• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2023年01月19日 11篇

文献来源

  • 8
  • 3

主题分类

      • 1
      • 1
      • 1
      • 2
      • 1
      • 1
      • 2
      • 1
      • 1

文献类型

  • 8
  • 1
  • 2
筛选
订阅
<< 前一天 后一天 >>

Trustworthy and Efficient Crowdsensed Data Trading on Sharding Blockchain

【Author】 Wang, En Cai, Jiatong Yang, Yongjian Liu, Wenbin Wang, Hengzhi Yang, Bo Wu, Jie

【影响因子】13.081

【主题类别】

区块链技术-核心技术-扩展方案

【Abstract】With the development of communications, networking, and information technology, Crowdsensed Data Trading (CDT) becomes a novel data trading paradigm. In CDT, the data requesters publish crowdsensing tasks with specific data requirements, and then workers complete these tasks, upload the data and obtain corresponding rewards. To efficiently deal with data trading, most of the existing CDT systems assume a trusted centralized platform. However, we argue that the platform may collude with workers or requesters to trick others for achieving more benefits. For example, according to the workers' uploaded data, the platform can modify the reward functions by colluding with the requester. Similarly, the platform might collude with workers to let them know the reward function, then workers could forge data. Meanwhile, requesters and workers may also be malicious. For example, requesters may post tasks but fail to pay and workers can upload wrong data to mislead the system. To solve the above problems, we combine the Crowdsensed Data Trading system with intelligent Blockchain (CDT-B), which contains a smart contract called CDToken. As a credible third-party, the CDToken is used to record the requesters' reward function and workers' data uploading function to avoid targeted trick. At the same time, we not only design a Data Uploading and Preprocessing (DUP) mechanism in CDToken to collect and process the workers' sensed data, but also propose a Grouping Truth Discovery (GTD) to evaluate their data quality for determining the payments. Moreover, to hold a large number of requesters and workers in CDT-B, we propose a Layered Sharding blockchain based on Membership Degree (LSMD) to solve the blockchain inefficiency problem. Finally, we deploy CDToken to an experimental environment based on Ethereum and demonstrate its efficient performance and practicability.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Intelligent blockchain; crowdsensed data trading; truth discovery; sharding

【发表时间】2022

【收录时间】2023-01-19

【文献类型】 理论模型

【DOI】 10.1109/JSAC.2022.3213331

A Tree Augmented Naive Bayes-based methodology for classifying cryptocurrency trends

【Author】 Dag, Ali Dag, Asli Z. Asilkalkan, Abdullah Simsek, Serhat Delen, Dursun

【影响因子】10.969

【主题类别】

区块链治理-市场治理-数字货币

【Abstract】As the popularity of blockchain technology and investor confidence in Bitcoin (BTC) increased in recent years, many individuals started making BTC and other cryptocurrency investments, in expectation of high returns. However, as recent market movements have shown, the lack of regulation and oversight makes it difficult to guard against high volatility and potentially significant losses in this sector. In this study, we propose a datadriven Tree Augmented Naive (TAN) Bayes methodology that can be used for identifying the most important factors (as well as their conditional, interdependent relationships) influencing BTC price movements. As the model is parsimonious without sacrificing accuracy, sensitivity, and specificity-as evident from the average accuracy value-the proposed methodology can be used in practice for making short-term investment decisions.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Price Prediction; Bitcoin; Cryptocurrency; Business Analytics; Tree Augmented Na?ve Bayes

【发表时间】2023

【收录时间】2023-01-19

【文献类型】 理论模型

【DOI】 10.1016/j.jbusres.2022.113522

The weighted Bitcoin Lightning Network

【Author】 Lin, Jian-Hong Marchese, Emiliano Tessone, Claudio J. Squartini, Tiziano

【影响因子】9.922

【主题类别】

区块链应用-虚拟经济-虚拟货币

【Abstract】The Bitcoin Lightning Network (BLN) was launched in 2018 to scale up the number of transactions between Bitcoin owners. Although several contributions concerning the analysis of the BLN binary structure have recently appeared in the literature, the properties of its weighted counterpart are still largely unknown. The present contribution aims at filling this gap, by considering the Bitcoin Lightning Network over a period of 18 months, ranging from 12th January 2018 to 17th July 2019, and focusing on its weighted, undirected, daily snapshot representation - each weight representing the total capacity of the channels the two involved nodes have established on a given temporal snapshot. As the study of the BLN weighted structural properties reveals, it is becoming increasingly `centralized' at different levels, just as its binary counterpart: (1) the Nakamoto coefficient shows that the percentage of nodes whose degrees/strengths `enclose' the 51% of the total number of links/total weight is rapidly decreasing; (2) the Gini coefficient confirms that several weighted centrality measures are becoming increasingly unevenly distributed; (3) the weighted BLN topology is becoming increasingly compatible with a core-periphery structure, with the largest nodes `by strength' constituting the core of such a network, whose size keeps shrinking as the BLN evolves. Further inspection of the resilience of the weighted BLN shows that removing such hubs leads to the network fragmentation into many components, an evidence indicating potential security threats - as the ones represented by the so called `split attacks'.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain-based systems; Bitcoin Lightning Network; Null models; Centralization; Core-periphery

