• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2023年01月12日 16篇

文献来源

  • 11
  • 5

主题分类

      • 1
      • 2
      • 4
      • 1
      • 1
      • 1
      • 1
      • 1
      • 2
      • 1
      • 4

文献类型

  • 3
  • 6
  • 4
  • 3
筛选
订阅
<< 前一天 后一天 >>

Blockchain Technology for Electronic Health Records

【Author】 Han, Yujin Zhang, Yawei Vermund, Sten H.

【影响因子】4.614

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】Compared with traditional paper-based medical records, electronic health records (EHRs) are widely used because of their efficiency, security, and reducing data redundancy. However, EHRs still manifest poor interoperability and privacy issues are unresolved. As a distributed ledger protocol composed of encrypted blocks of data organized in chains, blockchain represents a potential tool to solve the shortcomings of EHRs in terms of interoperability and privacy. In this paper, we define EHRs and blockchain technology and introduce several classic schemes based on blockchain technology to strengthen EHR interoperability and privacy protection. We then review ongoing challenges in the areas of data management efficiency, fairness of access, and trust in the systems. In this commentary, we suggest ongoing research needs for health informatics, data sciences, and ethics to establish EHRs based on blockchain technology. Blockchain-based EHR schemes must address the potential inequality of healthcare resources, the huge carbon footprint of computational needs, and potential distrust of health providers and patients that may ensue with wider use of blockchain technology.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】electronic health records; blockchain; interoperability; privacy

【发表时间】2022

【收录时间】2023-01-12

【文献类型】 观点阐述

【DOI】 10.3390/ijerph192315577

A Blockchain Technology Introduction Strategy for Asymmetric Sharing Platforms under Different Homing Behaviors of Both Sides

【Author】 Guo, Libin Guo, Xiangtian

【影响因子】4.614

【主题类别】

区块链治理-市场治理-技术采用

【Abstract】To address user privacy concerns and improve user trust levels, sharing platforms are commencing to focus on investing in blockchain technology. This study focuses on blockchain technology investment and pricing strategies for two asymmetric sharing platforms. By constructing a Hotelling model, we investigate the investment strategies of the two asymmetric platforms regarding blockchain technology under different user attribution behaviours, i.e., single-homing or multi-homing, and the optimal pricing under different investment decisions. Afterwards, we compare and analyse the investment strategies under different conditions, obtain the influence of relevant market factors on the pricing strategies of the platforms, and finally determine the optimal timing of blockchain technology investment for asymmetric sharing platforms. The results indicate that when users' perception of blockchain value is high, both platforms are motivated to introduce blockchain technology, and, conversely, a stronger platform exits the blockchain market. In multi-homing markets, platforms are more likely to implement blockchain strategies and the cost of technology investment is significantly higher than in a single-homing market. In addition, we also find that the degree of differentiation has a significant impact on the blockchain strategies of weaker platform under multi-homing market.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】sharing economy; asymmetric platforms; blockchain technology; multi-homing behavior; privacy concerns

【发表时间】2022

【收录时间】2023-01-12

【文献类型】 理论模型

【DOI】 10.3390/ijerph192316060

Information Sharing Game and Value Analysis for the Following Enterprise Applications of Blockchain Technology

【Author】 Luo, Haiyan Pan, Junlin

【影响因子】3.889

【主题类别】

区块链治理-市场治理-技术采用

【Abstract】To address the question of whether small and medium-sized enterprises (SMEs) should follow benchmark companies in establishing a blockchain-based information sharing platform, a two-tier supply chain decision-making problem dominated by retailers and containing two manufacturers of unequal status is analyzed, including the impact on the utility and social welfare of different game players in the supply chain and the supply chain as a whole, taking into account the fact that consumers are sensitive to both price and quality. For this purpose, traditional cooperation models, short-term and long-term models based on blockchain technology for information sharing were constructed and solved, respectively. The findings suggest that in the short term, the establishment of a blockchain technology-based information sharing platform will widen the status gap between manufacturers, making the strong stronger and the weak weaker, with retailers' profits and social welfare suffering and no change in consumer surplus. In the long term, the quality improvement effect of information sharing will narrow the gap between manufacturers and increase members' profits, with retailers and the entire supply chain experiencing a significant increase in profits after a short period of time, as well as an increase in consumer surplus and social welfare. In addition, when consumer price sensitivity and quality sensitivity are high, the establishment of a blockchain technology-based information sharing platform is beneficial for the stronger manufacturers, detrimental to the weaker manufacturers, and beneficial for the supply chain in the long term; otherwise, the absence of a blockchain technology-based information sharing platform is beneficial for the weaker manufacturers and the supply chain.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain technology; supply chain; information sharing; dynamic games; social welfare

