• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2022年07月22日 24篇

文献来源

  • 15
  • 9

主题分类

      • 1
      • 3
      • 1
      • 1
      • 1
      • 6
      • 1
      • 1
      • 2
      • 2
      • 1
      • 1
      • 1
      • 1
      • 1

文献类型

  • 18
  • 5
  • 1
筛选
订阅
<< 前一天 后一天 >>

Blockchain-Based Trustworthy Energy Dispatching Approach for High Renewable Energy Penetrated Power Systems

【Author】 Xu, Yang Liu, Ziming Zhang, Cheng Ren, Ju Zhang, Yaoxue Shen, Xuemin

CCF-C

【影响因子】10.238

【主题类别】

区块链应用-实体经济-能源领域

【Abstract】Renewable energy sources (RES) and low-carbon technology users play a vital role in modern power systems. However, RES generation is easily affected by the environment. Meanwhile, the load, such as electric vehicles (EVs) and prosumers, accounts for most low-carbon technology users. Their power is usually superimposed on peak loads without dispatching, which also exacerbates the instability of the power system. Current optimal dispatching mechanisms mainly rely on centralized organizations, while their dispatching process is not open and transparent. In this article, we propose a blockchain-based trustworthy dispatching approach for the distribution network in high renewable energy penetrated power systems. We first develop an optimal dispatching model considering EVs' charging behavior and the prosumers' economic benefits. With the model, prosumers can be dispatched to balance power and consume renewable energy, reducing the impact of disorderly charging on the grid and the abandonment of RES generation. An orderly charging iteration optimization (OCIO) algorithm is proposed to implement orderly EV charging while considering the charging cost and the period. We also propose a modified particle swarm optimization (mPSO) algorithm to publish dispatching tasks based on real-time power balance. Furthermore, blockchain is applied as an open and transparent ledger to record each entity's power generation and consumption information, ensuring that the dispatching process is trustworthy. Finally, the effectiveness of the dispatching approach is verified in the modified IEEE 33-bus test system and Ethereum-based smart contracts.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Dispatching; Blockchains; Power system stability; Renewable energy sources; Distribution networks; Costs; Stability analysis; Blockchain; electric vehicle (EV); optimal dispatching; prosumer; renewable energy power generation

【发表时间】2022

【收录时间】2022-07-22

【文献类型】 理论性文章

【DOI】 10.1109/JIOT.2021.3117924

Blockchain enabled optimal Hopfield Chaotic Neural network based secure encryption technique for industrial internet of things environment

【Author】 Khayyat, Manal M. Khayyat, Mashael M. Abdel-Khalek, S. Mansour, Romany F.

【影响因子】6.626

【主题类别】

区块链技术-协同技术-物联网

【Abstract】Industrial Internet of Things (IIoT) denotes a network of interlinked sensors, instruments, and other devices for industrial applications in the domains of manufacturing, logistics, transportation, etc. IIoT security is a major crucial research area for several applications. Image encryption techniques gained popularity in the recent years, thanks to increasing requirements for secure image transmission in IIoT environments. At the same time, conventional security solutions built for sensitive data protection are getting outdated in IIoT environment due to the participation of third party. Blockchain (BC) is one of the recent solutions used for security purpose which eliminates the involvement of a third party. With this motivation, the current research article presents a new BC-Enabled Shark Smell Optimization with Hopfield Chaotic Neural Network (SSO-HCNN) for secure encryption in IoT environment. The proposed SSO-HCNN model exploits a composite Chaotic Map (CM) which is integrated into staged logistic and tent maps to initially process the images and develop the variables needed for Arnold mapping. In addition, the SSO algorithm is developed with maximum PSNR and coefficient fitness function to select the optimum secret and public keys of the system amongst the random numbers. Besides, the diffusion phase utilizes HCNN to create a self-diffusion chaotic matrix whereas the jumbled image performs XOR operation using the keys to obtain the cipher image. In SSO-HCNN model, the cryptographic pixel value in the image is saved on BC thus guaranteeing the security and privacy of the images. To examine the superior performance of SSO-HCNN model over state-of-the-art methods, a set of

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of Things; Shark smell optimization; Self diffusion; Chaotic Neural; Hopfield Chaotic Neural; Network

【发表时间】2022

【收录时间】2022-07-22

【文献类型】 理论性文章

【DOI】 10.1016/j.aej.2022.05.0021110-0168

Quantitative Comparison of Two Chain-Selection Protocols Under Selfish Mining Attack

