-constrained devices. Furthermore, our results show a 0.90 F1-score for colostomy prediction, a 25% reduction in emergency surgeries, and 31% lower energy consumption compared to MQTT baselines. Med-Q Ledger sets a new benchmark for secure, high-performance, and privacy-preserving IoMT analytics, offering a robust blueprint for next-generation healthcare deployments. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

29 pages, 1903 KB  
Article
Enabling Intelligent Internet of Energy-Based Provenance and Green Electric Vehicle Charging in Energy Communities
by Anthony Jnr. Bokolo
Energies 2025, 18(18), 4827; https://doi.org/10.3390/en18184827 - 11 Sep 2025
Viewed by 341
Abstract
With the gradual shift towards the use of electric vehicles (EV), electricity demand is expected to increase especially in energy communities. Therefore, it is important to investigate how energy is generated as the provenance of electricity supply is directly linked to climate change. [...] Read more.
With the gradual shift towards the use of electric vehicles (EV), electricity demand is expected to increase especially in energy communities. Therefore, it is important to investigate how energy is generated as the provenance of electricity supply is directly linked to climate change. There are only a few studies that investigated the internet of energy and energy provenance, but this area of research is important to prevent the rebound effect of CO2 emission due to the lack of a transparent approach that verifies the source of electricity consumed for charging EVs. The energy system is a complex network, which results in difficulty verifying the source of electricity as related to the generation of energy. Identifying the provenance of electricity is challenging since electricity is a non-physical element. Moreover, the volatility of a Renewable Energy Source (RES), such as solar and wind power farms, in relation to the complex electricity distribution system makes tracking and tracing challenging. Disruptive technologies, such as Distributed Ledger Technologies (DLT), have been previously adopted to trace the end-to-end stages of products. Likewise, artificial intelligence (AI) can be adopted for the optimization, control, dispatching, and management of energy systems. Therefore, this study develops a decentralized intelligent framework enabled by AI-based DLT and smart contracts deployed to accelerate the development of the internet of energy towards energy provenance in energy communities. The framework supports the tracing and tracking of RES type and source consumed for charging EVs. Findings from this study will help to accelerate the production, trading, distribution, sharing, and consumption of RES in energy communities. Full article
(This article belongs to the Special Issue Challenges, Trends and Achievements in Electric Vehicle Research)
Show Figures

Figure 1

19 pages, 2790 KB  
Article
Patterns of Morbidity in Ambatoboeny District, Northern Madagascar: A 12-Month Study
by Daniel Kasprowicz, Krzysztof Korzeniewski and Wanesa Wilczyńska
J. Clin. Med. 2025, 14(17), 6329; https://doi.org/10.3390/jcm14176329 - 8 Sep 2025
Viewed by 574
Abstract
Background: Ambatoboeny District in northern Madagascar faces significant health challenges due to widespread poverty, poor access to healthcare, and limited diagnostic capabilities. Despite high disease burden, data on morbidity patterns in the region are scarce. This study aims to identify the most prevalent [...] Read more.
Background: Ambatoboeny District in northern Madagascar faces significant health challenges due to widespread poverty, poor access to healthcare, and limited diagnostic capabilities. Despite high disease burden, data on morbidity patterns in the region are scarce. This study aims to identify the most prevalent diseases and most affected demographic groups, thus providing valuable insight into the region’s health profile. Methods: A retrospective analysis was conducted on medical records from 3678 patients who were admitted at Clinique Médicale BEYZYM, a secondary-level referral facility in Manerinerina, Boeny Region between January and December 2024. Diagnoses were retrieved from physician registration ledgers, hospitalization records, monthly laboratory reports, monthly general hospital activity reports and monthly reports from Centre de Traitement et de Diagnostic de la Tuberculose, which were cross-referenced and verified by trained clinical staff. Records were included if they contained identifiable demographic data and at least one clinical diagnosis. Diagnoses were coded using ICD-11 and were classified into 15 major categories. Results: The median patient age was 19.5 years (IQR: 7–42), with females accounting for 54% of the cohort. Most patients (87.2%) resided in Ambatoboeny. The most common reasons for admission were infectious and parasitic diseases (35.75%, 95% CI: 34.20–37.30), respiratory diseases (22.73%, 95% CI: 21.38–24.08), and diseases of the genitourinary system (13.95%, 95% CI: 12.83–15.07), collectively accounting for 72.43% of all recorded cases. Statistically significant differences in morbidity patterns were observed across age and sex groups. Conclusions: The findings underscore the multifaceted burden of disease in the Ambatoboeny District, where both infectious and chronic conditions coexist in a resource-limited setting. Delayed healthcare-seeking behavior, cultural beliefs, and diagnostic limitations further complicate care delivery. This study provides foundational data to inform targeted health policies, humanitarian medical missions, and diagnostic capacity-building tailored to local needs. Full article
(This article belongs to the Section Infectious Diseases)
Show Figures