【发表时间】2022

【收录时间】2023-01-12

【文献类型】 理论模型

【DOI】 10.3390/su142316060

Blockchain Technology Implementation in the Energy Sector: Comprehensive Literature Review and Mapping

【Author】 Khezami, Nadhira Gharbi, Nourcherif Neji, Bilel Braiek, Naceur Benhadj

【影响因子】3.889

【主题类别】

区块链应用-实体经济-能源领域

【Abstract】Satisfying the world's rapidly increasing demands in energy via the optimized management of available resources is becoming one of the most important research trends worldwide. When it comes to energy, it is very important to talk about decentralization, security, traceability and transparency. Thus, over the last few years, numerous research works have presented blockchain technology as the best novel business platform enabling a secure, transparent and tamper-proof energy management solution. In this paper, we conducted a systematic literature review (SLR) using the PRISMA framework of the different existing research studies related to the use of the blockchain technology in the energy sector, published between 2008 and 2021. We identified a total of 769 primary studies after intensive manual analysis and filtering, which we thoroughly assessed using various criteria to address six main research questions that covered the blockchain types, applications and platforms in the energy sector, the energy source types for which blockchain platforms are implemented, the emergent technologies that are combined to blockchain solutions, and the types of consensuses used in energy blockchains. Based on the collected survey data, we built a database to categorize the existing research works, identify research trends, and highlight knowledge gaps and potential areas for additional field study.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】systematic literature review; energy blockchain; energy management; sustainable energy; PRISMA

【发表时间】2022

【收录时间】2023-01-12

【文献类型】 综述

【DOI】 10.3390/su142315826

Blockchain, Data Protection and P2P Energy Trading: A Review on Legal and Economic Challenges

【Author】 Chiarini, Alessandra Compagnucci, Lorenzo

【影响因子】3.889

【主题类别】

区块链应用-实体经济-能源领域

【Abstract】Blockchain technology (BCT) enables the automated execution of smart contracts in peer-to-peer (P2P) energy trading. BCT-based P2P platforms allow the sharing, exchange and trade of energy among consumers or prosumers as peers, fostering the decarbonization, decentralization and digitalization of the energy industry. On the other hand, BCT-based P2P energy trading relies on the collection, storage and processing of a large amount of user data, posing interdisciplinary challenges, including user anonymity, privacy, the governance of BCT systems and the role of energy market players. First, this paper seeks to review the state of the art of European data protection law and regulations by focusing on BCT compliance with the General Data Protection Regulation (GDPR) of 2018. Second, it explores both the potentials and the challenges of BCT-based P2P energy trading from a legal-economic perspective. To do so, the paper adopts an interdisciplinary approach which intertwines both law and economics, by reviewing the recent literature on BCT and P2P energy trading. Findings have revealed that the deployment of BCT-based P2P energy trading is still in its pilot stage because of technology immaturity, data protection uncertainty, incomplete disintermediation and the lack of both user awareness and collaboration among market players. Drawing on the review, the paper also proposes a selection of solutions to foster the implementation of BCT-based P2P energy trading.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; data protection; energy community; P2P energy trading; prosumer; transaction cost

【发表时间】2022

【收录时间】2023-01-12

【文献类型】 综述

【DOI】 10.3390/su142316305

Moving-Target Defense in Depth: Pervasive Self- and Situation-Aware VM Mobilization across Federated Clouds in Presence of Active Attacks

