• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2022年09月28日 23篇

文献来源

  • 20
  • 3

主题分类

      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 3
      • 1
      • 1
      • 3
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1

文献类型

  • 15
  • 1
  • 3
  • 1
  • 3
筛选
订阅
<< 前一天 后一天 >>

A Scalable Double-Chain Storage Module for Blockchain

【Author】 Han, Hui Wan, Wunan Zhang, Jinquan Qin, Zhi Qiu, Xiaofang Zhang, Shibin Xia, Jinyue

【影响因子】3.860

【主题类别】

区块链技术-核心技术-分布式存储

【Abstract】With the growing maturity of blockchain technology, its peer-to-peer model and fully duplicated data storage pattern enable blockchain to act as a distributed ledger in untrustworthy environments. Blockchain storage has also become a research hotspot in industry, finance, and academia due to its security, and its unique data storage management model is gradually becoming a key technology to play its value in various fields' applications. However, with the increasing amount of data written into the blockchain, the blockchain system faces many problems in its actual implementation of the application, such as high storage space occupation, low data flexibility and availability, low retrieval efficiency, poor scalability, etc. To improve the above problems, this paper combines off-chain storage technology and deduplication technology to optimize the blockchain storage model. Firstly, this paper adopts the double-chain model to reduce the data storage of the major chain system, which stores a small amount of primary data and supervises the vice chain through an Application Programming Interface (API). The vice chain stores a large number of copies of data as well as non-transactional data. Our model divides the vice chain storage system into two layers, including a storage layer and a processing layer. In the processing layer, deduplication technology is applied to reduce the redundancy of vice chain data. Our double-chain storage model with high scalability enhances data flexibility, is more suitable as a distributed storage system, and performs well in data retrieval.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; storage model; off-chain storage; de-duplication

【发表时间】2022

【收录时间】2022-09-28

【文献类型】 理论模型

【DOI】 10.32604/cmc.2022.028607

Trustworthiness Evaluation for Permissioned Blockchain-Enabled Applications

【Author】 Cha, Shi-Cho Shiung, Chuang-Ming Li, Wen-Wei Peng, Chun-Neng Hung, Yi-Hsuan Yeh, Kuo-Hui

【影响因子】3.860

【主题类别】

区块链治理-技术治理-区块链安全

【Abstract】As permissioned blockchain becomes a common foundation of blockchain-based circumstances for current organizations, related stakeholders need a means to assess the trustworthiness of the applications involved within. It is extremely important to consider the potential impact brought by the Blockchain technology in terms of security and privacy. Therefore, this study proposes a rigorous security risk management framework for permissioned blockchain-enabled applications. The framework divides itself into different implementation domains, i.e., organization security, application security, consensus mechanism security, node management and network security, host security and perimeter security, and simultaneously provides guidelines to control the security risks of permissioned blockchain applications with respect to these security domains. In addition, a case study, including a security testing and risk evaluation on each stack of a specific organization, is demonstrated as an implementation instruction of our proposed risk management framework. According to the best of our knowledge, this study is one of the pioneer researches that provide a means to evaluate the security risks of permissioned blockchain applications from a holistic point of view. If users can trust the applications that adopted this framework, this study can contribute to the adoption of permissioned blockchain-enabled technologies. Furthermore, application providers can use the framework to perform gap analysis on their existing systems and controls and understand the risks of their applications.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Permissioned blockchain; blockchain security; blockchain risk evaluation

【发表时间】2022

【收录时间】2022-09-28

【文献类型】 理论模型

【DOI】 10.32604/cmc.2022.029161

Blockchain-Based Privacy-Preserving Approach Using SVML for Encrypted Smart City Data in the Era of IR 4.0

