【Author】 Musamih, Ahmad Salah, Khaled Jayaraman, Raja Seghier, Mohamed Hamdan, Hamdan Ellaham, Samer Omar, Mohammed
【影响因子】8.957
【主题类别】
--
【Abstract】Claustrophobia is a widespread mental health issue that affects a significant portion of the population. Traditional approaches, such as exposure therapies, have shown efficacy but are limited by their inability to provide immersive and controlled environments for effective therapy. These methods often struggle to replicate the intensity and authenticity of claustrophobic scenarios and face challenges in data security and patient engagement. In this paper, we propose a blockchain and Non-Fungible Token (NFT)-based metaverse to create a decentralized, transparent, immersive, and secure platform for claustrophobia exposure therapy. Our approach integrates blockchain technology for decentralized data management and NFTs for incentivizing patient participation, offering a unique enhancement to traditional therapy methods. We develop four blockchain smart contracts to manage registration, access control, NFT management, progress monitoring, and incentives distribution. Our system architecture, sequence diagrams, and algorithms are presented to demonstrate the functionality of our solution. We validate our approach through functionality testing, cost evaluation, and security analysis. Specifically, we measure the gas consumption of the smart contracts, analyze transaction costs, and assess system security against vulnerabilities. Additionally, we leverage existing literature to support the effectiveness of NFTs as incentives and the role of blockchain in enhancing data security and participation. The results show improvements in therapy engagement and data security, validating the practical implications of integrating blockchain and metaverse technologies in mental health therapy. We discuss the practical implications, challenges, and limitations of our solution, along with guidelines for generalization. The source code is publicly available on GitHub.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Claustrophobia; Exposure therapy; Clinical trials; Blockchain; Metaverse; Virtual reality; NFTs
【发表时间】2024
【收录时间】2024-07-31
【文献类型】
【影响因子】6.017
【主题类别】
--
【Abstract】After the initial surge in decentralized finance, widespread public adoption did not materialize. A predominant portion of the populace harbors distrust towards the crypto asset market. Conversely, banks, serving as intermediaries in financial management, enjoy heightened trust. The contemporary development within the banking sector indicates an inclination towards integrating into the crypto asset market. This integration results in new business models for banking institutions and emergent opportunities for their clientele. Prior research addresses perceptions surrounding cryptocurrencies. The present research augments this field by investigating the acceptance of crypto assets. Specifically, we conducted an empirical user study to analyze investing behaviors. By adapting the theoretical framework of the technology acceptance model to the unique characteristics of crypto assets, we highlight acceptance drivers. Notable variances in awareness of crypto assets affect investment decisions. The findings of this study contribute to social welfare by identifying impediments to sustainable investment practices. Additionally, these insights facilitate a more sophisticated comprehension of strategic alternatives available to banking institutions.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Crypto assets; Digital assets; Acceptance; Investment banking; DeFi; Blockchain; G110; G41; G210
【发表时间】2024
【收录时间】2024-07-31
【文献类型】
【Author】 Lin, Hong Chen, Ke Jiang, Dawei Shou, Lidan Chen, Gang
【影响因子】4.243
【主题类别】
--
区块链技术-协同技术-联邦学习
【Abstract】
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2024
【收录时间】2024-07-31
【文献类型】
【影响因子】3.715
【主题类别】
--
【Abstract】PurposeThis study investigates the factors that lead to the adoption of blockchain technology through payment transactions and how this not only affects real estate (RE) and blockchain transparency but also RE performance.Design/methodology/approachData gathered across RE firms in the United Arab Emirates (UAE) were employed to test the model. The measurement model and structural equation modeling (SEM) were used to test the items and the hypotheses illustrated in the proposed model.FindingsPerceived financial benefits, competitive pressure and top manager support were demonstrated to successfully influence blockchain adoption (BA). Despite blockchain's early stages of development, its impact on RE operations cannot be ignored and should be more objectively examined in order to gain a better understanding of it. UAE blockchain-based companies could be seen as having a competitive advantage that maximizes resource consumption.Originality/valueThis study introduces the positive influence of blockchain technology on RE payment transactions and may advance information on how blockchain technology has the potential to change the RE sector. The paper finds its significance in exploring how RE payment systems must change to remain competitive in the market amid emerging digitalization trends.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Real estate; Blockchain adoption; Transparency; Blockchain technology; Structural equation modeling; United Arab Emirates