【Author】 Magdy, Yousra Azab, Mohamed Hamada, Amal Rizk, Mohamed R. M. Sadek, Nayera

【影响因子】3.847

【主题类别】

区块链技术-协同技术-联邦学习

【Abstract】Federated clouds are interconnected cooperative cloud infrastructures offering vast hosting capabilities, smooth workload migration and enhanced reliability. However, recent devastating attacks on such clouds have shown that such features come with serious security challenges. The oblivious heterogeneous construction, management, and policies employed in federated clouds open the door for attackers to induce conflicts to facilitate pervasive coordinated attacks. In this paper, we present a novel proactive defense that aims to increase attacker uncertainty and complicate target tracking, a critical step for successful coordinated attacks. The presented systemic approach acts as a VM management platform with an intrinsic multidimensional hierarchical attack representation model (HARM) guiding a dynamic, self and situation-aware VM live-migration for moving-target defense (MtD). The proposed system managed to achieve the proposed goals in a resource-, energy-, and cost-efficient manner.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】cloud federation; virtual machines; blockchain; HARM model; moving-target defense; virtualization; cloud migration

【发表时间】2022

【收录时间】2023-01-12

【文献类型】 理论模型

【DOI】 10.3390/s22239548

BBNSF: Blockchain-Based Novel Secure Framework Using RP2-RSA and ASR-ANN Technique for IoT Enabled Healthcare Systems

【Author】 Kumar, Mohit Mukherjee, Priya Verma, Sahil Kavita, Maninder Kaur, Maninder Singh, S. Kobielnik, Martyna Wozniak, Marcin Shafi, Jana Ijaz, Muhammad Fazal

【影响因子】3.847

【主题类别】

区块链技术-协同技术-物联网

【Abstract】The wearable healthcare equipment is primarily designed to alert patients of any specific health conditions or to act as a useful tool for treatment or follow-up. With the growth of technologies and connectivity, the security of these devices has become a growing concern. The lack of security awareness amongst novice users and the risk of several intermediary attacks for accessing health information severely endangers the use of IoT-enabled healthcare systems. In this paper, a blockchain-based secure data storage system is proposed along with a user authentication and health status prediction system. Firstly, this work utilizes reversed public-private keys combined Rivest-Shamir-Adleman (RP2-RSA) algorithm for providing security. Secondly, feature selection is completed by employing the correlation factor-induced salp swarm optimization algorithm (CF-SSOA). Finally, health status classification is performed using advanced weight initialization adapted SignReLU activation function-based artificial neural network (ASR-ANN) which classifies the status as normal and abnormal. Meanwhile, the abnormal measures are stored in the corresponding patient blockchain. Here, blockchain technology is used to store medical data securely for further analysis. The proposed model has achieved an accuracy of 95.893% and is validated by comparing it with other baseline techniques. On the security front, the proposed RP2-RSA attains a 96.123% security level.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of Medical Things (IoMT); data privacy; blockchain; security; reversed public-private keys combined Rivest-Shamir-Adleman; correlation factor-induced salp swarm optimization algorithm; data encryption; classification

【发表时间】2022

【收录时间】2023-01-12

【文献类型】 实验仿真

【DOI】 10.3390/s22239448

An Effective Blockchain-Based Defense Model for Organizations against Vishing Attacks

【Author】 Fakieh, Ahlam Akremi, Aymen

【影响因子】2.838

【主题类别】

区块链应用-实体经济-网安领域

【Abstract】Social engineering (SE) attacks (also called social hacking) refer to various methods used by cybercriminals to exploit the weak nature of human beings rather than the logical and physical security measures used by organizations. This research paper studies the various methods of SE used by criminals to exploit the psychological vulnerabilities of human beings. On this basis, the paper proposes a new defense categorization of SE attacks based on two security principles: dual control (i.e., more than one entity to complete the task) and split knowledge (i.e., dual controlling of the knowledge to complete the task). We describe how those measures could stop SE attacks and avoid human weaknesses. Then, we propose an original new SE defense model that implements the security principles using blockchain technology to both dual control the transactions and record them safely for organizations. The proposed model's first aim is to avoid the dependence on the cognitive or psychological status of the victim and enable more verification steps to be taken in a fast and flexible manner. The paper demonstrates the quick and easy adoption of the existing private blockchain platform to implement the proposed SE defense model.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】vishing social engineering attacks; organization defense model; security policies; blockchain; social engineering attack categorization

