Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems...Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems.展开更多
Thucydides asserts that the occupation of Decelea by the Spartans in 413 BC made the grain supply for Athens costly by forcing the transport from land onto the sea.This calls into question the well-established consens...Thucydides asserts that the occupation of Decelea by the Spartans in 413 BC made the grain supply for Athens costly by forcing the transport from land onto the sea.This calls into question the well-established consensus that sea transport was far cheaper than land transport.This paper contends that the cost of protecting supply lines-specifically the expenses associated with the warships which escorted the supply ships-rendered the grain transported on the new route exceptionally costly.In this paper,the benefits and drawbacks of a maritime economy,including transaction costs,trade dependencies,and the capabilities of warships and supply ships are discussed.展开更多
Most traditional trust computing models in E-commerce do not take the transaction frequency among participating entities into consideration,which makes it easy for one party of the transaction to obtain a high trust v...Most traditional trust computing models in E-commerce do not take the transaction frequency among participating entities into consideration,which makes it easy for one party of the transaction to obtain a high trust value in a short time,and brings many disadvantages,uncertainties and even attacks.To solve this problem,a transaction frequency based trust is proposed in this study.The proposed method is composed of two parts.The first part is built on the classic Bayes analysis based trust modelswhich are ease of computing for the E-commerce system.The second part is the transaction frequency module which can mitigate the potential insecurity caused by one participating entity gaining trust in a short time.Simulations show that the proposed method can effectively mitigate the self-promoting attacks so as to maintain the function of E-commerce system.展开更多
Rapidly increasing cryptocurrency prices have encouraged cryptocurrency miners to participate in cryptocurrency production,increasing network hashrates and electricity consumption.Growth in network hashrates has furth...Rapidly increasing cryptocurrency prices have encouraged cryptocurrency miners to participate in cryptocurrency production,increasing network hashrates and electricity consumption.Growth in network hashrates has further crowded out small cryptocurrency investors owing to the heightened costs of mining hardware and electricity.These changes prompt cryptocurrency miners to become new investors,leading to cryptocurrency price increases.The potential bidirectional relationship between cryptocurrency price and electricity consumption remains unidentified.Hence,this research thus utilizes July 312015–July 122019 data from 13 cryptocurrencies to investigate the short-and long-run causal effects between cryptocurrency transaction and electricity consumption.Particularly,we consider structural breaks induced by external shocks through stationary analysis and comovement relationships.Over the examined time period,we found that the series of cryptocurrency transaction and electricity consumption gradually returns to mean convergence after undergoing daily shocks,with prices trending together with hashrates.Transaction fluctuations exert both a temporary effect and permanent influence on electricity consumption.Therefore,owing to the computational power deployed to wherever high profit is found,transactions are vital determinants of electricity consumption.展开更多
Accounting Information System(AIS),which is the foundation of any enterprise resource planning(ERP)system,is often built as centralized system.The technologies that allow the Internet-of-Value,which is built onfive asp...Accounting Information System(AIS),which is the foundation of any enterprise resource planning(ERP)system,is often built as centralized system.The technologies that allow the Internet-of-Value,which is built onfive aspects that are network,algorithms,distributed ledger,transfers,and assets,are based on blockchain.Cryptography and consensus protocols boost the blockchain plat-form implementation,acting as a deterrent to cyber-attacks and hacks.Blockchain platforms foster innovation among supply chain participants,resulting in ecosys-tem development.Traditional business processes have been severely disrupted by blockchains since apps and transactions that previously required centralized struc-tures or trusted third-parties to authenticate them may now function in a decentra-lized manner with the same level of assurance.Because a blockchain split in AIS may easily lead to double-spending attacks,reducing the likelihood of a split has become a very important and difficult research subject.Reduced block relay time between the nodes can minimize the block propagation time of all nodes,resulting in better Bitcoin performance.In this paper,three problems were addressed on transaction and block propagation mechanisms in order to reduce the likelihood of a split.A novel algorithm for blockchain is proposed to reduce the total pro-pagation delay in AIS transactions.Numerical results reveal that,the proposed algorithm performs better and reduce the transaction delay in AIS as compared with existing methods.展开更多