【发表时间】2024
【收录时间】2024-07-31
【文献类型】
【Author】 Liu, Chunyan Feng, Tao
CCF-C
【影响因子】3.488
【主题类别】
--
【Abstract】The surging interest in digitalization has revitalized research for digital business model. Mobile Internet of Things (IoT) terminals will reach billions and become an important infrastructure for a digital and intelligent society. In the digital business model of IoT terminals, the electronic seal of commercial contracts are especially investigated to provide the same level security as guaranteed by the traditional seal. However, the existing electronic seal is only applicable to the centralized network applications, which severely relies on the certificate authority. In this paper, we propose a blockchain-based multi-signature smart contract electronic seal scheme. The key of our design is to deploy a smart contract for business parties on Ethereum for secure electronic seal towards mobile IoT terminals. Unlike the traditional seal, this electronic seal is verified and managed collectively by all mining nodes. Combining it with optimizations in terms of a multi-signature algorithm encoded in the smart contract, our design achieves complete digital contract functionality for all business participants of terminals. As an example, we demonstrate an implementation on the Goerli testnet of the Ethereum network with the smart contract deployment. The security analysis and evaluation demonstrate that our design is secure in its multi-signature implementation and can be used in practice.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Business model; Commercial contract; Electronic seal; Smart contract
【发表时间】2024
【收录时间】2024-07-31
【文献类型】
【影响因子】3.476
【主题类别】
--
【Abstract】Blockchain technology is widely used in the field of e-commerce, but with the increasing variety of blockchains, there is a problem of how to interact with different blockchain assets. To address this issue, a new e-commerce transaction model based on an improved notary mechanism is proposed. Firstly, the model analyzes the interest interaction modes of buyers, sellers, and logistics companies through the e-commerce supply chain process. Based on this analysis, a three-party supervision transaction mechanism based on BLS (Boneh-Lynn-Shacham) signatures is proposed. The mechanism is designed so that the buyer, seller, and logistics company act as notaries for each other, forming a circular cross-chain supervision where the buyer is responsible for the seller, the seller is responsible for the logistics company, and the logistics company is responsible for the buyer. This ensures trustworthy cross-chain transactions under the premise of mutual distrust among the three parties.Then, the model combines elliptic curve cryptography and symmetric encryption to achieve privacy protection of the buyer's data on the blockchain. Finally, experimental results and scheme comparisons demonstrate that the proposed model has a low probability of malicious attacks and a high cost of attacks. Furthermore, the encryption and decryption efficiency of the used algorithm is superior to other comparison schemes, meeting the requirements of daily e-commerce activities.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Electronic commerce; Encryption; Supply chains; Transportation; Protection; Privacy; Smart contracts; Blockchain; E-commerce; smart contracts; privacy encryption; notary mechanisms
【发表时间】2024
【收录时间】2024-07-31
【文献类型】
【影响因子】3.476
【主题类别】
--
【Abstract】Flying Ad Hoc Networks (FANET) is an emerging area of research due to its low cost, high coverage and fast transmission features. In these networks, the flying nodes are connected with ground stations and communicate wirelessly, especially when the networks are congested and complex. Due to mobility, and lack of predefined infrastructure, these networks have suffered from various security and trust issues. The traditional trust and security solutions are designed for ground networks and are not feasible for these networks. This paper proposes a trust and authentication model including Trust Establishment Mechanism for FANET (TEM-FANET) and authentication system by using Block-chain method. The trust is calculated to evaluate the node's trust status and ensure the existence of the trustworthy nodes by using direct, indirect, and cumulative trust values. Whereas the authentication system is utilizing blockchain technology for nodes authentication and evaluate its feasibility. The proposed model is lightweight and able to monitor the node's behavior and compute the trusted quality and broadcast the node status with neighbor nodes. The proposed model is also integrated with ground stations for record keeping and decision-making processes. The proposed model is evaluated in simulation with state-of-the-art trust solutions where the results show the better performance in terms of overhead, data delivery, node detection rate, and computational time.