【发表时间】2022

【收录时间】2023-01-12

【文献类型】 理论模型

【DOI】 10.3390/app122413020

Resolving Security Issues in the IoT Using Blockchain

【Author】 Malik, Hafiz Abid Mahmood Shah, Asghar Ali Muhammad, Abdul Hafeez Kananah, Ahmad Aslam, Ayesha

【影响因子】2.690

【主题类别】

区块链应用-实体经济-网安领域

区块链技术-协同技术-物联网

【Abstract】The Internet of Things is a system of interconnected smart devices that can communicate with each other and with other devices over the Internet, with or without human-to-human or human-to-computer interaction. Although IoT devices, which have IPs, make living easier, they are also a threat to the security and privacy of people. This research work presents a solution to the problem of security in the network of IoT, based on the idea of implementing the blockchain in IoT. Blockchain is a decentralized technology that adds blocks at the end of the chain. It saves the hash value for every block, and corresponds to the previous block. The decentralized behavior of blockchain is best for IoT as an extensive network, because IoT must not have a single point of failure, and one entity must not decide what to do. All the capable storage devices will save the same data entered from any device, removing the risk of receiving altered data.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】IoT; blockchain; cybersecurity; IoT layer; blockchain layer; distributed layer

【发表时间】2022

【收录时间】2023-01-12

【文献类型】 理论模型

【DOI】 10.3390/electronics11233950

Blockchain Application Analysis Based on IoT Data Flow

【Author】 Li, Juxia Zhang, Xing Shi, Wei

【影响因子】2.690

【主题类别】

区块链技术-协同技术-物联网

区块链应用-实体经济-网安领域

【Abstract】In the Internet of Things (IoT) system, data leakage can easily occur due to the differing security of edge devices and the different processing methods of data in the transmission process. Blockchain technology has the advantages of good non-tamperability, decentralization, de-trust, openness, and transparency, and it can protect data security on the Internet of Things. This research integrates the means by which data flow can be combined with blockchain technology to prevent privacy leakage throughout the entire transportation process from sender to receiver. Through a keyword search of the last five years, 94 related papers in Web of Science and IEEE Xplore were extracted and the complex papers and frameworks explained using a reconstruction graph. The data processing process is divided into five modules: data encryption, data access control, data expansion, data storage, and data visualization. A total of 11 methods combining blockchain technology to process IoT data were summarized. The blockchain application technology in the IoT field was summarized objectively and comprehensively, and a new perspective for studying IoT data flow was given.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; Internet of Things; information security; reconstruction diagram

