【影响因子】10.884
【主题类别】
区块链应用-实体经济-供应链
【Abstract】This study investigates decision drivers for assimilating blockchain technology in supply chains. The benefits of blockchain accrue when there is collaborative acceptance of supply chain members. We ground our hypotheses in tenets of social network theory to propose that supply chain learning, supply chain collaboration, and network prominence will influence blockchain assimilation by organizations. Based on a cross-sectional group of blockchain users (150 supply chain professionals familiar with blockchain), the study is the first to develop an understanding of behavioral drivers of blockchain assimilation at the organizational level and complements earlier studies focused on the intention to adopt the technology and identification of blockchain benefits. In addition to contributing to a nascent body of literature on the blockchain, we provide psychometrically validated scales for blockchain assimilation and network prominence constructs. The findings have implications for blockchain adoption in supply chain literature.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Supply chain collaboration; Learning; Social network
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 理论模型
【Author】 Yu, Yi Liu, Guo-Ping Hu, Wenshan
【影响因子】10.275
【主题类别】
区块链应用-实体经济-电力领域
【Abstract】DC microgrids with distributed architectures inevitably encounter the threats of communication constraints and cyber attacks, and there is little research to address these two communication irregularities simultaneously. To provide DC microgrids with maximum resistance to communication constraints and cyber attacks, a distributed predictive secure control method based on blockchain protocol is proposed in this paper. The proposed control approach is the first attempt to address cyber attacks with a hybrid of data and models, improving the resilience and robustness of DC microgrids. With the help of practical Byzantine ideas, the proposed strategy preserves the resilience strengths of the blockchain against corruption and discards its shortcomings of low real-time performance, significantly enhancing the security without compromising the dynamic performance of the system by active intervention. Subsequently, a bound on the communication delay induced by the blockchain network under the expected security index is given based on the theoretical analysis. Unlike the existing practice of passively tolerating communication delays and packet dropouts, the predictive control method proposed in this paper actively compensates for them experienced by DC microgrids. Then, an analytical model of the closed-loop DC microgrid system is developed, and stability analysis is presented accordingly. Finally, several experimental tests performed on a PV-based DC microgrid hardware system are presented to demonstrate the effectiveness of the proposed control strategy.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Microgrids; Blockchains; Cyberattack; Predictive control; Delays; DC microgrids; blockchain protocol; communication constraints; networked predictive control; delay compensation; cyber attacks; voltage restoration and current sharing
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 实验仿真
【DOI】 10.1109/TSG.2022.3217807
【Author】 Zhou, Yuanjian Cao, Zhenfu Dong, Xiaolei Zhou, Jun
CCF-C
【影响因子】10.238
【主题类别】
区块链应用-实体经济-车联网
【Abstract】Vehicular social networks (VSNs) are likely to play an increasingly important role of the future smart cities, supporting traffic management, real-time warning, and sharing data (e.g., condition, vehicular, and warning). However, there are existing security and privacy issues with vehicular data, which directly lead to the insufficient utilization of vehicular data. In this article, a blockchain-based lightweight searchable data sharing scheme is presented. Specifically, the proposed protocol achieves efficient data matching and data sharing by uniting the feature of public-key encryption with equality test (PKE-ET) and proxy re-encryption (PRE), meanwhile ensuring reliable matching results by invoking smart contacts. Moreover, a reputation-based dynamic PBFT consensus mechanism is provided. By analyzing the reputation and behavior of the consensus nodes, we further reduce the probability of malicious nodes becoming the consensus nodes, thus decreasing the computing overhead and communication costs in the consensus process. Finally, the security of the proposed protocol is demonstrated based on a computation Diffie-Hellman assumption in the Random Oracle model. According to the performance analysis, it was found that compared to the other protocols, the proposed protocol is computationally lightweight.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Public key; Cloud computing; Encryption; Social networking (online); Software engineering; Vehicular ad hoc networks; Blockchain; data sharable; equality test; lightweight; proxy re-encryption (PRE); vehicular social network (VSN)
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 实验仿真
【Author】 Xu, Hao Fan, Yixuan Li, Wenyu Zhang, Lei
CCF-C
【影响因子】10.238
【主题类别】
区块链应用-实体经济-通信领域
【Abstract】Connected critical autonomous systems (C-CASs) are envisioned to significantly change our life and work styles through emerging vertical applications, such as autonomous vehicles and cooperative robots. However, as the scale of the connected nodes continues to grow, their heterogeneity and cybersecurity threats are more eminent, and conventional centralized communications and decision-making methodology are reaching their limit. This article is the first exploration of a trustworthy and fault-tolerant framework for C-CAS for achieving hyperreliable global decision making in a trustless environment, where the connected sensors/nodes are less reliable due to either communication failure or local decision error (e.g., by sensing algorithm/AI, etc.). The proposed framework is based on two iconic distributed consensus (DC) mechanisms: 1) practical Byzantine fault tolerance (PBFT) and 2) Raft, under the proposed perception-initiative-consensus-action (PICA) protocol with wireless connections among the nodes. We first analytically derived consensus reliability in six different system models. The other fundamental performance metrics, such as the consensus throughput and latency, node scalability, and reliability gain are also analytically derived. These analytical results provide basic design guidelines for wireless DC (WDC) usage in the C-CAS systems. The results show that WDC significantly improves overall system reliability with the increasing number of participating nodes.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Reliability; Wireless communication; Peer-to-peer computing; Protocols; Fault tolerant systems; Sensors; Wireless sensor networks; Autonomous driving; autonomous system; Byzantine fault tolerance (BFT); perception-initiative-consensus-action (PICA); practical Byzantine fault tolerance (PBFT); raft; wireless distributed consensus
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 实验仿真
CCF-C
【影响因子】10.238
【主题类别】
区块链技术-协同技术-物联网
【Abstract】Multidomain Internet of Things (IoT) is faced with serious domain interoperability (DI) and compatibility issues since different intradomain authorization and authentication (A&A) mechanisms are deployed without the consideration of interdomain A&A. This article proposes a blockchain-assisted scheme to achieve flexible intra- and inter-domain A&A simultaneously and seamlessly. Specifically, we first design a contract-based mutual access control agreement on top of a consortium blockchain, where domain managers can manage their access permission without any trusted parties. Based on the agreement, a secure and privacy-preserving authentication protocol is further proposed by tailoring one-out-of-many proof techniques, which enables IoT devices to anonymously access authorized IoT domains. We additionally design a voting-based protocol by using a threshold-based cryptosystem. The protocol allows domain managers to transparently audit resource access with the assistance of the blockchain. Detailed security analysis demonstrates that the proposed scheme achieves the security properties, such as DI, privacy protection, and accountability. Finally, we develop two proof-of-concept prototypes in a physical testbed and virtual machine, respectively, based on an open-source blockchain platform to show our scheme's efficiency in terms of computation and communication overhead.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Internet of Things; Security; Servers; Authentication; Smart contracts; Interoperability; Authorization and authentication (A&A); blockchain; Internet of Things (IoT); intra; inter-domain; privacy protection (PP)