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Security; Monitoring; Ad hoc networks; Drones; Blockchains; Authentication; Data communication; Trusted computing; Malware; Trust; evaluation; FANET; security; malicious; attacks; blockchain
【发表时间】2024
【收录时间】2024-07-31
【文献类型】
【Author】 Albekairi, Mohammed
【影响因子】3.476
【主题类别】
--
【Abstract】Accessibility to networks of communication and sensing equipment situated beneath the surface of vast bodies of water is made possible by the Internet of Underwater Things (IoUT). Adopting an Internet of Things (IoT) infrastructure to provide ubiquitous and pervasive access to information helps to improve the connectivity between the underwater systems and the onshore equipment. Accomplishing comprehensiveness in the analysis of data gathered is a laborious procedure made more difficult by the tangible features of the water bodies. A Mutable Sensor Data Analytics (MSDA) approach is proposed in this article to capitalize on the results of restricted data assimilation. To reduce the number of inaccuracies that occur during processing, the proposed analytics method is adaptable to any data that has been collected. Through blockchain-based evaluation, the dampened data patterns that contain unimportant data gathered by sensors are minimized from the relevant data. The technology behind Blockchain is utilized to transmit and distinguish information that has been condensed from earlier accumulation times. A classification method known as gradient descendent learning is used to differentiate between sensor data and noise. During this learning process, distinct patterns are determined, and an exact data assessment is performed instantly for extreme and low sensor data aggregation. Adequate experimental findings are utilized to validate the performance of the suggested analytics technique. Additionally, the accuracy, variation factor, identification ratio, time for processing, and delivery factor are used to validate the overall performance.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Reliability; Wireless sensor networks; Energy efficiency; Data analysis; Accuracy; Mathematical models; Internet of Things; Underwater communication; Data assimilation; Gradient methods; Pattern analysis; Internet of Underwater Things; blockchain; data assimilation; data analytics; gradient descendent; pattern differentiation
【发表时间】2024
【收录时间】2024-07-31
【文献类型】
CCF-A
【影响因子】3.183
【主题类别】
--
【Abstract】Users have become accustomed to storing data on the cloud using ciphertext policy attribute-based encryption (CP-ABE) for fine-grained access control. However, this encryption method does not consider the ability of malicious users to launch thousands of file download requests when launching an economic denial of sustainability attack (EDoS), which may be more expensive for data owners. Existing solutions typically use a cloud server to verify the download permissions of the data users. However, cloud servers are not completely trusted and cloud server providers and colluding data users can still launch an EDoS attack. With our scheme, using CP-ABE, a blockchain is introduced for verifying the download permission of data users. In addition, we propose a new mechanism to solve the problem of malicious user revocations under EDoS attacks by updating the ciphertext and symmetric encryption technology. A formal security proof has demonstrated that the proposed scheme is suitable for plaintext attack security. Theoretical and experimental analyses show that our scheme performs more efficiently than previous methods.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Cloud computing; Blockchains; Security; Servers; Access control; Encryption; Industrial Internet of Things; ciphertext-policy attributed-based encryption; cloud storage service; EDoS attacks; blockchain
【发表时间】2024
【收录时间】2024-07-31
【文献类型】
【DOI】 10.1109/TC.2024.3398502
【Author】 Zeng, Honghong Li, Jie Lou, Jiong Yuan, Shijing Wu, Chentao Zhao, Wei Wu, Sijin Wang, Zhiwen
CCF-A
【影响因子】3.183
【主题类别】
区块链技术-协同技术-联邦学习