【Author】 Yang, Runkai Chang, Xiaolin Misic, Jelena Misic, Vojislav B. Kang, Hongyue

CCF-C

【影响因子】4.758

【主题类别】

区块链治理-技术治理-挖矿检测

【Abstract】The longest-chain and Greedy Heaviest Observed Subtree (GHOST) protocols are the two most famous chain-selection protocols to address forking in Proof-of-Work (PoW) blockchain systems. Inclusive protocol was proposed to lower the loss of miners who produce stale blocks and increase the blockchain throughput. This paper aims to make an analytical-model-based quantitative comparison of their capabilities against selfish mining attack. Analytical models have been developed for the longest-chain protocol but less to the GHOST protocol. However, the blockchain dynamics and evolution are different when adopting different chain-selection protocols. Therefore, the corresponding analytical models and/or the formulas of calculating metrics (such as miner profitability and system throughput) may be different. To address these challenges, this paper first develops a novel Markov model and the formulas of evaluation metrics, in order to analyze a GHOST-based blockchain system under selfish mining attack. Then extensive experiments are conducted for comparison and we observe that: (i) The GHOST protocol is more resistant to selfish mining attack than the longest-chain protocol from the aspect of relative revenue of selfish miners. (ii) Inclusive protocol can promote the security (evaluated in terms of miner profitability) improvement of the system which has little total computational power or a high forking probability. Additionally, the longest-chain protocol is more sensitive to inclusive protocol than GHOST protocol. (iii) It is hard for each of the two common-used difficulty adjustment algorithms to achieve higher system throughput and security.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Protocols; Blockchains; Throughput; Analytical models; Security; Measurement; Profitability; Analytical model; blockchain; GHOST protocol; inclusive protocol; proof of work; selfish mining

【发表时间】2022

【收录时间】2022-07-22

【文献类型】 实证性文章

【DOI】 10.1109/TNSM.2022.3151083

On Using Raft Over Networks: Improving Leader Election

【Author】 Choumas, Kostas Korakis, Thanasis

CCF-C

【影响因子】4.758

【主题类别】

区块链技术-核心技术-共识机制

【Abstract】Raft is a state-of-the-art consensus algorithm for state replication over a distributed system of nodes. According to Raft, all state updates occurring anywhere in the system are forwarded to the leader, which is elected among the system nodes to collect and replicate these updates to all other nodes. Thus, the time required for the state replication, named as system response time, depends on the delays between the leader and all other nodes. After multiple node failures and leadership transitions, each node can be leader with a probability that affects the expected response time. The leadership probabilities, in turn, are affected by the random intervals that nodes are waiting, after detecting a leader failure and before competing for the successive leadership. The Raft designers suggest the ranges of these intervals to be equal for all nodes. However, this may result in increased expected response time. In this paper, mathematical models are presented for estimating the ranges resulting in the desired leadership probabilities. The presented theoretical results are also confirmed by testbed experimentation with an open-source and widely used Raft implementation.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Voting; Time factors; Leadership; Delays; Heart beat; Protocols; Open source software; Raft; distributed-system; clustering; testbed-experimentation

【发表时间】2022

【收录时间】2022-07-22

【文献类型】 实证性文章

【DOI】 10.1109/TNSM.2022.3147958

MPCN-RP: A Routing Protocol for Blockchain-Based Multi-Charge Payment Channel Networks

【Author】 Chen, Yanjiao Ran, Yuyang Zhou, Jingyue Zhang, Jian Gong, Xueluan

CCF-C

【影响因子】4.758

【主题类别】

区块链应用-虚拟经济-金融领域

【Abstract】Blockchain-based cryptocurrencies are severely limited in transaction throughput and latency due to the need to seek consensus among all peers of the network. A promising solution to this issue is payment channels, which allow unlimited numbers of atomic and trust-free payments between two peers without exhausting the resources of the blockchain. A linked payment channel network enables payments between two peers without direct channels through a series of intermediate nodes that forward and charge for the transactions. However, the charging strategies of intermediate nodes vary with different payment channel networks. Existing works do not yet have a complete routing algorithm to provide the most economical path for users in a multi-charge payment channel network. In this work, we propose MPCN-RP, a general routing protocol for payment channel networks with multiple charges. Our extensive experimental results on both simulated and real payment channel networks show that MPCN-RP significantly outperforms the baseline algorithms in terms of time and fees.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Peer-to-peer computing; Routing; Bitcoin; Blockchains; Lightning; Costs; Throughput; Blockchain; payment channel network; routing