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 实验仿真
【Author】 Choi, Tsan-Ming Sheu, Jiuh-Biing
【影响因子】8.702
【主题类别】
--
【Abstract】Today, ride-hailing platform operations are popular. Facing pandemics (e.g., COVID-19) some customers feel unsafe for the ride-hailing service and possess a "safety risk-averse" (SRA) attitude. The proportion of this type of SRA customers is unfortunately unknown, which makes it difficult for the ride-hailing platform to decide its optimal service price. In this article, understanding that blockchain technology (BT) based systems can help improve market estimation for the proportion of SRA customers, we conduct a theoretical study to explore the impacts that the BT-based system can bring to the platform, customers, and drivers. We consider the case in which the platform is risk-averse (in profit) and serves a market with both SRA and non-SRA customers. We analytically prove that using BT, the optimal service price will be increased and BT is especially helpful for the case with a more risk-averse ride-hailing platform. However, whether it is more or less significant for the more risk-averse SRA customers depends on their degree of risk aversion. We uncover that when the use of BT is beneficial to the customers, it will also be beneficial to the drivers, and vice versa. We derive in closed-form the analytical conditions under which the use of BT can be beneficial to the ride-hailing platform, customers, and drivers (i.e., achieving "all-win"). When all-win cannot be achieved automatically, we explore how governments can provide sponsors to help. We further extend the analysis to consider the general case in which BT incurs both a fixed cost as well as a cost increasing in demand. We prove that the main conclusion remains robust. In addition, we reveal that the required amount of government sponsor to achieve all-win is the same between the two different costing models explored in this article.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Safety; Pandemics; Government; Costs; COVID-19; Blockchains; Biological system modeling; Blockchain; pandemics; platform operations; risk; risk aversion
【发表时间】2023
【收录时间】2023-06-09
【文献类型】
【DOI】 10.1109/TEM.2023.3263854
【Author】 Chen, Wendy D. Murtazashvili, Ilia
【影响因子】8.144
【主题类别】
区块链应用-实体经济-公共管理
【Abstract】Public managers and administrators confront the increasing scale and prevalence of crises. Despite some deployments, blockchain applications by governments for emergency management and response management have only begun to scratch the surface. To facilitate greater awareness of the promises and challenges of blockchain applications to the public sector, we consider the ways in which distributed ledger technologies can improve emergency and crisis management across the dimensions of transparency, public trust, and social equity. The article ends with a call for a public administration research agenda on blockchains for emergency and crisis management.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 观点阐述
【DOI】 10.1111/puar.13647
【Author】 Kumar, Adarsh Ahuja, Neelu Jyothi Thapliyal, Monika Dutt, Sarthika Kumar, Tanesh Pacheco, Diego Augusto De Jesus Konstantinou, Charalambos Choo, Kim-Kwang Raymond
CCF-C
【影响因子】7.574
【主题类别】
区块链应用-实体经济-无人机
【Abstract】Two-thirds of the earth's surface is surrounded by water and the majority of it is still unexplored. The underwater monitoring of the oceans and their surroundings is highly crucial from several perspectives, e.g., to unearth the hidden minerals/oils, to monitor the life of underwater species, military and rescue applications, surveillance of maritime borders, and predict tidal wave behaviors among others. The exploration and inspection activities of the underwater environment are mainly performed remotely by unmanned underwater vehicles or robots because human direct involvement in such a complex environment might not be a feasible option. Moreover, the recent maturity in digital automation and underwater drone technology along with the emergence and improvements in wireless, communication, and sensing technologies had already encouraged the research community to drive deep into this domain. Among several disruptive enabling technologies, Blockchain has emerged as a vital enabling technology to fulfil key requirements for secure data sharing, storage, process tracking, collaboration, and resource management. This study presents a comprehensive review of the utilization of Blockchain in different underwater applications, discussing various use cases along with detailing blockchainbased architectures, potential challenges, solutions, and future research directions. Potential challenges of underwater applications addressed by Blockchain have been detailed. This work identifies knowledge gaps between theoretical research and real-time Blockchain integration in realistic underwater drone applications. The key limitations for effective integration of Blockchain in real-time integration in Unmanned Underwater Drones (UUD) applications, along with directions for future research have been presented.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Data management; Drone design; Privacy; Security; Unmanned underwater drones
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 综述
【影响因子】7.032
【主题类别】
区块链应用-实体经济-供应链
【Abstract】Relationships in multi-tier supply chains (MTSCs) are complex and require constant information sharing. For MTSCs involved in perishable product distribution, blockchain technology (BCT) is one of the most promising technologies that can ensure products' traceability and safety. This study examines a Portuguese MTSC for frozen fish products piloting BCT adoption for its supply chain (SC) practices. The goal is therefore to explore the consequences of information availability inherent for BCT adoption pilots in the SC context. This study follows a mixed-method approach, with qualitative and quantitative data collection techniques. Three semi-structured interviews with players from a single frozen fish SC, including supplier, transporter, and retailer were conducted. MAXQDA Analytics Pro 2022 software was used for further coding and data analysis. An online survey among retail chain consumers was conducted resulting in 112 responses. Regression analysis and Pearson correlation test were further performed via IBM SPSS Statistics software. Data collection for both parts took place between December 2021 and July 2022. This study explores four layers in the SC- including supplier, transporter, retailer and final consumer. Findings revealed a current lack of extensive and detailed information from upper tiers regarding products' characteristics. Despite being hyped as a "trust-enabling" technology, BCT was found not to eliminate the need for trustful relationships between players prior to adoption, as information input requires human intervention. Even in those cases when the traceability option is not of major interest to final consumers, findings revealed a higher probability of purchasing fish products that have traceable information available.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain technology; Multi-tier supply chains; Final consumers; Information sharing; Frozen fish products; Mixed-method approach
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 实证数据
【影响因子】7.032
【主题类别】
区块链应用-实体经济-供应链
【Abstract】With the rapid developments in the field of blockchain technology, the food supply chain has entered the era of blockchain applications for the past few years. Although many publications related to blockchain technology have shown a remarkable impact on the food supply chain, there is no bibliometric report that considers this research trend. The research for this study was carried out from the years 2008 to 2021, with the first paper in this field being published in the year 2016. The research uses multiple databases for data analysis, studying approximately 2637 records to enlighten scholars around the world, and 150 records are finalized for the study. The primary purpose of this study is to conduct a systematic literature review to understand the current research status of blockchain technology in managing and transforming food supply chains and fill the gap. Additionally, bibliometric analysis is utilised with the VOS viewer to visualise, comprehend, and simulate the diverse range of findings in terms of essential authors, authorship pattern, keyword analysis, and blockchain usage pattern in food supply chains. Additionally, the literature also examines the advantages, difficulties and applied blockchain-based models in the food supply chain. The study concludes by outlining research gaps, implications, and future research opportunities. This research will help the students, academicians, and experts to get a complete idea of the development of blockchain in the food supply chain area. The highly cited implementation papers existing in the literature have demonstrated that blockchain could improve transparency, traceability, food safety, and food quality. It is a promising technology to build trust among food supply chain actors. Furthermore, it revealed that blockchain is moving from its nascent stage to maturity stage.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Systematic literature review; Bibliometric analysis; Citation analysis; Food supply chain
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 综述
【Author】 Liu, Jingwei Jiang, Weiyang Sun, Rong Bashir, Ali Kashif Alshehri, Mohammad Dahman Hua, Qiaozhi Yu, Keping
CCF-C
【影响因子】7.021
【主题类别】
区块链应用-实体经济-医疗领域
【Abstract】As an important carrier of healthcare data, Electronic Medical Records (EMRs) generated from various sensors, i.e., wearable, implantable, are extremely valuable research materials for artificial intelligence and machine learning. The efficient circulation of EMRs can improve remote medical services and promote the development of the related healthcare industry. However, in traditional centralized data sharing architectures, the balance between privacy and traceability still cannot be well handled. To address the issue that malicious users cannot be locked in the fully anonymous sharing schemes, we propose a trackable anonymous remote healthcare data storing and sharing scheme over decentralized consortium blockchain. Through an "on-chain & off-chain" model, it relieves the massive data storage pressure of medical blockchain. By introducing an improved proxy re-encryption mechanism, the proposed scheme realizes the fine-gained access control of the outsourced data, and can also prevent the collusion between semi-trusted cloud servers and data requestors who try to reveal EMRs without authorization. Compared with the existing schemes, our solution can provide a lower computational overhead in repeated EMRs sharing, resulting in a more efficient overall performance.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Medical services; Blockchains; Data privacy; Servers; Security; Cloud computing; Privacy; Remote medical data sharing; privacy preservation; blockchain; proxy re-encryption
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 实验仿真
【Author】 Feng, Zhiqi Li, Yongli Ma, Xiaochen
【影响因子】6.793
【主题类别】
区块链应用-实体经济-网安领域
【Abstract】With the high-speed development of decentralized applications, account-based blockchain platforms have become a hotbed of various financial scams and hacks due to their anonymity and high financial value. Financial security has become a top priority with the sustainable development of blockchain-based platforms because of an increasing number of cyber attacks, which have resulted in a huge loss of crypto assets in recent years. Therefore, it is imperative to study the real-time detection of cyber attacks to facilitate effective supervision and regulation. To this end, this paper proposes the weighted and extended isolation forest algorithms and designs a novel framework for the real-time detection of cyber-attack transactions by thoroughly studying and summarizing real-world examples. Furthermore, this study develops a new detection approach for locating the compromised address of a cyber attack to resolve the data scarcity of hack addresses and reduce time consumption. Moreover, three experiments are carried out not only to apply on different types of cyber attacks but also to compare the proposed approach with the widely used existing methods. The results demonstrate the high efficiency and generality of the proposed approach. Finally, the lower time consumption and robustness of our method were validated through additional experiments. In conclusion, the proposed blockchain-oriented approach in this study can handle real-time detection of cyber attacks and has significant scope for applications.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Cyber-attack detection; Extended isolation forest; Decentralized application; Financial security; Fintech
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 实验仿真
【Author】 Rehman, Amir Xing, Huanlai Khan, Muhammad Adnan Hussain, Mehboob Hussain, Abid Gulzar, Nighat
【影响因子】5.076
【主题类别】
区块链应用-实体经济-医疗领域
【Abstract】In light of the constantly changing terrain of the COVID outbreak, medical specialists have implemented proactive schemes for vaccine production. Despite the remarkable COVID-19 vaccine development, the virus has mutated into new variants, including delta and omicron. Currently, the situation is critical in many parts of the world, and precautions are being taken to stop the virus from spreading and mutating. Early identification and diagnosis of COVID-19 are the main challenges faced by emerging technologies during the outbreak. In these circumstances, emerging technologies to tackle Coronavirus have proven magnificent. Artificial intelligence (AI), big data, the internet of medical things (IoMT), robotics, blockchain technology, telemedicine, smart applications, and additive manufacturing are suspicious for detecting, classifying, monitoring, and locating COVID-19. Henceforth, this research aims to glance at these COVID-19 defeating technologies by focusing on their strengths and limitations. A CiteSpace-based bibliometric analysis of the emerging technology was established. The most impactful keywords and the ongoing research frontiers were compiled. Emerging technologies were unstable due to data inconsistency, redundant and noisy datasets, and the inability to aggregate the data due to disparate data formats. Moreover, the privacy and confidentiality of patient medical records are not guaranteed. Hence, Significant data analysis is required to develop an intelligent computational model for effective and quick clinical diagnosis of COVID-19. Remarkably, this article outlines how emerging technology has been used to counteract the virus disaster and offers ongoing research frontiers, directing readers to concentrate on the real challenges and thus facilitating additional explorations to amplify emerging technologies.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Emerging technologies; SARS-COVID-2; Detection; Bibliometric analysis; CiteSpace; Network visualization
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 综述
【Author】 Shankar, Achyut Maple, Carsten
CCF-C
【影响因子】5.047
【主题类别】
区块链技术-协同技术-物联网
【Abstract】Since the Internet of Things (IoT) employs a diverse range of new technologies, it is impossible to build a single recommended design adopted as a master plan for all possible requests. Some possible IoT application areas have not been looked into yet or do not have enough information on how to approach them. This shows that more research needs to be done in this difficult area to find new and potentially big benefits for society. Although smart cities offer residents and providers of capital several advantages, there are numerous ways that breaches could compromise the safety and security of individuals. As a result, several different recommendation designs can coexist in the IoT. This research examines the effects of ethics and technology on the security of IoT-enabled systems in smart city infrastructure. Hence provides a secure IoT network architecture for smart cities combining blockchain and deep learning to safeguard privacy and credibility. This research presents a Secure Smart City Infrastructure using Blockchain and Deep Learning (SSCI-BDL) framework to ensure privacy protection and trustworthiness among IoT communication in smart cities. This framework involves the blockchain network for security management in the smart city infrastructure. This framework integrates the deep learning model with an optimization algorithm that maintains efficient resource utilization in the smart city infrastructure. The simulation results show that the system has high security of 99.5% and the lowest latency rate of 4.1% compared to existing models. Overall, the proposed framework's efficiency gives the highest rate of 99.8%.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Deep learning; Security; Privacy protection; Blockchain; Smart city infrastructure
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 实验仿真
【Author】 Xu, Xianbin Guo, Yajun Guo, Yimin
CCF-C
【影响因子】5.047
【主题类别】
--
【Abstract】As the Internet of Things (IoT) technology continues to advance, it has found widespread application in various fields, including smart health, smart cities, and smart transportation. Among these applications, smart homes are particularly noteworthy due to their intimate connection to our daily lives. However, the use of smart devices in a home environment exposes users to various security threats, such as impersonation attacks and insider privilege attacks, as users must communicate with multiple devices through a public channel. Additionally, traditional authentication schemes that rely on trusted third-party present a single point of failure, as users and smart devices must be registered and authenticated by a central authority. Blockchain technology offers a decentralized, tamper-proof, and flexible solution for authentication and access control of data. By using blockchain, the single point of failure problem in traditional authentication schemes can be resolved. In the context of smart homes, the real-time nature of the environment necessitates the use of fog nodes to provide localized computing services. Fog nodes are closer to IoT devices than cloud nodes, making fog computing more efficient and faster than cloud computing. This paper proposes an authentication scheme for blockchain-enabled fog nodes in smart homes. The scheme involves registering all fog nodes and intelligent devices on a local private blockchain, and authentication is performed jointly by smart contracts on the blockchain and off-chain operations. The scheme provides comprehensive security and better performance, as demonstrated by security analysis and performance evaluation. Moreover, the proposed scheme offers a certain level of user privacy protection.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Authentication; Private blockchain; Fog node; Smart home; Privacy protection
【发表时间】2023
【收录时间】2023-06-09
【文献类型】
【Author】 Fan, Sizheng Zhang, Hongbo Wang, Zehua Cai, Wei
【影响因子】5.033
【主题类别】
区块链技术-协同技术-联邦学习
【Abstract】Leveraging various mobile devices to train the shared model collaboratively, federated learning (FL) can improve the privacy and security of 6G communication. To economically encourage the participation of heterogeneous mobile devices, an incentive mechanism and a fair trading platform are needed. In this paper, we implement a blockchain-based FL system and propose an incentive mechanism to establish a decentralized and transparent trading platform. Moreover, to better understand the mobile devices' behaviors, we provide economic analysis for this market. Specifically, we propose two strategy models for mobile devices, namely the discrete strategy model (DSM) and the continuous strategy model (CSM). Also, we formulate the interactions among the non-cooperative mobile devices as a dynamic game, where they adjust their strategies iteratively to maximize the individual payoff based on others' previous strategies. We further prove the existence in Nash equilibrium (NE) of two different models and propose algorithms to achieve them. Simulation results demonstrate the convergence of the proposed algorithms and show that the CSM can effectively increase the mobile devices' payoffs to 128.1 percent at most compared with DSM.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Mobile handsets; Blockchains; Training; Task analysis; Smart contracts; Privacy; Games; Blockchain; dynamic game; federated learning; nash equilibrium
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 实验仿真
【影响因子】4.747
【主题类别】
区块链技术-协同技术-物联网
【Abstract】In the recent era, the communication network with the support of many wireless technologies is giving benefits for remote access. Such a communication model increases the flexibility for data storage with the management of network resources efficiently with the integration of the Internet of Things (IoT). Although, the industrial Internet of Things (IIoT) has enabled the development of numerous machine learning-based solutions to provide real-time applications. However, most of the solutions are not prepared to cope with heterogeneous services and the huge amount of device data in the digital world. Furthermore, conducting financial transactions over the Internet raises several security issues. Such restrictions compromise the sensitive data of financial institutions and also degrade the trust of network users in the system. Thus, this article presents a secured blockchain model for high-performance computing in a big data environment, which aims to protect the business activities for financial interaction with intelligent services of software-defined network (SDN) architecture. First, to keep the security credentials, the SDN controller creates an association between the IoT devices and maintains local and global records. Second, the machine learning approach is explored using reliable and fault-tolerant methods to support the network scalability and extract the updated routing information for transmitting financial data. The proposed protocol also provides data integrity with a high level of network availability and copes with the financial security of big data by investigating cryptographic approaches. Our proposed protocol is tested using simulation, and various experiments are performed to show its efficacy in terms of network throughput, computing overhead, data delay, response time, and dropped packets as compared to tunicate swarm algorithm-based optimized routing mechanism (TORM) and RouteChain.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Protocols; Blockchains; Routing; Security; Big Data; Logic gates; Reliability; Big data; blockchain; distributed tasks; financial security; software-defined network (SDN)
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 实验仿真
【Author】 Feng, Zhangwei Jin, Peng Li, Guiping
【影响因子】3.889
【主题类别】
区块链应用-实体经济-供应链
【Abstract】Effectively managing fresh food supply chains (FFSCs) has long been a big challenge owing to the complexity in practice. Adoption of innovative technologies, blockchain traceability (BT), and cold-chain preservation (CP) technology to improve the efficiency of FFSC management has attracted much attention practically and academically. Distinct from existing studies, this paper provides a specific insight into the application of these two technologies by taking into account their functions in restraining misreporting behavior with BT technology due to its traceability and transparency and improving the freshness with CP technology based on the investment in fresh preservation equipment. With this in mind, this paper develops game theoretic models to identify the conditions under which technologies are the optimal selection for the supplier/retailer. It assumes that the retailer is the Stackelberg leader and the supplier is the follower. The key findings show that: (1) with the foci to eliminate suppliers' misreporting behavior and minimize the incentive fees, BT investment can increase prices and promote order quantities and demand; (2) only when the consumers demonstrate "appropriate" sensitivity to freshness, a win-win situation can be achieved without adoption of BT technology; and (3) suppliers are not keen to invest in BT or CP technology when the circulation time is short, while retailers prefer to invest in CP technology when the circulation time is long.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】fresh food supply chain management; misreporting behavior; blockchain traceability technology; cold-chain preservation technology; game theory
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 观点阐述
【DOI】 10.3390/su15097421
【Author】 Potnis, Tejas Lau, Yui-yip Yip, Tsz Leung
【影响因子】3.889
【主题类别】
区块链应用-实体经济-供应链
【Abstract】Blockchain technology is a major innovation that has swept through global supply chains recently. Blockchain technology has received immense attention in the supply chain industry due to its promising capabilities. This study was conducted to evaluate the potential capabilities of blockchain technology, which are highly relevant to the supply chain industry. To improve the understanding of the effect of blockchain on the supply chain, this research focuses on two crucial aspects of supply chain management, namely, supply chain capabilities and flexibility. The research procures measuring items for blockchain characteristics, supply chain capabilities, and flexibility through a questionnaire, the previous literature, and interviews conducted with industry experts. Through the use of statistical analysis, this study identifies the relationship between the above variables. The effect of blockchain on each variable is examined using a simple linear regression model. The findings disclose that blockchain technology has generated a notable impact on the supply chain capabilities and supply chain flexibility of firms. This makes blockchain technology highly essential for firms to generate a competitive advantage in the market and develop a new set of capabilities ahead of their competitors.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain technology; supply chain capabilities; supply chain flexibility
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 观点阐述
【DOI】 10.3390/su15097460
【影响因子】3.847
【主题类别】
区块链应用-实体经济-工业领域
【Abstract】In the industrial sector, production processes are continuously evolving, but issues and delays in production are still commonplace. Complex problems often require input from production managers or experts even though Industry 4.0 provides advanced technological solutions. Small and medium-sized enterprises (SMEs) normally rely more on expert opinion since they face difficulties implementing the newest and most advanced Industry 4.0 technologies. This reliance on human expertise can cause delays in the production processes, ultimately, impacting the efficiency and profitability of the enterprise. As SMEs are mostly niche markets and produce small batches, dynamics in production operations and the need for quick responses cannot be avoided. To address these issues, a decision support method for dynamic production planning (DSM DPP) was developed to optimize the production processes. This method involves the use of algorithms and programming in Matlab to create a decision support module that provides solutions to complex problems in real-time. The aim of this method is to combine not only technical but also human factors to efficiently optimize dynamic production planning. It is hardly noticeable in other methods the involvement of human factors such as skills of operations, speed of working, or salary size. The method itself is based on real-time data so examples of the required I 4.0 technologies for production sites are described in this article-Industrial Internet of Things, blockchains, sensors, etc. Each technology is presented with examples of usage and the requirement for it. Moreover, to confirm the effectiveness of this method, tests were made with real data that were acquired from a metal processing company in Lithuania. The method was tested with existing production orders, and found to be universal, making it adaptable to different production settings. This study presents a practical solution to complex problems in industrial settings and demonstrates the potential for DSM DPP to improve production processes while checking the latest data from production sites that are conducted through cloud systems, sensors, IoT, etc. The implementation of this method in SMEs could result in significant improvements in production efficiency, ultimately, leading to increased profitability.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】smart production planning; production optimization; Industry 4.0; dynamic decision support method
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 实证数据
【DOI】 10.3390/s23094498
【Author】 Fei, Xuanshu
CCF-C
【影响因子】3.732
【主题类别】
区块链技术-协同技术-物联网
【Abstract】After more than 40 years of long-term development, as a pioneer of China's reform and opening up, the Yangtze River Delta region has made tremendous economic progress and strong scientific and technological innovation strength, which has made the economy flourish and scientific and technological innovation strength strong. However, in the process of financial growth in the Yangtze River Delta, there are also financial structures that do not match the optimization of industrial structure, thus hindering the quality and efficiency of industrial structure optimization, thus affecting the strategic function of industrial development. For the development of the financial field, this paper applies the real-time data processing system of the Internet of Things based on blockchain technology to analyze the financial industry of the Yangtze River Delta urban agglomeration. The Internet of Things, based on the technology of real-time data processing system, can store different types of financial assets. These assets are a common component of supporting the application of the Internet of Things. They mix and build a powerful back-end process that can support the data processing application of the Internet of Things. Therefore, the Internet of Things data network and other information are stored in the data structure, so that data analysis and consolidation can be carried out with consensus, Thus, the processing efficiency of relevant financing data in the Yangtze River Delta region has been greatly improved, and the development process of the financial sector in the region has been effectively accelerated. Therefore, the research on this issue will enable the financial industry to give full play to its potential as a major component of national economic development, so as to maximize the improvement of the industrial structure and promote the development of blockchain and Internet of Things technologies.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Internet of Things; Data processing; Changjiang delta; Financial integration
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 实证数据
【Author】 Zhou, Yuchen Chen, Jian Lyu, Lu He, Bingtao
【影响因子】3.170
【主题类别】
区块链技术-核心技术-挖矿策略
区块链技术-协同技术-边缘计算
【Abstract】To promote the application of edge computing in wireless blockchain networks, this paper presents a business ecosystem, where edge computing is introduced to assist blockchain users in implementing the mining process. This paper exploits resource trading and miner competition to enable secure and efficient transactions in the presented business ecosystem. The resource trading problem is formulated as a Stackelberg game between miner candidates and edge computing servers, where computing, caching, and communication resources are jointly optimized to maximize the potential profit. Partial offloading is introduced to further enhance the system performance when compared with the existing work. We analyze the existence and uniqueness of the Nash equilibrium and Stackelberg equilibrium. Based on the optimization result, winners are selected from the set of miner candidates by bidding and constitute the mining network. Simulation results demonstrate that the proposal is able to improve the social welfare of blockchain miners, thus stimulating more blockchain users to join the mining network.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; edge computing; miner competition; resource trading; social welfare
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 实验仿真
【Author】 Guo, Yongan Wang, Yuao Qian, Qijie
【影响因子】3.170
【主题类别】
区块链技术-协同技术-物联网
区块链技术-协同技术-边缘计算
【Abstract】The demand for the Internet of Everything has slowed down network routing efficiency. Tradi-tional routing policies rely on manual configuration, which has limitations and adversely affects network performance. In this paper, we propose an Inter-net of Things (IoT) Intelligent Edge Network Routing (ENIR) architecture. ENIR uses deep reinforcement learning (DRL) to simulate human learning of empir-ical knowledge and an intelligent routing closed-loop control mechanism for real-time interaction with the network environment. According to the network de-mand and environmental conditions, the method can dynamically adjust network resources and perform in-telligent routing optimization. It uses blockchain tech-nology to share network knowledge and global op-timization of network routing. The intelligent rout-ing method uses the deep deterministic policy gradient (DDPG) algorithm. Our simulation results show that ENIR provides significantly better link utilization and transmission delay performance than various routing methods (e.g., open shortest path first, routing based on Q-learning and DRL-based control framework for traffic engineering).