The purpose of this research is to deal with effective block chain framework for secure transactions.The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved ...The purpose of this research is to deal with effective block chain framework for secure transactions.The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved in Blockchain and to tackle this issue,Cross-Chain based Transaction(CCT)is introduced.Traditional industries have been restructured by the introduction of Internet of Things(IoT)to become smart industries through the feature of data-driven decision-making.Still,there are a few limitations,like decentralization,security vulnerabilities,poor interoperability,as well as privacy concerns in IoTs.To overcome this limitation,Blockchain has been employed to assure a safer transaction process,especially in asset exchanges.In recent decades,scalable local ledgers implement Blockchains,simultaneously sustaining peer validations of transactions which can be at local or global levels.From the single Hyperledger-based blockchains system,the CCT takes the transaction amid various chains.In addition,the most significant factor for this registration processing strategy is the Signature to ensure security.The application of the Quantum cryptographic algorithm amplifies the proposed Hyperledger-based blockchains,to strengthen the safety of the process.The key has been determined by restricting the number of transactions that reach the global Blockchain using the quantum-based hash function and accomplished by scalable local ledgers,and peer validations of transactions at local and global levels without any issues.The rate of transaction processing for entire peers has enhanced with the ancillary aid of the proposed solution,as it includes the procedure of load distribution.Without any boosted enhancement,the recommended solution utilizes the current transaction strategy,and also,it’s aimed at scalability,resource conservation,and interoperability.The experimental results of the system have been evaluated using the metrics like block weight,ledger memory,the usage of the central processing unit,and the communication overhead.展开更多
Accurate and seamless auxiliary services in the power market can guarantee smooth and continuous power system operation. China’s new round of power system reform has entered a critical period, and reform implementati...Accurate and seamless auxiliary services in the power market can guarantee smooth and continuous power system operation. China’s new round of power system reform has entered a critical period, and reform implementation requires comprehensive improvements in the maturity of the supporting auxiliary service market. This study reviews the development status and evolution path of the European unified power market and the US regional power market, provides experience for the development of China’s regional power market, then identifies the key influencing factors of auxiliary service trading mechanism design in regional power markets. To analyze the rationality of the auxiliary service trading evaluation index, this paper established an evaluation model for assessing regional power markets. Using combined weight optimization, the gray correlation TOPSIS method was applied to comprehensively evaluate auxiliary service trading in the regional power market. Finally, the application of the proposed evaluation method was briefly analyzed to examine four regional power markets in China and evaluate the effectiveness of current market construction in different regions and provide suggestions for future market construction.展开更多
In the context of the joint operation of China’s intra-provincial markets and inter-provincial trading,how to meet the load demand and energy consumption using inter-provincial renewable energy trading is a key probl...In the context of the joint operation of China’s intra-provincial markets and inter-provincial trading,how to meet the load demand and energy consumption using inter-provincial renewable energy trading is a key problem.The combined operation of intra-provincial and inter-provincial markets provides a new way for provincial power companies to optimize and clear the intra-provincial power market,complete the intra-provincial consumption responsibility weight index,and consume renewable energy across provinces and regions.This paper combines power generation and consumption within the province,uses inter-provincial renewable energy trading tomeet the load demand within the province and completes the index of intra-provincial consumption responsibility weights.The intra-provincial market trading and inter-provincial market clearing are respectively taken as the upper and lower levels of the model.Under the two-level electricity market operation framework,the upper-level model aims to minimize the expected total operating cost within the province considering the carbon emission cost and the weight of the consumption responsibility,while the lower-level model aims to minimize the inter-provincial renewable energy purchasing cost.Finally,the influence of inter-provincial transaction mechanism,risk aversion coefficient,voucher price,and responsibility weight on operating cost is analyzed.Simulation is used to verify that the proposed model can meet the requirements of the provincial load power consumption and the consumption responsibility weight index,and promote the consumption of renewable energy.展开更多
Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests from both industrial and academic communities. With its rapid development, the cryptocurrency transaction network embedding(C...Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests from both industrial and academic communities. With its rapid development, the cryptocurrency transaction network embedding(CTNE) has become a hot topic. It embeds transaction nodes into low-dimensional feature space while effectively maintaining a network structure,thereby discovering desired patterns demonstrating involved users' normal and abnormal behaviors. Based on a wide investigation into the state-of-the-art CTNE, this survey has made the following efforts: 1) categorizing recent progress of CTNE methods, 2) summarizing the publicly available cryptocurrency transaction network datasets, 3) evaluating several widely-adopted methods to show their performance in several typical evaluation protocols, and 4) discussing the future trends of CTNE. By doing so, it strives to provide a systematic and comprehensive overview of existing CTNE methods from static to dynamic perspectives,thereby promoting further research into this emerging and important field.展开更多
