• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2022年01月12日 19篇

文献来源

  • 11
  • 8

主题分类

      • 10
      • 4
      • 2
      • 3

文献类型

  • 16
  • 3
筛选
订阅
<< 前一天 后一天 >>

Mining semantic information of co-word network to improve link prediction performance

【Author】 Xiong, Ting Zhou, Liang Zhao, Ying Zhang, Xiaojuan

【影响因子】3.801

【主题类别】

区块链技术--

【Abstract】Link prediction in co-word network is a quantitative method widely used to predict the research trends and direction of disciplines. It has aroused extensive attention from academia and the industry domain. Most of the methods to date predicting co-word network links are only based on the topology of the co-word network but ignore the characteristics of network nodes. This paper proposes an approach with an attempt to exploit network nodes' semantic information to improve link prediction in co-word network. Our work involves three major tasks. First, a new semantic feature of network nodes (based on the original technology) was proposed. Second, multiple ground-truth data sets which consist of literature from the Information Science and Library Science, Blockchain and Primary Health Care fields are built. Third, to validate the effectiveness of the new feature and prior ones, extensive prediction experiments are carried out based on the data set we construct. The result shows that the new predictive models with semantic information obtain more than 80% of overall accuracy and more than 0.7 of Area Under Curve, which indicates the effectiveness and stability of the new feature in different feature sets and algorithm sets.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Co-word network; Link prediction; Semantic feature; Machine learning

【发表时间】

【收录时间】2022-01-12

【文献类型】 期刊

【DOI】 10.1007/s11192-021-04247-9

TontineCoin: Survivor-based Proof-of-Stake

【Author】 Pollett, Chris Austin, Thomas H. Potika, Katerina Rietz, Justin Pardeshi, Prashant

CCF-C

【影响因子】3.488

【主题类别】

区块链技术--

【Abstract】Proof-of-Stake cryptocurrencies avoid many of the computational and environmental costs associated with Proof-of-Work protocols. However, they must address the nothing-at-stake problem, where a validator might attempt to sign off on competing blocks, with the hopes of earning coins regardless of which block becomes accepted as part of the blockchain. Cryptocurrencies such as Tendermint resolve this challenge by requiring validators to bond coins, which can be seized from a validator that is caught signing two competing blocks. Nevertheless, as the number of validators increases, it becomes increasingly infeasible to effectively monitor all validators, and to reach consensus. In this work, we incentivize proper block monitoring by allowing validators to form tontines. In the real world, tontines are financial agreements where payouts to each member increase as the number of members decreases. In our system, a tontine is a group of validators that monitor each other's behavior, murdering any cheating tontine members to seize their stake. As the number of validators in a tontine is smaller than the number of validators in the currency as a whole, members can effectively police each other. We propose two methods whereby a Tendermint-like currency can be extended to allow for the creation of tontines: a pure PoS model, and a hybrid Proof-of-Stake/Proof-of-Work model. We describe snitch mechanisms for both the inter- and intra-tontine setting, argue our incentive mechanisms increase monitoring, and describe how it handles a variety of possible attacks. We extend our model to act as a validator delegated cryptocurrency, with the users having an incentive to partially participate. We show that these strategies may benefit validators as well as speed up the block formation process. Moreover, we describe a prototype implementation of TontineCoin, and perform various experiments that support our theoretical analysis

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Proof-of-Stake; Cheater Detection; Cryptocurrency; Scalability

【发表时间】

【收录时间】2022-01-12

【文献类型】 期刊

【DOI】 10.1007/s12083-021-01227-x

Parallel analysis of Ethereum blockchain transaction data using cluster computing