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】edge intelligence; deep reinforcement; learning; intelligent routing; IoT; blockchain
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 实验仿真
【Author】 Moya, Cristina Vilchez Higuera, Juan Ramon Bermejo Higuera, Javier Bermejo Montalvo, Juan Antonio Sicilia
【影响因子】2.838
【主题类别】
区块链技术-协同技术-零知识证明
【Abstract】The problem of digital identity acquires more relevance every day in the eyes of a society that spends more and more time connected to the Internet. It has evolved throughout its history to reach a decentralized model known as Self-Sovereign Identity (SSI), which finds its natural tools in the blockchain technology and Zero-Knowledge Proofs (ZKPs). ZKPs, in this context, allow users to prove that their credentials are legitimate without revealing more information than is strictly necessary, and constitute one of the most promising areas of applied cryptography. In this work, an application is developed for the study of Zero-Knowledge Proof methods and, specifically, in their application for authentication in public-private key encryption systems. It focuses on the study of three ZKP protocols (Feige-Fiat-Shamir, Guillou-Quisquater, and Schnorr, which rely on the problems of large number factorizations and discrete logarithms for security) in the practical use-case where a prover wants to demonstrate knowledge of a private key for a public key without revealing the key itself. The application allows the user to modify the necessary parameters in each method to achieve a better understanding of their role in their safety and efficiency. Several types of attacks are carried out against the above-mentioned protocols to analyze their degree of security and what recommendations can be made to improve it.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】educational software; Self-Sovereign Identity; Zero-Knowledge protocols
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 实验仿真
【DOI】 10.3390/app13095552
【Author】 Tyagi, Kalpana
【影响因子】2.731
【主题类别】
区块链应用-实体经济-供应链
【Abstract】This article presents a holistic and integrated framework for blockchain deployment in global Agro-food 'supply' chains and how to transition them to accountable and sustainable global 'value' chains. Though many a scholarly contributions have assessed blockchain implementation at various levels in the chain, this research holistically looks at impediments to blockchain implementation at each level in the value chain. The study first establishes interlinkages between the three United Nations Sustainable Development Goals (SDGs), namely food for all (SDG 2), health for all (SDG 3), and sustainable consumption and production (SDG 12). It assesses the legal framework (namely trade law) and regulatory requirements therein. It then employs a case-study-based approach to assess blockchain deployment from the lens of operations management. These inter-disciplinary insights offer an enabling framework to successfully implement a vertically-integrated blockchain across the entire global Agro-food value chain. An end-to-end blockchain promises accountability, and thereby, enhanced trust in trade by offering a time-stamped ledger of transactions from the farm to the fork, to the end consumer. This systematic study, and its findings therein, are expected to serve as a ready reference guide to managers and policymakers for a truly integrated farm-to-fork blockchain deployment.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 理论模型
【Author】 Kumar, Mohit Kumar, Ashwani Verma, Sahil Bhattacharya, Pronaya Ghimire, Deepak Kim, Seong-heum Hosen, A. S. M. Sanwar
【影响因子】2.690
【主题类别】
区块链应用-实体经济-医疗领域
【Abstract】Advancements in Healthcare Internet of Things (H-IoT) systems have created new opportunities and solutions for healthcare services, including the remote treatment and monitoring of patients. In addition, the security and privacy of personal health data must be ensured during data transfer. Security breaches in H-IoT can have serious safety and legal implications. This comprehensive review provides insights about secured data accession by employing cryptographic platforms such as H-IoT in big data, H-IoT in blockchain, H-IoT in machine learning and deep learning, H-IoT in edge computing, and H-IoT in software-defined networks. With this information, this paper reveals solutions to mitigate threats caused by different kinds of attacks. The prevailing challenges in H-IoT systems, including security and scalability challenges, real-time operating challenges, resource constraints, latency, and power consumption challenges are also addressed. We also discuss in detail the current trends in H-IoT, such as remote patient monitoring and predictive analytics. Additionally, we have explored future prospects, such as leveraging health data for informed strategic planning. A critical analysis performed by highlighting the prevailing limitations in H-IoT systems is also presented. This paper will hopefully provide future researchers with in-depth insights into the selection of appropriate cryptographic measures to adopt an energy-efficient and resource-optimized healthcare system.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】healthcare; IoT; big data; block chain; edge computing; software defined networks; machine learning; deep learning
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 综述
【Author】 Bian, Genqing Qu, Wenjing Shao, Bilin
【影响因子】2.690
【主题类别】
区块链应用-实体经济-医疗领域
区块链技术-协同技术-联邦学习