【发表时间】2022

【收录时间】2022-07-22

【文献类型】 理论性文章

【DOI】 10.1109/TNSM.2021.3139019

Proof of Activity Protocol for IoMT Data Security

【Author】 Rajadevi, R. Venkatachalam, K. Masud, Mehedi AlZain, Mohammed A. Abouhawwash, Mohamed

【影响因子】4.397

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】The Internet of Medical Things (IoMT) is an online device that senses and transmits medical data from users to physicians within a time interval. In, recent years, IoMT has rapidly grown in the medical field to provide healthcare services without physical appearance. With the use of sensors, IoMT applications are used in healthcare management. In such applications, one of the most important factors is data security, given that its transmission over the network may cause obtrusion. For data security in IoMT systems, blockchain is used due to its numerous blocks for secure data storage. In this study, Blockchain-assisted secure data management framework (BSDMF) and Proof of Activity (PoA) protocol using malicious code detection algorithm is used in the proposed data security for the healthcare system. The main aim is to enhance the data security over the networks. The PoA protocol enhances high security of data from the literature review. By replacing the malicious node from the block, the PoA can provide high security for medical data in the blockchain. Comparison with existing systems shows that the proposed simulation with B SD-Malicious code detection algorithm achieves higher accuracy ratio, precision ratio, security, and efficiency and less response time for Blockchain-enabled healthcare systems.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; IoMT; malicious code detection; security; secure data management framework; data management; PoA

【发表时间】2023

【收录时间】2022-07-22

【文献类型】 理论性文章

【DOI】 10.32604/csse.2023.024537

Hybrid Smart Contracts for Securing IoMT Data

【Author】 Palanikkumar, D. Alrasheedi, Adel Fahad Parthasarathi, P. Askar, S. S. Abouhawwash, Mohamed

【影响因子】4.397

【主题类别】

区块链技术-核心技术-智能合约

【Abstract】Data management becomes essential component of patient healthcare. Internet of Medical Things (IoMT) performs a wireless communication between E-medical applications and human being. Instead of consulting a doctor in the hospital, patients get health related information remotely from the physician. The main issues in the E-Medical application are lack of safety, security and privacy preservation of patient's health care data. To overcome these issues, this work proposes block chain based IoMT Processed with Hybrid consensus protocol for secured storage. Patients health data is collected from physician, smart devices etc. The main goal is to store this highly valuable health related data in a secure, safety, easy access and less cost-effective manner. In this research we combine two smart contracts such as Practical Byzantine Fault Tolerance with proof of work (PBFT-PoW). The implementation is done using cloud technology setup with smart contracts (PBFT-PoW). The accuracy rate of PBFT is 90.15%, for PoW is 92.75% and our proposed work PBFT-PoW is 99.88%.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】PoW; byzantine fault tolerance; IoMT; cloud computing; health care data

【发表时间】2023

【收录时间】2022-07-22

【文献类型】 理论性文章

【DOI】 10.32604/csse.2023.024884

Phish Block: A Blockchain Framework for Phish Detection in Cloud

【Author】 Karthika, R. N. Valliyammai, C. Naveena, M.

【影响因子】4.397

【主题类别】

区块链治理-技术治理-异常/非法交易识别

【Abstract】The data in the cloud is protected by various mechanisms to ensure security aspects and user???s privacy. But, deceptive attacks like phishing might obtain the user???s data and use it for malicious purposes. In Spite of much technological advancement, phishing acts as the first step in a series of attacks. With technological advancements, availability and access to the phishing kits has improved drastically, thus making it an ideal tool for the hackers to execute the attacks. The phishing cases indicate use of foreign characters to disguise the original Uniform Resource Locator (URL), typosquatting the popular domain names, using reserved characters for re directions and multi-chain phishing. Such phishing URLs can be stored as a part of the document and uploaded in the cloud, providing a nudge to hackers in cloud storage. The cloud servers are becoming the trusted tool for executing these attacks. The prevailing software for blacklisting phishing URLs lacks the security for multi-level phishing and expects security from the client???s end (browser). At the same time, the avalanche effect and immutability of block-chain proves to be a strong source of security. Considering these trends in technology, a block-chain based filtering implementation for preserving the integrity of user data stored in the cloud is proposed. The proposed Phish Block detects the homographic phishing URLs with accuracy of 91% which assures the security in cloud storage.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cloud server; phishing URLs; phish detection blockchain; safe files; smart contract