【Author】 Xihua, Zhang Goyal, S. B. Tesfayohanis, Miretab Verma, Chaman

【影响因子】3.791

【主题类别】

区块链技术-协同技术-隐私计算

区块链应用-实体经济-智慧城市领域

【Abstract】The collection of amounts of useful data from various IoT devices through machine learning (ML) techniques has been extensively applied in lots of areas of the smart city. To improve the efficiency of machine learning, people realize efficient data classification by supporting the ML model, namely, the support vector machine (SVM) model, which is used in the realization of linear classification. However, data security and data protection are not addressed in SVM classifier training from multiple entity-labeled IoT data. In the existing solution, they depend on the implicit hypothesis that learning data can be dependable collected from complex data providers, which is often not the reality. To solve the question between the above problems, in this article, we put forward a secure support vector machine-a secure SECURE SVM training scheme for protecting the privacy on encrypted IoT data based on blockchain. Firstly, a secure and dependable data encryption sharing platform is established among complex data providers by using blockchain technology, which is recorded in a distributed ledger. Secondly, the homomorphic cryptosystem is used to design secure components, and the secure polynomial multiplication is improved to design a secure SVM training algorithm, which only needs two interactions in one iteration and does not need a trusted third party. Finally, the experimental results display that the plan ensures the confidentiality of sensitive data of each data provider and the confidentiality and validity of SVM model parameters of data analysts.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-09-28

【文献类型】 理论模型

【DOI】 10.1155/2022/7463513

A Survey on Blockchain and Artificial Intelligence Technologies for Enhancing Security and Privacy in Smart Environments

【Author】 Oumaima, Fadi Karim, Zkik Abdellatif, El Ghazi Mohammed, Boulmalf

【影响因子】3.476

【主题类别】

区块链治理-技术治理-区块链安全

【Abstract】Smart environments consist of a collection of sensors, actuators, and numerous computing units that improve human life. With the booming of smart environments, data generation has been notably increasing in recent years, which must be managed in a smart and optimal manner. The components (i.e., workstations and cloud) used for data processing are not the best to recommend since it is risky and resource costing. For that matter, enterprises, firms and companies are deploying blockchain technologies (BT) as a more suitable alternative. In fact, blockchain is a distributed transaction ledger ensuring the reliability and transparency of data. However, BT faces some inherent security challenges such as DoS, eclipse and double spending attacks as well as Advanced Persistent Threat (APT) and malware. Thus, advanced anomaly detection and mitigation approaches, especially the ones using artificial intelligence (AI) techniques (e. g. Machine Learning, Deep Learning, Federated Learning) are required to address the aforementioned issues. In combination, AI and BT are capable of detecting anomalies within blockchain networks with high accuracy. In this paper, with a focus on cyber security issues, we explore the challenges of blockchain deployment in smart environments. Additionally, we explore the use of anomaly detection AI-based techniques as a ledger of blockchain technologies to address the security issues in smart environments. Thus, we propose a framework that emphasizes the challenges of BT, values and capabilities of BT-AI integration. We also present research trends to highlight potential research paths for improving the security of blockchain networks using artificial intelligence.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain technology; artificial intelligence; security and privacy; smart environments; machine learning; anomaly detection

【发表时间】2022

【收录时间】2022-09-28

【文献类型】 综述

【DOI】 10.1109/ACCESS.2022.3203568

Distributed Ledger Technology Based Architecture for Decentralized Device-to-Device Communication Network

【Author】 Lu, Shu-Ping Lei, Chin-Laung Ho, Cheng-Yun Hwang, Shy-Shang Chen, Hsin-Chen

【影响因子】3.476

【主题类别】

区块链应用-实体经济-通信领域

【Abstract】Due to the mobility of devices, device-to-device (D2D) communication is a promising fifth-generation (5G) technology in dynamic environments for improving message transmission efficiency for group communication. Additionally, all services in an ad hoc network are current Vehicle Ad Hoc Network (VANET) applications. Therefore, D2D communication has been introduced in ad hoc environments to reduce latency during vehicle conversations, such as autonomous vehicle solutions and drone fleet management for cellular vehicle-to-everything (C-V2X) modules and Internet of Drones (IoDs) networks. However, providing secure and effective group communication is an urgent challenge. To solve these problems, we propose a dynamic group management solution based on distributed ledger technology. This study demonstrates that a distributed ledger-based hierarchical architecture for dynamic group management is faster and more adaptable without compromising security and performance. Furthermore, the proposed method can facilitate the transfer of direct communication data without a centralized database, thereby reducing the chance of a single point of failure. In addition, the research was tested by a third party that has established close cooperation with world-leading automotive electronics suppliers in Taiwan.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Vehicle dynamics; Security; Distributed ledger; Servers; Ad hoc networks; Device-to-device communication; Computer architecture; Vehicle-to-everything; Cryptography; Device-to-device communications; peer-to-peer (P2P); vehicle-to-everything (V2X); distributed ledger technology; security; cryptography