【Author】 Kilic, Baran Ozturan, Can Sen, Alper

【影响因子】2.303

【主题类别】

区块链技术--

【Abstract】Ability to perform fast analysis on massive public blockchain transaction data is needed in various applications such as tracing fraudulent financial transactions. The blockchain data is continuously growing and is organized as a sequence of blocks containing transactions. This organization, however, cannot be used for parallel graph algorithms which need efficient distributed graph data structures. Using message passing libraries (MPI), we develop a scalable cluster-based system that constructs a distributed transaction graph in parallel and implement various transaction analysis algorithms. We report performance results from our system operating on roughly 5 years of 10.2 million block Ethereum Mainnet blockchain data. We report timings obtained from tests involving distributed transaction graph construction, partitioning, page ranking of addresses, degree distribution, token transaction counting, connected components finding and our new parallel blacklisted address trace forest computation algorithm on a 16 node economical cluster set up on the Amazon cloud. Our system is able to construct a distributed graph of 766 million transactions in 218 s and compute the forest of blacklisted address traces in 32 s.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Parallel; Cluster; Blockchain; Graph; Transaction

【发表时间】

【收录时间】2022-01-12

【文献类型】 期刊

【DOI】 10.1007/s10586-021-03511-0

Blockchain-based Secure Data Transmission for UAV Swarm using Modified Particle Swarm Optimization Path Planning Algorithm

【Author】 Kayalvizhi, M. Ramamoorthy, S.

【影响因子】0.000

【主题类别】

区块链技术--

【Abstract】With the rapid development of unmanned aerial vehicles assisted applications enabled with a communication system, they are open to various malicious attacks. As a new form of flying things, they can access the network for better communication via the aerial base station. Most of the Unmanned aerial vehicles assisted flying objects' optimal path selection schemes does not consider the path deviation. In path deviation attacks, secure data transmission are not addressed in existing works. The secure communication process between Unmanned aerial vehicles and base station are exploited through security-based attacks. Moreover, path loss issue leads to multicast packet loss and unsecured broadcast. The existing network architecture setup does not fulfill the secure data communication and privacy issues. In this paper, Blockchain is utilized to investigate the secure communication between Unmanned aerial vehicles to Wireless Unmanned aerial vehicles Base stations. Since the destination information is dynamic under an uncertain environment, it will cause a delay in data communication. Unmanned aerial vehicles are more vulnerable to security attacks. The proposed blockchain-based architecture supports secure data communication in Unmanned aerial vehicles uncertain environments. To improve network security, this paper designs a modified particle swarm optimization method for better path selection. Through these experimental results, a blockchain-based data communication scheme is outer performed concerning network security.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Unmanned aerial vehicles; path planning; swarm optimization; denial of service attack; blockchain; security and privacy; data communication

【发表时间】2021

【收录时间】2022-01-12

【文献类型】 期刊

【DOI】

Trust-based Key Management Conglomerate ElGamal Encryption for Data Aggregation Framework in WSN using Blockchain Technology

【Author】 Babu, T. G. Jayalakshmi, V

【影响因子】0.000

【主题类别】

区块链技术--

【Abstract】In wireless sensor networks (WSN), data aggregation is a widely used method. Security issues like data integrity and data confidentiality became a significant concern in data aggregation when the sensor network is deployed in a hostile environment. Many researches may carry out several works to tolerate these security issues. However, there were some limitations like delay, the arrival rate of packets, and so on. Hence, to overcome the existing problems, this approach offers a blockchain-dependent data aggregation scheme in WSN. The main intention of the proposed work is to generate a certificateless key generation so that the proposed system's secrecy rate is improved. The use of blockchain is employed for security purposes, and it enables the user to acquire the information stored internally in an effortless manner. Initially, deployment of sensor and base station (BS) is carried out, followed by node registration at which the public/private keys are generated. The computation of private hash values is carried by performing certificateless key generation. After that, the formation of blockchain is made using the PoW (Proof of Work) detection algorithm followed by the aggregation of data. In the data aggregation process, Elgammal based cryptographic approach is introduced to acquire member data, perform aggregation logic, and transfer the aggregated data. Finally, cluster-based routing is established with the use of Knapsack based cluster routing strategy. The performance investigation of the proposed system is estimated and the outcomes attained are compared with the existing techniques in terms of arrival rate, average delay, and the delay ratio of the packets. The investigation illustrates that the suggested approach is better than the traditional techniques.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Wireless sensor networks; data aggregation; PoW detection scheme; blockchain technology; cluster formation; key generation; security; delay ratio