Figure 1

34 pages, 761 KB  
Article
GDPR-Compliant Academic Certification via Blockchain: Legal and Technical Validation of the GAVIN Project
by Alvaro Gómez Vieites, Christian Delgado-von-Eitzen and Diego Estévez Garcia
Appl. Sci. 2025, 15(16), 9191; https://doi.org/10.3390/app15169191 - 21 Aug 2025
Viewed by 1331
Abstract
For years, combining the immutability associated with blockchain technology with the European Union’s General Data Protection Regulation (GDPR) has been considered a practically unsolvable conflict due to the very nature of blockchain and the GDPR. This article presents the GAVIN project (GDPR-Compliant Blockchain-Based [...] Read more.
For years, combining the immutability associated with blockchain technology with the European Union’s General Data Protection Regulation (GDPR) has been considered a practically unsolvable conflict due to the very nature of blockchain and the GDPR. This article presents the GAVIN project (GDPR-Compliant Blockchain-Based Architecture for Universal Learning, Education and Training Information Management), a pioneering initiative that overcomes this challenge through an innovative technical and legal approach to trusted digital academic certification. Developed by atlanTTic (University of Vigo) and funded by the European Union, GAVIN proposes a scalable architecture that combines off-chain storage, encrypted Hash-Based Message Authentication Code (HMAC) anonymization, access notarization, and blockchain-based access control. The legal validation of the working prototype under development demonstrates that blockchain decentralization is compatible with GDPR compliance. The model is presented as a replicable reference for institutions wishing to leverage distributed ledger technologies without compromising personal data protection. This paper details the legal design, technical architecture, and compliance mechanisms, offering a practical framework for implementing decentralized systems with privacy by design. Full article
(This article belongs to the Special Issue Blockchain and Distributed Systems)
Show Figures

Figure 1

23 pages, 2903 KB  
Article
IoT and Blockchain for Support for Smart Contracts Through TpM
by Renan Yamaguti, Luiz Carlos B. C. Ferreira, Lucas Lui Motta, Raphael Montali Assumpção, Omar C. Branquinho, Gustavo Iervolino and Paulo Cardieri
Sensors 2025, 25(16), 5001; https://doi.org/10.3390/s25165001 - 13 Aug 2025
Viewed by 600
Abstract
This paper investigates the integration of Internet of things (IoT) technology with blockchain to enhance transparency, accountability, and operational efficiency in smart contract execution for IoT ecosystems. The proposed approach extends the Three-Phase Methodology (TpM) by introducing an innovative entity, the IoT Operator, [...] Read more.
This paper investigates the integration of Internet of things (IoT) technology with blockchain to enhance transparency, accountability, and operational efficiency in smart contract execution for IoT ecosystems. The proposed approach extends the Three-Phase Methodology (TpM) by introducing an innovative entity, the IoT Operator, which acts as a custody caretaker, contract enforcer, and mediator. By leveraging blockchain’s secure and immutable ledger, the IoT Operator ensures the reliable monitoring and governance of IoT applications. A PoC implementation conducted at the Eldorado Research Institute demonstrates the methodology’s effectiveness, realizing a significant reduction of 95.83% in equipment search time. This work highlights the practical advantages of integrating blockchain and IoT within a structured framework, emphasizing the need for tailored, application-specific solutions rather than generic decentralization. The findings offer actionable guidelines for implementing blockchain in IoT systems, paving the way for more secure, efficient, and resilient IoT applications. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