【发表时间】2022

【收录时间】2023-01-19

【文献类型】 理论模型

【DOI】 10.1016/j.chaos.2022.112620

Hedging with automatic liquidation and leverage selection on bitcoin futures

【Author】 Alexander, Carol Deng, Jun Zou, Bin

【影响因子】6.363

【主题类别】

区块链治理-市场治理-数字货币

【Abstract】Bitcoin derivatives positions are maintained with a self-selected margin, which is often too low to avoid automatic liquidation by the exchange, without notice, especially during periods of excessive volatility. In-deed, according to CryptoQuant, almost $80 billion of positions on centralised exchanges were liquidated during 2021, that is an average of over $200 million per day. So hedgers of bitcoin price risk should ac-count for the possibility of automatic liquidation when taking positions on bitcoin futures. We derive a semi-closed form for an optimal hedging strategy with dual objectives - to minimize both the variance of the hedged portfolio and the probability of liquidation due to insufficient collateral. The solution depends on the statistical characteristics of the spot and futures extreme returns, and other parameters that char-acterize the hedger by choice of leverage, loss aversion and collateral management. An empirical analysis based on minute-level data compares the performance of the major direct and inverse bitcoin hedging instruments traded on five major exchanges.(c) 2022 The Author(s). Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license ( http://creativecommons.org/licenses/by-nc-nd/4.0/ )

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Finance; Cryptocurrency; Leverage; Liquidation; Perpetual swap

【发表时间】2023

【收录时间】2023-01-19

【文献类型】 实验仿真

【DOI】 10.1016/j.ejor.2022.07.037

RealPrice: Blockchain-Powered Real-Time Pricing for Software-Defined Enabled Edge Network

【Author】 Oktian, Yustus Eko Le, Thi-Thu-Huong Jo, Uk Kim, Howon

【影响因子】3.847

【主题类别】

区块链应用-实体经济-计算机网络

【Abstract】With the limited Internet bandwidth in a given area, unlimited data plans can create congestion because there is no retribution for transmitting many packets. The real-time pricing mechanism can inform users of their Internet consumption to limit congestion during peak hours. However, implementing real-time pricing is opex-heavy from the network provider side and requires high-integrity operations to gain consumer trust. This paper aims to leverage the software-defined network to solve the opex issues and blockchain technology to solve trust issues. First, the network congestion level in a given area is analyzed. Then, the price is adjusted accordingly. Devices that send a lot of traffic during congestion will be charged more expensive bills than if transmitting traffic during an off-peak period. To prevent over-charging, the consumers can pre-configure a customized Internet profile stating how many data bytes they are willing to send during congestion. The software-defined controller also authenticates consumers and checks whether they have enough token deposits in the blockchain as Internet usage fees. We implement our work using Ethereum and POX controllers. The experiment results show that the proposed real-time pricing can be performed seamlessly, and the network provider can reap up to 72.91% more profits than existing approaches, such as usage-based pricing or time-dependent pricing. The fairness and trustability of real-time pricing is also guaranteed through the proof-of-usage mechanism and the transparency of the blockchain.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】real-time pricing; software-defined network; blockchain; smart contract