【发表时间】2021

【收录时间】2022-01-12

【文献类型】 期刊

【DOI】

Digital Image Encryption Using Double Crossover Approach for SARS-CoV-2 Infected Lungs in a Blockchain Framework

【Author】 Banerjee, Bannishikha Jani, Ashish Shah, Niraj

【影响因子】0.000

【主题类别】

区块链应用--

【Abstract】As the (Covid-19) pandemic spreads, the creativity of the scientific community is thriving while trying to control the situation. They are trying to treat patients viably and work with the almost exhausted medical equipment and staff, while growing new, successful antibodies. Successful screening of SARS-CoV-2 empowers fast and proficient determination of COVID-19 and can relieve the weight on medical care frameworks. Numerous forecast models are being created to comprehend and prognosticate the spread of the pandemic and to stay away from the following wave. But in the coming time, we can be sure that the models would experience the ill effects of a few issues, security being one of them. All the models need to be built in such a way that the investigation task gets successfully conducted without compromising the privacy and security of the patients. To take care of this, we propose a blockchain framework for sharing patients' personal data or medical reports. A blockchain will take care of the integrity part, but we still need to worry about confidentiality. Therefore, combining a genetic approach with a blockchain seemed like a good idea. A twofold hybrid methodology is proposed in this paper to tackle the issue of confidentiality. The outcomes displayed high entropy accomplishment for the utilized dataset. The sensitivity of the plaintext and ciphertext is also checked and compared with existing approaches which thus demonstrates the security of the proposed approach in the given setting.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】cryptography; image encryption; medical data encryption; blockchain; smart healthcare

【发表时间】2021

【收录时间】2022-01-12

【文献类型】 期刊

【DOI】 10.3389/fbloc.2021.771241

Improving Halal Traceability Process in the Poultry Industry Utilizing Blockchain Technology: Use Case in Indonesia

【Author】 Sidarto, Larissa P. Hamka, Aditya

【影响因子】0.000

【主题类别】

区块链应用--

【Abstract】Demand for Halal food has significantly increased with the growing Muslim population and society's interest in sustainable food production. However, there has been an increase in concerns regarding the Halal food labeling transparency process, with misleading labels found across the world. Blockchain-based traceability systems are a potential solution for current limitations in monitoring the production process of food due to its inherent decentralization and immutable nature. The technology allows stakeholders, including consumers, to promote farm-to-fork transparency, where traceability is a core component. This paper will explore the blockchain-based traceability system use case implemented by the Indonesian poultry player PT Sreeya Sewu Indonesia Tbk. Utilizing a blockchain-based system as a foundation for traceability shows promising results: data throughout the process is recorded permanently and difficult to tamper. Although the system does not eliminate the possibility of incorrect information being recorded, the same immutability characteristics will keep the new knowledge of fraud permanent if found during the audit. This layer of accountability contributes to the transparency that benefits both the consumers and stakeholders of the value chain.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; decentralization; halal traceability; poultry; transparency; supply chains