22 pages, 1195 KB  
Article
Private Blockchain-Driven Digital Evidence Management Systems: A Collaborative Mining and NFT-Based Framework
by Butrus Mbimbi, David Murray and Michael Wilson
Information 2025, 16(7), 616; https://doi.org/10.3390/info16070616 - 17 Jul 2025
Viewed by 811
Abstract
Secure Digital Evidence Management Systems (DEMSs) ae crucial for law enforcement agencies, because traditional systems are prone to tampering and unauthorised access. Blockchain technology, particularly private blockchains, offers a solution by providing a centralised and tamper-proof system. This study proposes a private blockchain [...] Read more.
Secure Digital Evidence Management Systems (DEMSs) ae crucial for law enforcement agencies, because traditional systems are prone to tampering and unauthorised access. Blockchain technology, particularly private blockchains, offers a solution by providing a centralised and tamper-proof system. This study proposes a private blockchain using Proof of Work (PoW) to securely manage digital evidence. Miners are assigned specific nonce ranges to accelerate the mining process, called collaborative mining, to enhance the scalability challenges in DEMSs. Transaction data includes digital evidence to generate a Non-Fungible Token (NFT). Miners use NFTs to solve the puzzle according to the assigned difficulty level d, so as to generate a hash using SHA-256 and add it to the ledger. Users can verify the integrity and authenticity of records by re-generating the hash and comparing it with the one stored in the ledger. Our results show that the data was verified with 100% precision. The mining time was 2.5 s, and the nonce iterations were as high as 80×103 for d=5. This approach improves the scalability and integrity of digital evidence management by reducing the overall mining time. Full article
(This article belongs to the Special Issue Blockchain and AI: Innovations and Applications in ICT)
Show Figures

Figure 1

22 pages, 1158 KB  
Article
FODIT: A Filter-Based Module for Optimizing Data Storage in B5G IoT Environments
by Bruno Ramos-Cruz, Francisco J. Quesada-Real, Javier Andreu-Pérez and Jessica Zaqueros-Martinez
Future Internet 2025, 17(7), 295; https://doi.org/10.3390/fi17070295 - 30 Jun 2025
Viewed by 361
Abstract
In the rapidly evolving landscape of the Internet of Things (IoT), managing the vast volumes of data generated by connected devices presents significant challenges, particularly in B5G IoT environments. One key issue is data redundancy, where identical data is stored several times because [...] Read more.
In the rapidly evolving landscape of the Internet of Things (IoT), managing the vast volumes of data generated by connected devices presents significant challenges, particularly in B5G IoT environments. One key issue is data redundancy, where identical data is stored several times because it is captured by multiple sensors. To address this, we introduce “FODIT”, a filter-based module designed to optimize data storage in IoT systems. FODIT leverages probabilistic data structures, specifically filters, to improve storage efficiency and query performance. We hypothesize that applying these structures can significantly reduce redundancy and accelerate data access in resource-constrained IoT deployments. We validate our hypothesis through targeted simulations under a specific and rare configuration: high-frequency and high-redundancy environments, with controlled duplication rates between 4% and 8%. These experiments involve data storage in local databases, cloud-based systems, and distributed ledger technologies (DLTs). The results demonstrate FODIT’s ability to reduce storage requirements and improve query responsiveness under these stress-test conditions. Furthermore, the proposed approach has broader applicability, particularly in DLT-based environments such as blockchain, where efficient querying remains a critical challenge. Nonetheless, some limitations remain, especially regarding the current data structure used to maintain consistency with the DLT, and the need for further adaptation to real-world contexts with dynamic workloads. This research highlights the potential of filter-based techniques to improve data management in IoT and blockchain systems, contributing to the development of more scalable and responsive infrastructures. Full article
Show Figures