【Abstract】COVID-19 is a serious epidemic that not only endangers human health, but also wreaks havoc on the development of society. Recently, there has been research on using artificial intelligence (AI) techniques for COVID-19 detection. As AI has entered the era of big models, deep learning methods based on pre-trained models (PTMs) have become a focus of industrial applications. Federated learning (FL) enables the union of geographically isolated data, which can address the demands of big data for PTMs. However, the incompleteness of the healthcare system and the untrusted distribution of medical data make FL participants unreliable, and medical data also has strong privacy protection requirements. Our research aims to improve training efficiency and global model accuracy using PTMs for training in FL, reducing computation and communication. Meanwhile, we provide a secure aggregation rule using differential privacy and fully homomorphic encryption to achieve a privacy-preserving Byzantine robust federal learning scheme. In addition, we use blockchain to record the training process and we integrate a Byzantine fault tolerance consensus to further improve robustness. Finally, we conduct experiments on a publicly available dataset, and the experimental results show that our scheme is effective with privacy-preserving and robustness. The final trained models achieve better performance on the positive prediction and severe prediction tasks, with an accuracy of 85.00% and 85.06%, respectively. Thus, this indicates that our study is able to provide reliable results for COVID-19 detection.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】COVID-19; pre-trained models (PTMs); federated learning (FL); fully homomorphic encryption; blockchain
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 实验仿真
【Author】 Kiran, Ajmeera Mathivanan, Prasad Mahdal, Miroslav Sairam, Kanduri Chauhan, Deepak Talasila, Vamsidhar
【影响因子】2.592
【主题类别】
区块链技术-协同技术-物联网
【Abstract】The rapid proliferation of smart devices in Internet of Things (IoT) networks has amplified the security challenges associated with device communications. To address these challenges in 5G-enabled IoT networks, this paper proposes a multi-level blockchain security architecture that simplifies implementation while bolstering network security. The architecture leverages an adaptive clustering approach based on Evolutionary Adaptive Swarm Intelligent Sparrow Search (EASISS) for efficient organization of heterogeneous IoT networks. Cluster heads (CH) are selected to manage local authentication and permissions, reducing overhead and latency by minimizing communication distances between CHs and IoT devices. To implement network changes such as node addition, relocation, and deletion, the Network Efficient Whale Optimization (NEWO) algorithm is employed. A localized private blockchain structure facilitates communication between CHs and base stations, providing an authentication mechanism that enhances security and trustworthiness. Simulation results demonstrate the effectiveness of the proposed clustering algorithm compared to existing methodologies. Overall, the lightweight blockchain approach presented in this study strikes a superior balance between network latency and throughput when compared to conventional global blockchain systems. Further analysis of system under test (SUT) behavior was accomplished by running many benchmark rounds at varying transaction sending speeds. Maximum, median, and lowest transaction delays and throughput were measured by generating 1000 transactions for each benchmark. Transactions per second (TPS) rates varied between 20 and 500. Maximum delay rose when throughput reached 100 TPS, while minimum latency maintained a value below 1 s.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; Internet of Things (IoT); Evolutionary Adaptive Swarm Intelligent Sparrow Search (EASISS); Network Efficient Whale Optimization (NEWO); data security; clustering techniques
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 实验仿真
【DOI】 10.3390/math11092073
CCF-C
【影响因子】2.577
【主题类别】
--
【Abstract】This paper presents a new authentication framework for cancelable face recognition biometrics. In recent years, biometric plays a pivotal role in Cognitive Internet of Things (C-IoT) security. The face trait solves a lot of security issues; it increases the resistance of these systems against severe authentication attacks especially in smart IoT-based applications. The proposed scheme runs in two phases; The first phase (enrollment), in which the face image of the person is hashed using SHA256, is passed to an algorithm to extract the main features. Then the image is decomposed using a wavelet transform algorithm. Wavelet transform is applied to hide the face details from the image. This step is done to protect the image against being stolen or modified by external hackers. The image, hash, and wavelet transform are passed through the raspberry Pi to be stored in a database. A block is added to the private blockchain with these files. In the second phase (authentication) the test image is hashed, passed to the system to extract the features, and compared with the stored images in the database. Then the decision is stored in a new block in the chain, whether the two images are identical or not. The simulation results based demonstrate that the proposed cancelable biometric system gives a very reliable and secure performance for securing the IoT applications.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Cancelable biometrics; Image authentication; Machine learning; Face recognition
【发表时间】2023
【收录时间】2023-06-09
【文献类型】
【Author】 Huang, Haijun Zhang, Hong Zhao, Zidi Zhang, Shouhua
【影响因子】2.557
【主题类别】
区块链应用-实体经济-车联网
区块链技术-核心技术-密码学