【发表时间】2022

【收录时间】2023-01-19

【文献类型】 理论模型

【DOI】 10.3390/s22249639

A secure and efficient multi-domain data sharing model on consortium chain

【Author】 Zhang, Wenbo Huo, Xiaotong Bao, Zhenshan

【影响因子】2.557

【主题类别】

区块链技术-协同技术-数据管理

【Abstract】In a large-scale networking scenario with massive distribution of devices, data are independently generated and maintained by multiple domains. To solve the problem of isolated data islands in multi-domain, this paper designs a multi-domain data sharing model based on consortium chain. Aiming at the problems of low efficiency and lack of consideration of intra-domain consensus processes in traditional data sharing schemes, this paper optimizes the security and efficiency of data sharing from two parts: inter-domain chain and intra-domain chain. To ensure fine granularity, flexibility and security of the access control process in inter-domain chain, this model combines the Attribute-Based Access Control (ABAC) with smart contract, and a permission grading mechanism is designed to solve the problem of low retrieval efficiency in this access control model through reducing the retrieval range by grading and matching Policy set. Considering the problem of high delay of node consensus in the large-scale networking environment of intra-domain chain, a layered practical Byzantine fault tolerance optimization (LPBFT) algorithm with introducing a reputation model is designed, which greatly improves the efficiency and security of the intra-domain consensus. The consortium chain model is designed and implemented from the perspectives of inter-domain and intra-domain, which optimized the security and efficiency of the multi-domain data sharing model. Finally, a prototype system is implemented based on Hyperledger Fabric, and the validity of the model is verified from the aspects of inter-domain access control and intra-domain consensus algorithm.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Data sharing; Multi-domain; Consortium chain; Consensus; Access control

【发表时间】

【收录时间】2023-01-19

【文献类型】 理论模型

【DOI】 10.1007/s11227-022-05010-4

Metaverse-Flight From Dusk to Darkness?

【Author】 Gurov, Oleg N.

【影响因子】0.000

【主题类别】

区块链应用-虚拟经济-元宇宙

【Abstract】The article studies the phenomenon of the metaverses, that is, projects developed by technology companies, where physical, virtual and augmented (extended) realities are brough together in digital space. Apologists for the metaverses argue that soon the Internet will cease to exist in the usual sense, and its place will be taken by the metaverses as global virtual spaces for communication, work, and leisure. This vision is compared with the concept of the Panopticon, formulated by Jeremy Bentham and subsequently interpreted by Michel Foucault. The growing dependence of the state, the society, and the individual on technology and their increasing interconnection forms a set of problems with an ever increasing acuteness, yet no obvious solution has been found so far. The article demonstrates how technology manipulates human weaknesses, increasing its power and gaining control over society. Among the major risks related to the metaverses are the decay of values and morality in the virtual world, and the collapse of the individual's identity. Possible scenarios of interaction between human and technology are illustrated by Tarkovsky's Solaris, Cronenberg's Videodrome, and Folman's Congress. The study ends with an assumption that a new socio-humanitarian rationality must be formed to enable control over the logic of the development of tech companies promoting the metaverses.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】metaverse; singularity; digital technologies; metaverse; rectitude; morality; metaparasite

【发表时间】2022

【收录时间】2023-01-19

【文献类型】 观点阐述

【DOI】 10.30628/1994-9529-2022-18.1-11-46

Iraqi E-Voting System Based on Smart Contract Using Private Blockchain Technology

【Author】 Jumaa, Maral Hassan Shakir, Ahmed Chalak

【影响因子】

【主题类别】

区块链应用-实体经济-投票领域

【Abstract】In democratic societies including Iraq, electronic voting (e-voting) is an available option as a viable voting system. This system is more economically advisable than face-to-face voting by eliminating the need to pay poll staff. It may also make voting more accessible to the population with impairments and those living overseas. This study will propose an e-voting system based on smart contracts by using a decentralized private Blockchain. The proposed e-voting system will provide transparency, accuracy, fairness, eligibility, anonymity, verifiability, and immutability. This research proposed the most secure way of voting with the help of Blockchain using a mobile application that can be used to implement a large-scale solution and is cost-effective. The Blockchain-based system has been designed in conjunction with the existing ECC cryptosystem to assure the dependability, anonymity, and security of votes and voters. The system that has been developed can be used to properly conduct elections, using a quick response code (QR Code), face recognition, and fingerprint for identification before casting a ballot to ensure eligibility. This results in using mobile smartphones in the voting process where voters can observe the transparency of their votes. Furthermore, eliminates the possibility of fraud and manipulation of the votes made due to the used blockchain for secure storage.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】e-voting; private blockchain; ECC; QRcode; smart contract

【发表时间】2022

【收录时间】2023-01-19

【文献类型】 理论模型

【DOI】 10.31449/inf.v46i6.4241

基于联盟链的工业物联网数据存储模型研究

【作者】 翟社平;刘法鑫;杨锐;廉佳颖;

【作者单位】西安邮电大学计算机学院;西安邮电大学陕西省网络数据分析与智能处理重点实验室;