【Abstract】Federated learning (FL) is a technique that enables clients to collaboratively train a model by sharing local models instead of raw private data. However, existing reconstruction attacks can recover the sensitive training samples from the shared models. Additionally, the emerging poisoning attacks also pose severe threats to the security of FL. However, most existing Byzantine-robust privacy-preserving federated learning solutions either reduce the accuracy of aggregated models or introduce significant computation and communication overheads. In this paper, we propose a novel Blockchain-based Secure and Robust Federated Learning (BSR-FL) framework to mitigate reconstruction attacks and poisoning attacks. BSR-FL avoids accuracy loss while ensuring efficient privacy protection and Byzantine robustness. Specifically, we first construct a lightweight non-interactive functional encryption (NIFE) scheme to protect the privacy of local models while maintaining high communication performance. Then, we propose a privacy-preserving defensive aggregation strategy based on NIFE, which can resist encrypted poisoning attacks without compromising model privacy through secure cosine similarity and incentive-based Byzantine-tolerance aggregation. Finally, we utilize the blockchain system to assist in facilitating the processes of federated learning and the implementation of protocols. Extensive theoretical analysis and experiments demonstrate that our new BSR-FL has enhanced privacy security, robustness, and high efficiency.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Servers; Computational modeling; Privacy; Federated learning; Data models; Blockchains; Training; privacy-preserving; functional encryption; poisoning attacks; blockchain
【发表时间】2024
【收录时间】2024-07-31
【文献类型】 实验仿真
【DOI】 10.1109/TC.2024.3404102
CCF-A
【影响因子】3.183
【主题类别】
--
【Abstract】Decentralized identity (DID) systems conforming to the World Wide Web Consortium (W3C) Decentralized Identifiers (DIDs) and Verifiable Credentials Data Model recommendations have recently attracted attention due to their better autonomy, interoperability, and openness design. However, those W3C recommendations lack a design for addressing the single point of failure (SPOF) and identity revocation, which could seriously compromise the robustness and practicality of DID systems. To remedy these limitations, we propose FutureDID, a DID system that enables multiple parties to jointly issue credentials and efficiently revoke DID identities, providing a robust and practical DID system. FutureDID is designed with a multi-party credential issuing mechanism based on distributed key generation technology, which transforms trust from a single entity to distributed committees and facilitates authentication between issuers, making it more resistant to SPOF. Moreover, the underlying blockchain system is built on a chameleon hash function to ensure tamper-proof and enable efficient identity revocation. We have implemented a prototype system using FISCO BCOS and conducted extensive evaluations to demonstrate the effectiveness and practicality of our system. Our evaluations have shown that FutureDID provides a significant improvement in efficiency, achieving at least a 60 x efficiency improvement in identity revocation compared to state-of-the-art systems.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Security; W3C; Resistance; Authentication; Privacy; Computers; Decentralized identity; blockchain; distributed key generation; chameleon hash function; identity revocation
【发表时间】2024
【收录时间】2024-07-31
【文献类型】
【DOI】 10.1109/TC.2024.3398509
CCF-A
【影响因子】3.183
【主题类别】
--
【Abstract】Blockchain technology has gained momentum due to its immutability and transparency. Several blockchain platforms, each with different consensus protocols, have been proposed. However, choosing and configuring such a platform is a non-trivial task. Numerous benchmarking tools have been introduced to test the performance of blockchain solutions. Yet, these tools are often limited to specific blockchain platforms or require complex configurations. Moreover, they tend to focus on one-off batch evaluation models, which may not be ideal for longer-running instances under continuous workloads. In this work, we present BlockCompass, an all-inclusive blockchain benchmarking tool that can be easily configured and extended. We demonstrate how BlockCompass can evaluate the performance of various blockchain platforms and configurations, including Ethereum Proof-of-Authority, Ethereum Proof-of-Work, Hyperledger Fabric Raft, Hyperledger Sawtooth with Proof-of-Elapsed-Time, Practical Byzantine Fault Tolerance, and Raft consensus algorithms, against workloads that continuously fluctuate over time. We show how continuous transactional workloads may be more appropriate than batch workloads in capturing certain stressful events for the system. Finally, we present the results of a usability study about the convenience and effectiveness offered by BlockCompass in blockchain benchmarking.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Benchmark testing; Distributed ledger; Fabrics; Generators; Consensus algorithm; Real-time systems; Benchmark; performance testing; blockchain; decentralized database; consensus protocols; software performance