【发表时间】2022

【收录时间】2023-01-12

【文献类型】 综述

【DOI】 10.3390/electronics11233907

A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology

【Author】 Khan, Zulfiqar Ali Namin, Akbar Siami

【影响因子】2.690

【主题类别】

区块链应用-实体经济-网安领域

区块链技术-协同技术-物联网

【Abstract】The Internet of Things (IoT) is a network of sensors that helps collect data 24/7 withouthuman intervention. However, the network may suffer from problems such as the low battery,heterogeneity, and connectivity issues due to the lack of standards. Even though these problemscan cause several performance hiccups, security issues need immediate attention because hackersaccess vital personal and financial information and then misuse it. These security issues can allowhackers to hijack IoT devices and then use them to establish a Botnet to launch a Distributed Denial ofService (DDoS) attack. Blockchain technology can provide security to IoT devices by providing secureauthentication using public keys. Similarly, Smart Contracts (SCs) can improve the performance of theIoT-blockchain network through automation. However, surveyed work shows that the blockchainand SCs do not provide foolproof security; sometimes, attackers defeat these security mechanisms andinitiate DDoS attacks. Thus, developers and security software engineers must be aware of differenttechniques to detect DDoS attacks. In this survey paper, we highlight different techniques to detectDDoS attacks. The novelty of our work is to classify the DDoS detection techniques according toblockchain technology. As a result, researchers can enhance their systems by using blockchain-basedsupport for detecting threats. In addition, we provide general information about the studied systemsand their workings. However, we cannot neglect the recent surveys. To that end, we compare thestate-of-the-art DDoS surveys based on their data collection techniques and the discussed DDoSattacks on the IoT subsystems. The study of different IoT subsystems tells us that DDoS attacks alsoimpact other computing systems, such as SCs, networking devices, and power grids. Hence, ourwork briefly describes DDoS attacks and their impacts on the above subsystems and IoT. For instance,due to DDoS attacks, the targeted computing systems suffer delays which cause tremendous financialand utility losses to the subscribers. Hence, we discuss the impacts of DDoS attacks in the contextof associated systems. Finally, we discuss Machine-Learning algorithms, performance metrics, andthe underlying technology of IoT systems so that the readers can grasp the detection techniquesand the attack vectors. Moreover, associated systems such as Software-Defined Networking (SDN)and Field-Programmable Gate Arrays (FPGA) are a source of good security enhancement for IoTNetworks. Thus, we include a detailed discussion of future development encompassing all major IoTsubsystems.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】vulnerabilities; blockchain; smart contracts; detection techniques; machine-learning; interplanetary file system (IPFS); IoT architecture; DDoS; denial of service

【发表时间】2022

【收录时间】2023-01-12

【文献类型】 综述

【DOI】 10.3390/electronics11233892

面向异构多链的区块链链上数据隐私保护方案

【作者】 王思蝶;马兆丰;罗守山;徐单恒;

【作者单位】北京邮电大学网络空间安全学院;杭州安存网络科技有限公司;

【文献来源】信息网络安全

【复合影响因子】1.887

【综合影响因子】0.804

【主题类别】

区块链应用-实体经济-知识管理

【摘要】为解决异构区块链数据隐私安全问题,文章在知识付费应用场景下提出一种支持异构多链的数据隐私保护方案,实现了联盟链上知识分享及公有链上知识付费。方案采用IPFS系统存储知识文件,解决了区块链存储负载过重问题。此外,为避免传统公钥加密机制加密次数多、需多次重复对数据进行加密上链的问题,方案利用代理重加密技术实现参与方之间的数据共享。最后,文章从理论和实验两方面对方案进行了正确性、安全性和性能分析。

【关键词】区块链;;隐私保护;;异构多链;;代理重加密

【文献类型】 实验仿真

【DOI】

【发表时间】2023-01-12

工业区块链中基于CUDA的数据并行处理方法

【作者】 陈强;谭林;王云丽;肖靖;

【作者单位】湖南大学电气与信息工程学院;湖南天河国云科技有限公司;

【文献来源】计算机工程与科学

【复合影响因子】1.442

【综合影响因子】1.037

【主题类别】

区块链应用-实体经济-工业领域

【摘要】工业区块链数据交易系统能够使交易双方在没有中间商存在的情况下安全地进行交易,简化了交易流程,降低了交易成本。针对大规模数据上链,现有的一般做法是将源数据的哈希值作为元数据存储到区块链,源数据本身则存储在本地或云端。一方面,传统哈希值的计算方式难以满足工业大规模数据高效上链的需求。另一方面,由于只将元数据存储到了区块链,交易时数据需求者在只收到元数据时无法确认源数据本身是否完整。因此,设计了一种基于CUDA的数据并行处理方法,通过合理的数据分块、线程布局等手段加快大规模工业数据哈希值的计算速度,提高上链效率。并且,基于此方法构建了两方数据完整性验证模型,数据需求者在交易时能够在未得到源数据的情况下,根据证明信息有效地验证源数据的完整性,避免了因传输无用数据而付出的通信代价。对于较大规模工业数据,所提出的计算方法可将哈希值计算效率提升至少22%。同时,由安全性分析可知,在数据拥有者持有签名私钥的特殊情况下,数据需求者在交易时可以对源数据进行完整性验证。