【发表时间】2021

【收录时间】2022-01-12

【文献类型】 期刊

【DOI】 10.3389/fbloc.2021.612898

Characterizing Wealth Inequality in Cryptocurrencies

【Author】 Sai, Ashish Rajendra Buckley, Jim Le Gear, Andrew

【影响因子】0.000

【主题类别】

区块链治理--

【Abstract】Cryptocurrencies often tend to maintain a publically accessible ledger of all transactions. This open nature of the transactional ledger allows us to gain macroeconomic insight into the USD 1 Trillion crypto economy. In this paper, we explore the free market-based economy of eight major cryptocurrencies: Bitcoin, Ethereum, Bitcoin Cash, Dash, Litecoin, ZCash, Dogecoin, and Ethereum Classic. We specifically focus on the aspect of wealth distribution within these cryptocurrencies as understanding wealth concentration allows us to highlight potential information security implications associated with wealth concentration. We also draw a parallel between the crypto economies and real-world economies. To adequately address these two points, we devise a generic econometric analysis schema for cryptocurrencies. Through this schema, we report on two primary econometric measures: Gini value and Nakamoto Index which report on wealth inequality and 51% wealth concentration respectively. Our analysis reports that, despite the heavy emphasis on decentralization in cryptocurrencies, the wealth distribution remains in-line with the real-world economies, with the exception of Dash. We also report that 3 of the observed cryptocurrencies (Dogecoin, ZCash, and Ethereum Classic) violate the honest majority assumption with less than 100 participants controlling over 51% wealth in the ecosystem, potentially indicating a security threat. This suggests that the free-market fundamentalism doctrine may be inadequate in countering wealth inequality within a crypto-economic context: Algorithmically driven free-market implementation of these cryptocurrencies may eventually lead to wealth inequality similar to those observed in real-world economies.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】centralization; wealth centralization; cryptoeconomics; gini; nakamoto index

【发表时间】2021

【收录时间】2022-01-12

【文献类型】 期刊

【DOI】 10.3389/fbloc.2021.730122

A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures

【Author】 Swessi, Dorsaf Idoudi, Hanen

【影响因子】2.017

【主题类别】

综述--

【Abstract】Internet of things (IoT) is a world wide network and set of paradigms that are intended to allow communications between anything, anytime and anywhere. However, connected objects are in most cases vulnerable due to their constrained resources and the inherent IoT environment conditions, basically, the dynamic aspect, the heterogeneity, and the open and wireless medium of communication. Securing the IoT networks is still an open and challenging issue and the majority of traditional security mechanisms designed so far for Internet doesn't satisfy IoT security requirements. Recently, the use of emergent technologies such as Artificial Intelligence mechanisms, Blockchain and IoTA as a promising solutions to solve security and privacy problems has shown a yield remarkable performance. In this paper we outline the security requirements proposed for the IoT. We provide a comprehensive taxonomy of the major security issues based on IoT architecture, attack implications and application areas. Furthermore, we tabulate and map the different countermeasures used to solve these threats taking into account new advances in security approaches. Finally, we discuss and compare the enumerated countermeasures for IoT security.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of things (IoT); Security; IoT threats; Attack implications; Emerging countermeasures

【发表时间】

【收录时间】2022-01-12

【文献类型】 综述

【DOI】 10.1007/s11277-021-09420-0

Latest Advancement of Technologies in Supply Chain Management: An Overview

【Author】 Saibani, Nizaroyani Cihani, Jaharah A. Akmar, Muhammad Hassan Shamsul Boon, Wa Kai Ravi, Mohan Raj Nawawi, Muhammad Azim Md Asri, Nur Aziatul Izwa Mohd

【影响因子】0.000

【主题类别】

综述--

【Abstract】Supply chain management (SCM) involves an interconnected structure of facilities that produces elements or compounds for transforming into a semifinished compound. After completion, the final compound is delivered to customers via a distribution system. Owing to ever-changing customer demands, increasingly efficient and resilient SCM is necessary, which requires support from the latest technologies. Therefore, this paper presents an overview of the latest technologies in SCM and logistics. The management of a supply chain and role of the different actors involved differ from industry to industry and company to company. Consequently, SCM has become a crucial issue to manufacturers, professionals and researchers. The latest technologies identified in this paper include radio frequency identification, vehicular ad hoc networks, the Internet of things, robotics and artificial intelligence and blockchain. Moreover, the application of the aforementioned technologies in different industries and systems is discussed to understand how the technologies impact practitioners. Although not discussed thoroughly, other recent technology trends in SCM and logistics, such as machine learning, autonomous vehicles/drones, advanced analytics, cloud logistics, supergrid logistics, anticipatory logistics, omnichannel logistics and additive manufacturing (3D printing), are also highlighted in this paper. By understanding the advancements in SCM technology, the possible direction of future innovations can be effectively planned and articulated.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Supply Chain Management (SCM); Radio Frequency Identification (RFID); Vehicular ad hoc networks (VANET); Internet of Things (IoT); Robotic and Artificial Intelligent (AI); Blockchain