A blockchain-based power transaction method is proposed for Active Distribution Network(ADN),considering the poor security and high cost of a centralized power trading system.Firstly,the decentralized blockchain struc...A blockchain-based power transaction method is proposed for Active Distribution Network(ADN),considering the poor security and high cost of a centralized power trading system.Firstly,the decentralized blockchain structure of the ADN power transaction is built and the transaction information is kept in blocks.Secondly,considering the transaction needs between users and power suppliers in ADN,an energy request mechanism is proposed,and the optimization objective function is designed by integrating cost aware requests and storage aware requests.Finally,the particle swarm optimization algorithm is used for multi-objective optimal search to find the power trading scheme with the minimum power purchase cost of users and the maximum power sold by power suppliers.The experimental demonstration of the proposed method based on the experimental platform shows that when the number of participants is no more than 10,the transaction delay time is 0.2 s,and the transaction cost fluctuates at 200,000 yuan,which is better than other comparison methods.展开更多
This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data ...This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data in the stock market being crucial, the implementation of robust systems which guarantee trust between the different actors is essential. We therefore proposed, after analyzing the limits of several security approaches in the literature, an architecture based on blockchain technology making it possible to both identify and reduce the vulnerabilities linked to the design, implementation work or the use of web applications used for transactions. Our proposal makes it possible, thanks to two-factor authentication via the Blockchain, to strengthen the security of investors’ accounts and the automated recording of transactions in the Blockchain while guaranteeing the integrity of stock market operations. It also provides an application vulnerability report. To validate our approach, we compared our results to those of three other security tools, at the level of different metrics. Our approach achieved the best performance in each case.展开更多
Petroleum, the most important energy source in the world, plays an essential role in securing economic development. If a petroleum shortage happens, it will severely disrupt production and life. Cross-regional emergen...Petroleum, the most important energy source in the world, plays an essential role in securing economic development. If a petroleum shortage happens, it will severely disrupt production and life. Cross-regional emergency scheduling can effectively alleviate a petroleum shortage and further enhance the efficiency of the emergency response. Considering the general lack of focus on cross-regional petroleum dispatching management, we propose a three-layer emergency scheduling network for petroleum based on a supernetwork model that can increase the regional emergency correlation by adding a transfer management process. Then, we compare the total demand for petroleum and the emergency costs considered in the petroleum emergency scheduling supernetwork model(the single-region and the cross-region scenarios).The result shows that the cross-regional emergency scheduling pattern can effectively enhance the efficiency of the emergency preparations and reduce the emergency costs in most cases. However, when the vulnerabilities in the crossregional link grow or the regional linkage decreases, the effect of single-regional scheduling is better. In addition, the advantages of the cross-regional emergency scheduling network will be strengthened with an increase in its maximum emergency capability. Nonetheless, this advantage will disappear when the petroleum demand in the crisis layer reaches the maximum emergency response capacity. Finally, according to the comparative analysis simulation among scenarios,certain strategic policy recommendations are suggested to improve the petroleum emergency scheduling ability in regions.These recommendations include strengthening the cross-regional coordination mechanism, increasing the modes of petroleum transportation and enhancing the carrying capacity of regional emergency routes.展开更多
As the typical peer-to-peer distributed networks, blockchain systemsrequire each node to copy a complete transaction database, so as to ensure newtransactions can by verified independently. In a blockchain system (e.g...As the typical peer-to-peer distributed networks, blockchain systemsrequire each node to copy a complete transaction database, so as to ensure newtransactions can by verified independently. In a blockchain system (e.g., bitcoinsystem), the node does not rely on any central organization, and every node keepsan entire copy of the transaction database. However, this feature determines thatthe size of blockchain transaction database is growing rapidly. Therefore, with thecontinuous system operations, the node memory also needs to be expanded tosupport the system running. Especially in the big data era, the increasing networktraffic will lead to faster transaction growth rate. This paper analyzes blockchaintransaction databases and proposes a storage optimization scheme. The proposedscheme divides blockchain transaction database into cold zone and hot zone usingexpiration recognition method based on Least Recently Used (LRU) algorithm. Itcan achieve storage optimization by moving unspent transaction outputs outsidethe in-memory transaction databases. We present the theoretical analysis on theoptimization method to validate the effectiveness. Extensive experiments showour proposed method outperforms the current mechanism for the blockchaintransaction databases.展开更多