Figure 1

25 pages, 1083 KB  
Article
STALE: A Scalable and Secure Trans-Border Authentication Scheme Leveraging Email and ECDH Key Exchange
by Jiexin Zheng, Mudi Xu, Jianqing Li, Benfeng Chen, Zhizhong Tan, Anyu Wang, Shuo Zhang, Yan Liu, Kevin Qi Zhang, Lirong Zheng and Wenyong Wang
Electronics 2025, 14(12), 2399; https://doi.org/10.3390/electronics14122399 - 12 Jun 2025
Viewed by 609
Abstract
In trans-border data (data transferred or accessed across national jurisdictions) exchange scenarios, identity authentication mechanisms serve as critical components for ensuring data security and privacy protection, with their effectiveness directly impacting the compliance and reliability of transnational operations. However, existing identity authentication systems [...] Read more.
In trans-border data (data transferred or accessed across national jurisdictions) exchange scenarios, identity authentication mechanisms serve as critical components for ensuring data security and privacy protection, with their effectiveness directly impacting the compliance and reliability of transnational operations. However, existing identity authentication systems face multiple challenges in trans-border contexts. Firstly, the transnational transfer of identity data struggles to meet the varying data-compliance requirements across different jurisdictions. Secondly, centralized authentication architectures exhibit vulnerabilities in trust chains, where single points of failure may lead to systemic risks. Thirdly, the inefficiency of certificate verification in traditional Public Key Infrastructure (PKI) systems fails to meet the real-time response demands of globalized business operations. These limitations severely constrain real-time identity verification in international business scenarios. To address these issues, this study proposes a trans-border distributed certificate-free identity authentication framework (STALE). The methodology adopts three key innovations. Firstly, it utilizes email addresses as unique user identifiers combined with a Certificateless Public Key Cryptography (CL-PKC) system for key distribution, eliminating both single-point dependency on traditional Certificate Authorities (CAs) and the key escrow issues inherent in Identity-Based Cryptography (IBC). Secondly, an enhanced Elliptic Curve Diffie–Hellman (ECDH) key-exchange protocol is introduced, employing forward-secure session key negotiation to significantly improve communication security in trans-border network environments. Finally, a distributed identity ledger is implemented, using the FISCO BCOS blockchain, enabling decentralized storage and verification of identity information while ensuring data immutability, full traceability, and General Data Protection Regulation (GDPR) compliance. Our experimental results demonstrate that the proposed method exhibits significant advantages in authentication efficiency, communication overhead, and computational cost compared to existing solutions. Full article
Show Figures