【发表时间】2022

【收录时间】2022-09-28

【文献类型】 实证数据

【DOI】 10.1109/ACCESS.2022.3199880

Circuit: A JavaScript Memory Heap-Based Approach for Precisely Detecting Cryptojacking Websites

【Author】 Hong, Hyunji Woo, Seunghoon Park, Sunghan Lee, Jeongwook Lee, Heejo

【影响因子】3.476

【主题类别】

区块链治理-技术治理-加密劫持检测

【Abstract】Cryptojacking is often used by attackers as a means of gaining profits by exploiting users' resources without their consent, despite the anticipated positive effect of browser-based cryptomining. Previous approaches have attempted to detect cryptojacking websites, but they have the following limitations: (1) they failed to detect several cryptojacking websites either because of their evasion techniques or because they cannot detect JavaScript-based cryptojacking and (2) they yielded several false alarms by focusing only on limited characteristics of cryptojacking, such as counting computer resources. In this paper, we propose CIRCUIT, a precise approach for detecting cryptojacking websites. We primarily focuse on the JavaScript memory heap, which is resilient to script code obfuscation and provides information about the objects declared in the script code and their reference relations. We then extract a reference flow that can represent the script code behavior of the website from the JavaScript memory heap. Hence, CIRCUIT determines that a website is running cryptojacking if it contains a reference flow for cryptojacking. In our experiments, we found 1,813 real-world cryptojacking websites among 300K popular websites. Moreover, we provided new insights into cryptojacking by modeling the identified evasion techniques and considering the fact that characteristics of cryptojacking websites now appear on normal websites as well.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Codes; Computer security; Cryptocurrency; Engines; Instruction sets; Behavioral sciences; Syntactics; Cyberattack; Browsers; Browser security; web security; cryptojacking

【发表时间】2022

【收录时间】2022-09-28

【文献类型】 实验仿真

【DOI】 10.1109/ACCESS.2022.3204814

A Patient-Centric Healthcare Framework Reference Architecture for Better Semantic Interoperability Based on Blockchain, Cloud, and IoT

【Author】 Gohar, Ahmad N. Abdelmawgoud, Sayed Abdelgaber Farhan, Marwa Salah

【影响因子】3.476

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】Due to the distributed and non-integrated nature of the healthcare systems which results from the application-centric view it leads to a challenging task to manage healthcare data exchange (heterogeneity problem). On the other hand, Blockchain technologies are emerging as promising and cost-effective means to meet some of these requirements due to their inherent design properties, such as secure cryptography and a resilient peer-to-peer network. Likewise, Blockchain-based applications can benefit the healthcare domain via their properties of asset sharing, and audit trails of data access. Existing work mainly pays attention to centralized and blockchain-based mechanisms. But it doesn't realize the increase need for better data interoperability amount multiple healthcare systems and services. This requires shifting from the application-centric solutions toward the patient-centric solutions. This paper presents A secure and efficient framework based on Blockchain, Cloud, and IoT named Patient-Centric Healthcare Framework (PCH) for better healthcare systems interoperability. A tiered-based architecture (5 tiers) with collaboration is designed for the feasible realization of PCH. Also, the design and implementation aspects start from the layering diagram, system context, and detailed reference architecture that emphasizes the detailed component topology and interactions within the framework. An electronic medical record is used to show how healthcare data is processed with the required security considerations. Then, an evaluation of PCH against the existing Blockchain-based healthcare frameworks is conducted. The results analysis demonstrates that PCH offers practical solutions to protect healthcare data and support efficient data sharing with better interoperability.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Medical services; Distributed ledger; Interoperability; Computer architecture; Security; Data privacy; Blockchain; chaincode; digital health; distributed ledger technology (DLT); eHealth; EHRs sharing; electronic health records (EHRs); endorsement; fabric; health information exchange; Hyperledger; ordering service; smart contracts