【发表时间】2021

【收录时间】2022-01-12

【文献类型】 综述

【DOI】 10.17576/jkukm-2021-33(4)-01

Organizational Building Blocks for Blockchain Governance: A Survey of 241 Blockchain White Papers

【Author】 Honkanen, Petri Nylund, Mats Westerlund, Magnus

【影响因子】0.000

【主题类别】

综述--

【Abstract】Governance for centralized organizational structures has long roots and well-developed frameworks, including for various specialty areas, such as IT or data governance. However, the introduction of blockchain technology as a supportive tool for implementing decentralized organizations requires a renewed focus for research in the area. The paper utilizes empirical data from blockchain ecosystems in the form of white papers (public communique of intention) to analyze their governance intentions. The empirical findings are based on a review of 241 blockchains and distributed ledger technology white papers, out of which 67 include explicit descriptions of how governance should be organized in the ecosystem. Our empirical research distinguishes between three categories of governance: objectives, mechanisms, and stakeholders. We further identify 28 features for these categories, which are described in an open encoding format. Hence, the paper contributes to the emerging blockchain research field, particularly to the decentralized aspects of blockchain governance research. This research also reveals that blockchain governance does not receive the attention it should as a large majority of ecosystems have not disclosed their governance intentions. The results can be utilized as a framework for future research. The results can also be helpful for industry when designing and developing governance systems.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; white paper; governance; decentralized ecosystems; decentralized governance; distributed ledger technology

【发表时间】2021

【收录时间】2022-01-12

【文献类型】 综述

【DOI】 10.3389/fbloc.2021.613115

元宇宙视域下的智慧图书馆服务模式与技术框架研究

【作者】 李默;

【作者单位】山东科技大学图书馆;

【文献来源】情报理论与实践

【复合影响因子】3.419

【综合影响因子】2.368

【主题类别】

区块链应用--

【摘要】[目的/意义]元宇宙的出现为智慧图书馆服务模式的改进提供了一种全新的思路和方法。[方法/过程]文章在述评元宇宙概念及其研究现状的基础上,构建了图书馆元宇宙体系架构,探讨了物理层、软件层、数据层、规则层、应用层和交互层6个层次的功能。[结果/结论]认为元宇宙能对智慧图书馆服务产生积极的促进和影响,并对元宇宙视角下智慧图书馆建设需要解决的问题进行了分析,以期为元宇宙在智慧图书馆中的应用研究提供借鉴参考。

【关键词】元宇宙;;智慧图书馆;;服务模式;;虚拟现实;;区块链

【文献类型】 期刊

【DOI】

【发表时间】2022-01-12

面向无人机集群的双层分组拜占庭容错算法

【作者】 陈宇;贾连兴;王旭;

【作者单位】国防科技大学信息通信学院;

【文献来源】通信学报

【复合影响因子】2.347

【综合影响因子】1.740

【主题类别】

区块链技术--

【摘要】针对区块链技术应用于无人机集群通信时存在的通信复杂度高、稳健性差等问题,提出了一种双层分组拜占庭容错算法。根据无人机的编队结果对节点进行分组,并从每组选取一部分高信誉节点组成委员会,其他节点作为共用节点,形成双层分组共识结构。使用门限签名技术降低通信复杂度,仅通过委员会节点与其他分组节点通信,减少分组间通信次数,使平均通信时延大幅减小。分层结构使主节点身份隐匿于委员会之中,降低了主节点被敌方自适应攻击的风险,提升了系统的稳健性。实验结果表明,所提算法相比于对比算法,共识过程的时延显著降低,同时能够有效保证系统的活性。

【关键词】无人机集群;;拜占庭容错;;共识算法;;双层分组结构

【文献类型】 期刊

【DOI】

【发表时间】2022-01-12

基于DHT和区块链技术的电网安全稳定控制终端分布式认证

【作者】 赖业宁;封科;于同伟;王旺;唐冠军;