Figure 1

24 pages, 2593 KB  
Review
A Comprehensive Analysis of Integrating Blockchain Technology into the Energy Supply Chain for the Enhancement of Transparency and Sustainability
by Narendra Gariya, Anjas Asrani, Adhirath Mandal, Amir Shaikh and Dowan Cha
Energies 2025, 18(11), 2951; https://doi.org/10.3390/en18112951 - 4 Jun 2025
Cited by 3 | Viewed by 1582
Abstract
The energy sector underwent a significant transformation with increasing demand for efficiency, transparency, and sustainability. The traditional or conventional system often faces several challenges, such as inefficient energy trading, a lack of transparency in renewable energy generation verification, and complex regulatory guidelines that [...] Read more.
The energy sector underwent a significant transformation with increasing demand for efficiency, transparency, and sustainability. The traditional or conventional system often faces several challenges, such as inefficient energy trading, a lack of transparency in renewable energy generation verification, and complex regulatory guidelines that affect its widespread adoption. Thus, blockchain technology has emerged as a potential solution to overcome these challenges, as it is known for its transparent, secure, and decentralized nature. However, despite the promising application of blockchain, its integration into the energy supply chain (ESC) is underexplored. The purpose of this research is to analyze the potential applications of blockchain technology in ESC in order to enhance efficiency, transparency, and sustainability in energy systems. The aim is to investigate the integration of blockchain with emerging technologies (such as IoTs, smart contracts, and P2P energy trading) in order to optimize energy production, distribution, and consumption. Furthermore, by comparing different blockchain platforms (like Ethereum, Solana, Hedera, and Hyperledger Fabric), this study discusses the security and scalability challenges of using blockchain in energy systems. It also examines the practical use cases of blockchain for the tokenization of RECs, dynamic energy pricing, and P2P energy trading by providing the Energy Web Foundation and Power Ledger as real-world examples. The article concludes that blockchain technology has the potential to transform ESC by enabling decentralized energy trading, which subsequently enhances transparency in energy transactions and the verification of renewable energy generation. It also identifies smart contracts and tokenization of energy assets as key parameters for dynamic pricing models and efficient trading mechanisms. However, regulatory and scalability challenges remain significant obstacles to its widespread adoption. Finally, this study provides the basis for future advancement in the adoption of blockchain technology in ESC, which offers a valuable resource for industry professionals, regulating authorities, and researchers. Full article
(This article belongs to the Section B: Energy and Environment)
Show Figures

Figure 1

18 pages, 922 KB  
Article
Accounting Support Using Artificial Intelligence for Bank Statement Classification
by Marco Lecci and Thomas Hanne
Computers 2025, 14(5), 193; https://doi.org/10.3390/computers14050193 - 15 May 2025
Viewed by 1597
Abstract
Artificial Intelligence is a disruptive technology that is revolutionizing the accounting sector, e.g., by reducing costs, detecting fraud, and generating reports. However, the manual maintenance of booking ledgers remains a significant challenge, particularly for small and medium-sized enterprises. The usage of AI technologies [...] Read more.
Artificial Intelligence is a disruptive technology that is revolutionizing the accounting sector, e.g., by reducing costs, detecting fraud, and generating reports. However, the manual maintenance of booking ledgers remains a significant challenge, particularly for small and medium-sized enterprises. The usage of AI technologies in this area is rarely considered in the literature depite a significant interest in using AI for other acounting-related activities. Our study, which was conducted during 2023–2024, utilizes natural language processing and machine learning to construct a predictive model that accurately matches bank transaction statements with accounting records. The study employs Feedforward Neural Networks and Support Vector Machines with various settings and compares their performance with that of previous models embedded in similar predictive tasks. Additionally, as a baseline model, a software called Contofox, a rule-based system capable of classifying accounting records by manually creating rules to match bank statements with accounting records, is used. Furthermore, this study evaluates the business value of the model through an interview with an accounting expert, highlighting the potential benefits of artifacts in enhancing accounting processes. Full article
(This article belongs to the Special Issue Emerging Trends in Machine Learning and Artificial Intelligence)
Show Figures

Figure 1

20 pages, 2881 KB  
Article
A Cybersecurity Detection Platform Integrating IOTA DLT and IPFS for Vulnerability Management
by Iuon-Chang Lin, Jyun-Yan Ruan, Ching-Chun Chang, Chin-Chen Chang and Chun-Tse Wang
Electronics 2025, 14(10), 1929; https://doi.org/10.3390/electronics14101929 - 9 May 2025
Cited by 1 | Viewed by 864
Abstract
In response to the Cybersecurity Law, organizations face numerous management and technical requirements. Detection techniques such as vulnerability scanning and penetration testing are employed to identify risks. Addressing these vulnerabilities demands substantial manpower, time, and financial resources. Security concerns also arise during digital [...] Read more.
In response to the Cybersecurity Law, organizations face numerous management and technical requirements. Detection techniques such as vulnerability scanning and penetration testing are employed to identify risks. Addressing these vulnerabilities demands substantial manpower, time, and financial resources. Security concerns also arise during digital file transmission and remediation efforts. This study proposes a security detection platform with step-by-step implementation guidelines, enabling resource-limited units to replicate the setup and address security gaps. It compares detection results between open-source and commercial tools, highlighting key differences and offering remediation strategies. Numerous digital files (e.g., test reports) are generated during testing. To ensure secure storage and sharing, the system integrates IOTA’s distributed ledger and IPFS, generating HASH values and uploading files on-chain to preserve integrity and authenticity. The objective is to deliver a scalable, cost-effective security detection framework that enhances system resilience while minimizing resource consumption. Full article
(This article belongs to the Special Issue Data Security and Privacy in Blockchain and the IoT)
Show Figures