【发表时间】2023

【收录时间】2022-07-22

【文献类型】 理论性文章

【DOI】 10.32604/csse.2023.024086

Smart Academic and Professional Education

【Author】 Silvestru, Catalin-Ionut Firulescu, Alexandru-Cristian Iordoc, Dumitru-Georgian Icociu, Vasilica-Cristina Stoica, Mihai-Alexandru Platon, Otilia-Elena Orzan, Anca-Olguta

【影响因子】3.889

【主题类别】

区块链应用-实体经济-教育领域

【Abstract】The evolution of technology brings closer the endless possibilities of education, allowing a human to learn something new anywhere and anytime. With the crisis created by the pandemic situation for the last two years, new ways of education have taken form to maintain the flow of learning and qualification; thus, the term "distance learning" has been implemented in all types of learning, from primary education all the way to tertiary education. This paper covers the image of tertiary education, mostly at the level of universities. Many changes took form at this level, such as developing new ways for the distance learning implementation by creating new programs dedicated for this new method of education. We will present to you how these changes took form and how they can evolve with the help of various technologies such as Blockchain and XR, and other strategic learning methods such as Massive Open Online Courses (MOOCs) and gamification. Universities start to create new programs based on their unique crypto coin, which help students pay for their studies, such as articles, new disciplines, and exchange programs. The gamification of these programs raises the interactivity that students have during class hours, thus motivating them and creating an optimal curve of learning, combined with the implementation of XR technology.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; cryptocurrency; education; MOOCs; gamification; tertiary education

【发表时间】2022

【收录时间】2022-07-22

【文献类型】 理论性文章

【DOI】 10.3390/su14116408

Home Environment Augmented Reality System Based on 3D Reconstruction of a Single Furniture Picture

【Author】 Wei, Hongtao Tang, Lei Wang, Wenshuo Zhang, Jiaming

【影响因子】3.847

【主题类别】

区块链应用-虚拟经济-元宇宙

【Abstract】With the popularization of the concept of "metaverse", Augmented Reality (AR) technology is slowly being applied to people's daily life as its underlying technology support. In recent years, rapid 3D reconstruction of interior furniture to meet AR shopping needs has become a new method. In this paper, a virtual home environment system is designed and the related core technologies in the system are studied. Background removal and instance segmentation are performed for furniture images containing complex backgrounds, and a Bayesian Classifier and GrabCut (BCGC) algorithm is proposed to improve on the traditional foreground background separation technique. The reconstruction part takes the classical occupancy network reconstruction algorithm as the network basis and proposes a precise occupancy network (PONet) algorithm, which can reconstruct the structural details of furniture images, and the model accuracy is improved. Because the traditional 3D registration model is prone to the problems of model position shift and inaccurate matching with the scene, the AKAZE-based tracking registration algorithm is improved, and a Multiple Filtering-AKAZE (MF-AKAZE) based on AKAZE is proposed to remove the matching points. The matching accuracy is increased by improving the RANSAC filtering mis-matching algorithm based on further screening of the matching results. Finally, the system is verified to realize the function of the AR visualization furniture model, which can better complete the reconstruction as well as registration effect.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】3D reconstruction; instance segmentation; 3D registration; furniture objects