【作者单位】国网电力科学研究院有限公司;国网辽宁省电力有限公司电力科学研究院;

【文献来源】中国电力

【复合影响因子】2.333

【综合影响因子】1.944

【主题类别】

区块链技术--

【摘要】电网安全稳定控制系统终端资源有限、业务实时性要求高,现有认证方案难以兼顾系统的安全性、实时性和存储效率。将分布式哈希表(Distributed Hash Table, DHT)技术与区块链技术相结合,提出基于跳图(Skip Graph)结构DHT的区块链分布式存储优化方法;设计了基于DHT和区块链技术的电网安全稳定控制终端分布式认证方案,给出了终端注册、入网和认证的流程与关键算法;分析了本方案的安全性和时空复杂度;对认证方案进行了系统实现,并从平均认证时延和平均终端存储开销两方面进行了实验测试,验证了该方案的可行性和在时空效率方面的优势。方案在不影响电网安全稳定控制系统终端间通信效率的同时提升了终端间通信安全性,进而保障了电网的安全稳定运行。

【关键词】安全稳定控制系统;;区块链;;认证;;分布式存储;;Skip Graph

【文献类型】 期刊

【DOI】

【发表时间】2022-01-12

基于SmartVerif的比特币底层协议算力盗取漏洞发现

【作者】 包象琳;熊焰;黄文超;陈凯杰;汪万森;孟昭逸;徐晓峰;方贤进;

【作者单位】安徽工程大学计算机与信息学院;中国科学技术大学计算机科学与技术学院;安徽理工大学计算机科学与工程学院;

【文献来源】电子学报

【复合影响因子】1.804

【综合影响因子】1.355

【主题类别】

区块链技术--

【摘要】比特币引入了一种新的P2P(Peer to Peer)交易方法,并依靠其底层协议实现去中心化交易.然而,由于目前缺乏对比特币各底层协议的细粒度形式化分析和系统建模,比特币安全性并未被保证.本文通过设计多维度的比特币安全模型引理和细粒度的比特币模型规则,系统地抽象了多协议组合运行考虑下的比特币协议实体交互,完成了对比特币的形式化符号建模与自动化安全分析.与以前的工作相比,本文更细粒度地建模了比特币协议实体及其相关操作,并全面设计了满足比特币各实体需求的安全属性.此外,本文利用自动化形式化验证系统SmartVerif实现了无需额外手工推导证明的形式化验证实验,通过将本文所建模的符号模型规则与引理作为SmartVerif的输入,发现了比特币底层协议算力盗取攻击.

【关键词】比特币;;区块链;;协议安全;;符号模型;;形式化分析

【文献类型】 期刊

【DOI】

【发表时间】2022-01-12

群智网络中基于区块链的有序聚合签名认证方案

【作者】 杨坤伟;杨波;周彦伟;

【作者单位】陕西师范大学计算机科学学院;

【文献来源】电子学报

【复合影响因子】1.804

【综合影响因子】1.355

【主题类别】

区块链技术--

【摘要】传统的中心化认证机制存在单点故障和证书签发不透明等问题,难以适用具有高度自治性和动态多变性的群智网络,因此本文提出了一个基于区块链的轻量级认证机制和一个有序聚合签名方案,二者结合实现了点对点的去中心认证.在认证机制中,区块链作为一个去中心化的底层存储数据库,用来记录密钥、证书、签名和所有其他相关信息,通过对用户节点的公钥证书进行有序签名可以证明其身份的真实性,同时形成一条具有公信力的证书链.针对现有有序聚合签名方案公钥长度较长、验证效率低下的问题,基于BLS签名提出了一个新的有序聚合签名方案,并在有序聚合认证密钥模型下证明了方案的不可伪造性,分析了该方案所具有的公开验证性等安全属性.与现有方案相比较,本文方案的公钥和签名长度更短,且签名长度与用户数无关,更适用于带宽较低的群智网络环境.

