【影响因子】11.678
【主题类别】
--
【Abstract】In blockchain consortia, different companies band together to develop, govern, and operate a shared blockchain-based system. However, many blockchain-based systems are exposed to the risk of never going live without a proper understanding of the peculiar collaboration this technological architecture entails. To understand how blockchain consortia develop and advance collaborative relationships, this article reports on an extensive analysis of online material and interviews of key members. It draws from the literature on interorganizational collaboration and digital platforms to explain the staged progression of blockchain consortia and the key features of blockchain consortia.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】alliances; information systems; interorganizational collaboration; technological innovation; collaboration; platforms; blockchain
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【影响因子】11.245
【主题类别】
--
【Abstract】E-commerce logistics financing drives growth in small and medium-sized logistics companies. Despite the popularity, its adoption faces vexing challenges in supply chains, such as (i) asymmetry arising from information silos, (ii) hidden centrality in existing information technology solutions, and (iii) opaqueness in information ownership. Blockchain technology, with its native constructs, such as shared ledger, smart contracts, and tokens, is deemed promising to alleviate these concerns. Hence, this study introduces a blockchain-enabled cyberphysical traceability system for logistics financing based on digital asset tokenization. The tokenization of digital assets brings visibility and traceability into the supply chain's cyber (information flow) and physical (logistics flow) transactions. Subsequently, we (i) introduce the design and implementation of the proposed traceability system and (ii) demonstrate the application of the proposed system in logistics financing. Some of the resulting implications include: (i) The information sharing through blockchain technology brings resolution into the operations in the supply chain for logistics financing. (ii) The system minimizes the required upfront expenditure and provides flexible access to computing resources to promote the system's adoption by the stakeholders.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】E-commerce logistics financing; Digital asset; Tokenization; Cyber-physical traceability; Blockchain
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
CCF-C
【影响因子】10.238
【主题类别】
--
【Abstract】As a result of the rapid development of Internet of Things (IoT) systems, an increasing number of academics are focusing on finding new applications for IoT systems. For IoT systems, crowdsourcing is a prevalent practise. Due to the large number of deployed devices in IoT networks, more research is still required on the privacy and trust issues that arise when utilizing crowdsourcing. As a result of the characteristics of social computing, the crowdsourcing network poses issues in terms of confidentiality and reliability. To consolidate and create this industry, we have built a differentially private crowdsourcing system that integrates public and private blockchains to address the privacy and trust issues of conventional crowdsourcing systems. Our proposed solution enables varying levels of privacy protection to protect the user's identity and location. Moreover, the installation of blockchain networks might potentially ensure the data's integrity. In the conclusion of this article, the possibility of deploying a crowdsourcing system with blockchain in IoE networks is examined.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Crowdsourcing; Internet of Things; Privacy; Task analysis; Servers; Smart contracts; Blockchain; crowdsourcing; Internet of Things (IoT); IoE; privacy preservation
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【Author】 Li, Zhixin Huang, Chunpu Gai, Keke Lu, Zhihui Wu, Jie Chen, Lulu Xu, Yangchuan Choo, Kim-Kwang Raymond
CCF-C
【影响因子】10.238
【主题类别】
--
【Abstract】As a new distributed machine learning (ML) framework for privacy protection, federated learning (FL) enables substantial Internet of Things (IoT) devices (e.g., mobile phones, tablets, etc.) to participate in collaborative training of an ML model. FL can protect the data privacy of IoT devices without exposing their raw data. However, the diversity of IoT devices may degrade the overall training process due to the straggler issue. To tackle this problem, we propose a gear-based asynchronous FL (AsyFed) architecture. It adds a gear layer between the clients and the FL server as a mediator to store the model parameters. The key insight is that we group these clients with similar training abilities into the same gear. The clients within the same gear conduct synchronous training. These gears then communicate with the global FL server asynchronously. Besides, we propose a T-step mechanism to reduce the weight from the slow gear when they are communicating with the FL server. The extensive experiment evaluations indicate that AsyFed outperforms FedAvg (baseline synchronous FL scheme) and some state-of-the-art asynchronous FL methods in terms of training accuracy or speed under different data distributions. The only negligible overhead is that we leverage the extra layer (gear layer) to preserve part of the model parameters.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Training; Servers; Gears; Computational modeling; Data models; Internet of Things; Edge computing; Federated learning (FL); communication overhead; device heterogeneity; asynchronous update
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
CCF-C
【影响因子】10.238
【主题类别】
--
【Abstract】The Internet of Drones (IoD) is built on the Internet of Things (IoT) by replacing "Things" with "Drones" while retaining incomparable features. Because of its vital applications, IoD technologies have attracted much attention in recent years. Nevertheless, gaining the necessary degree of public acceptability of IoD without demonstrating safety and security for human life is exceedingly difficult. In addition, intrusion detection systems (IDSs) in IoD confront several obstacles because of the dynamic network architecture, particularly in balancing detection accuracy and efficiency. To increase the performance of the IoD network, we proposed a blockchain-based radial basis function neural networks (RBFNNs) model in this article. The proposed method can improve data integrity and storage for smart decision-making across different IoDs. We discussed the usage of blockchain to create decentralized predictive analytics and a model for effectively applying and sharing deep learning (DL) methods in a decentralized fashion. We also assessed the model using a variety of data sets to demonstrate the viability and efficacy of implementing the blockchain-based DL technique in IoD contexts. The findings showed that the suggested model is an excellent option for developing classifiers while adhering to the constraints placed by network intrusion detection. Furthermore, the proposed model can outperform the cutting-edge methods in terms of specificity, F1, recall, precision, and accuracy. [Heidari, Arash] Islamic Azad Univ, Dept Comp Engn, Tabriz Branch, Tabriz 5157944533, Iran; [Navimipour, Nima Jafari] Kadir Has Univ, Fac Engn & Nat Sci, Dept Comp Engn, TR-34083 Istanbul, Turkiye; [Unal, Mehmet] Nisantasi Univ, Dept Comp Engn, TR-34485 Istanbul, Turkiye Islamic Azad University; Kadir Has University; Nisantasi University Navimipour, N (通讯作者),Kadir Has Univ, Fac Engn & Nat Sci, Dept Comp Engn, TR-34083 Istanbul, Turkiye. Arash_heidari@ieee.org; Navimipour@ieee.org; mehmet.unal@nisantasi.edu.tr Heidari, Arash/0000-0003-4279-8551 59 8 8 0 0 IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC PISCATAWAY 445 HOES LANE, PISCATAWAY, NJ 08855-4141 USA 2327-4662 IEEE INTERNET THINGS IEEE Internet Things J. MAY 15 2023 10 10 8445 8454 10.1109/JIOT.2023.3237661 http://dx.doi.org/10.1109/JIOT.2023.3237661 10 Computer Science, Information Systems; Engineering, Electrical & Electronic; Telecommunications Science Citation Index Expanded (SCI-EXPANDED) Computer Science; Engineering; Telecommunications F4ZV0 2023-06-24 WOS:000982455700010
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Drones; Blockchains; Security; 5G mobile communication; Internet of Things; Computer architecture; Adaptation models; Blockchain; intrusion detection system (IDS); Internet of Drones (IoD); security
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【Author】 Tan, Evrim Mueller, A. Paula Rodriguez
【影响因子】6.004
【主题类别】
--
【Abstract】Disruptive technologies, such as blockchain (BCT), uphold relevant implications to design more transparent, efficient, and effective coproduction. However, evidence on how disruptive technologies affect the design choices and process of coproduction remains limited. Drawing on the unique case of Barcelona, this study analyses how BCT can shape coproduction and how BCT-based coproduction can look. By using a novel framework, our findings suggest that BCT-based coproduction has the potential to lead to new forms and roles in digital coproduction, yet several institutional, social and organizational factors can influence the design choices and, in turn, the implication of such processes.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Digital coproduction; Distributed ledger technology
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【Author】 Ali, Mohd Helmi Chung, Leanne Tan, Kim Hua Makhbul, Zafir Mohd Zhan, Yuanzhu Tseng, Ming-Lang
【影响因子】5.992
【主题类别】
区块链应用-实体经济-食品领域
【Abstract】Blockchain infrastructures' promising benefits and tremendous growth revolutionised supply chain; especially for the highly concerned industry with integrity issues such as halal food. Drawing on the technology, organisation, environment framework and diffusion of innovation theory, this study investigates the factors that affect halal food SMEs (HFSMEs). The questionnaires covering 500 halal-certified SMEs were conducted in Malaysia. The results showed that the theory of diffusion of innovation (DOI) and technological-organisational-environmental (TOE) model was tested with 175 respondents, showing top management support, trialability, external support, and competitive pressure are the critical factors influencing HFSMEs' intention to adopt BT. In contrast, relative advantage, compatibility, complexity, uncertainty and security, observability, organisational readiness, and government regulations show no effect on intention. In addition, supply chain integration (SCI) is a moderating factor in diffusing BT.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; intention to adopt; supply chain integration; halal food industry
【发表时间】2023
【收录时间】2023-06-29
【文献类型】 实证数据
【影响因子】5.261
【主题类别】
--
【Abstract】Buying and selling real estate is time consuming and labor intensive, requires many intermediaries, and incurs high fees. Blockchain technology provides the real estate industry with a reliable means of tracking transactions and increases trust between the parties involved. Despite the benefits of blockchain, its adoption in the real estate industry is still in its infancy. Therefore, we investigate the factors that influence the acceptance of blockchain technology by buyers and sellers of real estate. A research model was designed based on the combined strengths of the unified theory of technology acceptance and use model and the technology readiness index model. Data were collected from 301 real estate buyers and sellers and analyzed using the partial least squares method. The study found that real estate stakeholders should focus on psychological factors rather than technological factors when adopting blockchain. This study adds to the existing body of knowledge and provides valuable insights to real estate stakeholders on how to implement blockchain technology.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Real estate; Adoption; Factors; Partial least squares method
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【Author】 Luo, Yonggen Duan, Junshan Li, Antai Shao, Jiaoyang
【影响因子】4.859
【主题类别】
--
【Abstract】Blockchain technology is an important part of the infrastructure of the digital economy. We investigate the relationship between blockchain information disclosure and trade credit. Using Python to extract the information from MD&A, the results show that blockchain information disclosure significantly increases an enterprise's trade credit. This effect is stronger for enterprises with weak bargaining power and those located in areas with high social trust. The mechanism of the effect is improved corporate governance and reduced information asymmetry, which reduce default risk. The results are consistent when we consider heterogeneity issues. Our research clarifies the significant role of blockchain technology in the real economy.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain technology; trade credit; information disclosure; textual analysis
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【Author】 Vilkov, Arsenii Tian, Gang
【影响因子】3.889
【主题类别】
--