【Abstract】With the rapid development of Vehicular ad hoc networks (VANETs), secure communication in VANETs has been extensively studied. However, it is very challenging for VANETs to establish reliable data sharing for one-to-many users without access control. Attribute-based encryption (ABE) is a promising access control technique, which can maintain data confidentiality and is suitable for applications in VANETs. The current ABE scheme performs encryption and decryption of elements on the bilinear group, which is unfriendly for large-scale plaintexts and causes VANETs vulnerable to receive malicious or erroneous information. In this paper, we propose a variant attribute-based encryption access control scheme to achieve fine-grained access control for VANETs data shared in cloud and fog. It allows a message sender to determine which vehicles receive and decrypt messages based on the vehicle's attributes. We also employ a fusion of AES and CP-ABE to address the issue of key leakage caused by symmetric encryption key transferring. We implement a one-time key operation to make each ciphertext with its unique key and signature, which greatly improves the security of data transmission and provides tamper-proof for the plaintext. We also offer a novel method that treats roadside units as the constituent parts of a blockchain and publishes the device's public signature on the chain to validate the sender's identity. Compared with other existing CP-ABE schemes, our scheme is easily retrofitted to other encryption frameworks. Finally, performance evaluation reveals the security and efficiency of the proposed scheme based on theoretical analysis and experimental analysis.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】VANET (Vehicular ad hoc network); CP-ABE; Traceability; ECDSA; Tamper-proof
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 实验仿真
【Author】 DeFranco, Joanna Kshetri, Nir Voas, Jeffrey
【影响因子】2.256
【主题类别】
区块链技术-核心技术-挖矿策略
【Abstract】Blockchains require much energy. We talk here about options for less.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 观点阐述
【DOI】 10.1109/MC.2022.3219720
【影响因子】2.017
【主题类别】
区块链应用-实体经济-通信领域
【Abstract】The compression on replicated string characters of large-sized data diminishes the consumption of the sensor's memory storage and power dissipation in the wireless sensor networks (WSNs). The intruders attack during data transmission in the clusters that humiliating the throughput rate. Therefore, we present a lossless compression and blockchain-assisted aggregation (CBA) with the rating-based energy-efficient cluster overlapping (REEC Overlap) method for effective resource utilization and data integrity. The Lempel-Ziv-Welch (LZW) method compresses the sensed data, and the source node transmits the packets to cluster head on the routes established by ad-hoc on-demand distance vector (AODV) routing protocol. Head node aggregates the data using consortium blockchain in which a federated consensus mechanism validates the blocks. Eventually, the base station (BS) decodes the received data packets using LZW decompression to recover the actual data. Simulation results of CBA-REEC Overlap obtain the decreased energy power consumption with a better compression ratio and the minimized network overhead compared to existing conventional algorithms.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】REEC overlap; LZW compression; AODV routing; Data aggregation; Consortium blockchain; Federated consensus
【发表时间】2023
【收录时间】2023-06-09
【文献类型】 实验仿真
【作者】 吴江;杨亚璇;邹柳馨;柯丹;
【作者单位】武汉大学信息管理学院;武汉大学电子商务研究与发展中心;武汉大学经济与管理学院;
【文献来源】情报科学
【复合影响因子】3.367
【综合影响因子】2.220
【主题类别】
--
【摘要】【目的/意义】针对农业供应链与金融机构间存在的信息不对称问题,为帮助金融机构和政府宏观调控农业供应链生产和管理,增加小农户融资可获得性和生产力,推动小农户与农业现代化接轨。【方法/过程】本文提出了一种基于区块链技术的农业供应链金融信息共享平台原型,以Hyperledger Fabric作为底层技术框架,有效连接农业供应链、政府和金融机构,实现信息共享;并通过演化博弈方法探究区块链平台介入后对融资困境的改善作用。【创新/局限】相较于传统农业供应链金融,本文通过数据及时上链、可追溯、防篡改、交易通道隔离等机制实现信息共享和实时监管;从博弈的视角针对性地给出该平台对于农业供应链金融创新发展的解决思路和对策,但对区块链技术在农业生产中的使用成本和硬件设施架构考虑不足。
【关键词】区块链;;信息共享;;农业供应链金融;;演化博弈;;融资风险;;政府推动
【文献类型】
【发表时间】2023-06-09
【作者】 郭亚军;郭一若;李帅;蒋玲;
【作者单位】郑州航空工业管理学院信息管理学院;中国人民大学评价研究中心;
【文献来源】图书馆论坛
【复合影响因子】2.553
【综合影响因子】1.900
【主题类别】
--
【摘要】元宇宙相关技术的应用与发展是推进图书馆服务变革与优化的重要机遇,为多元空间建设提供方向,对公共图书馆空间服务创新具有指导意义。文章对不同年龄、学历、专业以及地域的公共图书馆用户进行深度访谈,通过扎根理论研究挖掘其对公共图书馆空间服务需求,并结合KANO模型,构建元宇宙场域下公共图书馆用户空间服务需求模型,进而提出发展策略。结果表明:图书馆管理是用户空间服务需求的外部驱动因素,用户体验与空间配置是用户空间服务需求的内部驱动因素。公共图书馆应以智能化为目标、以多元治理为手段、以技术为依托,从图书馆建设、用户需求以及空间配置3个方面提升空间服务能力。
【关键词】元宇宙;;用户需求;;空间服务;;ChatGPT;;KANO模型
【文献类型】
【发表时间】2023-06-09
【作者】 施鑫垚;王静宇;刘立新;
【作者单位】内蒙古科技大学信息工程学院;中国人民大学信息工程学院;
【文献来源】小型微型计算机系统
【复合影响因子】1.734
【综合影响因子】1.304
【主题类别】
--
【摘要】为了解决在物联网场景下数据聚合中存在的中心化存储、隐私信息泄露、依赖可信第三方等问题,本文提出了工业物联网环境下分布式的隐私保护数据聚合方案(Distribued privacy-preserving data aggregation scheme,DPPDA)。首先通过区块链技术与雾计算设计了一个分层分布式存储数据聚合架构,实现数据的去中心化存储;并且提出了基于阈值同态加密算法结合随机值噪声值对数据加密,实现用户数据隐私保护并且系统不依赖于完全可信的密钥管理中心;此外,结合Bloom过滤器与批量验证签名算法设计了一个高效的匿名签名验证机制,实现用户身份的隐私保护。安全分析和仿真测试验证本方案安全可行,有较好的抗攻击性和较低的计算成本。结果表明,本方案能够在物联网的数据聚合过程中保护用户数据隐私并具有较好性能。
【关键词】区块链;;数据聚合;;隐私保护;;paillier同态加密;;雾计算
【文献类型】
【发表时间】2023-06-09
【作者】 万勇;
【作者单位】中国人民大学法学院;
【文献来源】社会科学辑刊
【复合影响因子】1.516
【综合影响因子】0.727
【主题类别】
--
【摘要】在数字经济时代,建构数字版权产品二级市场是实现分配正义的当然推论、发展市场经济的应然需要、促进文化保存的必然选择,具有充分的正当性与必要性。然而,在发展过程中,其遇到了法律上的重大障碍:传统权利用尽原则难以适用于数字环境。为纾解发展困境,已有研究提出了“功能等同说”“单一复制件说”“传播权用尽说”等准用旧法型或改良老制型解决方案,但这些方案均存在一定局限。“数字转售法定许可说”跳脱了“权利用尽原则能够/不能适用数字环境”二分的思维陷阱,以“再造新规”的方式为建构数字版权产品二级市场提供了最佳现实出路。
【关键词】版权;;数字经济;;权利用尽;;首次销售;;NFT
【文献类型】
【发表时间】2023-06-09
【作者】 陈涵;谭北海;余荣;王思明;
【作者单位】广东工业大学;
【文献来源】电测与仪表
【复合影响因子】
【综合影响因子】
【主题类别】
--
【摘要】以区块链为代表的去中心化技术因其突出的可靠性和安全性已被广泛应用于分布式能源领域。区块链分片技术可以克服传统区块链系统低吞吐量、低可扩展性的性能缺陷,然而现有区块链分片系统大多采用随机分片模式,没有考虑系统中节点的能力差异以及分片的安全隐患。为了解决这类问题,文中提出了一种在分布式能源交易场景下区块链分片的匹配算法,该方法充分考虑了分布式能源交易中节点对节点间电气距离和分片内交易数的偏好,以降低能源传输损耗和交易成本,同时考虑节点信誉值,以反映其过去在交付承诺能源方面的表现,保证分片的安全性,并将问题抽象为具有外部性的多对一匹配模型进行求解,最后通过仿真实验验证了所提出的区块链分片方法优于传统的分片方法,具有良好的应用价值。
【关键词】分布式能源;;区块链;;边缘计算;;分片技术;;匹配理论
【文献类型】
【发表时间】2023-06-09
【作者】 钱丹丹;王丽华;刘炜;
【作者单位】上海健康医学院图书馆;上海大学文化遗产与信息管理学院;上海图书馆;上海科学技术情报研究所;
【文献来源】图书馆建设
【复合影响因子】
【综合影响因子】
【主题类别】
--
【摘要】新冠肺炎疫情的全球蔓延加速了社会虚拟化进程,虚实融合的元宇宙话题火爆出圈。图书馆要抓住时代机遇,构建元宇宙时代新型知识形态和新研究范式。本文通过“元宇宙”文献梳理,探讨了元宇宙与图书馆相关理论的缘起与内涵界定,运用信息生态理论,构建了由元宇宙图书馆资源、元宇宙图书馆人、元宇宙图书馆技术、元宇宙图书馆环境四个核心要素的元宇宙图书馆智慧生态系统,最后探讨了元宇宙图书馆的典型应用案例。该研究将为提升图书馆在疫情等动荡不确定因素下的数字化服务能级和完善图书馆服务体验提供参考。
【关键词】元宇宙;;图书馆;;虚实融合;;沉浸交互;;智慧服务
【文献类型】
【发表时间】2023-06-09
【作者】 宋歌笙;蔡丹丹;蔡文杰;
【作者单位】上海图书馆系统网络中心;
【文献来源】图书馆建设
【复合影响因子】
【综合影响因子】
【主题类别】
--
【摘要】数字时代图书馆的文化保存职能受到了巨大的挑战,如何实现数字资源的长期保存是一个被业界持久关注的课题。以区块链技术为基础的Web3.0时代为数字资源长期保存打开了新的思路,提供了新的可能。本文回顾了去中心化存储的发展历程,结合长期保存的需求特点,分析和比较了中心化网络与去中心化存储的发展趋势,探讨了Web3.0环境下长期保存实现方式的可能应用,提出去中心化存储不能仅要依靠技术进步,同时要在运行模式和激励机制等生产关系方面有所创新。
【关键词】去中心化存储;;区块链;;长期保存;;Web3.0
【文献类型】
【发表时间】2023-06-09