【影响因子】7.307
【主题类别】
区块链应用-实体经济-数据管理
【Abstract】Materials are the foundation of social development. The vigorous development of big-data technology has brought new opportunities for material research and development, gradually entering the data -driven paradigm. How to safely collect, store and utilize material big-data to realize the design and prediction of advanced materials has essential research significance and value. Many material big-data platforms have been constructed to gather multi-source heterogeneous material data. However, these traditional platforms are hard to realize the safe and efficient circulation and utilization of data. Relying on the national Materials Genome Engineering (MGE) project, we built a secured big-data sharing platform and proposed corresponding data collection, storage, utilization, and security solutions. On the one hand, the blockchain framework working as a 'middleware' provides a standard application program interface for data interaction between participants, and participants do not need to perceive the underlying system framework; on the other hand, it provides a unified management and security mechanism for the platform. In terms of collection, the dynamic container model is used to solve the data normalization problem, thereby improving data quality. In terms of storage, data adaptors store normalized data in different databases for distributed storage and unified scheduling. The platform provides a unified service gateway to schedule all services for data utilization. The secured big-data sharing platform can improve data utilization, promote material data sharing, accelerate material discovery, and serve the data needs of high-throughput computing and the design of new materials. (c) 2022 Elsevier B.V. All rights reserved.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Materials genome engineering; Big data; Data sharing; Blockchain; Merkle Patricia Tree; Secure multi-party computation
【发表时间】2023
【收录时间】2023-02-23
【文献类型】 理论模型
【影响因子】7.180
【主题类别】
区块链应用-实体经济-可持续发展领域
【Abstract】The role of new technologies such as additive manufacturing and blockchain technology in designing and implementing circular economy ecosystems is not a trivial issue. This study aimed to understand if blockchain technology can be an enabler tool for developing additive symbiotic networks. A real case study was developed regarding a circular economy ecosystem in which a fused granular fabrication 3D printer is used to valorize polycarbonate waste. The industrial symbiosis network comprised four stakeholders: a manufacturing company that produces polycarbonate waste, a municipality service responsible for the city waste management, a start-up holding the 3D printer, and a non-profit store. It was identified a set of six requirements to adopt the blockchain technology in an additive symbiotic network, bearing in mind the need to have a database to keep track of the properties of the input material for the 3D printer during the exchanges, in addition to the inexistence of mechanisms of trust or cooperation between well-established industries and the additive manufacturing industry. The findings suggested a permissioned blockchain to support the implementation of the additive symbiotic network, namely, to enable the physical transactions (quantity and quality of waste material PC sheets) and monitoring and reporting (additive manufacturing technology knowledge and final product's quantity and price).Future research venues include developing blockchain-based systems that enhance the development of ad-ditive symbiotic networks.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Circular economy; Industrial symbiosis; Additive manufacturing; Blockchain technology; Circular economy ecosystems; Case study
【发表时间】2023
【收录时间】2023-02-23
【文献类型】 观点阐述
【Author】 Taloba, Ahmed I. Elhadad, Ahmed Rayan, Alanazi Abd El-Aziz, Rasha M. Salem, Mostafa Alzahrani, Ahmad A. Alharithi, Fahd S. Park, Choonkil
【影响因子】6.626
【主题类别】
区块链应用-实体经济-医疗领域
【Abstract】Blockchain technology must have sparked widespread interest, applications associated with data monitoring, banking sectors, computer security, the Internet of Things, and food chem-istry to the healthcare sector and cognitive science. The use of multimedia in the healthcare archi-tecture also allows for the storage, processing and transmission of patient information in a wide range of formats such as images, text and audio over the Internet using various smart particles. However, managing large amounts of data, including findings and images of each individual, increases human effort and increases protection risks. In this paper, to address these problems by using IoT in healthcare improves the performance of patient care while lowering costs by effi-ciently distributing healthcare resources. Nevertheless, various attackers can cause a variety of risks in IoT devices. To avoid these problems, Blockchain technology has been identified as the most effective method for maintaining the secrecy and security of control systems in real-time. This should provide a security architecture for healthcare multimedia content using blockchain technol-ogy by producing the hash of every information so that any transition or modification in informa-tion, as well as any breaches of medicines, would be evidenced across the whole blockchain platform. (c) 2022 THE AUTHORS. Published by Elsevier BV on behalf of Faculty of Engineering, Alexandria University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/ licenses/by-nc-nd/4.0/).