【Abstract】Carbon markets, particularly emission trading schemes (ETS) and carbon offset projects, are significant mechanisms in climate change mitigation. However, there are still a number of unresolved issues regarding their attractiveness and efficient functioning. Blockchain, as the core of "3D's concept" (including decentralization, decarbonization and digitalization), could be considered as a candidate solution for carbon markets' improvement. A systematic literature review was conducted to identify the role of blockchain in ETS and carbon offset projects, its key features, implementation challenges and proposed applications, by analyzing and discussing the content of relevant studies, and grouping the results into domains. This study's findings show that blockchain has great potential to be adopted in carbon markets. However, there is no data on blockchain use cases in energy efficiency, chemical processes and industrial manufacturing, waste disposal, and agriculture. Blockchain-based household and transportation carbon offset projects are linked to renewables through energy trading. Renewables and forestry are the most appropriate domains for blockchain adoption, considering various criteria of quality for carbon offset projects. Blockchain is currently immature in carbon markets because of its own drawbacks and challenges. This study also highlights research gaps and offers research directions to inspire researchers for conducting related investigations. [Vilkov, Arsenii; Tian, Gang] Northeast Forestry Univ, Coll Econ & Management, Harbin 150040, Peoples R China Northeast Forestry University - China Tian, G (通讯作者),Northeast Forestry Univ, Coll Econ & Management, Harbin 150040, Peoples R China. ars.vilkov@gmail.com; tiangang_nefu@126.com Vilkov, Arsenii/AAG-3369-2020 Vilkov, Arsenii/0000-0003-1427-3272 101 0 0 3 3 MDPI BASEL ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND 2071-1050 SUSTAINABILITY-BASEL Sustainability MAY 23 2023 15 11 8495 10.3390/su15118495 http://dx.doi.org/10.3390/su15118495 27 Green & Sustainable Science & Technology; Environmental Sciences; Environmental Studies Science Citation Index Expanded (SCI-EXPANDED); Social Science Citation Index (SSCI) Science & Technology - Other Topics; Environmental Sciences & Ecology I4WW8 gold 2023-06-24 WOS:001002811400001
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; carbon markets; carbon credits; carbon offset projects; emissions trading scheme; systematic review
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【DOI】 10.3390/su15118495
【Author】 Wang, Yi Yang, Yafei Qin, Zhaoxiang Yang, Yefei Li, Jun
【影响因子】3.889
【主题类别】
--
【Abstract】Digitization and greening have become the characteristics of social and economic development. Digital technology, as a critical enabler of green supply chain management, has been widely considered and recognized by academia and business circles. With the advent of the Industry 4.0 era and the rapid development of digital technology, this emerging field of technology is constantly being updated, and so the academic research in this field is increasing but has yet to reach saturation. We systematically reviewed 144 relevant papers published in the last 14 years. We used qualitative analysis to classify, summarize and analyze the literature in two dimensions (i.e., digital technologies and green supply chain practices). Then, we continued the classification from each dimension. According to the basic characteristics, there are five digital technologies: the Internet of Things, big data, cloud computing, blockchain, and artificial intelligence. The green supply chain is divided into green procurement, green production, green consumption, and green logistics according to the essential practices of the supply chain. This study explores which digital technologies are needed in a green supply chain. The study also discusses how these technologies can reduce the input of resources and energy and the emission of pollutants, finally improving the operating efficiency of the green supply chain, and achieving economic, social, and environmental benefits.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】digital technology; green supply chain management; literature review
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【DOI】 10.3390/su15118564
【Author】 Qu, Li Wang, Zihui Liu, Yueting Liu, Ying
【影响因子】3.889
【主题类别】
--
【Abstract】With the rapid development of information technology, the industrial boundary is gradually blurred, and industrial cross-border integration brings new impetus for innovation development and value co-creation. High-tech industrial parks are characterized by industrial diversification, but few studies have analyzed how industrial integration in high-tech parks enhances the value creation of the entire high-tech park from a value perspective. In this study, we build a value network model of the Beijing Economic-Technological Development Area (BDA) based on grounded theory research methods to explore the mechanism of value co-creation among industrial chains in the BDA. Additionally, we found that the communication network infrastructure represented by 5G, the Internet of Things, and the Industrial Internet, the new technology infrastructure represented by artificial intelligence and blockchain, and the computing infrastructure represented by the data center in BDA are integrated with the leading industries, which improves the value of the industry and promotes the digitalization, networking, and intelligent transformation and upgrading of the industry. Contributions for future research are presented.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】value network; grounded theory; industrial integration; value co-creation; information infrastructure
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【DOI】 10.3390/su15118842
CCF-C
【影响因子】3.848
【主题类别】
--
【Abstract】A drone is often called an "Unmanned Aerial Vehicle" or UAV. It is utilized in various civilian and military applications, including agriculture, surveillance, and delivery of packages. A promising idea for enhancing the safety and quality of drone flight is to build the Internet of Drones (IoD), in which drones are used to collect sensitive data, which is then communicated in real-time to external user (Ui) through the Ground Station Server (GSS). Before deployment, the GSS and all drones are registered with Control Room (CR), a central authority, which is a trusted authority. To ensure secure and reliable communications, an efficient and secure authentication scheme is needed to enable users and drones to authenticate each other and share a session key. Furthermore, because drones generally have small batteries and limited memory capacity, efficient and lightweight security techniques are suitable for them. Many schemes to secure IoD environments have been proposed recently; however, some were proven as insecure, and some degraded efficiency. In this work, we focus on developing a novel blockchain-based authentication scheme, called HCALA, on protecting the communication between an external user and drone utilizing Hyperelliptic Curve Cryptography (HECC). To evaluate the viability and efficacy of HCALA, We employ the extensively used Random Oracle Model (ROM) and formal security verification using a software tool called AVISPA, which is used to validate the internet security protocols. HCALA is also examined by utilizing informal security analysis techniques, demonstrating that the proposed protocol can withstand several well-known active and passive adversary attacks. It also shows that HCALA is more efficient regarding different parameters, according to the performance comparison. Compared to previous similar schemes, the security and functionality aspects are improved, and the computation, communication costs, and energy consumption are reduced. (c) 2023 Elsevier B.V. All rights reserved. [Berini, Aymen Dia Eddine; Ferrag, Mohamed Amine; Farou, Brahim; Seridi, Hamid] 8 May 1945 Univ, LabST Lab, Guelma 24000, Algeria Universite 8 Mai 1945 de Guelma Berini, ADE (通讯作者),8 May 1945 Univ, LabST Lab, Guelma 24000, Algeria. berini.aymen@univ-guelma.dz; ferrag.mohamedamine@univ-guelma.dz; farou.brahim@univ-guelma.dz; seridi.hamid@univ-guelma.dz 54 0 0 1 1 ELSEVIER AMSTERDAM RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS 1574-1192 1873-1589 PERVASIVE MOB COMPUT Pervasive Mob. Comput. MAY 2023 92 101798 10.1016/j.pmcj.2023.101798 http://dx.doi.org/10.1016/j.pmcj.2023.101798 MAY 2023 21 Computer Science, Information Systems; Telecommunications Science Citation Index Expanded (SCI-EXPANDED) Computer Science; Telecommunications H9OB1 2023-06-24 WOS:000999159200001
