ترغب بنشر مسار تعليمي؟ اضغط هنا

Invoice Financing of Supply Chains with Blockchain technology and Artificial Intelligence

158   0   0.0 ( 0 )
 نشر من قبل Sandra Johnson
 تاريخ النشر 2019
والبحث باللغة English




اسأل ChatGPT حول البحث

Supply chains lend themselves to blockchain technology, but certain challenges remain, especially around invoice financing. For example, the further a supplier is removed from the final consumer product, the more difficult it is to get their invoices financed. Moreover, for competitive reasons, retailers and manufacturers do not want to disclose their supply chains. However, upstream suppliers need to prove that they are part of a `stable supply chain to get their invoices financed, which presents the upstream suppliers with huge, and often unsurmountable, obstacles to get the necessary finance to fulfil the next order, or to expand their business. Using a fictitious supply chain use case, which is based on a real world use case, we demonstrate how these challenges have the potential to be solved by combining more advanced and specialised blockchain technologies with other technologies such as Artificial Intelligence. We describe how atomic crosschain functionality can be utilised across private blockchains to retrieve the information required for an invoice financier to make informed decisions under uncertainty, and consider the effect this decision has on the overall stability of the supply chain.

قيم البحث

اقرأ أيضاً

370 - Neo C.K. Yiu 2021
An interesting research problem in supply chain industry is evaluating and determining provenance of physical goods - demonstrating authenticity of luxury goods. Yet, there have been a few innovative software solutions addressing product anti-counter feiting and record provenance of todays goods that are produced and transported in complex and internationally-spanning supply chain networks. However, these supply chain systems have been implemented with centralized system architecture, relying on centralized authorities or any form of intermediaries, and leading to issues such as single-point processing, storage and failure, which could be susceptible to malicious modifications of product records or various potential attacks to system components by dishonest participant nodes traversing along the supply chain. Blockchain technology has evolved from being merely a decentralized, distributed and immutable ledger of cryptocurrency transactions to a programmable interactive environment for building decentralized and reliable applications addressing different use cases and existing problems in the world. In this research, the Decentralized NFC-Enabled Anti-Counterfeiting System (dNAS) is proposed and developed, decentralizing a legacy anti-counterfeiting system of supply chain industry using Blockchain technology, to facilitate trustworthy data provenance retrieval, verification and management, as well as strengthening capability of product anti-counterfeiting in supply chain industry. The proposed dNAS utilizes decentralized blockchain network on a consensus protocol compatible with the concept of enterprise consortium, programmable smart contracts and a distributed file storage system to develop a secure and immutable scientific data provenance tracking and management platform on which provenance records, providing compelling properties on data integrity, are validated automatically.
281 - Neo C.K. Yiu 2021
Innovative solutions addressing product anti-counterfeiting and record provenance have been deployed across todays internationally spanning supply chain networks. These product anti-counterfeiting solutions are developed and implemented with centrali zed system architecture relying on centralized authorities or any form of intermediaries. Vulnerabilities of centralized product anti-counterfeiting solutions could possibly lead to system failure or susceptibility of malicious modifications performed on product records or various potential attacks to the system components by dishonest participant nodes traversing along the supply chain. Blockchain technology has progressed from merely with a use case of immutable ledger for cryptocurrency transactions to a programmable interactive environment of developing decentralized and reliable applications addressing different use cases globally. In this research, so as to facilitate trustworthy data provenance retrieval, verification and management, as well as strengthening capability of product anti-counterfeiting, key areas of decentralization and feasible mechanisms of developing decentralized and distributed product anti-counterfeiting and traceability ecosystems utilizing blockchain technology, are identified via a series of security and threat analyses performed mainly against NFC-Enabled Anti-Counterfeiting System (NAS) which is one of the solutions currently implemented in the industry with centralized architecture. A set of fundamental system requirements are set out for developing a blockchain-enabled autonomous and decentralized solution for supply chain anti-counterfeiting and traceability, as a secure and immutable scientific data provenance tracking and management platform in which provenance records, providing compelling properties on data integrity of luxurious goods, are recorded and verified automatically, for supply chain industry.
Blockchain offers traceability and transparency to supply chain event data and hence can help overcome many challenges in supply chain management such as: data integrity, provenance and traceability. However, data privacy concerns such as the protect ion of trade secrets have hindered adoption of blockchain technology. Although consortium blockchains only allow authorised supply chain entities to read/write to the ledger, privacy preservation of trade secrets cannot be ascertained. In this work, we propose a privacy-preservation framework, PrivChain, to protect sensitive data on blockchain using zero knowledge proofs. PrivChain provides provenance and traceability without revealing any sensitive information to end-consumers or supply chain entities. Its novelty stems from: a) its ability to allow data owners to protect trade related information and instead provide proofs on the data, and b) an integrated incentive mechanism for entities providing valid proofs over provenance data. In particular, PrivChain uses Zero Knowledge Range Proofs (ZKRPs), an efficient variant of ZKPs, to provide origin information without disclosing the exact location of a supply chain product. Furthermore, the framework allows to compute proofs and commitments off-line, decoupling the computational overhead from blockchain. The proof verification process and incentive payment initiation are automated using blockchain transactions, smart contracts, and events. A proof of concept implementation on Hyperledger Fabric reveals a minimal overhead of using PrivChain for blockchain enabled supply chains.
Location information claimed by devices will play an ever-increasing role in future wireless networks such as 5G, the Internet of Things (IoT). Against this background, the verification of such claimed location information will be an issue of growing importance. A formal information-theoretic Location Verification System (LVS) can address this issue to some extent, but such a system usually operates within the limits of idealistic assumptions on a-priori information on the proportion of genuine users in the field. In this work we address this critical limitation by using a Neural Network (NN) showing how such a NN based LVS is capable of efficiently functioning even when the proportion of genuine users is completely unknown a-priori. We demonstrate the improved performance of this new form of LVS based on Time of Arrival measurements from multiple verifying base stations within the context of vehicular networks, quantifying how our NN-LVS outperforms the stand-alone information-theoretic LVS in a range of anticipated real-world conditions. We also show the efficient performance for the NN-LVS when the users signals have added Non-Line-of-Site (NLoS) bias in them. This new LVS can be applied to a range of location-centric applications within the domain of the IoT.
This report surveys the landscape of potential security threats from malicious uses of AI, and proposes ways to better forecast, prevent, and mitigate these threats. After analyzing the ways in which AI may influence the threat landscape in the digit al, physical, and political domains, we make four high-level recommendations for AI researchers and other stakeholders. We also suggest several promising areas for further research that could expand the portfolio of defenses, or make attacks less effective or harder to execute. Finally, we discuss, but do not conclusively resolve, the long-term equilibrium of attackers and defenders.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا