Based on the current situation of urbanization development in West China, this paper analyses main factors responsible for sluggish urbanization in West China as follows: impact of environment factor, impact of popula...Based on the current situation of urbanization development in West China, this paper analyses main factors responsible for sluggish urbanization in West China as follows: impact of environment factor, impact of population quality and quantity, lagging of public product service, stagnancy of technological development, backwardness of slow growth, and rigidity of system building. And then this paper analyses the restriction mechanism of urbanization in West China: at the superficial level, the constraints of urbanization in West China arise from the shortage of capital; at the profound level, the backward culture contributes to the constraints of urbanization in West China. The thread of resolving restriction mechanism of urbanization in West China is put forward from system, economy and culture. On the basis of this thread, we construct the power system for the development of urbanization in West China. The power system for urbanization in West China should be propelled by "four forces", namely, pull of external forces, cohesive strength of regional market environment, expansion power inside countryside, traction of industrial structure adjustment. Innovation is the engine of impetus for urbanization in West China; spatial clustering and modernization of industry is the major driving force for urbanization; the government behaviour, driving of foreign investment, great projects and other forces are supplementary power. Via the main power, we should take the market as medium to achieve the role of power in promoting urbanization.展开更多
A statistically significant research finding should not be defined as a P-value of 0.05 or less, because this definition does not take into account study power. Statistical significance was originally defined by Fishe...A statistically significant research finding should not be defined as a P-value of 0.05 or less, because this definition does not take into account study power. Statistical significance was originally defined by Fisher RA as a P-value of 0.05 or less. According to Fisher, any finding that is likely to occur by random variation no more than 1 in 20 times is considered significant. Neyman J and Pearson ES subsequently argued that Fisher's definition was incomplete. They proposed that statistical significance could only be determined by analyzing the chance of incorrectly considering a study finding was significant(a Type Ⅰ?error) or incorrectly considering a study finding was insignificant(a Type Ⅱ error). Their definition of statistical significance is also incomplete because the error rates are considered separately, not together. A better definition of statistical significance is the positive predictive value of a P-value, which is equal to the power divided by the sum of power and the P-value. This definition is more complete and relevant than Fisher's or Neyman-Peason's definitions, because it takes into account both concepts of statistical significance. Using this definition, a statistically significant finding requires a P-value of 0.05 or less when the power is at least 95%, and a P-value of 0.032 or less when the power is 60%. To achieve statistical significance, P-values must be adjusted downward as the study power decreases.展开更多
The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize t...The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize the win-win game between the malicious mining pool and the employee,the paper proposes an Employment Attack Pricing Algorithm(EAPA)of mining pools in blockchain based on game theory.In the EAPA,the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack,the revenue increment of malicious mining pools,and the revenue of the employee.It establishes a game model between the malicious mining pool and the employee under the employment attack.Then,the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation.In the strategy,the malicious mining pool analyzes the conditions for the employment attack,and uses the derivative method to find the optimal utilization value of computing power,employees analyze the conditions for accepting employment,and use the derivative method to find the optimal reward value of computing power.Finally,the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation.The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee.The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time.The EAPA outperforms the state-of-the-art methods such as SPSUCP,DPSACP,and FPSUCP.展开更多
This study conducts a systematic literature review(SLR)of blockchain consensus mechanisms,an essential protocols that maintain the integrity,reliability,and decentralization of distributed ledger networks.The aim is t...This study conducts a systematic literature review(SLR)of blockchain consensus mechanisms,an essential protocols that maintain the integrity,reliability,and decentralization of distributed ledger networks.The aim is to comprehensively investigate prominent mechanisms’security features and vulnerabilities,emphasizing their security considerations,applications,challenges,and future directions.The existing literature offers valuable insights into various consensus mechanisms’strengths,limitations,and security vulnerabilities and their real-world applications.However,there remains a gap in synthesizing and analyzing this knowledge systematically.Addressing this gap would facilitate a structured approach to understanding consensus mechanisms’security and vulnerabilities comprehensively.The study adheres to Preferred Reporting Items for Systematic Reviews and Meta-Analyses(PRISMA)guidelines and computer science standards and reviewed 3749 research papers from 2016 to 2024,excluding grey literature,resulting in 290 articles for descriptive analysis.The research highlights an increased focus on blockchain consensus security,energy efficiency,and hybrid mechanisms within 60%of research papers post-2019,identifying gaps in scalability,privacy,and interoperability for future exploration.By synthesizing the existing research and identifying the key trends,this SLR contributes to advancing the understanding of blockchain consensus mechanisms’security and guiding future research and structured innovation in blockchain systems and applications.展开更多
