ﻻ يوجد ملخص باللغة العربية
Supply chains lend themselves to blockchain technology, but certain challenges remain, especially around invoice financing. For example, the further a supplier is removed from the final consumer product, the more difficult it is to get their invoices financed. Moreover, for competitive reasons, retailers and manufacturers do not want to disclose their supply chains. However, upstream suppliers need to prove that they are part of a `stable supply chain to get their invoices financed, which presents the upstream suppliers with huge, and often unsurmountable, obstacles to get the necessary finance to fulfil the next order, or to expand their business. Using a fictitious supply chain use case, which is based on a real world use case, we demonstrate how these challenges have the potential to be solved by combining more advanced and specialised blockchain technologies with other technologies such as Artificial Intelligence. We describe how atomic crosschain functionality can be utilised across private blockchains to retrieve the information required for an invoice financier to make informed decisions under uncertainty, and consider the effect this decision has on the overall stability of the supply chain.
An interesting research problem in supply chain industry is evaluating and determining provenance of physical goods - demonstrating authenticity of luxury goods. Yet, there have been a few innovative software solutions addressing product anti-counter
Innovative solutions addressing product anti-counterfeiting and record provenance have been deployed across todays internationally spanning supply chain networks. These product anti-counterfeiting solutions are developed and implemented with centrali
Blockchain offers traceability and transparency to supply chain event data and hence can help overcome many challenges in supply chain management such as: data integrity, provenance and traceability. However, data privacy concerns such as the protect
Location information claimed by devices will play an ever-increasing role in future wireless networks such as 5G, the Internet of Things (IoT). Against this background, the verification of such claimed location information will be an issue of growing
This report surveys the landscape of potential security threats from malicious uses of AI, and proposes ways to better forecast, prevent, and mitigate these threats. After analyzing the ways in which AI may influence the threat landscape in the digit