【关键词】工业数据;;区块链;;CUDA;;哈希计算;;数据完整性验证

【文献类型】 实验仿真

【DOI】

【发表时间】2023-01-12

元宇宙中促进人的自由而全面发展

【作者】 张爱军;贾璐;

【作者单位】西北政法大学新闻传播学院;西北政法大学;

【文献来源】中国特色社会主义研究

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-虚拟经济-元宇宙

【摘要】人的自由而全面发展,指人在自由人联合体内能最大限度地克服外在条件限制,自主自愿地发展自己的脑力、体力的过程,其前提和真实性体现在劳动实践。元宇宙概念的提出、应用使得虚拟世界与现实社会不断交互、融合、发展,甚至演变成共生状态,为人的全面发展提供了全新契机。从物理人到数字人再到沉浸人,让人的发展中的思想情感、认知体验、创新思维、现实需求等方面得到了超越现实空间的自由延伸,以在环境转变的新场域为基础激发人可能发展的无限潜力,实现人的全面发展。然而,元宇宙虚拟技术作为成长型新数字技术,其建构的虚拟空间存在未知变数,在人促进全面发展的无限制自由意识下衍生出系列消极行为。要有效遏制消极影响在人的全面发展过程中不断扩散,就需借助技术辅助治理,并依靠强制力作为保障措施,加强元宇宙虚拟空间相关的道德教育,建立健全元宇宙虚拟空间运行规章制度,在外部环境变化与内部自我建设中展现出人全面发展的主体性特征。

【关键词】元宇宙;;虚拟空间;;人的全面发展

【文献类型】 观点阐述

【DOI】

【发表时间】2023-01-12

从数据主权到数据确权:数字时代传媒发展的创新路径

【作者】 杭敏 ;张亦晨 ;

【作者单位】清华大学新闻与传播学院;

【文献来源】中国编辑

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-虚拟经济-NFT

【摘要】数据作为基础生产要素之一,明晰其权利归属已成为构建全球数字治理体系、推动数据要素市场健康发展的重要前提。数据主权聚焦国家层面的数据权属,数据确权则在更广泛的层面上关注数据权利问题。从数据主权到数据确权,是数据治理在权属方面更为基础、更为系统的探讨。在数字时代,传媒发展在国家数据主权、企业商业利益和个人隐私保护等方面均面临确权困境。为此,本文通过梳理数据权属在宏观、中观和微观层面的具体表现来讨论数据确权问题,同时,基于非同质化代币(NFT)等技术逻辑,探索数据确权推动传媒发展的创新路径。

【关键词】数据主权;;数据确权;;数据权属;;传媒发展;;NFT;;数据治理

【文献类型】 观点阐述

【DOI】

【发表时间】2023-01-12

基于区块链的柔性电测量设备检测系统研究

【作者】 文茹馨;宫游;刘惠颖;李兴刚;王晓宇;梁言贺;

【作者单位】国网黑龙江省电力有限公司供电服务中心;

【文献来源】实验技术与管理

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-实体经济-电力领域

【摘要】针对电测量设备在智能检测方面存在的业务流程不统一、检测效率低、管控有盲区等问题,该文设计了一种基于区块链的柔性电测量设备检测系统。系统通过混合遗传算法调度检查流程,设计定制化夹具适应不同检测对象;采用区块链技术建立安全可信、去中心化、防篡改的检测数据溯源体系,实现了检测对象柔性化、检测任务柔性化、检测工序柔性化、检测设备工位柔性化,提高了不同检测对象的检测效率和试验数据信息的管控能力,提高了检测试验室的智能化水平和数据可信度。

【关键词】电测量设备;;柔性检测系统;;区块链;;数据溯源;;系统设计

【文献类型】 理论模型

【DOI】 10.16791/j.cnki.sjg.2022.12.020

【发表时间】2023-01-12

在线标注

备案号: 苏ICP备17025947号-5

评论回复