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Multimedia; Data processing; Internet of Things (IoT); Healthcare system; Data security
【发表时间】2023
【收录时间】2023-02-23
【文献类型】 理论模型
【影响因子】6.348
【主题类别】
区块链应用-实体经济-电力领域
【Abstract】Social Internet of Vehicles (SIoV) falls under the umbrella of social Internet of Things (IoT), where vehicles are socially connected to other vehicles and roadside units that can reliably share information and services with other social entities by leveraging the capabilities of 5G technology, which brings new opportunities and challenges, e.g., collaborative power trading can address the mileage anxiety of electric vehicles. However, it relies on a trusted central party for scheduling, which introduces performance bottlenecks and cannot be set up in a distributed network, in addition, the lack of transparency in state-of-the-art Vehicle-to-Vehicle (V2V) power trading schemes can introduce further trust issues. In this paper, we propose a blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social vehicular networks that uses a distributed market mechanism to introduce trusted power trading and avoids the dependence on a centralized dispatch center. Based on the game theory, we design the pricing and trading matching mechanism for V2V power trading to obtain maximum social welfare. We use blockchain to record power trading data for trusted pricing and use smart contracts for transaction matching. The simulation results verify the effectiveness of the proposed scheme in improving social welfare and reducing the load on the grid.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Social internet of vehicles; Blockchain; Collaborative power trading; Vehicle-to-vehicle charging; 5G
【发表时间】2022
【收录时间】2023-02-23
【文献类型】 实验仿真
【影响因子】4.255
【主题类别】
区块链应用-实体经济-网安领域
【Abstract】Network security has benefited from intrusion detection, which may spot unexpected threats from network traffic. Modern methods for detecting network anomalies typically rely on conventional machine learning models. The human construction of traffic features that these systems mainly rely on, which is no longer relevant in the age of big data, results in relatively low accuracy and certain exceptional features. A storage authentication and access control model based on Interplanetary File System (IPFS) and a network intrusion detection system based on Chronological Anticorona Virus Optimization are hence the main goals of this research (CACVO-based DRN).The setup, user registration, initialization, data encryption and storage, authentication, testing, access control, and decryption stages are used here to perform the blockchain authentication and access control. After then, DRN is used to perform network intrusion detection. To do this, the recorded data log file is initially sent to the feature fusion module, which uses Deep Belief Network and hybrid correlation factors (DBN). After the feature fusion is complete, the proposed optimization technique, CACVO, which was recently developed by fusing the Chronological Concept with Anti Corona virus Optimization (ACVO) algorithm, is used to perform intrusion detection utilizing DRN. The experimental outcome shows that, based on the f-measure value of 0.939 and 0.938, respectively, the developed model achieved greater performance.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Deep belief network; Deep residual network; Chronological concept; Anti coronavirus optimization; Intrusion detection
【发表时间】2023
【收录时间】2023-02-23
【文献类型】 理论模型
【影响因子】3.476
【主题类别】
区块链应用-实体经济-建筑领域
区块链技术-协同技术-物联网
【Abstract】Because of the rising population density, relationships are necessary to raise living standards through sending and receiving a wide range of services. Because of this, many means of object communication-regardless of their nature-are necessary to meet our daily needs. IoT is a network of physical things integrated with sensors, and software to communicate with each other. To establish a good connection, every object considered to be an associate of another object should meet certain requirements including scalability, interoperability, and trustworthiness. IoT security is a challenging task to protect the hardware and networks in the IoT system and a significant constraint to the deployment and realization of IoT. IoT security may include data confidentiality, authentication, access control, anonymity, and trust among services and products. Exchanging trust information is critical for assessing an entity's trustworthiness. Therefore, trust information must be shared and stored securely to ensure reliability, honesty, and safety. We propose a secure trust management scheme built on blockchain technologies to secure the entire system in transparency, traceability, and material integrity. We implement a blockchain-based trust management architecture for smart buildings that collect node trust proof. It assigns a trust score to each node, securely stores them in an array, then the threshold value is computed using the ID3 Algorithm. IoT threshold value is broadcasted into the blockchain network and stored in the trusted list. According to the findings, our approach encompasses security measures such as tamper-proofing, attack resistance, reliability, and low functionality for IoT in smart buildings.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Smart buildings; Internet of Things; Blockchains; Peer-to-peer computing; Security; Trust management; IoT security; block chain; smart building; trust management
【发表时间】2023
【收录时间】2023-02-23
【文献类型】 理论模型
【影响因子】3.476
【主题类别】
区块链应用-实体经济-其他
【Abstract】The blockchain paradigm and its application of Distributed Ledger Technology (DLT) are now enabling technologies for the worldwide development of trustworthy and decentralized solutions. DLT offers enormous potential to accommodate the intricate architectural patterns of individual Distributed Information Systems (DIS). Despite its immense potential, the current research effort is not focused on deploying DLT inside the DIS area. We identified sixteen essential DIS Architectural Properties (APs) that offer issues for DIS system architects using Grounded Theory. Then, we assessed the capabilities of the major DLT platform and highlighted its prospects and limits with regard to supporting DIS APs. Using the meta-analysis research technique, we demonstrated that DLT might serve as a development platform for a blockchain-native DIS (BN-DIS) that enables design and development processes. A BN-DIS utilizes DLT infrastructure and blockchain design principles to expand internationally, support thousands of distributed nodes, and employ DIS APs unique to the Blockchain. Lastly, we give a case study illustrating how DLT handles DIS APs in a real-world context, giving empirical proof of the DLT's efficacy in servicing DIS APs.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Distributed ledger; Blockchains; Distributed information systems; Peer-to-peer computing; Organizations; Computer architecture; Distributed ledger technology; blockchain; distributed information systems; permissioned blockchain
【发表时间】2023
【收录时间】2023-02-23
【文献类型】 理论模型
【Author】 Waseem, Muhammad Adnan Khan, Muhammad Goudarzi, Arman Fahad, Shah Sajjad, Intisar Ali Siano, Pierluigi
【影响因子】3.252
【主题类别】
区块链应用-实体经济-电力领域
【Abstract】Smart grid integrates computer, communication, and sensing technologies into existing power grid networks to achieve significant informatization-related advantages. It will provide communication between neighbors, localized management, bidirectional power transfer, and effective demand response. Smart grids (SG) replace conventional grids by integrating various operational measures, including smart automation appliances, smart meters, and renewable energy sources. Regarding energy management and resolving energy issues, SG is one of the most cutting-edge and potentially game-changing innovations. Even still, its complexity suggests that decentralization may provide significant gains. Because of its increasing digitization and interconnectedness, it is also vulnerable to cyber threats. Blockchain, in this sense, is a potential SG paradigm solution that provides several great benefits. Even though blockchains have been widely discussed to decentralize and strengthen smart grid cybersecurity, they have not yet been researched in depth from an application and architectural standpoint. Blockchain-enabled SG applications are the subject of an in-depth research investigation. Electric vehicles (EVs), home automation, energy management systems, etc., are only a few of the many examples that have prompted the proposal of blockchain designs for their respective use cases. Information communication network security is of paramount importance. However, this evolving system raises cybersecurity issues. This paper aims to guide researchers in the right manner so they may build blockchain-based, secure, distributed SG applications in the future. This article also summarizes cybersecurity threats pertaining to smart grids. It starts with a description of a blockchain followed by the blockchain infrastructure, challenges, and solutions for different smart grid applications. A look back at the tried-and-true methods of securing a power grid is offered, and then it discusses the newer and more complex cybersecurity threats to the smart grid. In addition, models of common cyberattacks are presented, and the methods of defense against them are examined.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】smart grid; blockchain; cybersecurity; home automation; energy management; electric vehicles; cyberattacks; denial-of-service (DoS) attack
【发表时间】2023
【收录时间】2023-02-23
【文献类型】 理论模型
【DOI】 10.3390/en16020820
【Author】 Kirkwood, Jeffrey West
【影响因子】1.944
【主题类别】
区块链技术-核心技术-共识机制
【Abstract】
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2022
【收录时间】2023-02-23
【文献类型】 观点阐述
【DOI】 10.1086/717303
【Author】 Vasukidevi, G. Sethukarasi, T.