【发表时间】2024
【收录时间】2024-07-31
【文献类型】
【DOI】 10.1109/TC.2024.3404103
【Author】 Narayan, Shivani Kumar, Dilip
【影响因子】2.853
【主题类别】
区块链治理-市场治理-价格预测
【Abstract】The study investigates the interconnectedness and risk spillover among a diverse range of financial assets, including thirty-three cryptocurrencies, thirteen sectoral indices, six exchange rates, four precious metals, and six energy commodities. Using diverse methodologies, including partial correlation network, dynamic causality index, Granger causality network, crossquantilogram and Bayesian graphical VAR model, the findings reveal intriguing insights, such as cryptocurrencies exhibiting a negative relation with other asset classes, minimal interconnectedness during the COVID-19 pandemic, and their vulnerability to shocks. Moreover, there is a stronger dependence structure from energy commodities and exchange rates to other classes, while moderate temporal dependencies exist between cryptocurrencies and other assets. These results emphasize the need for understanding and managing risks in the cryptocurrency market and highlight the interconnected nature of financial markets. The interconnectedness among various asset classes is mainly driven by variables representing market and economic sentiment, uncertainty and business confidence.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Risk spillover; Interconnectedness; Cryptocurrencies; Bayesian graphical VAR; Cross-quantilogram
【发表时间】2024
【收录时间】2024-07-31
【文献类型】 实证数据
【Author】 Farber, Shai Yehezkel, Snir Ahiad
【影响因子】2.562
【主题类别】
区块链治理-法律治理-恐怖主义
【Abstract】This study sheds light on the emerging threat of terrorists, particularly Hamas and other Palestinian terror organizations, leveraging online crowdfunding and cryptocurrencies. The recent events of October 7, 2023, highlight the pressing nature of this issue. A systematic case analysis reveals the sophisticated exploitation of digital finance for discreet resource accumulation, circumventing traditional oversight. The findings expose unidentified typologies and funding pathways, significantly bolstering terrorist resilience against interdiction efforts. This study provides vital knowledge to catalyze policy adaptations at this critical juncture by probing real-world implications that still lack coordinated responses. Ultimately, this study raises awareness about evolving asymmetries and underscores the importance of closing gaps in vigilance, necessitating academic and policy attention to inform agile, ethical countermeasures before technological vulnerabilities widen further.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Crowdfunding; cryptocurrencies; cyber terrorism; financial counterterrorism; fundraising campaigns
【发表时间】2024
【收录时间】2024-07-31
【文献类型】 实证数据
【Author】 Yin, Jiaqi Fei, Yuan
CCF-C
【影响因子】1.813
【主题类别】
--
【Abstract】Traditional IoT authentication methods, often centralized and reliant on a Trusted Third Party (TTP), face issues like high communication costs and vulnerability to data loss. Blockchain-based Internet of Things (IoT) authentication can effectively solve the problems brought by traditional IoT authentication. Because the authentication schemes are usually deployed on a large number of IoT devices it would be extremely expensive when there are issues to be fixed after the authentication schemes is deployed. Performing verification early at design time can alleviate this problem. To focus on these requirements, this article proposes a formal verification framework for blockchain-based IoT authentication (FVF-BIoT). Specifically, we design data type mapping and the conversion of elements in smart contracts for the authentication. Then we formalize the smart contracts into formal models in the interactive theorem prover Coq. Several algorithms are presented for the conversion of the smart contracts and the generation of examples. Examples and security properties related to contracts are described in the form of theorems, which are also proved by Coq. Through a case study, we not only demonstrate the effectiveness of the FVF-BIoT framework in ensuring the security and reliability of blockchain technology for IoT authentication but also highlight its innovative integration of formal verification processes. This distinctly addresses the previously unmet need for rigorous, mathematically proven security validations in the design and deployment of blockchain-based IoT authentication methods.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Formal verification; Theorem proving; Blockchain; Smart contract; IoT authantication
【发表时间】2024
【收录时间】2024-07-31
【文献类型】
【Author】 Kumar, M. Prasanna Nalini, N.