Cloud computing is the highly demanded technology nowadays.Due to the service oriented architecture,seamless accessibility and other advantages of this advent technology,many transaction rich applications are making u...Cloud computing is the highly demanded technology nowadays.Due to the service oriented architecture,seamless accessibility and other advantages of this advent technology,many transaction rich applications are making use of it.At the same time,it is vulnerable to hacks and threats.Hence securing this environment is of at most important and many research works are being reported focusing on it.This paper proposes a safe storage mechanism using Elliptic curve cryptography(ECC)for the Transaction Rich Applications(TRA).With ECC based security scheme,the security level of the protected system will be increased and it is more suitable to secure the delivered data in the portable devices.The proposed scheme shields the aligning of different kind of data elements to each provider using an ECC algorithm.Analysis,comparison and simulation prove that the proposed system is more effective and secure for the Transaction rich applications in Cloud.展开更多
This paper deals with how to implement AMBA bus transaction level modeling in SystemC. There are two main techniques used in the whole modeling process, which consist of starting the platform modeling at the transacti...This paper deals with how to implement AMBA bus transaction level modeling in SystemC. There are two main techniques used in the whole modeling process, which consist of starting the platform modeling at the transaction level and using the uniformed modeling language— System C. According to the concepts of interface, port and hierarchical channel introduced in SystemC 2.0, the system of master-channel (AMBA bus) slave is created as the architecture of the AMBA bus transaction level model, which can make it more extendable. The port and interface classes of the model that are prone to program are defined in accordance with the SoC hierarchical design methodology. In addition, method calls, not signal communication, are used between different modules in the model, so the higher-level abstraction is achieved and the simulation performance is improved. The AMBA bus transaction level model is analyzed and certified by simulation experiment, and proved to be completely compliant to the AMBA specification 2.0. Key words AMBA - transaction level - SystemC - SoC CLC number TP 393 Foundation item: Supported by the National High Technology Development 863 Program of China (2002AA1Z1490)Biography: He Zhen (1979-), male, Master candidate, research direction: system level modeling in SoC hardware/software co-design.展开更多
We study the dividend optimization problem for an insurance company under the consideration of internal competition between different units inside company and transaction costs when dividends occur. The management of ...We study the dividend optimization problem for an insurance company under the consideration of internal competition between different units inside company and transaction costs when dividends occur. The management of the company controls the reinsurance rate, the timing and the amount of dividends paid out to maximize the expected total dividends paid out to the shareholders until ruin time. By solving the corresponding quasi-variational inequality, we obtain the optimal return function and the optimal strategy.展开更多
The purpose of present work is to examine the financial problem of finding the universal reservation prices of a European call option written on exchange rate when there is proportional transaction costs of trading fo...The purpose of present work is to examine the financial problem of finding the universal reservation prices of a European call option written on exchange rate when there is proportional transaction costs of trading foreign currency in the market. An approach is suggested to compute the reservation bid-ask price of foreign currency call option based on maximizing the investor's expected utility. Option prices are determined from the investor's basic portfolio selection problem, without the need to solve a more complex optimization problem involving the insertion of the option payoffs into the terminal value function. Option prices are computed numerically in a Markov chain approximation for the case of exponential utility. Numerical results show that the option price bounds are almost independent of the alternative risk aversion parameter, but the bounds of NT region becomes narrower and the range of values of the initial holding for which the fair price lies within the bid-ask spread is shifted to a lower value when the risk aversion parameter increases.展开更多
On the basis of analyzing essence of land ticket system of Chongqing Municipality and its transaction process,this paper studies the relationship between government and farmers and between city and countryside,and dis...On the basis of analyzing essence of land ticket system of Chongqing Municipality and its transaction process,this paper studies the relationship between government and farmers and between city and countryside,and discusses the drawbacks of land ticket system in Chongqing Municipality. Results show that inherent drawbacks of land ticket system and wrong guidance of policies lead to suspicion of land ticket system occupying rural resources. Interregional exploitation and intergenerational exploitation are inherent mechanism of city exploiting countryside. Finally,it proposes increasing construction land index to satisfy demand of new socialist countryside construction primarily,to ensure rural social stability; Later,use land ticket index to fill the gap of construction land in economically developed areas,so as to alleviate conflict of urban land use and maximize circulation value of rural construction land. It is expected to provide theoretical reference for relevant departments to regulate land ticket transaction system and realize the harmonious development,between urban and rural areas.展开更多
基金funded by the National Natural Science Foundation of China(62072056,62172058)the Researchers Supporting Project Number(RSP2023R102)King Saud University,Riyadh,Saudi Arabia+4 种基金funded by the Hunan Provincial Key Research and Development Program(2022SK2107,2022GK2019)the Natural Science Foundation of Hunan Province(2023JJ30054)the Foundation of State Key Laboratory of Public Big Data(PBD2021-15)the Young Doctor Innovation Program of Zhejiang Shuren University(2019QC30)Postgraduate Scientific Research Innovation Project of Hunan Province(CX20220940,CX20220941).