【文献来源】计算机应用研究

【复合影响因子】1.888

【综合影响因子】1.138

【主题类别】

区块链技术-协同技术-物联网

【摘要】由于工业物联网数据具备较强的私密性,数据是否能够安全存储成为工业物联网发展的关键问题。针对这一问题,提出一种基于联盟链的工业物联网数据存储模型。为保证数据存储的效率与安全,首先在原有PBFT算法的基础上搭建节点状态信用评估模型同时增加投票机制。其次结合节点状态在SM9数字签名算法中设置多密钥生成中心共同参与密钥生成。对模型的吞吐量、共识时延及通信开销进行实验分析,实验结果表明,该模型相较于传统模型在数据存储方面,安全性得到了进一步保障,降低黑客攻击并防止数据泄露或被窜改,并在通信开销方面提升了40%。

【关键词】区块链;;工业物联网数据;;数字签名;;实用拜占庭容错算法(PBFT);;SM9算法

【文献类型】 理论模型

【DOI】 10.19734/j.issn.1001-3695.2022.10.0539

【发表时间】2023-01-19

基于区块链的可信SOA架构

【作者】 陈艳;林兵;陈晓娜;陈星;

【作者单位】福州大学计算机与大数据学院;福建省网络计算与智能信息处理重点实验室;福建师范大学物理与能源学院;

【文献来源】计算机科学

【复合影响因子】1.722

【综合影响因子】1.149

【主题类别】

区块链应用-实体经济-计算机网络

【摘要】在传统服务架构(Service-Oriented Architecture, SOA)中,Web Service提供者将其服务描述注册在注册中心,供服务消费者进行服务发现和服务调用。尽管该架构可以提供松散的服务调用,但是缺乏争议解决机制,使得互不信任的服务消费者和提供者之间的服务可信调用得不到保证。区块链技术在去中心化和抗篡改等方面具有显著的优势,可被合理地应用在传统SOA中,以解决服务可信问题。结合传统SOA架构和区块链技术,提出了一种基于区块链的可信SOA架构,实现可信的服务调用。在一次服务可信调用过程中,服务消费者进行参数加密并将其发送给目标服务提供者;服务提供者接收加密参数并对其完成解密;服务提供者完成服务执行并对输出结果完成加密;最后服务提供者在将加密结果发送给服务消费者的同时完成可信凭证的构造与上链。在上述基础上,当发生服务纠纷时,将触发裁决智能合约,正确处理服务纠纷。实验结果表明,与传统的调用相比,所提方法能够在保证大部分服务可信调用时间增长率不大于30%的前提下,正确处理服务提供者和请求者之间的服务纠纷。

【关键词】区块链;;基于区块链的服务描述模型;;可信凭证;;可信调用;;争议解决机制

【文献类型】 理论模型

【DOI】

【发表时间】2023-01-19

沉浸式大学智慧校园的整体实现:理论构建与实践探析

【作者】 钱小龙;宋子昀;黄蓓蓓;

【作者单位】南通大学未来教育研究所;

【文献来源】重庆高教研究

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-实体经济-教育领域

【摘要】伴随教育信息化的深入推进,大学智慧校园蓬勃发展,但教学的智慧性不足等问题还有待解决,而沉浸式大学智慧校园为重塑智慧校园生态带来新的希望。在理论层面,有了建构主义学习理论、具身认知理论和心流理论的加持,能够从外部环境、身体感知和心理状态三个维度为沉浸式大学智慧校园提供指引,进而形成沉浸式大学智慧校园的理论框架。在技术层面,有了扩展现实技术、数字孪生技术和5G技术的驱动,能够为沉浸式大学智慧校园塑造和优化沉浸式体验提供支持。在此基础上,可以构建包含智能感知层、网络通信层、平台能力层、应用服务层、用户交互层、规范标准与评价体系、信息与数据安全保障体系在内的五横两纵式沉浸式大学智慧校园架构模型,为沉浸式大学智慧校园的建设和发展提供实践抓手。在实践层面,通过对菲斯克大学的虚拟现实尸体实验室和莫尔豪斯学院的数字孪生校园两个典型案例的深入分析,为沉浸式大学智慧校园提供示范和佐证,并从教育数字化转型、主体协同化治理、用户沉浸式体验等方面总结两所校园的共性与启示。面向未来,沉浸式大学智慧校园的建设要洞悉技术、理论和实践层面的机遇与挑战,加快谋划与布局。尽管沉浸式大学智慧校园主要侧重于智慧教学的创新,但其为高等教育带来的赋能作用无疑是巨大的。

【关键词】沉浸式大学智慧校园;;智慧校园;;智慧教育;;数字孪生;;扩展现实;;元宇宙;;沉浸式学习

【文献类型】 观点阐述

【DOI】

【发表时间】2023-01-19

在线标注

备案号: 苏ICP备17025947号-5

评论回复