【发表时间】2022

【收录时间】2022-09-28

【文献类型】 理论模型

【DOI】 10.1109/ACCESS.2022.3202902

Standardizing Smart Contracts

【Author】 Capocasale, Vittorio Perboli, Guido

【影响因子】3.476

【主题类别】

区块链技术-核心技术-智能合约

【Abstract】In the evolving context of distributed ledger technologies, the standardization of smart contracts is necessary. Smart contracts are tamper-proof computer programs. Due to their security and flexibility, it is possible to exploit smart contracts in a wide variety of use cases. In particular, it could be possible to automate legally recognized contracts by leveraging smart contracts. To this extent, some standards regarding the proper management of smart contracts are surging. However, there are still many technological misconceptions regarding smart contracts. This study describes smart contracts from multiple perspectives and identifies and clarifies some of the most common misconceptions regarding smart contracts. This study also provides some guidelines and insights on the proper management of smart contracts. This study can be a valuable resource for future standards on smart contracts.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Smart contracts; Blockchains; Smart contracts; Guidelines; Law; Peer-to-peer computing; Codes; Blockchain; chaincode; smart contracts; standardization

【发表时间】2022

【收录时间】2022-09-28

【文献类型】 观点阐述

【DOI】 10.1109/ACCESS.2022.3202550

New Blockchain Based Special Keys Security Model With Path Compression Algorithm for Big Data

【Author】 Bakir, Cigdem

【影响因子】3.476

【主题类别】

区块链治理-技术治理-区块链安全

【Abstract】In recent years, following the introduction of the IoT (Internet of Things) into our lives and thanks to the rapidly increasing number of digital applications, data is collected from a wide variety of sources at an astonishing rate, and the amount of data is increasing exponentially. Today, social networks, cloud computing and data analytics make it possible to collect huge amounts of data. The concept of big data has subsequently emerged and is an important topic in many fields. However, it is not only very difficult to store big data and analyze it, but it is also a serious threat to the security of an individual's sensitive information. This study describes the issues surrounding big data security and privacy, and provides a solution involving a new blockchain-based security model. This proposed model is called the Blockchain-based Special Key Security Model (BSKM). BSKM proposes, implements and integrates three elements (confidentiality, integrity and availability) of information security together for big data. With this proposed model, a more practical and flexible structure is established for all operations (read, write, update and delete) performed on a database with real data. In this study performed with a special key, all separate blockchain transactions were used for read, write, update and delete operations, and there was a structure that could ensure both confidentiality and integrity at the same time. By looking at a special key for all the blockchain transaction operations performed on the big data it has been shown what type of authorization and access control can be established between which processes and which users. Thus, in contrast to previous studies seen in published literature, data confidentiality, data integrity and data consistency were guaranteed for all transactions. The results of the proposed BSKM model have also been compared by conducting an experimental study of its application. Moreover, this study has shown the effectiveness and benefits of the path compression algorithm. This result has been shown with experimental studies modeling big data and also shows promise for further studies.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Big Data; Security; Blockchains; Data privacy; Data models; Medical diagnostic imaging; Authorization; Privacy; Big data; blockchain; path compression; privacy; security