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Drones; User authentication; Blockchain; Security; Cryptography; AVISPA
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【影响因子】3.847
【主题类别】
--
【Abstract】The fish industry experiences substantial illegal, unreported, and unregulated (IUU) activities within traditional supply chain systems. Blockchain technology and the Internet of Things (IoT) are expected to transform the fish supply chain (SC) by incorporating distributed ledger technology (DLT) to build trustworthy, transparent, decentralized traceability systems that promote secure data sharing and employ IUU prevention and detection methods. We have reviewed current research efforts directed toward incorporating Blockchain in fish SC systems. We have discussed traceability in both traditional and smart SC systems that make use of Blockchain and IoT technologies. We demonstrated the key design considerations in terms of traceability in addition to a quality model to consider when designing smart Blockchain-based SC systems. In addition, we proposed an Intelligent Blockchain IoT-enabled fish SC framework that uses DLT for the trackability and traceability of fish products throughout harvesting, processing, packaging, shipping, and distribution to final delivery. More precisely, the proposed framework should be able to provide valuable and timely information that can be used to track and trace the fish product and verify its authenticity throughout the chain. Unlike other work, we have investigated the benefits of integrating machine learning (ML) into Blockchain IoT-enabled SC systems, focusing the discussion on the role of ML in fish quality, freshness assessment and fraud detection.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; fish supply chain; Internet of Things; machine learning; traceability; security; anti-fraud
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【DOI】 10.3390/s23115136
【Author】 Lee, JoonYoung Kim, MyeongHyun Park, KiSung Noh, SungKee Bisht, Abhishek Das, Ashok Kumar Park, Youngho
【影响因子】3.847
【主题类别】
--
【Abstract】Recently, with the increasing application of the Internet of Things (IoT), various IoT environments such as smart factories, smart homes, and smart grids are being generated. In the IoT environment, a lot of data are generated in real time, and the generated IoT data can be used as source data for various services such as artificial intelligence, remote medical care, and finance, and can also be used for purposes such as electricity bill generation. Therefore, data access control is required to grant access rights to various data users in the IoT environment who need such IoT data. In addition, IoT data contain sensitive information such as personal information, so privacy protection is also essential. Ciphertext-policy attribute-based encryption (CP-ABE) technology has been utilized to address these requirements. Furthermore, system structures applying blockchains with CP-ABE are being studied to prevent bottlenecks and single failures of cloud servers, as well as to support data auditing. However, these systems do not stipulate authentication and key agreement to ensure the security of the data transmission process and data outsourcing. Accordingly, we propose a data access control and key agreement scheme using CP-ABE to ensure data security in a blockchain-based system. In addition, we propose a system that can provide data nonrepudiation, data accountability, and data verification functions by utilizing blockchains. Both formal and informal security verifications are performed to demonstrate the security of the proposed system. We also compare the security, functional aspects, and computational and communication costs of previous systems. Furthermore, we perform cryptographic calculations to analyze the system in practical terms. As a result, our proposed protocol is safer against attacks such as guessing attacks and tracing attacks than other protocols, and can provide mutual authentication and key agreement functions. In addition, the proposed protocol is more efficient than other protocols, so it can be applied to practical IoT environments.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】IoT data; CP-ABE; data validation; data nonrepudiation; data accountability; security; authentication
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【DOI】 10.3390/s23115173
【影响因子】3.847
【主题类别】
--
【Abstract】Security is one of the major concerns while designing robust protocols for underwater sensor networks (UWSNs). The underwater sensor node (USN) is an example of medium access control (MAC) that should control underwater UWSN, and underwater vehicles (UV) combined. Therefore, our proposed method, in this research, investigates UWSN combined with UV optimized as an underwater vehicular wireless network (UVWSN) that can completely detect malicious node attacks (MNA) from the network. Thus, MNA that engages the USN channel and launches MNA is resolved by our proposed protocol through SDAA (secure data aggregation and authentication) protocol deployed in UVWSN. SDAA protocol plays a significant role in secure data communication, as the cluster-based network design (CBND) network organization creates a concise, stable, and energy-efficient network. This paper introduces SDAA optimized network known as UVWSN. In this proposed SDAA protocol, the cluster head (CH) is authenticated through the gateway (GW) and the base station (BS) to guarantee that a legitimate USN oversees all clusters deployed in the UVWSN are securely established for providing trustworthiness/privacy. Furthermore, the communicated data in the UVWSN network guarantee that data transmission is secure due to the optimized SDAA models in the network. Thus, the USNs deployed in the UVWSN are securely confirmed to maintain secure data communication in CBND for energy efficiency. The proposed method is implemented and validated on the UVWSN for measuring reliability, delay, and energy efficiency in the network. The proposed method is utilized for monitoring scenarios for inspecting vehicles or ship structures in the ocean. Based on the testing results, the proposed SDAA protocol methods improve energy efficiency and reduce network delay compared to other standard secure MAC methods.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】SDAA; MNA; UWSN; UVWSN; UV; MAC; CBND; USN; BS; trustworthiness/privacy; energy efficiency; GW
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【DOI】 10.3390/s23115270
【Author】 Yadav, S. G. Shivaprasad Gunisetti, Loshma Koduri, Shirin Bhanu Scaria, Thomas Dixit, Anita Lokesh, S.