【影响因子】1.630
【主题类别】
区块链应用-实体经济-电力领域
【Abstract】Internet of Things (IoT)-based smart grid employs IoT smart devices which gather private data about electricity from consumers and distribute data to service providers via an open network, causing new security issues. In order to overcome these restrictions, an efficient chaotic MHT-PUF based IoT device authentication with QPBFT for smart grid infrastructure has been proposed. The IoT devices from the manufacturers are initially registered to cloud based on the PUF mechanism by generating challenge-response pair, and these responses are stored in blockchain for authentication. Following IoT device authentication, data transmission depends on the chaotic Merkle hash tree cryptography to generate the key and encryption of message. Next, the data will be securely transacted to the blockchain by utilizing the QPBFT consensus algorithm to store the encrypted data. Consensus is a technique used in blockchain to ensure that all nodes concur on the network's current state and the authenticity of transactions. The model that has been created is assessed using the program called Python. The evaluation performances of the proposed method are 0.0209 ms of encryption time, 0.0851 ms of decryption time, 0.1899 ms of block generation time, 1.41 ms of key generation time, 480.92 kbps of throughput, 0.1013 ms of transaction delay, 6% of packet loss and 94% of PDR. Thus, the proposed model with an efficient chaotic MHT-PUF based IoT device authentication with QPBFT operates well for effectively storing and securing data in smart grid infrastructure.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Smart grid (SG); IoT; Chaotic Merkle hash tree (MHT); Quantified role-based practical Byzantine fault tolerance; Physical unclonable function (PUF)
【发表时间】2024
【收录时间】2024-07-31
【文献类型】 实验仿真
【Author】 Xiu, Chen
【影响因子】1.281
【主题类别】
--
【Abstract】Managing athlete health archives data from the perspective of public health is essential for disease surveillance, outbreak response, evidence-based interventions, policy development, and collaborative efforts. By leveraging this data effectively, public health organizations can enhance their ability to monitor and protect the health of athletes, as well as the broader population. It is particularly important to monitor and share exercise status and human health data to prevent sports injuries caused by improper exercise during exercise. Therefore, this article proposes a storage and sharing model for athletes' health Archive data based on blockchain distributed decision-making to achieve safe storage and sharing of athletes' health data. First, the design goals and requirements of the distributed decision-making authentication system are clarified. Build DID data structure and athlete health Archive data management based on blockchain and DID technical standards. Utilize the characteristics of blockchain data such as traceability, non-tamperability, openness and transparency to solve the problem of mutual trust in athlete identity authentication systems. The overall architecture of the blockchain-based distributed athlete health Archive authentication system and the