CCF-C
【影响因子】1.859
【主题类别】
区块链技术-协同技术-云存储
【Abstract】A cloud storage system is a system that saves information for an individual or company. The cloud system enables the owner of data to control and share his or her information with specific users. Because of the irrevocable consequences of inaccurate information, the integrity or interfere resistance characteristic is critical for cloud systems. Owing to its immutability and irreversibility, blockchain technology has emerged as a viable solution. Unfortunately, significant technological hurdles remain, such as limited storage, privacy concerns, irrevocable permission, poor performance, and high energy usage. The goal of this study is to address these blockchain disadvantages and offer a blockchain-based cloud storage paradigm. To ensure tamper resistance, the suggested model is designed with blockchain technology. To protect privacy, the master-key exchange method and other cryptographic approaches are used. Perfectly fine and dynamic access control, consent that may be revoked, integrity, and fraud resistance are all features of the proposed paradigm. A thorough security study demonstrates that this proposed paradigm is prove that its secure in terms of confidentiality and fraud resistance. The performance study reveals that this research methodology outperforms the existing technique in the literature in terms of overall performance.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; cloud storage; cryptographic; privacy concerns
【发表时间】
【收录时间】2023-02-23
【文献类型】 实验仿真
【Author】 Rekha, H. Siddappa, M.
CCF-C
【影响因子】1.859
【主题类别】
区块链技术-协同技术-物联网
【Abstract】With IoT development, safety attacks are growing gradually as well. Numerous centralized attack-detecting schemes were developed for detecting IoT attacks namely, ML and DL schemes, which classify it as normal or attack. However, because to the various requirements of IoT devices, the most of the plans fall short of achieving noticeable results. In this study, a blockchain method is used to construct a novel attack-detecting scheme for IOT. Here, a system using blockchain is employed to process information in a logical sequence. At first, enhanced data normalization is deployed. Then, the features like "Exponential Moving Average, improved Holoentropy, higher-order statistical features, and mutual information" are extracted. Then feature selection is done via Improved Principal Component Analysis. The selected traits are evaluated "hybrid classification that includes Gated Recurrent Unit and Deep Belief Network" to discover the attacks in IoT. Finally, the advancements of this work are established over others. The proposed HC(GRU + DBN) scheme has attained higher accuracy of 97.2% for the best case of 92%,91%,94%,84%, and 92% to current schemes like SVM, RF, RNN, LSTM, and NB.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; hybrid classification; improved holoentropy; IoT; IPCA