【发表时间】2022

【收录时间】2022-07-22

【文献类型】 理论性文章

【DOI】 10.3390/s22114020

A Framework to Make Voting System Transparent Using Blockchain Technology

【Author】 Farooq, Muhammad Shoaib Iftikhar, Usman Khelifi, Adel

【影响因子】3.476

【主题类别】

区块链应用-实体经济-公共管理

【Abstract】A widespread mistrust towards the traditional voting system has made democratic voting in any country very critical. People have seen their fundamental rights being violated. Other digital voting systems have been challenged due to a lack of transparency. Most voting systems are not transparent enough; this makes it very difficult for the government to gain voters' trust. The reason behind the failure of the traditional and current digital voting system is that it can be easily exploited. The primary objective is to resolve problems of the traditional and digital voting system, which include any kind of mishap or injustice during the process of voting. Blockchain technology can be used in the voting system to have a fair election and reduce injustice. The physical voting systems have many flaws in it as well as the digital voting systems are not perfect enough to be implemented on large scale. This appraises the need for a solution to secure the democratic rights of the people. This article presents a platform based on modern technology blockchain that provides maximum transparency and reliability of the system to build a trustful relationship between voters and election authorities. The proposed platform provides a framework that can be implemented to conduct voting activity digitally through blockchain without involving any physical polling stations. Our proposed framework supports a scalable blockchain, by using flexible consensus algorithms. The Chain Security Algorithm applied in the voting system makes the voting transaction more secure. Smart contracts provide a secure connection between the user and the network while executing a transaction in the chain. The security of the blockchain based voting system has also been discussed. Additionally, encryption of transactions using cryptographic hash and prevention of attack 51% on the blockchain has also been elaborated. Furthermore, the methodology for carrying out blockchain transactions during the process of voting has been elaborated using Blockchain Finally, the performance evaluation of the proposed system shows that the system can be implemented in a large-scale population.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Peer-to-peer computing; Consensus algorithm; Smart contracts; Licenses; Robustness; Privacy; E-polling; voting system; blockchain application; blockchain voting; E-voting; electoral system; blockchain; cryptographic hash; secure voting

【发表时间】2022

【收录时间】2022-07-22

【文献类型】 理论性文章

【DOI】 10.1109/ACCESS.2022.3180168

Blockchain-Based Identity Management Systems in Health IoT: A Systematic Review

【Author】 Alamri, Bandar Crowley, Katie Richardson, Ita

【影响因子】3.476

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】Identity and Access Management (IAM) systems are crucial for any information system, such as healthcare information systems. Health IoT (HIoT) applications are targeted by attackers due to the high-volume and sensitivity of health data. Thus, IAM systems for HIoT need to be built with high standards and based on reliable frameworks. Blockchain (BC) is an emerging technology widely used for developing decentralized IAM solutions. Although, the integration of BC in HIoT for proposing IAM solutions has gained recent attention, BC is an evolving technology and needs to be studied carefully before using it for IAM solutions in HIoT applications. A systematic literature review was conducted on the BC-based IAM systems in HIoT applications to investigate the security aspect. Twenty-four studies that satisfied the inclusion criteria and passed the quality assessment were included in this review. We studied BC-based solutions in HIoT applications to explore the IAM system architecture, security requirements and threats. We summarized the main components and technologies in typical BC-based IAM systems and the layered architecture of the BC-based IAM system in HIoT. Accordingly, the security threats and requirements were summarized. Our systematic review shows that there is a lack of a comprehensive security framework, risk assessments, and security and functional performance evaluation metrics in BC-based IAM in HIoT applications.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Security; Medical services; Systematics; Bitcoin; Internet of Things; Regulation; Cloud computing; Access control; blockchain; e-Health; health IoT; identity management; security; systematic literature review

【发表时间】2022

【收录时间】2022-07-22

【文献类型】 综述

【DOI】 10.1109/ACCESS.2022.3180367

Blockchain Framework for Cognitive Sensor Network Using Non-Cooperative Game Theory

【Author】 Surekha, Sala Rahman, Md Zia Ur

【影响因子】3.476

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】The incorporation of technology in healthcare and hospital management has given a new perception to the medical procedures, and drug management for patient-centric care. Emerging technologies like blockchain, Internet of Things, and cognitive computing are most adaptable for designing smart healthcare systems. However, due to the diversified tasks involved, a design approach with broader understanding involving multiple factors that represent each area of the healthcare is the need of the hour. Game theory has gained prominence in modeling multi-player problems designated by strategic interdependency. This paper proposes a non-cooperative game strategy between players (stakeholders) to inspect how rationality is exhibited among the players who seamlessly try to get benefitted from the actions of other players. To evaluate the feasibility of the proposed model, a prototype was designed based on Ethereum permissioned blockchain employing Raspberry pi IoT devices and sensor-based cognition. Use of blockchain brings in trust, security and transparency to the system. The simulation results show that the proposed model provides better outcomes in terms of latency (approximate to 15 min), throughput and scalability with an increased number of transactions. The comparative analysis elucidates the fact that the proposed method outperforms the existing healthcare systems with a significant improvement of 10-15% in terms of resource utilization and provides faster and accurate patient-centric services.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; cognitive sensors; game theory; healthcare; Internet of Things; security