CCF-C
【影响因子】3.732
【主题类别】
--
【Abstract】The blockchain technology makes it possible to have a distributed, decentralized ecosystem without the need for a single power source. Blockchain technology has the most potential in the healthcare sector since it can be used to combine disparate systems, enhance the quality of electronic medical records, and adopt a more patient-centric perspective on healthcare systems. The goal is to make it possible for patients to use the data to support their medical care and to offer robust consent processes for data sharing between various institutions and apps. This work lays the groundwork for future studies on entirely decentralized dynamic data interoperability and integrity checks. The article will discuss how blockchain technology can help with the sharing and management of medical data, including the sharing and management of patient monitoring data from IoT devices. The performance of the work is tested by varying the count of users, and the work is found to be scalable.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Electronic health records; Healthcare system; Blockchain; IoT device
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【影响因子】3.715
【主题类别】
--
【Abstract】PurposeIndustry 4.0 accelerates the performance of supply chains, in particular, the reduction in supply chain cost (SCC) and improvement in supply chain flexibility (SCF). The aim of this study is to examine the role of Industry 4.0 on SCC and SCF, using network theory to explain the interrelationships.Design/methodology/approachData were collected from 182 manufacturing firms in Turkey. The partial least square structural equation modelling (PLS-SEM) was employed in testing the research hypotheses.FindingsThe results showed that Industry 4.0 positively affects SCC; however, no direct relationship was found between Industry 4.0 and SCF. Moreover, SCC was found to have a positive impact on SCF, while SCC was found to mediate the relationship between Industry 4.0 and SCF. An additional finding was that customer integration (CI) moderates the relationship between Industry 4.0 and SCC; however, CI does not moderate the relationship between Industry 4.0 and SCF.Practical implicationsThe research validates the role of Industry 4.0 on supply chain processes and thus provides valuable insights into supply chain practitioners and decision-makers interested in Industry 4.0 for supply chain management.Originality/valueIn view of the limited number of studies, this study empirically contributes to the literature on the relationships among Industry 4.0, SCC, SCF and CI.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Industry 4; 0; Supply chain cost; Supply chain flexibility; Supply chain management; Customer integration
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
CCF-C
【影响因子】3.488
【主题类别】
--
【Abstract】With high efficiency, low overhead, and high scalability, consortium blockchains have been gradually and deeply applied in various fields of society. Privacy preservation and information verifiability are essential for the application development of the consortium blockchains. The existing schemes of privacy preservation and information verifiability on the blockchain are mainly designed for public blockchains. Most of the existing privacy tokens are based on the less scalable Unspent Transaction Output (UTXO) model. The existing privacy tokens based on the account model either require offline information transfer or suffer from low efficiency and insufficient scalability. The consensus mechanism and operation process differences between the public and consortium blockchains make them impossible to apply in the consortium blockchains directly. While protecting the privacy of transaction information on consortium blockchains, there is no specific solution to both directly utilize the privacy tokens for transactions in the context of privacy information and verify the legitimacy of account balance changes before payments. This work proposes VmppToken, a verifiable and privacy-preserving account model on a consortium blockchain based on zero-knowledge Succinct Non-interactive ARguments of Knowledge (zk-SNARKs). By participants generating the private data relationship credentials for each token transaction using the zero-knowledge proof, it enables each endorsing peer node to verify the data relationship for the zero-knowledge proof credentials before writing the transaction into the ledger. VmppToken realizes the verifiability of transaction information while protecting the privacy of account balance and transaction amount and ensures the legitimacy of the transaction. We elaborate on the construction of VmppToken and analyze the security of the circuit constructed by zero-knowledge proof. We implement a prototype of the model on Hyperledger Fabric based on Libsnark and conduct comprehensive experiments to evaluate its efficiency and performance. Our experimental results demonstrate the effectiveness of the proposed model. The generation time of each proof is about 10-12 seconds, and the average time of credential verification is only 2.03 milliseconds. The transaction processing speed is about 660 Transactions Per Second (TPS) on a moderately equipped server.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Consortium blockchain; Privacy preservation; Account model; Verifiability; Zero-knowledge proof
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【Author】 Gould, Zachary Michael Isaac Mohanty, Vikram Reichard, Georg Saad, Walid Shealy, Tripp Day, Susan
【影响因子】3.252
【主题类别】
--
【Abstract】Distributed market structures for local, transactive energy trading can be modeled with ecological systems, such as mycorrhizal networks, which have evolved to facilitate interplant carbon exchange in forest ecosystems. However, the complexity of these ecological systems can make it challenging to understand the effect that adopting these models could have on distributed energy systems and the magnitude of associated performance parameters. We therefore simplified and implemented a previously developed blueprint for mycorrhizal energy market models to isolate the effect of the mycorrhizal intervention in allowing buildings to redistribute portions of energy assets on competing local, decentralized marketplaces. Results indicate that the applied mycorrhizal intervention only minimally affects market and building performance indicators-increasing market self-consumption, decreasing market self-sufficiency, and decreasing building weekly savings across all seasonal (winter, fall, summer) and typological (residential, mixed-use) cases when compared to a fixed, retail feed-in-tariff market structure. The work concludes with a discussion of opportunities for further expansion of the proposed mycorrhizal market framework through reinforcement learning as well as limitations and policy recommendations considering emerging aggregated distributed energy resource (DER) access to wholesale energy markets.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】transactive energy; wholesale energy markets; distributed energy resources; distributed ledgers; blockchain; bio-inspired computing; bio-inspired design; ecological modeling; multi-agent systems; mycorrhizal networks
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【DOI】 10.3390/en16104081
【影响因子】2.838
【主题类别】
--
【Abstract】This article addresses the telecommunications industry's priority of ensuring information security during the transition to next-generation networks. It proposes an image encryption system that combines watermarking techniques and a discrete fractional sine chaotic map. The authors also incorporate the principles of blockchain to enhance the security of transmitted and received image data. The proposed system utilizes a newly developed sine chaotic map with a fractional difference operator, exhibiting long-term chaotic dynamics. The complexity of this map is demonstrated by comparing it with three other fractional chaotic maps from existing literature, using bifurcation diagrams and the largest Lyapunov exponent. The authors also show the map's sensitivity to changes in initial conditions through time-series diagrams. To encrypt images, the authors suggest a method involving watermarking of two secret images and encryption based on blockchain technology. The cover image is watermarked with the two hidden images using discrete wavelet transformations. Then, the image pixels undergo diffusion using a chaotic matrix generated from the discrete fractional sine chaotic map. This encryption process aims to protect the image data and make it resistant to unauthorized access. To evaluate the algorithm, the authors perform statistical analysis and critical sensitivity analysis to examine its characteristics. They also analyse different attacks to assess the algorithm's ability to resist such threats and maintain image quality after decryption. The results demonstrate that the proposed algorithm effectively defends against attacks and ensures image security.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】discrete fractional calculus; chaotic map; bifurcation; image encryption; blockchain
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【DOI】 10.3390/app13116556
【影响因子】2.838
【主题类别】
--