文摘Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems.
文摘Thucydides asserts that the occupation of Decelea by the Spartans in 413 BC made the grain supply for Athens costly by forcing the transport from land onto the sea.This calls into question the well-established consensus that sea transport was far cheaper than land transport.This paper contends that the cost of protecting supply lines-specifically the expenses associated with the warships which escorted the supply ships-rendered the grain transported on the new route exceptionally costly.In this paper,the benefits and drawbacks of a maritime economy,including transaction costs,trade dependencies,and the capabilities of warships and supply ships are discussed.
文摘Most traditional trust computing models in E-commerce do not take the transaction frequency among participating entities into consideration,which makes it easy for one party of the transaction to obtain a high trust value in a short time,and brings many disadvantages,uncertainties and even attacks.To solve this problem,a transaction frequency based trust is proposed in this study.The proposed method is composed of two parts.The first part is built on the classic Bayes analysis based trust modelswhich are ease of computing for the E-commerce system.The second part is the transaction frequency module which can mitigate the potential insecurity caused by one participating entity gaining trust in a short time.Simulations show that the proposed method can effectively mitigate the self-promoting attacks so as to maintain the function of E-commerce system.
基金funding agencies in the public,commercial,or notfor-profit sectors.
文摘Rapidly increasing cryptocurrency prices have encouraged cryptocurrency miners to participate in cryptocurrency production,increasing network hashrates and electricity consumption.Growth in network hashrates has further crowded out small cryptocurrency investors owing to the heightened costs of mining hardware and electricity.These changes prompt cryptocurrency miners to become new investors,leading to cryptocurrency price increases.The potential bidirectional relationship between cryptocurrency price and electricity consumption remains unidentified.Hence,this research thus utilizes July 312015–July 122019 data from 13 cryptocurrencies to investigate the short-and long-run causal effects between cryptocurrency transaction and electricity consumption.Particularly,we consider structural breaks induced by external shocks through stationary analysis and comovement relationships.Over the examined time period,we found that the series of cryptocurrency transaction and electricity consumption gradually returns to mean convergence after undergoing daily shocks,with prices trending together with hashrates.Transaction fluctuations exert both a temporary effect and permanent influence on electricity consumption.Therefore,owing to the computational power deployed to wherever high profit is found,transactions are vital determinants of electricity consumption.
基金supported by the Researchers Supporting Project(No.RSP-2021/395),King Saud University,Riyadh,Saudi Arabia.
文摘Accounting Information System(AIS),which is the foundation of any enterprise resource planning(ERP)system,is often built as centralized system.The technologies that allow the Internet-of-Value,which is built onfive aspects that are network,algorithms,distributed ledger,transfers,and assets,are based on blockchain.Cryptography and consensus protocols boost the blockchain plat-form implementation,acting as a deterrent to cyber-attacks and hacks.Blockchain platforms foster innovation among supply chain participants,resulting in ecosys-tem development.Traditional business processes have been severely disrupted by blockchains since apps and transactions that previously required centralized struc-tures or trusted third-parties to authenticate them may now function in a decentra-lized manner with the same level of assurance.Because a blockchain split in AIS may easily lead to double-spending attacks,reducing the likelihood of a split has become a very important and difficult research subject.Reduced block relay time between the nodes can minimize the block propagation time of all nodes,resulting in better Bitcoin performance.In this paper,three problems were addressed on transaction and block propagation mechanisms in order to reduce the likelihood of a split.A novel algorithm for blockchain is proposed to reduce the total pro-pagation delay in AIS transactions.Numerical results reveal that,the proposed algorithm performs better and reduce the transaction delay in AIS as compared with existing methods.