Data management becomes essential component of patient healthcare.Internet of Medical Things(IoMT)performs a wireless communication between E-medical applications and human being.Instead of consulting a doctor in the ...Data management becomes essential component of patient healthcare.Internet of Medical Things(IoMT)performs a wireless communication between E-medical applications and human being.Instead of consulting a doctor in the hospital,patients get health related information remotely from the physician.The main issues in the E-Medical application are lack of safety,security and priv-acy preservation of patient’s health care data.To overcome these issues,this work proposes block chain based IoMT Processed with Hybrid consensus protocol for secured storage.Patients health data is collected from physician,smart devices etc.The main goal is to store this highly valuable health related data in a secure,safety,easy access and less cost-effective manner.In this research we combine two smart contracts such as Practical Byzantine Fault Tolerance with proof of work(PBFT-PoW).The implementation is done using cloud technology setup with smart contracts(PBFT-PoW).The accuracy rate of PBFT is 90.15%,for PoW is 92.75%and our proposed work PBFT-PoW is 99.88%.展开更多
Cancer cells are notoriously difficult to see,even under high-powered magnification(放大).The glasses are designed to make it easier for surgeons to distinguish cancer cells from healthy cells,helping to ensure that n...Cancer cells are notoriously difficult to see,even under high-powered magnification(放大).The glasses are designed to make it easier for surgeons to distinguish cancer cells from healthy cells,helping to ensure that no stray tumor cells are left behind during surgery."We’re in the early stages of this technology,and more development and testing will be done,but we’re certainly展开更多
基金Supported by the National Natural Science Foundation (51178372)
文摘Based on the current situation of urbanization development in West China, this paper analyses main factors responsible for sluggish urbanization in West China as follows: impact of environment factor, impact of population quality and quantity, lagging of public product service, stagnancy of technological development, backwardness of slow growth, and rigidity of system building. And then this paper analyses the restriction mechanism of urbanization in West China: at the superficial level, the constraints of urbanization in West China arise from the shortage of capital; at the profound level, the backward culture contributes to the constraints of urbanization in West China. The thread of resolving restriction mechanism of urbanization in West China is put forward from system, economy and culture. On the basis of this thread, we construct the power system for the development of urbanization in West China. The power system for urbanization in West China should be propelled by "four forces", namely, pull of external forces, cohesive strength of regional market environment, expansion power inside countryside, traction of industrial structure adjustment. Innovation is the engine of impetus for urbanization in West China; spatial clustering and modernization of industry is the major driving force for urbanization; the government behaviour, driving of foreign investment, great projects and other forces are supplementary power. Via the main power, we should take the market as medium to achieve the role of power in promoting urbanization.
文摘A statistically significant research finding should not be defined as a P-value of 0.05 or less, because this definition does not take into account study power. Statistical significance was originally defined by Fisher RA as a P-value of 0.05 or less. According to Fisher, any finding that is likely to occur by random variation no more than 1 in 20 times is considered significant. Neyman J and Pearson ES subsequently argued that Fisher's definition was incomplete. They proposed that statistical significance could only be determined by analyzing the chance of incorrectly considering a study finding was significant(a Type Ⅰ?error) or incorrectly considering a study finding was insignificant(a Type Ⅱ error). Their definition of statistical significance is also incomplete because the error rates are considered separately, not together. A better definition of statistical significance is the positive predictive value of a P-value, which is equal to the power divided by the sum of power and the P-value. This definition is more complete and relevant than Fisher's or Neyman-Peason's definitions, because it takes into account both concepts of statistical significance. Using this definition, a statistically significant finding requires a P-value of 0.05 or less when the power is at least 95%, and a P-value of 0.032 or less when the power is 60%. To achieve statistical significance, P-values must be adjusted downward as the study power decreases.