【Abstract】The federated learning (FL) approach in machine learning preserves user privacy during data collection. However, traditional FL schemes still rely on a centralized server, making them vulnerable to security risks, such as data breaches and tampering of models caused by malicious actors attempting to gain access by masquerading as trainers. To address these issues that hamper the trustability of federated learning, requirements were analyzed for several of these problems. The findings revealed that issues, such as the lack of accountability management, malicious actor mitigation, and model leakage, remained unaddressed in prior works. To fill this gap, a blockchain-based trustable FL scheme, MAM-FL, is proposed with the focus on providing accountability to trainers. MAM-FL established a group of voters responsible for evaluating and verifying the validity of the model updates submitted. The effectiveness of MAM-FL was tested based on the reduction of malicious actors present on both trainers' and voters' sides and the ability to handle colluding participants. Experiments show that MAM-FL succeeded at reducing the number of malicious actors, despite the test case involving initial collusion in the system.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】federated learning; blockchain; trustability
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【DOI】 10.3390/app13116707
【影响因子】2.775
【主题类别】
--
【Abstract】Recent technological developments have substantially impacted on the music industry. The advent of Industry 4.0, which comprises technologies like artificial intelligence, big data, cloud computing, the Internet of things, and blockchain, has transformed the music industry value chain. Despite the significance of these changes, there is insufficient literature on how Industry 4.0 affects the entire value chain of the music industry and how music companies should adopt these changes according to their priority. This article presents findings from a study on how Industry 4.0 capabilities can alter the music industry's value chain and how music companies should adopt these capabilities. The capabilities were identified through a literature review and semi-structured interviews with technology experts. Participants from 16 countries, who were experts in Industry 4.0 technologies, were invited to assess the impact and practicability of the capabilities using a questionnaire. The capabilities were then classified into four categories based on their scores. Finally, through an electronic brainstorming session, strategies were proposed for companies to implement each category of the capabilities.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Industry 4; 0 technologies; Music industry; Value chain; Technology adoption strategies
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【影响因子】2.690
【主题类别】
--
【Abstract】With the development of the Internet, cyberattacks are becoming increasingly complex, sustained, and organized. Cyber threat intelligence sharing is one of the effective ways to alleviate the pressure on organizational or individual cyber security defense. However, the current cyber threat intelligence sharing lacks effective incentive mechanisms, resulting in mutual distrust and a lack of motivation to share among sharing members, making the security of sharing questionable. In this paper, we propose a blockchain-based cyber threat intelligence sharing mechanism (B-CTISM) to address the problems of free riding and lack of trust among sharing members faced in cyber threat intelligence sharing. We use evolutionary game theory to analyze the incentive strategy; the resulting evolutionarily stable strategy achieves the effect of promoting sharing and effectively curbing free-riding behavior. Then, the incentive strategy is deployed to smart contracts running in the trusted environment of blockchain, whose decentralization and tamper-evident properties can provide a trusted environment for participating members and establish trust without a third-party central institution to achieve secure and efficient cyber threat intelligence sharing. Finally, the effectiveness of the B-CTISM in facilitating and regulating threat intelligence sharing is verified through experimental simulation and comparative analysis.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】cyber threat intelligence; incentive mechanism; blockchain; evolutionary game theory; smart contracts
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【Author】 Xie, Wenyuan Lin, Liming Lyu, Ting Xu, Haitao
【影响因子】2.690
【主题类别】
--
【Abstract】In this paper, we study the resource allocation problem of multi-access edge computing (MEC) assisted satellite networks in ocean areas. Considering the demand heterogeneity of users and the limited resources of satellites, we propose an online multi-round auction-based resource allocation (OMARA) approach for resource trading between satellites and users, where satellites are the resource sellers and users are the related resource buyers. The proposed approach can effectively determine the price for the trading of resources and can match the service relationships accordingly between satellites and ground users. Finally, it is shown by the simulation experimental results that the proposed approach outperforms the other existing algorithms in maximizing service satisfaction.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】computing offloading; satellite; auction mechanism; resource allocation
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【Author】 Li, Lu Qin, Jiwei Luo, Jintao
【影响因子】2.690
【主题类别】
--
【Abstract】Federated learning (FL) is a technique that involves multiple participants who update their local models with private data and aggregate these models using a central server. Unfortunately, central servers are prone to single-point failures during the aggregation process, which leads to data leakage and other problems. Although many studies have shown that a blockchain can solve the single-point failure of servers, blockchains cannot identify or mitigate the effect of backdoor attacks. Therefore, this paper proposes a blockchain-based FL framework for defense against backdoor attacks. The framework utilizes blockchains to record transactions in an immutable distributed ledger network and enables decentralized FL. Furthermore, by incorporating the reverse layer-wise relevance (RLR) aggregation strategy into the participant's aggregation algorithm and adding gradient noise to limit the effectiveness of backdoor attacks, the accuracy of backdoor attacks is substantially reduced. Furthermore, we designed a new proof-of-stake mechanism that considers the historical stakes of participants and the accuracy for selecting the miners of the local model, thereby reducing the stake rewards of malicious participants and motivating them to upload honest model parameters. Our simulation results confirm that, for 10% of malicious participants, the success rate of backdoor injection is reduced by nearly 90% compared to Vanilla FL, and the stake income of malicious devices is the lowest.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; federated learning; backdoor attack; proof-of-stake; differential privacy
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【影响因子】2.690
【主题类别】
--
【Abstract】The Named Data Network (NDN) enables efficient content dissemination through interest-based retrieval, name-based routing, and content caching. In the industrial Internet architecture based on NDN, device identity distribution, identification, resolution, and routing rely on identification resolution technology. However, this approach presents challenges such as cache poisoning, interest packet flood attacks, and black hole attacks. Existing security schemes primarily focused on routing forwarding and verification fail to address critical concerns, including routing environment credibility and data leakage, while exhibiting poor time and space efficiency. To address these challenges, this paper proposes a lightweight behavior auditing scheme using blockchain technology. The scheme utilizes an improved Bloom filter to compress behavioral information like interest and data packets during the identification transmission process. The compressed data are subsequently uploaded to a blockchain for auditing, achieving efficient space and time utilization while maintaining feasibility.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】IIoT; NDN; identity resolution; blockchain; audit; bloom filter
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【Author】 Mathur, Garima Pandey, Anjana Goyal, Sachin
CCF-C
【影响因子】2.577
【主题类别】
--
【Abstract】In biological science, the study of DNA sequences is considered an important factor because it carries the genomic details that can be used by researchers and doctors for the early prediction of disease using DNA classification. The NCBI has the world's largest database of genetic sequences, but the security of this massive amount of data is currently the greatest issue. One of the options is to encrypt these genetic sequences using blockchain technology. As a result, this paper presents a survey on healthcare data breaches, the necessity for blockchain in healthcare, and the number of research studies done in this area. In addition, the report suggests DNA sequence classification for earlier disease identification and evaluates previous work in the field.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Healthcare; DNA sequence; Classification; Blockchain; Genomes; Genbank; Machine learning
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【Author】 Vignesh, R. Prasad, K. Mohana
CCF-C
【影响因子】2.577
【主题类别】
--