【关键词】群智网络;;有序聚合签名;;区块链;;公开验证;;身份认证

【文献类型】 期刊

【DOI】

【发表时间】2022-01-12

基于用户视角的区块链平台综合评价方法研究

【作者】 刘亚茹;叶振军;聂建军;

【作者单位】华北电力大学数理学院;

【文献来源】系统工程

【复合影响因子】1.692

【综合影响因子】1.030

【主题类别】

区块链治理--

【摘要】本文从用户角度出发,针对区块链平台设计了包含四个一级指标和十一个二级指标的指标体系,并基于这些指标提出一种AHP-PSO-TOPSIS综合评价方法。该方法对TOPSIS法中指标权重的确定、正负理想解以及相对贴近度的计算进行了改进。采用AHP法确定指标的主观权重、PSO算法确定客观权重,利用乘法合成法将二者结合确定出综合权重。以比特币平台为例,利用该方法对其2020.3—2021.7的综合发展情况进行评价,结果显示比特币平台近一年发展整体呈上升趋势,并伴随着较高的波动性。并且根据对评价结果的稳健性检验,验证了所提指标体系及综合评价方法的合理性;进而通过对主观权重、客观权重、综合权重三种方法的评价结果进行相关性检验表明,这三种评价结果具有显著的相关性,即本文所采用的综合权重具有合理性。

【关键词】区块链;;综合评价;;PSO;;TOPSIS法;;稳健性检验

【文献类型】 期刊

【DOI】

【发表时间】2022-01-12

区块链赋能战略性矿产资源生态治理研究

【作者】 倪旭;付晶;张海亮;

【作者单位】昆明理工大学管理与经济学院;云南省政府发展研究中心;

【文献来源】云南社会科学

【复合影响因子】1.668

【综合影响因子】0.939

【主题类别】

区块链应用--

【摘要】战略性矿产资源关乎国家经济安全、国防安全和战略性新兴产业发展,其开发利用正面临资源耗竭、环境污染和生态破坏等问题。区块链作为一种新型互联网技术,契合战略性矿产资源生态治理的需要,在尾矿治理、生态溯源、生态补偿等方面具有广泛发展空间。针对战略性矿产资源生态治理面临的关键问题,可以利用区块链技术构建生态监管系统、生态补偿系统和高效利用系统,拓展区块链的赋能应用场景。从强化顶层设计、提升创新空间和完善监管体系3个方面,加强区块链赋能战略性矿产资源生态治理的风险防控。

【关键词】区块链;;战略性矿产资源;;生态治理

【文献类型】 期刊

【DOI】

【发表时间】2022-01-12

基于区块链的边缘计算安全架构鲁棒性检测

【作者】 徐琴;刘枚;李静毅;

【作者单位】重庆邮电大学移通学院;

【文献来源】计算机仿真

【复合影响因子】0.757

【综合影响因子】0.589

【主题类别】

区块链技术--

【摘要】由于边缘设备产生的数据具有实时感知、并行处理等开放性特征,其运行资源极易受到限制降低安全架构性能,提出一种基于区块链技术的边缘计算安全架构鲁棒性检测方法。通过分析边缘计算安全架构的运行流程与目的,计算区块链函数的奇异性和架构变换极大值,获得安全架构的运行周期,根据紧支集三次B样条构建区块链,分解临近的区块链,确定构建区块时所需要的尺寸,收集鲁棒性检测样本,最后对样本数据进行连续性的划分与离散转化,随着转化结果,初始样本会产生一种周期分散但架构紧凑的变化趋势,依靠该趋势完成边缘计算安全架构的鲁棒性检测。仿真结果表明,能够有效的完成对鲁棒性的检测,同时有着检测速度快的优点。

【关键词】区块链;;边缘计算;;安全架构;;鲁棒性;;离散转化

【文献类型】 期刊

【DOI】

【发表时间】2022-01-12

在线标注

备案号: 苏ICP备17025947号-5

评论回复