【发表时间】2022

【收录时间】2022-09-28

【文献类型】 理论模型

【DOI】 10.1109/ACCESS.2022.3204289

Comparative Analysis of Decentralized Identity Approaches

【Author】 Alizadeh, Morteza Andersson, Karl Schelen, Olov

【影响因子】3.476

【主题类别】

区块链应用-虚拟经济-虚拟身份

【Abstract】Decentralization is essential when trust and performance must not depend on a single organization. Distributed Ledger Technologies (DLTs) and Decentralized Hash Tables (DHTs) are examples where the DLT is useful for transactional events, and the DHT is useful for large-scale data storage. The combination of these two technologies can meet many challenges. The blockchain is a DLT with immutable history protected by cryptographic signatures in data blocks. Identification is an essential issue traditionally provided by centralized trust anchors. Self-sovereign identities (SSIs) are proposed decentralized models where users can control and manage their identities with the help of DHT. However, slowness is a challenge among decentralized identification systems because of many connections and requests among participants. In this article, we focus on decentralized identification by DLT and DHT, where users can control their information and store biometrics. We survey some existing alternatives and address the performance challenge by comparing different decentralized identification technologies based on execution time and throughput. We show that the DHT and machine learning model (BioIPFS) performs better than other solutions such as uPort, ShoCard, and BBID.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Cloud computing; Internet; Decentralized applications; Social networking (online); Distributed ledger; Privacy; Identification; decentralization; distributed hash table; self-sovereign identity

【发表时间】2022

【收录时间】2022-09-28

【文献类型】 实证数据

【DOI】 10.1109/ACCESS.2022.3202553

Information Dissemination Model in Rural Live Broadcasting under Blockchain in the Era of Artificial Intelligence

【Author】 Liu, Jie Yu, Yahui Ji, Peng Liu, Danni

【影响因子】3.120

【主题类别】

区块链应用-实体经济-直播领域

【Abstract】This work aims to improve the information dissemination atmosphere of rural live broadcasting and ensure its long-term development. First, it studies and analyzes the current situation and characteristics of rural live broadcasting. Then, it discusses the blockchain (BC) technology and information dissemination mode in the era of artificial intelligence (AI). Finally, the characteristics of BC technology (BT) and the information dissemination model are discussed. A BT-optimized susceptible exposed infected recovered (SEIR) information dissemination model is proposed. The results show that the BT-optimized SEIR model has no effect on the traditional information transmission characteristics and can ensure the conventional transmission of all information. Additionally, BT can effectively improve the overall transmission efficiency of the SEIR model for false information and accurate information and effectively shorten the duration. Specifically, the BT-optimized SEIR model's maximum false information transmission proportion is reduced by about 13%. The duration is reduced by 15 days over the traditional model. By comparison, in positive information dissemination, the maximum transmission proportion of the proposed BT-optimized SEIR model is about 19% higher than the traditional model. The duration is about 30 days longer. The research provides technical support for controlling and improving the current situation and atmosphere of rural live broadcasting information dissemination.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-09-28

【文献类型】 理论模型

【DOI】 10.1155/2022/4590578

Differential Privacy-Based Double Auction for Data Market in Blockchain-Enhanced Internet of Things

【Author】 Zhang, Junhua Zhong, Caiming

CCF-C

【影响因子】2.146

【主题类别】

区块链技术-协同技术-物联网

【Abstract】With the rapid development of the Internet of Things (IoT), large amounts of data are collected, which constitute a valuable business resource. Hence, a suitable IoT data market needs to be established, and the provision of safe and effective trading services for multiple buyers and sellers is required. This paper introduces an IoT data market framework supported by blockchain. It focuses on a transaction realization scheme for multiple buyers and sellers. In the scheme, the mechanisms are designed to determine the corresponding data providers and recipients for the buyers and sellers, respectively, and the transaction prices of both parties. When the data market runs, an inference attack will raise bid information leakage issues. We study a transaction scheme that enables differential privacy protection of bids based on an exponential mechanism. This paper theoretically proves the individual rationality, weak budget balance, and truthfulness of the normal transaction scheme and differential privacy-based transaction scheme. This paper also theoretically proves the effectiveness of the differential privacy protection for bids of transaction participants. Furthermore, this paper verifies the performances of the two schemes through digital simulation experiments. From the experiments, we can also prove that these schemes occupy reasonable social welfare and computational overhead.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-09-28