【发表时间】
【收录时间】2023-02-23
【文献类型】 实验仿真
【影响因子】0.000
【主题类别】
区块链技术-协同技术-边缘计算
【Abstract】With the rapid growth of smart mobile devices, the limited resources and computing performance of mobile devices might increase the delay of processing tasks, resulting in greater energy and cost consumption by terminal devices. This study aimed to focus on the balance of delay and energy consumption in the mobile edge environment, considering the impact of computationally intensive network interference on system performance under blockchain and proposed a joint optimization algorithm for computing offloading and resource allocation of adaptive data block size in the edge environment. First, a computing offloading model and a communication model were established, and the problem model was optimized on that basis. Second, the incentive mechanism of a virtual currency based on blockchain was introduced, and a coordinate descent method was used to formulate the offloading decision of adaptive data block size. Then, a subchannel allocation was based on the improved Hungarian algorithm and the greedy algorithm while satisfying the user delay constraint. Finally, energy minimization problems were converted into power minimization problems, then into a convex optimization problem, and finally into the user's optimal transmit power. Experimental results showed that compared with similar computing offloading algorithms, the proposed offloading decision could reduce the energy consumption of the system while satisfying different time delay requirements of the users and improving the system performance.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】mobile edge computing; blockchain; offloading decision; adaptive data block size; resource allocation
【发表时间】2022
【收录时间】2023-02-23
【文献类型】 实验仿真
【Author】 Ghosh, Uttam Tosh, Deepak Qureshi, Nawab Muhammad Faseeh Bashir, Ali Kashif Pathan, Al-Sakib Khan Ning, Zhaolong
【影响因子】0.000
【主题类别】
区块链技术-协同技术-软件工程
【Abstract】
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2022
【收录时间】2023-02-23
【文献类型】 观点阐述
【DOI】 10.3390/fi14120382
【影响因子】0.000
【主题类别】
区块链治理-市场治理-数字货币
【Abstract】The purpose of this study is to investigate the salient factors that influence Indonesian cryptocurrency owners in making their investment decision. This study employs intergroup bias, subjective norms, overborrowing, and spending control to explain cryptocurrency investment behavior. The questionnaire was collected from 309 respondents from the five largest internet user areas: Jakarta, Surabaya, Bandung, Semarang, and Medan. This study executes the research framework using binary logistic regression. The results reveal that intergroup bias and overborrowing are the most impulsive factors contributing to the cryptocurrency