Figure 1

24 pages, 4540 KB  
Article
Robotic Motion Intelligence Using Vector Symbolic Architectures and Blockchain-Based Smart Contracts
by Daswin De Silva, Sudheera Withanage, Vidura Sumanasena, Lakshitha Gunasekara, Harsha Moraliyage, Nishan Mills and Milos Manic
Robotics 2025, 14(4), 38; https://doi.org/10.3390/robotics14040038 - 28 Mar 2025
Cited by 1 | Viewed by 2276
Abstract
The rapid adoption of artificial intelligence (AI) systems, such as predictive AI, generative AI, and explainable AI, is in contrast to the slower development and uptake of robotic AI systems. Dynamic environments, sensory processing, mechanical movements, power management, and safety are inherent complexities [...] Read more.
The rapid adoption of artificial intelligence (AI) systems, such as predictive AI, generative AI, and explainable AI, is in contrast to the slower development and uptake of robotic AI systems. Dynamic environments, sensory processing, mechanical movements, power management, and safety are inherent complexities of robotic intelligence capabilities that can be addressed using novel AI approaches. The current AI landscape is dominated by machine learning techniques, specifically deep learning algorithms, that have been effective in addressing some of these challenges. However, these algorithms are subject to computationally complex processing and operational needs such as high data dependency. In this paper, we propose a computation-efficient and data-efficient framework for robotic motion intelligence (RMI) based on vector symbolic architectures (VSAs) and blockchain-based smart contracts. The capabilities of VSAs are leveraged for computationally efficient learning and noise suppression during perception, motion, movement, and decision-making tasks. As a distributed ledger technology, smart contracts address data dependency through a decentralized, distributed, and secure transactions ledger that satisfies contractual conditions. An empirical evaluation of the framework confirms its value and contribution towards addressing the practical challenges of robotic motion intelligence by significantly reducing the learnable parameters by 10 times while preserving sufficient accuracy compared to existing deep learning solutions. Full article
(This article belongs to the Section AI in Robotics)
Show Figures

Figure 1

21 pages, 2170 KB  
Article
Triple-Entry Accounting and Other Secure Methods to Preserve User Privacy and Mitigate Financial Risks in AI-Empowered Lifelong Education
by Konstantinos Sgantzos, Panagiotis Tzavaras, Mohamed Al Hemairy and Eva R. Porras
J. Risk Financial Manag. 2025, 18(4), 176; https://doi.org/10.3390/jrfm18040176 - 26 Mar 2025
Viewed by 965
Abstract
Within the past five years, and as Artificial Intelligence (AI) increasingly pervades the academic and educational landscape, a delicate balance has emerged between leveraging AI’s transformative potential and safeguarding individual privacy, which needs to be carefully maintained. The preservation of user privacy entails [...] Read more.
Within the past five years, and as Artificial Intelligence (AI) increasingly pervades the academic and educational landscape, a delicate balance has emerged between leveraging AI’s transformative potential and safeguarding individual privacy, which needs to be carefully maintained. The preservation of user privacy entails severe financial risks via penalties for the violation of directives such as General Data Protection Regulation (GDPR). This manuscript examines three neoteric approaches to data privacy protection in AI-empowered lifelong education. The first method uses Triple-Entry Accounting (TEA) together with Distributed Ledger Technology (DLT); the second method uses a transaction Merkle tree that can be used as a “proof of existence” so that the users can safeguard their personal information; and the third approach examines the advantages and disadvantages of an offline AI-tutor multimodal model that can operate without internet access. Finally, the ethical implications of deploying such technologies are critically discussed, emphasizing the necessity of achieving privacy while retaining the human factor in education. Full article
(This article belongs to the Special Issue Triple Entry Accounting, 2nd Edition)
Show Figures