【文献类型】 理论模型

【DOI】 10.1155/2022/8038846

Industrial Chain Data Sharing and Circulation of Blockchain an Big Data Technology

【Author】 Chen, Jun Wu, Jiangyao Qian, Zhenghao Li, Lei Zheng, Zaoxian

CCF-C

【影响因子】2.146

【主题类别】

区块链技术-协同技术-大数据

区块链应用-实体经济-工业领域

【Abstract】In the era of big data, the value of data is infinite. With the development of the Internet of Things, everything is interconnected, and the sharing and circulation of data are particularly important. This paper was aimed at studying the data sharing system based on blockchain and big data technology. Based on blockchain and big data technology, this paper proposes a data-sharing system based on an HDFS file system. And it strengthens the security of data sharing based on blockchain technology, proposes a security key for industrial data, and greatly upgrades the security of data sharing. Experiments in this paper have proved that the data-sharing system in this paper has strong robustness, and choosing the appropriate k and n can take into account both the computational overhead and security, such as (3, 5), (5, 10), and (6, 10).

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-09-28

【文献类型】 理论模型

【DOI】 10.1155/2022/7719036

A Study on the Innovative Use of Blockchain in the Human Resources Service Industry

【Author】 Wang, Tao

CCF-C

【影响因子】2.146

【主题类别】

区块链应用-实体经济-人力资源领域

【Abstract】The growing maturity of block chain in the context of the big data era has provided new opportunities for the development of the human resources service industry. This paper analyses the problems of the traditional HR service industry from the emerging technology of block chain and innovatively combines block chain technology with HR service industry, conceives a HR service platform based on block chain technology, and uses this platform as the center to connect job seekers, enterprises, partners, and the government, and actively explores the innovative application of block chain technology in HR service industry. The concept of "user profiling" provides new ideas and new ways to realise precise knowledge services for innovation and entrepreneurship. Under the strategic background of the Internet +, mass entrepreneurship, and innovation, we integrate precise service elements into the field of personalised knowledge services for innovation and entrepreneurship, establish a user portrait model for innovation and entrepreneurship, dig deeper into the information resources and knowledge service needs of users for innovation and entrepreneurship from the perspective of portrait, and build a precise knowledge service model that fits the knowledge needs of users for "dual innovation." It also proposes the implementation and guarantee strategies of the precise knowledge service model for innovation and entrepreneurship based on the dimensions of the concept, resources, users, and services.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-09-28

【文献类型】 理论模型

【DOI】 10.1155/2022/7798595

International Logistics Management System Based on Cloud Computing Technology

【Author】 Fan, Ming

CCF-C

【影响因子】2.146

【主题类别】

区块链应用-实体经济-物流领域

【Abstract】In order to solve the problems of slow matching between supply and demand, information authenticity and security, and lack of trust in traditional logistics platforms, the author proposes an international logistics management system based on cloud computing technology. The system uses blockchain as the underlying technology, combined with related technologies such as smart contracts and NSGA-II algorithms, matches the supply and demand sides of cross-border logistics resources, writes the important information generated in the platform transaction into the blockchain, and carries out network-wide broadcast and consensus, so as to realize the intelligence of the transaction and the nontampering and traceability of the information. The experiment found that in the case set by this example, max Z(1) = 57.139, and max Z(2) = 54.679, meaning that the final matching result is as follows: P2, the cross-border logistics provider, is matched with U5, the consignor; P3 matches U9, P8 matches U4, P9 matches U3, P1 matches U6, P5 matches U1, P7 matches U2, P4 matches U7, P10 matches U8, and P8 matches U10. Satisfactory matching results show that the algorithm is effective. Experimental results show that the system can increase the transparency and sharing of cross-border logistics information, help to reduce forged data information, improve the level of automation and intelligence, and provide a reference for the application of blockchain technology in the field of cross-border logistics.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-09-28

【文献类型】 实证数据

【DOI】 10.1155/2022/4317578

Security Research in Personnel Electronic File Management Based on Blockchain Technology