【Abstract】The concept of blockchain has attained more attention recently to promote secured encryption and decryption, especially in industrial explorations and research institutions. The secured authentication process is highly required in intelligent governance focusing on effective decision-making, common entity participation and openness. By this, resource usage, energy consumption and cost-efficiency can be greatly reduced. A Smart governance system is highly needed to observe and assess government workers' performance. As most systems are centralized, trust is lagging and prone to single-point failure issues. Also, employers or hackers tend to obtain data to favour individual workers. In most existing research works, the security is not maintained properly because of ineffective data handling and high latency. A decentralized system that promotes accountability, trust, transparency, tamper-resistance, security and reliability is required to overcome the existing issues. Hence, a novel Blockchain Assisted Decentralized Employee Performance Assessment (BDEPA) System is proposed in this research. Initially, the employee information like username or password is registered. During the encryption process, the keys are generated using Elliptic curve cryptography (ECC), whereas the optimal keys are chosen using an improved water wave's optimization (IWWO) algorithm. By this, higher security can be promoted among the users for secured encryption, whereas the data can be highly protected from third parties. The data are stored in a Quantum blockchain (QBC) to minimize energy costs and improve security. When accessing the data, employee authenticity is verified using the Adaptive hash multi-factor authentication (AHMFA) approach to avoid data loss, theft, and malicious attacks. In the data retrieval or decryption phase, Enhanced Diffie-Hellman (EDH) algorithm is used to secure data access. Performances like energy costs, delay, processing time, successful authentication, etc.; are analyzed through the implementation of the proposed work in PYTHON.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Decentralized network; Elliptic curve cryptography; Optimal key selection; Quantum blockchain; Adaptive hash multi-factor authentication; Enhanced Diffie-Hellman
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【Author】 Wen, Yean-Fu Wang, Chia-Pei
【影响因子】2.557
【主题类别】
--
【Abstract】In the era of global communication and the sharing economy, the demand for personal and ubiquitous storage among enterprises and individual users has increased; thus, the flexible expansion of the data access architecture has become crucial. According to the storage requirements, the aim of this study was to develop store and access mechanisms for achieving data privacy, decentralisation, and load balancing in a data storage system. We explore how factors such as data privacy, file segmentation, security processes, and auditing mechanisms affect the performance of ubiquitous storage systems. We developed a trust evaluation model to reduce the access error rates, which are caused by the abnormal storage hosts or transmission failed. The file segmentation and encryption methods are used to store data in untrustworthy decentralised hosts. Although such data can be decrypted, they are difficult to recognise because a part of the transformed file is adopted to protect user privacy. Furthermore, with the developed mechanism, any user can share their storage and computing power to achieve blockchain-based peer-to-peer storage functions. We conducted a series of simulations to evaluate and compare the performance of the proposed data privacy mechanism and existing data privacy mechanisms in ubiquitous storage. The results indicated that the proposed mechanism outperformed other mechanisms.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Data privacy; Sharing storage; System performance; File segment; Ubiquitous
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【影响因子】2.461
【主题类别】
--
【Abstract】The current trends in development and installation of solar and wind energy poses certain challenges over the stability of the future electricity grids. New regulations or energy storage systems will be essential to enable this large renewable penetration.In the present paper, a zero-emissions scenario composed solely of nuclear energy and renewables is proposed. The article analyzes the potential for nuclear power plants to perform the demand regulation function by coupling them with a crypto-asset mining facility, which provides a fast adaptation to the load-following re-quirements. The plant, operated at full power, will divert part of its energy to the mining facility when the electricity grid is saturated with renewable energy.An integral economic assessment of the coupled system is performed. To account for the uncertainties involved, different scenarios are assessed, varying the cryptocurrency price, network hashrate, hardware capa-bilities and lifespan. A profitability analysis is made comparing the benefits of both mining and selling energy to the grid, to the cost of producing that energy to find out if new-built plants would be positively balanced. The results show that only under circumstances of very high cryptoasset price and low network hashrate the cryp-tomining project would be profitable.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Nuclear energy; Load following; Duck curve; Cryptocurrency; Flexible operation
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【Author】 Shoaib, Muhammad Zhang, Shengzhong Ali, Hassan Akbar, Muhammad Azeem Hamza, Muhammad Rehman, Waheed Ur
【影响因子】2.352
【主题类别】
--
【Abstract】PurposeThis study aims to identify and prioritize the challenges to adopting blockchain in supply chain management and to make its taxonomic model. Moreover, validate whether these challenging factors exist in the real world and, if they exist, then in what percentage.Design/methodology/approachThis research adopted the fuzzy best-worst method (F-BWM), which integrates fuzzy set theory with the best-worst method to identify and prioritize the prominent challenges of the blockchain-based supply chain by developing a weighted multi-criteria model.FindingsA total of 20 challenges (CH's) were identified. Lack of storage capacity/scalability and lack of data privacy challenges were found as key challenges. The findings of this study will provide a robust framework of the challenges that will assist academic researchers and industry practitioners in considering the most significant category concerning their working area.Practical implicationsBlockchain provides the best solution for tracing and tracking where RFID has not succeeded. It can improve quality management in a supply chain network by improving standards and speeding up operations. For inventory management, blockchain provides transparency of documentation for both parties within no time.Originality/valueTo the best of the authors' knowledge, no previous research has adopted the fuzzy best-worst method to prioritize the identified challenges of blockchain implementation in the supply chain. Moreover, no study provides a taxonomic model for the challenges of implementing a blockchain-based supply chain.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Supply chain management; Challenges; Multiple criteria decision-making; Fuzzy best-worst method
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【DOI】 10.1108/K-01-2023-0046
【影响因子】2.303
【主题类别】
--
【Abstract】Now that we live in the digital age, the proliferation of Internet of Things (IoT) strategies raises various design concerns related to privacy for businesses. Patients' medical data poses an ethical and legal quandary for healthcare organisations, making security a difficult problem to solve. Early studies suggest that blockchain technology could be a substantial answer to the IoT's data security issues. It is therefore critical to ensure data security when designing a blockchain approach for healthcare applications. A blockchain-based data broadcast strategy with a categorization model in the healthcare industry is proposed in this study. Data from multiple IoT data providers, like blockchain, is used to make secure training algorithms. To ensure a safe and secure learning environment, Homomorphic Encryption (HE) technology is used. The oppositional-based harmony search (OHS) algorithm was used to make the best key for the HE algorithm. For the group of multiple shares of acquired images, a multiple-share creation (MSC) ideal is used. This gives privacy and security to the model. In addition, the blockchain technology is used to transmit data securely to the cloud server, which performs the classification model based on the convolutional neural network to determine the presence of disease. To summarise, the proposed model is known as the OHE-MSC based network, and it employs blockchain technology to create a secure and trustworthy platform for the exchange of data between many data providers using IoT and logging it in a shared ledger. Two benchmark datasets, such as the Breast Cancer Wisconsin Dataset (BCWD) and the Heart Disease Data Set (HDD), are used to evaluate the projected method's performance. Several parts of the simulation showed that the OHE-MSC-based network model achieved better performance than all other approaches.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Homomorphic encryption; Heart disease data set; Blockchain model; Oppositional based harmony search; Multiple share creation; Security
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【Author】 Nematollahi, Masoud Ghaffari, Ali Mirzaei, A.