文摘The purpose of this research is to deal with effective block chain framework for secure transactions.The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved in Blockchain and to tackle this issue,Cross-Chain based Transaction(CCT)is introduced.Traditional industries have been restructured by the introduction of Internet of Things(IoT)to become smart industries through the feature of data-driven decision-making.Still,there are a few limitations,like decentralization,security vulnerabilities,poor interoperability,as well as privacy concerns in IoTs.To overcome this limitation,Blockchain has been employed to assure a safer transaction process,especially in asset exchanges.In recent decades,scalable local ledgers implement Blockchains,simultaneously sustaining peer validations of transactions which can be at local or global levels.From the single Hyperledger-based blockchains system,the CCT takes the transaction amid various chains.In addition,the most significant factor for this registration processing strategy is the Signature to ensure security.The application of the Quantum cryptographic algorithm amplifies the proposed Hyperledger-based blockchains,to strengthen the safety of the process.The key has been determined by restricting the number of transactions that reach the global Blockchain using the quantum-based hash function and accomplished by scalable local ledgers,and peer validations of transactions at local and global levels without any issues.The rate of transaction processing for entire peers has enhanced with the ancillary aid of the proposed solution,as it includes the procedure of load distribution.Without any boosted enhancement,the recommended solution utilizes the current transaction strategy,and also,it’s aimed at scalability,resource conservation,and interoperability.The experimental results of the system have been evaluated using the metrics like block weight,ledger memory,the usage of the central processing unit,and the communication overhead.
基金supported by the Beijing Power Exchange Center (Study on the Medium and Long Term Time Division Transaction Mode and Balance Mechanism of Electric Power)supported by the National Natural Science Foundation of China(No. 72171082)。
文摘Accurate and seamless auxiliary services in the power market can guarantee smooth and continuous power system operation. China’s new round of power system reform has entered a critical period, and reform implementation requires comprehensive improvements in the maturity of the supporting auxiliary service market. This study reviews the development status and evolution path of the European unified power market and the US regional power market, provides experience for the development of China’s regional power market, then identifies the key influencing factors of auxiliary service trading mechanism design in regional power markets. To analyze the rationality of the auxiliary service trading evaluation index, this paper established an evaluation model for assessing regional power markets. Using combined weight optimization, the gray correlation TOPSIS method was applied to comprehensively evaluate auxiliary service trading in the regional power market. Finally, the application of the proposed evaluation method was briefly analyzed to examine four regional power markets in China and evaluate the effectiveness of current market construction in different regions and provide suggestions for future market construction.
基金supported by National Natural Science Foundation of China (51977127)Shanghai Municipal Science and Technology Commission (19020500800)“Shuguang Program” (20SG52)Shanghai Education Development Foundation and Shanghai Municipal Education Commission.
文摘In the context of the joint operation of China’s intra-provincial markets and inter-provincial trading,how to meet the load demand and energy consumption using inter-provincial renewable energy trading is a key problem.The combined operation of intra-provincial and inter-provincial markets provides a new way for provincial power companies to optimize and clear the intra-provincial power market,complete the intra-provincial consumption responsibility weight index,and consume renewable energy across provinces and regions.This paper combines power generation and consumption within the province,uses inter-provincial renewable energy trading tomeet the load demand within the province and completes the index of intra-provincial consumption responsibility weights.The intra-provincial market trading and inter-provincial market clearing are respectively taken as the upper and lower levels of the model.Under the two-level electricity market operation framework,the upper-level model aims to minimize the expected total operating cost within the province considering the carbon emission cost and the weight of the consumption responsibility,while the lower-level model aims to minimize the inter-provincial renewable energy purchasing cost.Finally,the influence of inter-provincial transaction mechanism,risk aversion coefficient,voucher price,and responsibility weight on operating cost is analyzed.Simulation is used to verify that the proposed model can meet the requirements of the provincial load power consumption and the consumption responsibility weight index,and promote the consumption of renewable energy.
基金supported in part by the National Natural Science Foundation of China (62272078)the CAAI-Huawei MindSpore Open Fund (CAAIXSJLJJ-2021-035A)the Doctoral Student Talent Training Program of Chongqing University of Posts and Telecommunications (BYJS202009)。
文摘Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests from both industrial and academic communities. With its rapid development, the cryptocurrency transaction network embedding(CTNE) has become a hot topic. It embeds transaction nodes into low-dimensional feature space while effectively maintaining a network structure,thereby discovering desired patterns demonstrating involved users' normal and abnormal behaviors. Based on a wide investigation into the state-of-the-art CTNE, this survey has made the following efforts: 1) categorizing recent progress of CTNE methods, 2) summarizing the publicly available cryptocurrency transaction network datasets, 3) evaluating several widely-adopted methods to show their performance in several typical evaluation protocols, and 4) discussing the future trends of CTNE. By doing so, it strives to provide a systematic and comprehensive overview of existing CTNE methods from static to dynamic perspectives,thereby promoting further research into this emerging and important field.