【发表时间】2022

【收录时间】2022-07-22

【文献类型】 理论性文章

【DOI】 10.1109/ACCESS.2022.3180336

Blockchain and K-Means Algorithm for Edge AI Computing

【Author】 Qiu, Xiaotian Yao, Dengfeng Kang, Xinchen Abulizi, Abudukelimu

【影响因子】3.120

【主题类别】

区块链技术-协同技术-边缘计算

【Abstract】The current development of blockchain, technically speaking, still faces many key problems such as efficiency and scalability issues, and any distributed system faces the problem of how to balance consistency, availability, and fault tolerance need to be solved urgently. The advantage of blockchain is decentralization, and the most important thing in a decentralized system is how to make nodes reach a consensus quickly. This research mainly discusses the blockchain and K-means algorithm for edge AI computing. The natural pan-central distributed trustworthiness of blockchain provides new ideas for designing the framework and paradigm of edge AI computing. In edge AI computing, multiple devices running AI algorithms are scattered across the edge network. When it comes to decentralized management, blockchain is the underlying technology of the Bitcoin system. Due to its characteristics of immutability, traceability, and consensus mechanism of transaction data storage, it has recently received extensive attention. Blockchain technology is essentially a public ledger. This is done by recording data related to trust management to this ledger. To collaboratively complete artificial intelligence computing tasks or jointly make intelligent group decisions, frequent communication is required between these devices. By integrating idle computing resources in an area, a distributed edge computing platform is formed. Users obtain benefits by sharing their computing resources, and nodes in need complete computing tasks through the shared platform. In view of the identity security problems faced in the sharing process, this article introduces blockchain technology to realize the trust between users. All participants must register a secure identity in the blockchain network and conduct transactions in this security system. A K-means algorithm suitable for edge environments is proposed to identify different degradation stages of equipment operation reflected by multiple types of data. Based on the prediction of the fault state for a single type of data, the algorithm uses the historical data of multiple types of data together with the prediction data to predict the fault stage. During the research process, the average optimization energy consumption of K-means algorithm is 14.6% lower than that of GA. On the basis of designing a resource allocation scheme based on blockchain, the problem of how the participants can realize reliable resource use according to the recorded data on the chain is studied. The article implements the verification of the legality of the use of blockchain resources. In addition, a control node is introduced to master the global real-time information of the network to provide data support for the user's choice.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-07-22

【文献类型】 理论性文章

【DOI】 10.1155/2022/1153208

The unintended consequences of the regulation of cryptocurrencies

【Author】 Sauce, Loic

【影响因子】2.273

【主题类别】

区块链治理-法律治理-区块链监管制度

【Abstract】This paper investigates whether the application of the latest guidance of the Financial Action Task Force (FATF) for regulating cryptocurrencies may engender unintended consequences at odds with the initial purposes of transparency and technology neutrality. For instance, we will ask whether regulation strengthening may incite a category of investors to flight to unregulated and non-compliant decentralised exchange platforms to stay under the radar of regulators. Furthermore, we ask whether regulation may lead to a two-tier industry, fragmented between compliant trading venues that attract mainstream users and non-compliant trading venues that attract privacy-centric users. We argue that somewhat paradoxically, regulation may push part of the crypto-industry to the 'dark side' of financial innovation and drives privacy-centric investors out of the scope of regulators.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cryptocurrencies; Decentralised trading; Decentralised finance; Regulation

【发表时间】2022

【收录时间】2022-07-22

【文献类型】 理论性文章

【DOI】 10.1093/cje/beab053

加密货币与传统金融资产市场的动态相关性研究——基于t-Copula-DCC-GARCH的实证分析

【作者】 皮天雷;游承静;

【作者单位】重庆大学经济与工商管理学院金融系;重庆大学经济与工商管理学院;

【文献来源】金融论坛

【复合影响因子】4.842

【综合影响因子】2.546

【主题类别】

区块链治理-市场治理-数字货币

【摘要】本文基于2015年8月至2020年4月的日交易数据,构建t-Copula-DCC-GARCH模型,实证考察比特币、以太坊、瑞波币、标准普尔500指数、COMEX黄金期货、WTI原油期货市场之间的动态相关性以及时变波动性,并结合套期保值理论探究加密货币对冲传统金融资产的效率。研究发现,三种加密货币之间价格波动存在显著的正向关联,具有自身难以对冲的特质风险;而加密货币与传统金融资产市场之间却相对隔离,瑞波币、比特币、以太坊分别是股票、黄金、原油的最有效对冲资产。

【关键词】加密货币;;金融资产;;Copula函数;;动态相关性;;对冲

【文献类型】 实证性文章

【DOI】 10.16529/j.cnki.11-4613/f.2022.05.003

【发表时间】2022-07-22

元宇宙赋能的图书馆社会教育:场景、审视与应对

【作者】 娄方园;邹轶韬;高振;齐梦娜;王书瑶;王娟;