design of each functional module of the identity authentication system were also designed, including identity registration, verification, authorization, etc. The unique identity identifier is used as the athlete's identity, the public and private keys are used for signature and verification, and the Merkel tree is used to record and verify the athlete's data records. Based on the blockchain platform, the smart contract security execution process is used to store athlete identity information on the blockchain, ensuring that access records are traceable and tamper -proof.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Public Health; Data Sharing; Blockchain; Athlete Health Archives
【发表时间】2024
【收录时间】2024-07-31
【文献类型】
【影响因子】1.142
【主题类别】
--
【Abstract】With the rapid growth of wireless mobile networks and the proliferation of user-generated content, ensuring efficient and effective content moderation has become imperative. To address the challenges posed by the increasing workload in content moderation, along with the lack of management in third-party moderation, this paper presents a decentralized quality management mechanism for content moderation in wireless mobile networks. Our approach leverages permissioned blockchain to establish a transparent and trustworthy infrastructure. Through the utilization of smart contracts, we automate content moderation management rules, thereby enhancing management efficiency. Our mechanism combines quality evaluation and monetary incentives based on historical authenticity data. This not only incentivizes participants to consistently provide high-quality services but also ensures fairness within the system. Experimental results demonstrate the effectiveness of our approach in encouraging high-quality contributions, deterring low-quality data from bad-behaved participants, and improving performance. Security analysis reveals that the cost of collusion outweighs the potential benefits.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】decentralized quality management; content moderation; permissioned blockchain; smart contract; decentralized autonomous organization (DAO)
【发表时间】2024
【收录时间】2024-07-31
【文献类型】
【作者】 王栋; 冯景丽; 李达; 牛静伟; 李军
【作者单位】国网区块链科技(北京)有限公司;北京信息科技大学计算机学院;
【文献来源】中国电力
【复合影响因子】2.333
【综合影响因子】1.944
【主题类别】
区块链应用-实体经济-能源领域
【摘要】构建了基于能源电力区块链的园区碳排放可信监测数字模型。首先,利用区块链防篡改技术保障监测数据的可信存证要求,相关接入实体指标全部由联盟链进行身份认证和权限控制,避免了数据遗失以及主体以外其他人恶意篡改的风险;其次,在具体的监测指标融合过程中,结合层次分析法,构建碳排放评价指标融合策略,对能源电力相关指标数据结合相似性聚类算法进行多源在线融合;最后,基于局部异常因子算法(local outlier factor,LOF)实现指标数据长周期异常离群检测,一定程度上解决数据畸变和错报自筛难题。
【关键词】区块链;;碳排放监测;;层次决策
【文献类型】 实证数据
【发表时间】2024-07-31
【作者】 王璞; 高湛云; 王振飞; 宋哲理
【作者单位】郑州大学计算机与人工智能学院;郑州财税金融职业学院信息技术系;
【文献来源】计算机科学
【复合影响因子】1.722
【综合影响因子】1.149
【主题类别】
区块链技术-核心技术-共识机制
【摘要】区块链技术在物联网场景的应用中具有强数据安全性和高可信度的优势,但区块链技术中的共识算法存在能耗高、计算成本高、可扩展性低等缺点,在物联网应用中部署区块链系统面临物联网节点低存储容量、低能耗和低计算能力的问题。本文在实用拜占庭容错算法(PBFT)的基础上,提出一种物联网场景下基于信誉预测模型的共识协议(BDBFT)。首先,根据分组策略的地理位置分类标准对节点进行分组以选取共识节点,减少组内通信的通信时延;其次,引入基于Dirichlet分布的细粒度信誉预测模型,根据每轮视图生命周期中的信誉信息动态地更新模型,并基于历史信誉信息和当前信誉信息投票高预测概率的节点作为共识节点。仿真实验结果表明,相对于PBFT算法和LRBFT算法,BDBFT算法有效降低拜占庭节点参与共识的概率,在时间延迟、吞吐量、通信开销和安全性这四个方面具有明显的性能提升。
【关键词】物联网;;区块链;;PBFT;;Dirichlet分布;;分组策略;;信誉预测模型
【文献类型】 实验仿真
【发表时间】2024-07-31