基金supported by the Postdoctoral Research Funding Program of Jiangsu Province under Grant 2021K622C.
文摘A blockchain-based power transaction method is proposed for Active Distribution Network(ADN),considering the poor security and high cost of a centralized power trading system.Firstly,the decentralized blockchain structure of the ADN power transaction is built and the transaction information is kept in blocks.Secondly,considering the transaction needs between users and power suppliers in ADN,an energy request mechanism is proposed,and the optimization objective function is designed by integrating cost aware requests and storage aware requests.Finally,the particle swarm optimization algorithm is used for multi-objective optimal search to find the power trading scheme with the minimum power purchase cost of users and the maximum power sold by power suppliers.The experimental demonstration of the proposed method based on the experimental platform shows that when the number of participants is no more than 10,the transaction delay time is 0.2 s,and the transaction cost fluctuates at 200,000 yuan,which is better than other comparison methods.
文摘This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data in the stock market being crucial, the implementation of robust systems which guarantee trust between the different actors is essential. We therefore proposed, after analyzing the limits of several security approaches in the literature, an architecture based on blockchain technology making it possible to both identify and reduce the vulnerabilities linked to the design, implementation work or the use of web applications used for transactions. Our proposal makes it possible, thanks to two-factor authentication via the Blockchain, to strengthen the security of investors’ accounts and the automated recording of transactions in the Blockchain while guaranteeing the integrity of stock market operations. It also provides an application vulnerability report. To validate our approach, we compared our results to those of three other security tools, at the level of different metrics. Our approach achieved the best performance in each case.
基金supported by the Fundamental Research Funds for the Central Universities (Grant No. 2014XT06)
文摘Petroleum, the most important energy source in the world, plays an essential role in securing economic development. If a petroleum shortage happens, it will severely disrupt production and life. Cross-regional emergency scheduling can effectively alleviate a petroleum shortage and further enhance the efficiency of the emergency response. Considering the general lack of focus on cross-regional petroleum dispatching management, we propose a three-layer emergency scheduling network for petroleum based on a supernetwork model that can increase the regional emergency correlation by adding a transfer management process. Then, we compare the total demand for petroleum and the emergency costs considered in the petroleum emergency scheduling supernetwork model(the single-region and the cross-region scenarios).The result shows that the cross-regional emergency scheduling pattern can effectively enhance the efficiency of the emergency preparations and reduce the emergency costs in most cases. However, when the vulnerabilities in the crossregional link grow or the regional linkage decreases, the effect of single-regional scheduling is better. In addition, the advantages of the cross-regional emergency scheduling network will be strengthened with an increase in its maximum emergency capability. Nonetheless, this advantage will disappear when the petroleum demand in the crisis layer reaches the maximum emergency response capacity. Finally, according to the comparative analysis simulation among scenarios,certain strategic policy recommendations are suggested to improve the petroleum emergency scheduling ability in regions.These recommendations include strengthening the cross-regional coordination mechanism, increasing the modes of petroleum transportation and enhancing the carrying capacity of regional emergency routes.
基金supported by Researchers Supporting Project(No.RSP-2020/102)King Saud University,Riyadh,Saudi Arabiathe National Natural Science Foundation of China(Nos.61802031,61772454,61811530332,61811540410)+4 种基金the Natural Science Foundation of Hunan Province,China(No.2019JGYB177)the Research Foundation of Education Bureau of Hunan Province,China(No.18C0216)the“Practical Innovation and Entrepreneurial Ability Improvement Plan”for Professional Degree Graduate students of Changsha University of Science and Technology(No.SJCX201971)Hunan Graduate Scientific Research Innovation Project,China(No.CX2019694)This work is also supported by the Programs of Transformation and Upgrading of Industries and Information Technologies of Jiangsu Province(No.JITC-1900AX2038/01).
文摘As the typical peer-to-peer distributed networks, blockchain systemsrequire each node to copy a complete transaction database, so as to ensure newtransactions can by verified independently. In a blockchain system (e.g., bitcoinsystem), the node does not rely on any central organization, and every node keepsan entire copy of the transaction database. However, this feature determines thatthe size of blockchain transaction database is growing rapidly. Therefore, with thecontinuous system operations, the node memory also needs to be expanded tosupport the system running. Especially in the big data era, the increasing networktraffic will lead to faster transaction growth rate. This paper analyzes blockchaintransaction databases and proposes a storage optimization scheme. The proposedscheme divides blockchain transaction database into cold zone and hot zone usingexpiration recognition method based on Least Recently Used (LRU) algorithm. Itcan achieve storage optimization by moving unspent transaction outputs outsidethe in-memory transaction databases. We present the theoretical analysis on theoptimization method to validate the effectiveness. Extensive experiments showour proposed method outperforms the current mechanism for the blockchaintransaction databases.