Figure 1

12 pages, 651 KB  
Article
Smart Contract for Relay Verification Collaboration Rewarding in NOMA Wireless Communication Networks
by Vidas Sileikis and Wei Wang
Electronics 2025, 14(4), 706; https://doi.org/10.3390/electronics14040706 - 12 Feb 2025
Cited by 1 | Viewed by 791
Abstract
Future generations of wireless networks at high-frequency spectrum suffer from limited coverage and Non-Line- of-Sight signal blockage, challenging emerging applications, such as smart industries and intelligent automation systems. Collaborative and cooperative communications with smart relays via Non-Orthogonal Multiple Access (NOMA) could be a [...] Read more.
Future generations of wireless networks at high-frequency spectrum suffer from limited coverage and Non-Line- of-Sight signal blockage, challenging emerging applications, such as smart industries and intelligent automation systems. Collaborative and cooperative communications with smart relays via Non-Orthogonal Multiple Access (NOMA) could be a breakthrough solution to this challenge. This paper presents a blockchain-integrated framework for NOMA wireless communication systems that incentivizes cooperation among users serving as relays. By leveraging Ethereum-based smart contracts, we introduce a Service Verification Contract featuring a Proof of Quality of Experience (PQoE) mechanism. The contract uses trust scores, weighted verifications, and dynamic validation thresholds to ensure honest behavior and deter malicious activities. The simulation results show that honest participants gradually increase their trust scores and require fewer verifications, while malicious verifiers lose influence over repeated rounds. Our findings indicate that combining trust-based incentives with a decentralized ledger can effectively promote reliable data-relaying services and streamline payment processes in collaborative and smart wireless networking systems. Full article
(This article belongs to the Special Issue Collaborative Intelligent Automation System for Smart Industry)
Show Figures

Figure 1

23 pages, 621 KB  
Article
A Dynamic Trading Approach Based on Walrasian Equilibrium in a Blockchain-Based NFT Framework for Sustainable Waste Management
by Ch Sree Kumar, Aayushman Bhaba Padhy, Akhilendra Pratap Singh and K. Hemant Kumar Reddy
Mathematics 2025, 13(3), 521; https://doi.org/10.3390/math13030521 - 5 Feb 2025
Cited by 1 | Viewed by 1360
Abstract
It is becoming harder to manage the growing amounts of waste generated daily at an increasing rate. These problems require an efficient solution that guarantees effectiveness and transparency and maintains trust within the community. To improve the process of traditional waste management, we [...] Read more.
It is becoming harder to manage the growing amounts of waste generated daily at an increasing rate. These problems require an efficient solution that guarantees effectiveness and transparency and maintains trust within the community. To improve the process of traditional waste management, we proposed a unique solution, “GREENLINK”, which uses a combination of blockchain technology with the concept of zero-knowledge proofs (ZKPs), non-fungible tokens (NFTs), and Walrasian equilibrium. Zero-knowledge proofs (cryptographic protocols) are used to verify organizations and prove compliance (e.g., certification, recycling capacity) without disclosing sensitive information. Through an iterative bidding process, the proposed framework employs Walrasian equilibrium, a technique to balance supply and demand, guaranteeing equitable pricing and effective resource distribution among participants. The transactions and waste management activities are securely recorded on an immutable ledger, ensuring accountability, traceability, and transparency. The performance of the proposed model is evaluated. Parameters like average latency, TPS, and memory consumption are calculated using Hyperledger Caliper (a blockchain performance benchmark framework). Full article
Show Figures

Figure 1

Back to TopTop