基金funded by the“Ling Yan”Research and Development Project of Science Technology Department of Zhejiang Province of China under Grants No.2022C03122Public Welfare Technology Application and Research Projects of Science Technology Department of Zhejiang Province of China under Grants No.LGF22F020006 and LGF21F010004.
文摘The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize the win-win game between the malicious mining pool and the employee,the paper proposes an Employment Attack Pricing Algorithm(EAPA)of mining pools in blockchain based on game theory.In the EAPA,the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack,the revenue increment of malicious mining pools,and the revenue of the employee.It establishes a game model between the malicious mining pool and the employee under the employment attack.Then,the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation.In the strategy,the malicious mining pool analyzes the conditions for the employment attack,and uses the derivative method to find the optimal utilization value of computing power,employees analyze the conditions for accepting employment,and use the derivative method to find the optimal reward value of computing power.Finally,the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation.The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee.The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time.The EAPA outperforms the state-of-the-art methods such as SPSUCP,DPSACP,and FPSUCP.
基金funded by Universiti Teknologi PETRONAS and grants(YUTP-PRG:015PBC-011).
文摘This study conducts a systematic literature review(SLR)of blockchain consensus mechanisms,an essential protocols that maintain the integrity,reliability,and decentralization of distributed ledger networks.The aim is to comprehensively investigate prominent mechanisms’security features and vulnerabilities,emphasizing their security considerations,applications,challenges,and future directions.The existing literature offers valuable insights into various consensus mechanisms’strengths,limitations,and security vulnerabilities and their real-world applications.However,there remains a gap in synthesizing and analyzing this knowledge systematically.Addressing this gap would facilitate a structured approach to understanding consensus mechanisms’security and vulnerabilities comprehensively.The study adheres to Preferred Reporting Items for Systematic Reviews and Meta-Analyses(PRISMA)guidelines and computer science standards and reviewed 3749 research papers from 2016 to 2024,excluding grey literature,resulting in 290 articles for descriptive analysis.The research highlights an increased focus on blockchain consensus security,energy efficiency,and hybrid mechanisms within 60%of research papers post-2019,identifying gaps in scalability,privacy,and interoperability for future exploration.By synthesizing the existing research and identifying the key trends,this SLR contributes to advancing the understanding of blockchain consensus mechanisms’security and guiding future research and structured innovation in blockchain systems and applications.
基金Research Supporting Project number(RSP-2021/323)King Saud University,Riyadh,Saudi Arabia.
文摘Data management becomes essential component of patient healthcare.Internet of Medical Things(IoMT)performs a wireless communication between E-medical applications and human being.Instead of consulting a doctor in the hospital,patients get health related information remotely from the physician.The main issues in the E-Medical application are lack of safety,security and priv-acy preservation of patient’s health care data.To overcome these issues,this work proposes block chain based IoMT Processed with Hybrid consensus protocol for secured storage.Patients health data is collected from physician,smart devices etc.The main goal is to store this highly valuable health related data in a secure,safety,easy access and less cost-effective manner.In this research we combine two smart contracts such as Practical Byzantine Fault Tolerance with proof of work(PBFT-PoW).The implementation is done using cloud technology setup with smart contracts(PBFT-PoW).The accuracy rate of PBFT is 90.15%,for PoW is 92.75%and our proposed work PBFT-PoW is 99.88%.
文摘Cancer cells are notoriously difficult to see,even under high-powered magnification(放大).The glasses are designed to make it easier for surgeons to distinguish cancer cells from healthy cells,helping to ensure that no stray tumor cells are left behind during surgery."We’re in the early stages of this technology,and more development and testing will be done,but we’re certainly