文摘Cloud computing is the highly demanded technology nowadays.Due to the service oriented architecture,seamless accessibility and other advantages of this advent technology,many transaction rich applications are making use of it.At the same time,it is vulnerable to hacks and threats.Hence securing this environment is of at most important and many research works are being reported focusing on it.This paper proposes a safe storage mechanism using Elliptic curve cryptography(ECC)for the Transaction Rich Applications(TRA).With ECC based security scheme,the security level of the protected system will be increased and it is more suitable to secure the delivered data in the portable devices.The proposed scheme shields the aligning of different kind of data elements to each provider using an ECC algorithm.Analysis,comparison and simulation prove that the proposed system is more effective and secure for the Transaction rich applications in Cloud.
文摘This paper deals with how to implement AMBA bus transaction level modeling in SystemC. There are two main techniques used in the whole modeling process, which consist of starting the platform modeling at the transaction level and using the uniformed modeling language— System C. According to the concepts of interface, port and hierarchical channel introduced in SystemC 2.0, the system of master-channel (AMBA bus) slave is created as the architecture of the AMBA bus transaction level model, which can make it more extendable. The port and interface classes of the model that are prone to program are defined in accordance with the SoC hierarchical design methodology. In addition, method calls, not signal communication, are used between different modules in the model, so the higher-level abstraction is achieved and the simulation performance is improved. The AMBA bus transaction level model is analyzed and certified by simulation experiment, and proved to be completely compliant to the AMBA specification 2.0. Key words AMBA - transaction level - SystemC - SoC CLC number TP 393 Foundation item: Supported by the National High Technology Development 863 Program of China (2002AA1Z1490)Biography: He Zhen (1979-), male, Master candidate, research direction: system level modeling in SoC hardware/software co-design.
基金Supported by the National Natural Science Foundation of China(11371284)
文摘We study the dividend optimization problem for an insurance company under the consideration of internal competition between different units inside company and transaction costs when dividends occur. The management of the company controls the reinsurance rate, the timing and the amount of dividends paid out to maximize the expected total dividends paid out to the shareholders until ruin time. By solving the corresponding quasi-variational inequality, we obtain the optimal return function and the optimal strategy.
基金Supported by the Natural Science Foundation of Zhejiang Province (Y604137) the Altitude College Natural Science Foundation of JiangSu Province (KY205017).
文摘The purpose of present work is to examine the financial problem of finding the universal reservation prices of a European call option written on exchange rate when there is proportional transaction costs of trading foreign currency in the market. An approach is suggested to compute the reservation bid-ask price of foreign currency call option based on maximizing the investor's expected utility. Option prices are determined from the investor's basic portfolio selection problem, without the need to solve a more complex optimization problem involving the insertion of the option payoffs into the terminal value function. Option prices are computed numerically in a Markov chain approximation for the case of exponential utility. Numerical results show that the option price bounds are almost independent of the alternative risk aversion parameter, but the bounds of NT region becomes narrower and the range of values of the initial holding for which the fair price lies within the bid-ask spread is shifted to a lower value when the risk aversion parameter increases.
基金Supported by National Science and Technology Pillar Project of the Ministry of Science and Technology duringn the Twelfth Five-Year Plan Period(2012BAD141318)
文摘On the basis of analyzing essence of land ticket system of Chongqing Municipality and its transaction process,this paper studies the relationship between government and farmers and between city and countryside,and discusses the drawbacks of land ticket system in Chongqing Municipality. Results show that inherent drawbacks of land ticket system and wrong guidance of policies lead to suspicion of land ticket system occupying rural resources. Interregional exploitation and intergenerational exploitation are inherent mechanism of city exploiting countryside. Finally,it proposes increasing construction land index to satisfy demand of new socialist countryside construction primarily,to ensure rural social stability; Later,use land ticket index to fill the gap of construction land in economically developed areas,so as to alleviate conflict of urban land use and maximize circulation value of rural construction land. It is expected to provide theoretical reference for relevant departments to regulate land ticket transaction system and realize the harmonious development,between urban and rural areas.