【Author】 Wang, Hongbing Zhang, Jian

CCF-C

【影响因子】1.968

【主题类别】

区块链应用-实体经济-档案领域

【Abstract】Compared with traditional files, electronic personnel files have the characteristics of the economy, environmental protection, convenience, and sharing and are gradually replacing traditional paper files. However, the development of electronic archives is still in its infancy, and there are still many problems, including the professional quality of personnel, information management, and the security of electronic archives storage. As an emerging technology, blockchain technology has the characteristics of decentralization, immutability, and traceability. This paper applies blockchain technology in the management of electronic archives, overcomes the internal distortion and insecurity of electronic archives, and designs an electronic archives management module based on blockchain technology. Through the application in some schools, the effectiveness and practicability of the algorithm are proved.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-09-28

【文献类型】 理论模型

【DOI】 10.1155/2022/7875825

An energy harvesting, blockchain, and QoS-aware intelligent healthcare task coordination policy for IoT-assisted networks

【Author】 Chowdhury, Mahfuzulhoq

【影响因子】0.000

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】With the rise of advanced communication technology, mobile devices, cloud computing, and internet of things (IoT) technology, a significant amount of IoT-assisted healthcare applications have been emerged to improve the human's life quality. Most of the existing works in IoT-assisted healthcare application execution do not consider the energy harvesting, computation task allocation, trust access authentication of users, and quality of service (QoS) requirements satisfaction at the same time by investigating different healthcare users, requirements, energy cost, available cloud, and network resources. To deal with these issues, this paper proposes an intelligent energy harvesting, decentralised blockchain-based authentication, and QoS-aware healthcare task coordination scheme for IoT-assisted healthcare applications by taking into account different users, QoS requirements, resources availability, and resource cost. Simulation results on transaction delay, energy consumption, resource cost, throughput, and system reward are presented to show the significance of the proposed scheme over the conventional schemes.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; BC; energy harvesting; EH; task coordination; healthcare; Internet of things; IoT; quality of service; QoS

【发表时间】2022

【收录时间】2022-09-28

【文献类型】 理论模型

【DOI】 10.1504/IJES.2022.10050472

A MACHINE LEARNING MODEL BASED ON HETEROGENEOUS DATA

【Author】 Narbayeva, S. M. Tapeeva, S. K. Turarbek, A. Zhunusbaeva, S.

【影响因子】

【主题类别】

区块链技术-协同技术-机器学习

【Abstract】Big data is widely used in many areas of business. The information between organizations is systematically reproduced and processed by data, and the collected data differs significantly in attributes. By composing heterogeneous data sets, they complement each other, therefore, data exchange between organizations is necessary. In a machine learning collaborative learning process based on heterogeneous data, the current schema has many challenges, including efficiency, security, and availability in real-world situations. In this paper, we propose a secure SVM learning mechanism based on the consortium blockchain and a threshold homomorphic encryption algorithm. By implementing the consortium's blockchain, it is possible to build a decentralized data exchange platform, and also to develop a secure algorithm for the support-vector machine classifier based on threshold homomorphic encryption.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; heterogeneous data; SVM; secure scheme

【发表时间】2022

【收录时间】2022-09-28

【文献类型】 理论模型

【DOI】 10.26577/JMMCS.2022.v114.i2.09

Distributed Autonomous Organization of Learning: Future Structure for Health Professions Education Institutions

【Author】 Cabrera, Daniel Nickson, Christopher P. Roland, Damian Hall, Elissa Ankel, Felix

【影响因子】

【主题类别】

区块链应用-虚拟经济-DAO

【Abstract】Current health professions education (HPE) institutions are based on an assembly-line hierarchical structure. The last decade has witnessed the advent of sophisticated networks allowing the exchange of information and educational assets. Blockchain provides an ideal data management framework that can support high-order applications such as learning systems and credentialing in an open and a distributed fashion. These system management characteristics enable the creation of a distributed autonomous organization of learning (DAOL). This new type of organization allows for the creation of decentralized adaptive competency curricula, simplification of credentialing and certification, leveling of information asymmetry among educational market stakeholders, assuring alignment with societal priorities, and supporting equity and transparency.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; multidisciplinary; credentialing; medical education; health professionals; education; decentralization; training; curriculum; instruction