【影响因子】2.303
【主题类别】
--
【Abstract】The Internet of Things (IoT) technology is used to develop a wide range of applications and services, including intelligent healthcare systems and virtual reality applications. Low processing power limits IoT devices' capabilities. It's common practice to use cloud services to do operations that would otherwise require a user's device to be overloaded with data. High latency, high traffic, and high energy consumption remain, though. Given the above concerns, Fog Computing (FC) should be applied in the IoT to speed up time-sensitive data processing and management. In this study, a novel architecture for offloading jobs and allocating resources in the IoT is presented. Sensors, controllers, and FC servers are all part of the upgraded system. The second layer uses the subtask pool approach to offload work and the Moth-Flame Optimization (MFO) algorithm combined with Opposition-based Learning (OBL) to distribute resources. This combination is known as OBLMFO. A stack cache approach is used to complete resource allocation in the second layer to avoid system load imbalance. In addition, the second layer relies on the blockchain to guarantee the accuracy of transaction data. Another way to put it is that the proposed architecture utilizes blockchain advantages to optimize resource distribution in the IoT. The evaluation of the OBLMFO model was done through the Python 3.9 environment, which contains a large variety of distinct jobs. The results show that the OBLMFO model reduced the delay factor by 12.18% and the energy consumed by 6.22%.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Internet of things; Fog computing; Task offloading; Resource allocation; Efficiency
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【影响因子】2.295
【主题类别】
--
【Abstract】Cryptocurrency returns are highly nonnormal, casting doubt on the standard performance metrics. We apply almost stochastic dominance, which does not require any assumption about the return distribution or degree of risk aversion. From 29 long-short cryptocurrency factor portfolios, we find eight that dominate our four benchmarks. Their returns cannot be fully explained by the three-factor coin model of Liu et al. So we develop a new three-factor model where momentum is replaced by a mispricing factor based on size and risk-adjusted momentum, which significantly improves pricing performance.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】almost stochastic dominance; asset pricing; cryptocurrencies; mispricing
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【DOI】 10.1111/eufm.12431
【影响因子】2.017
【主题类别】
--
【Abstract】Sporadic occurrences of transmissible diseases have severe and long-lasting effects on humankind throughout history. These outbreaks have molded the political, economic, and social aspects of human life. Pandemics have redefined some of the basic beliefs of modern healthcare, pushing researchers and scientists to develop innovative solutions to be better equipped for future emergencies. Numerous attempts have been made to fight Covid-19-like pandemics using technologies such as the Internet of Things, wireless body area network, blockchain, and machine learning. Since the disease is highly contagious, novel research in patients' health monitoring system is essential for the constant monitoring of pandemic patients with minimal or no human intervention. With the ongoing pandemic of SARS-CoV-2, popularly known as Covid-19, innovations for monitoring of patients' vitals and storing them securely have risen more than ever. Analyzing the stored patients' data can further assist healthcare workers in their decision-making process. In this paper, we surveyed the research works on remote monitoring of pandemic patients admitted in hospitals or quarantined at home. First, an overview of pandemic patient monitoring is given followed by a brief introduction of enabling technologies i.e. Internet of Things, blockchain, and machine learning to implement the system. The reviewed works have been classified into three categories; remote monitoring of pandemic patients using IoT, blockchain-based storage or sharing platforms for patients' data, and processing/analyzing the stored patients' data using machine learning for prognosis and diagnosis. We also identified several open research issues to set directions for future research.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Covid-19; Remote patient monitoring; IoT; Blockchain; Patient data processing; Machine learning
【发表时间】2023
【收录时间】2023-06-29
【文献类型】
【影响因子】1.528
【主题类别】
--
【Abstract】The conflict between climate change and energy scarcity has recently gained widespread attention. The development and promotion of green power and renewable energy is an efficient strategy to address this issue. The widespread use of distributed renewable energy in microgrids results in decentralized power supply. The features of distributed power trading, such as low single transaction volume and frequent transaction intervals, present both possibilities and problems to the green electricity market. The usual centralized control and selling of power are no longer appropriate in this circumstance. This study proposes a decentralized energy transaction system architecture in the microgrid and connects the double auction mechanism to achieve the interests of each participant based on blockchain technology and the status quo green power trade in China. Finally, using the trading strategy and model, this study constructs a real and operational energy trading platform, and simulated experiments demonstrate the dependability and efficacy of the proposed trading mechanism.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Energy trading; Blockchain; Micro-grid; Green power; Double auctions
【发表时间】2023
【收录时间】2023-06-29
【文献类型】