investment decisions over the past year. Furthermore, after November 2021, Indonesian crypto owners are more irrational in a bearish period since their investment decisions are driven by their desire to be accepted in the social group. Moreover, when they have overindebtedness, instead of solving their debt problems, they prefer to spend their money on cryptocurrency investments. The subjective norms' influencers suggest that crypto owners not invest when the cryptocurrency price is sharply declining. The findings contribute to the dual-systems perspective and social contagion theories, enriching the empirical study regarding investment behavior.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】cryptocurrency; intergroup bias; subjective norms; self-control; overborrowing; spending control; survey
【发表时间】2023
【收录时间】2023-02-23
【文献类型】 实证数据
【DOI】 10.3390/risks11010017
【作者】 崔金栋;包晨瑞;周念成;
【作者单位】东北电力大学;重庆大学;
【文献来源】情报科学
【复合影响因子】3.367
【综合影响因子】2.220
【主题类别】
区块链应用-实体经济-电力领域
【摘要】【目的/意义】伴随着新型电力系统的推进,电能质量问题日益复杂且多变,电能质量数据精准溯源的重要性日渐凸显,高效稳定的配电网电能质量数据存储与溯源方法已成为目前亟待解决的技术难题。【方法/过程】本研究以配电网电能质量数据为研究对象,对配电网电能质量数据与联盟链技术的融合机理进行分析,并结合联盟链和云计算技术构建基于联盟链的配电网电能质量数据存储与溯源模型,阐述该模型的运行机理;最后借助python、remix等开发工具进行仿真验证。【结果/结论】结果表明,本研究所提出的方案相较于同类型的传统中心化系统和常规区块链系统,在实现电能质量数据高效存储和溯源的同时,能有效降低系统时延性,提升电能质量数据的质量。【创新/局限】但随着信息库的积累,在运用联盟链技术处理配电网电能质量数据时,各环节的处理效率会存在限制,后续仍需进行不断提升。
【关键词】联盟链;;配电网;;电能质量;;数据存储;;信息溯源
【文献类型】 理论模型
【发表时间】2023-02-23
【作者】 鲍锋;李羿;
【作者单位】吉林大学社会科学研究院;
【文献来源】情报科学
【复合影响因子】3.367
【综合影响因子】2.220
【主题类别】
区块链应用-实体经济-其他
【摘要】【目的/意义】为提升科研信息共享效果,研究基于区块链技术的科研信息共享平台构建与运行机制。【方法/过程】首先利用区块链共同记账技术完成科研信息共享,再通过科研信息解密中心提供公私钥,解密打包科研信息,提升科研信息共享的安全性,其次利用基于ITPBFT共识机制,令区块链内各节点科研信息达成共识,然后利用区块链技术,构建科研信息共享平台,最后通过开放获取、整合共享、服务对接与绩效评价四个方面,设计科研信息共享平台服务模式运行机制,提升平台服务效果。【结果/结论】基于区块链技术的科研信息共享平台可有效共享科研信息,具备较强的恶意攻击抵御能力与较高的科研信息共享安全性,且共享服务效果较优。【创新/局限】运用区块链技术实现科研信息共享,提升科研信息的综合利用率,科研信息共享平台,对于科技创新具有重大意义。
【关键词】区块链技术;;科研信息;;共享平台;;运行机制;;共识机制;;开放获取
【文献类型】 理论模型
【发表时间】2023-02-23
【作者】 罗俊;
【作者单位】武汉大学社会发展研究所;
【文献来源】学术论坛
【复合影响因子】2.443
【综合影响因子】1.293
【主题类别】
区块链应用-虚拟经济-元宇宙
【摘要】元宇宙被业界认为是互联网与数字经济的新风口,但迄今对元宇宙究竟是什么仍没有一个统一的界定,对于其价值也是看法不一。通过对2021年以来元宇宙发展脉络的梳理,可以发现其概念泛化的原因,在此基础上不难正确认识其本质和特征。元宇宙可能将成为人类社会有史以来最大的人工信息系统,它通过把扩展现实、数字孪生等3D技术与其他新兴信息通信技术相结合的集成式创新,实现互联网/移动互联网众多应用场景的升级,将在经济社会的众多领域产生重大而深远的影响,具有极为广阔的发展前景。但元宇宙要真正成形、成熟还要经历一个相当长的过程,而技术与应用两个赛道的竞争将贯穿于这一过程。在对元宇宙展开布局时,应准确辨识能够在未来竞争中决定主导权归属的关键性技术赛道,以及能够塑造国家核心竞争力的关键性应用赛道,才能选择合理高效的发展路径。同时,需要对元宇宙可能带来或使得加剧的各种社会风险进行前瞻性研究,以提前在技术规则、治理对策等方面未雨绸缪,避免将来陷入仓促应对的被动局面。
【关键词】元宇宙;;新兴信息通信技术;;扩展现实;;数字孪生;;数字经济;;数实融合;;技术异化;;社会风险
【文献类型】 观点阐述
【发表时间】2023-02-23
【作者】 王军;
【作者单位】郑州航空工业管理学院;河南日报社;
【文献来源】新闻爱好者
【复合影响因子】1.116
【综合影响因子】0.531
【主题类别】
区块链应用-虚拟经济-元宇宙
区块链应用-实体经济-传媒领域
【摘要】元宇宙是通过一系列技术集构建虚拟世界从而赋能现实世界最终达到虚实融生、虚实共生的社会状态;它联通现实世界与网络虚拟空间,在万物互联的基础上,建构全新的、沉浸式的未来人类社会的生态蓝图。基于元宇宙技术集的智慧媒体发展方向、技术框架、技术特征、应用场景等方面,为构建智慧媒体发展新路径提出新方法。
【关键词】智慧媒体;;元宇宙;;技术引擎;;人工智能
【文献类型】 理论模型
【发表时间】2023-02-23