【发表时间】2022

【收录时间】2022-09-28

【文献类型】 观点阐述

【DOI】 10.2196/28770

Blockchain technology for immunisation data storage in India: opportunities for population health innovation

【Author】 Banerjee, Somalee Banerjee, Sinchan Bhagi, Anshul Sarkar, Aurobindo Kapuria, Bhrigu Desai, Shrey Sethuraman, Venkatraman Ray, Arindam Palanuk, Kara Patil, Sumeet

【影响因子】

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-09-28

【文献类型】 理论模型

【DOI】 10.1136/bmjinnov-2021-000725

“Web3.0”时代数字版权保护与知识资源共享模式创新研究

【作者】 姜莉;

【作者单位】天津图书馆(天津市少年儿童图书馆);

【文献来源】图书馆工作与研究

【复合影响因子】2.830

【综合影响因子】2.536

【主题类别】

区块链应用-实体经济-版权领域

【摘要】随着信息技术的发展,数字文化作品市场日益繁荣,然而技术的进步一方面使侵权盗版现象日益猖獗,数字版权保护陷入困境;另一方面,少数平台运营商凭借寡头垄断优势获取了数字文化作品的大部分交易利润,使作者获得的收益与作品的价值不成正比,严重影响了作者的创作热情和学术环境的健康发展。而Web3.0技术为数字版权保护和分享带来了机遇。文章简要介绍了互联网技术的发展历程和Web3.0的核心技术,分析了Web3.0技术在数字版权保护及资源共享中的价值和存在的问题,在此基础上提出基于Web3.0技术完善数字版权保护及共享模式的框架设计。

【关键词】Web3.0;;区块链;;数字版权;;智能合约

【文献类型】 理论模型

【DOI】 10.16384/j.cnki.lwas.2022.08.008

【发表时间】2022-09-28

图书馆形象的历史嬗变及其在元宇宙中的构建

【作者】 张麒麟;

【作者单位】西南大学图书馆;

【文献来源】国家图书馆学刊

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-虚拟经济-元宇宙

【摘要】元宇宙即将到来,图书馆在其中应以什么形象存在关乎未来发展。在时代环境变化与图书馆本身的功能、价值观、文化目标等变化的双重影响下,图书馆实体形象经历了庙宇—楼阁—馆舍—中心的历史嬗变。考察架空世界,图书馆形象主要有仿造、复刻和拟人三种类型,但图书馆并未参与这些架空世界的构建。在元宇宙中,图书馆需要与其他机构竞争用户的时间分配,并在价值观和文化目标上对用户产生引导作用。基于架空世界中图书馆的虚拟形象,并依据元宇宙的规模差异,文章提出了元宇宙中图书馆的三种形象类型,即大厅、奇观和随身伴侣。表3。参考文献31。

【关键词】图书馆;;形象;;元宇宙

【文献类型】 观点阐述

【DOI】 10.13666/j.cnki.jnlc.2022.0407

【发表时间】2022-09-28

基于区块链的财务系统应用研究

【作者】 杨亮亮;

【作者单位】首都医科大学附属北京世纪坛医院审计处;

【文献来源】中国注册会计师

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-实体经济-财会领域

【摘要】随着互联网信息化技术的飞速发展,各行各业都出现了很多新型的信息化技术,区块链技术就是一种将数据整合为区块,并按照相应规则进行排列的新型技术,目前已经在金融、物联网、保险等各个领域实现了相应的应用。就区块链技术的具体内容与特点来说,区块链去中心化账本使得每个节点都是相对独立的账本,每个节点实时更新、数据一致,确保了数据的真实。

【关键词】区块链;系统应用;

【文献类型】 理论模型

【DOI】 10.16292/j.cnki.issn1009-6345.2022.08.017

【发表时间】2022-09-28

在线标注

备案号: 苏ICP备17025947号-5

评论回复