【作者单位】江苏师范大学智慧教育学院;江苏师范大学智慧教育研究中心;

【文献来源】图书馆论坛

【复合影响因子】2.553

【综合影响因子】1.900

【主题类别】

区块链应用-虚拟经济-元宇宙

【摘要】数智化时代背景下,图书馆的社会教育如何更好地创新发展成为亟待解决的问题,依托于5G/6G、AI、XR、数字孪生、区块链等技术的元宇宙提供了思路。元宇宙赋能图书馆社会教育变革面临着机遇,探索元宇宙赋能图书馆社会教育应用场景的策略成为时代命题。文章首先界定社会教育元宇宙等相关概念,探讨相关的6个应用场景;然后从6个方面对元宇宙赋能图书馆社会教育的应用场景进行理性审视;最后从政府、图书馆、产业组织、个人4个层面提出审慎应对的策略。

【关键词】社会教育元宇宙;;图书馆社会教育;;应用场景;;元宇宙

【文献类型】 理论性文章

【DOI】

【发表时间】2022-07-22

智能合约“内生型”纠纷化解机制及其法治化

【作者】 杨菲;

【作者单位】中国计量大学法学院;

【文献来源】学术交流

【复合影响因子】

【综合影响因子】

【主题类别】

区块链技术-核心技术-智能合约

【摘要】基于区块链技术的智能合约为合同当事人打造了一种流程简化、安全性高的交易“装置”,在市场广泛应用的同时,也催生了技术特质明显的全新内生型纠纷。司法诉讼是解决合同纠纷常用的传统方式,但却不适应智能合约交易特点。“以链治链”的思路为智能合约内生型纠纷化解带来了新范式。区块链解纷应用实现的去中心化“准司法”提高了纠纷化解效率,但也存在破坏法治的风险。为避免科技与法制落差过大,我国应结合硬法与软法,尽快确认区块链解纷应用的法律地位与监管框架,构建与其技术特征契合的程序规则与救济制度,优化纠纷化解众包模型,加强行业自主规制与标准化建设,提升自身在智能合约内生型纠纷化解服务市场的国际竞争力与规则话语权。

【关键词】区块链;;智能合约;;纠纷解决

【文献类型】 理论性文章

【DOI】

【发表时间】2022-07-22

基于节点分组的权益证明共识机制

【作者】 张旺;葛云生;

【作者单位】桂林理工大学信息科学与工程学院;

【文献来源】计算机应用与软件

【复合影响因子】

【综合影响因子】

【主题类别】

区块链技术-核心技术-共识机制

【摘要】共识机制作为区块链的核心,针对区块链共识效率较低、消耗大量算力及电力资源等问题,权益证明(Proof of Stake, PoS)对工作量证明(Proof of Work, PoW)有所改进,却又存在权益中心化的风险。提出基于节点分组的权益证明共识机制,将节点按币龄分组,各分组依次竞争并在各组内产生收益,用以提高低币龄节点出块概率以及降低单次共识全网消耗。同时提出虚拟币龄与无币龄队列解决系统初始节点无币问题以及根据队列特性控制共识过程中高代币节点参与竞争频率。实验结果表明,改进后的PoS算法能够有效提升低币龄节点出块概率,防止权益中心化以及进一步减少资源的消耗与浪费。

【关键词】节点分组;;区块链;;共识机制;;权益证明;;币龄

【文献类型】 实证性文章

【DOI】

【发表时间】2022-07-22

私人数字货币发行的刑法规制研究

【作者】 陈毅坚;陈海劲;

【作者单位】中山大学法学院;中山大学网络犯罪研究中心(广东省网络犯罪研究基地);澳门科技大学法学院;

【文献来源】湖南社会科学

【复合影响因子】

【综合影响因子】

【主题类别】

区块链治理-法律治理-ICO监管

【摘要】私人数字货币是数字经济的产物,我国虽对私人数字货币相关业务明令禁止,但其发行仍衍生出各种不同形态。私人数字货币不具备法定货币属性,是不同于传统货币类虚拟财产的新型虚拟财产。典型的数字货币发行ICO模式,主要包括“功能类”“债权类”“股权类”三种代币发行方式。与其运行机理相对应,ICO不具有利诱性,其筹集的对象不属于资金,不构成非法吸收公众存款罪;ICO不是“违反国家规定”的“其他非法经营行为”,不构成非法经营罪;“债权类”和“股权类”ICO可能构成变相发行股票、公司、企业债券;在符合诈骗罪构成要件情况下,可构成诈骗罪;具备拉人头、层级性特征的ICO混合运营模式可构成传销犯罪。IEO、STO是ICO基础上的新型发行模式。IEO存在三方关系,应恰当处理好共同犯罪的成立和责任划分;STO是实体资产的金融化,其特殊运行机理要求刑法规制的特殊性。

【关键词】私人数字货币;;虚拟财产;;发行行为;;刑法规制

【文献类型】 理论性文章

【DOI】

【发表时间】2022-07-22

身体·技术·存在:元宇宙电影空间形态

【作者】 宋丽娟;

【作者单位】广西师范大学文学院/新闻与传播学院;

【文献来源】电影文学

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-虚拟经济-元宇宙

【摘要】元宇宙电影空间形态的建构,不仅颠覆传统的叙事,还引发技术与文明系列问题的思索。其具身特征实现交互主体性,诠释虚拟世界身体与意识共存形而上的内在哲思。虚拟场景真实化,改变了个体的情感机制,与古典美学“身心合一”“游观”具有同质性。空间矩阵模拟“看与被看”的结构性叙事,再现了福柯现代社会空间-权力话语。技术反客为主,统摄着人类的生存秩序及伦理道德。因此,未来要义是重建新秩序,实现“人性秩序”对“技术秩序”的辖制。

【关键词】元宇宙;;电影;;空间形态

【文献类型】 理论性文章

【DOI】

【发表时间】2022-07-22

论元宇宙电影中的虚拟世界

【作者】 窦志伟;

【作者单位】聊城大学文学院;

【文献来源】电影文学

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-虚拟经济-元宇宙

【摘要】元宇宙是当下讨论最火爆的一个概念,国内外科技巨头、各国政府纷纷布局元宇宙。元宇宙究竟是什么?元宇宙电影有何特点?这成了一个值得研究的课题,因为目前的元宇宙电影大多都塑造了一个与现实世界不同的虚拟世界,元宇宙电影的特点基本上都体现在它所塑造的虚拟世界中,因此,研究元宇宙电影中虚拟世界的特点,从文本细读的角度分析元宇宙电影中虚拟世界存在的问题并找到解决这些问题的办法,就显得很有价值了。

【关键词】元宇宙;;元宇宙电影;;虚拟世界;;沉浸式体验

【文献类型】 理论性文章

【DOI】

【发表时间】2022-07-22

论元宇宙电影的叙事话语建构

【作者】 苗守艳;

【作者单位】临沂大学文学院;

【文献来源】电影文学

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-虚拟经济-元宇宙

【摘要】技术的进步不会改变电影的本质,元宇宙在电影中出现是数字技术发展必然,符合数字时代话语受众的情感需求与认知习惯。元宇宙是数字时代电影叙事话语的必然选择,元宇宙电影的话语建构路径主要包括重塑电影叙事网络话语体系、开拓永恒性主题的时代意蕴以及创新叙事话语实践策略三个方面。元宇宙概念的不断变化符合语言哲学的要求,“元宇宙+”预示了新兴电影叙事话语的发展趋势,但其发展又以数字技术以及现实文本的逻辑推理为基础。

【关键词】元宇宙;;电影;;叙事话语;;数字化

【文献类型】 实证性文章

【DOI】

【发表时间】2022-07-22

符号视域中的元宇宙电影英雄形象特质

【作者】 金洪申;吴树青;

【作者单位】广西艺术学院影视与传媒学院;聊城大学东昌学院;

【文献来源】电影文学

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-虚拟经济-元宇宙

【摘要】随着科学技术的不断发展,传媒领域日新月异,元宇宙这一概念得到了业界和理论界的广泛关注。小说、电子游戏和电影都可以向人们展现一个虚拟世界,而这虚拟世界就是元宇宙的核心所在。以虚拟世界为主体的元宇宙电影和其他类型的电影一样也为观众塑造了感人的英雄形象,这些英雄形象的体能、智力和勇敢等特征成为引人注目的符号。文章运用案例实证的方法分析了元宇宙电影英雄人物的符号特征,为影视工作者迎接互联网和电影改革创新提供了必要的借鉴和支持。

【关键词】元宇宙;;符号;;英雄人物

【文献类型】 理论性文章

【DOI】

【发表时间】2022-07-22

在线标注

备案号: 苏ICP备17025947号-5

评论回复