期刊文献+
共找到41,747篇文章
< 1 2 250 >
每页显示 20 50 100
Rule-based Fault Diagnosis of Hall Sensors and Fault-tolerant Control of PMSM 被引量:12
1
作者 SONG Ziyou LI Jianqiu +3 位作者 OUYANG Minggao GU Jing FENG Xuning LU Dongbin 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2013年第4期813-822,共10页
Hall sensor is widely used for estimating rotor phase of permanent magnet synchronous motor(PMSM). And rotor position is an essential parameter of PMSM control algorithm, hence it is very dangerous if Hall senor fault... Hall sensor is widely used for estimating rotor phase of permanent magnet synchronous motor(PMSM). And rotor position is an essential parameter of PMSM control algorithm, hence it is very dangerous if Hall senor faults occur. But there is scarcely any research focusing on fault diagnosis and fault-tolerant control of Hall sensor used in PMSM. From this standpoint, the Hall sensor faults which may occur during the PMSM operating are theoretically analyzed. According to the analysis results, the fault diagnosis algorithm of Hall sensor, which is based on three rules, is proposed to classify the fault phenomena accurately. The rotor phase estimation algorithms, based on one or two Hall sensor(s), are initialized to engender the fault-tolerant control algorithm. The fault diagnosis algorithm can detect 60 Hall fault phenomena in total as well as all detections can be fulfilled in 1/138 rotor rotation period. The fault-tolerant control algorithm can achieve a smooth torque production which means the same control effect as normal control mode (with three Hall sensors). Finally, the PMSM bench test verifies the accuracy and rapidity of fault diagnosis and fault-tolerant control strategies. The fault diagnosis algorithm can detect all Hall sensor faults promptly and fault-tolerant control algorithm allows the PMSM to face failure conditions of one or two Hall sensor(s). In addition, the transitions between health-control and fault-tolerant control conditions are smooth without any additional noise and harshness. Proposed algorithms can deal with the Hall sensor faults of PMSM in real applications, and can be provided to realize the fault diagnosis and fault-tolerant control of PMSM. 展开更多
关键词 electric vehicle permanent-magnet synchronous motor(PMSM) Hall sensors rule-based fault diagnosis fault-tolerant control
下载PDF
Soil Microbial Dynamics Modeling in Fluctuating Ecological Situations by Using Subtractive Clustering and Fuzzy Rule-Based Inference Systems 被引量:1
2
作者 Sunil Kr.Jha Zulfiqar Ahmad 《Computer Modeling in Engineering & Sciences》 SCIE EI 2017年第4期443-459,共17页
Microbial population and enzyme activities are the significant indicators of soil strength.Soil microbial dynamics characterize microbial population and enzyme activities.The present study explores the development of ... Microbial population and enzyme activities are the significant indicators of soil strength.Soil microbial dynamics characterize microbial population and enzyme activities.The present study explores the development of efficient predictive modeling systems for the estimation of specific soil microbial dynamics,like rock phosphate solubilization,bacterial population,and ACC-deaminase activity.More specifically,optimized subtractive clustering(SC)and Wang and Mendel's(WM)fuzzy inference systems(FIS)have been implemented with the objective to achieve the best estimation accuracy of microbial dynamics.Experimental measurements were performed using controlled pot experiment using minimal salt media with rock phosphate as sole carbon source inoculated with phosphate solubilizing microorganism in order to estimate rock phosphate solubilization potential of selected strains.Three experimental parameters,including temperature,pH,and incubation period have been used as inputs SC-FIS and WM-FIS.The better performance of the SC-FIS has been observed as compared to the WM-FIS in the estimation of phosphate solubilization and bacterial population with the maximum value of the coefficient of determination(0.9988)2 R=in the estimation of previous microbial dynamics. 展开更多
关键词 PHOSPHATE solubilizing bacteria bacterial population ACC-deaminase activity subtractive clustering fuzzy rule-based prediction system
下载PDF
Mapping of Freshwater Lake Wetlands Using Object-Relations and Rule-based Inference 被引量:1
3
作者 RUAN Renzong Susan USTIN 《Chinese Geographical Science》 SCIE CSCD 2012年第4期462-471,共10页
Inland freshwater lake wetlands play an important role in regional ecological balance. Hongze Lake is the fourth biggest freshwater lake in China. In the past three decades, there has been significant loss of freshwat... Inland freshwater lake wetlands play an important role in regional ecological balance. Hongze Lake is the fourth biggest freshwater lake in China. In the past three decades, there has been significant loss of freshwater wet- lands within the lake and at the mouths of neighboring rivers, due to disturbance, primarily from human activities. The main purpose of this paper was to explore a practical technology for differentiating wetlands effectively from upland types in close proximity to them. In the paper, an integrated method, which combined per-pixel and per-field classifi- cation, was used for mapping wetlands of Hongze Lake and their neighboring upland types. Firstly, Landsat ETM+ imagery was segmented and classified by using spectral and textural features. Secondly, ETM+ spectral bands, textural features derived from ETM+ Pan imagery, relative relations between neighboring classes, shape fea^xes, and elevation were used in a decision tree classification. Thirdly, per-pixel classification results from the decision tree classifier were improved by using classification results from object-oriented classification as a context. The results show that the technology has not only overcome the salt-and-pepper effect commonly observed in the past studies, but also has im- proved the accuracy of identification by nearly 5%. 展开更多
关键词 rule-based inferring object-based classification freshwater lake wetland relation feature Hongze Lake
下载PDF
RTTRS: Rule-based Train Traffic Rescheduling Simulator
4
作者 Cheng YuKnowledge Data Base Laboratory, Japan Railway Technical Research Institute 2-8-38 Hikari-cho, Kokubunji-shi, Tokyo, 185, Japan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1993年第4期73-81,共9页
Train traffic rescheduling is a complicated and large-scaled combinatorial problem. According to the characteristics of China railway system and from the point of practical use, this paper introduces a rule-based trai... Train traffic rescheduling is a complicated and large-scaled combinatorial problem. According to the characteristics of China railway system and from the point of practical use, this paper introduces a rule-based train traffic reschedule interactive simulator. It can be used as a powerful training tool to train the dispatcher and to carry out experimental analysis. The production rules are used as the basic for describing the processes to be simulated. With the increase of rule, users can easily upgrade the simulator by adding their own rules. 展开更多
关键词 SIMULATOR rule-based system Train traffic reschedule.
下载PDF
Neutrosophic Rule-Based Identity Verification System Based on Handwritten Dynamic Signature Analysis
5
作者 Amr Hefny Aboul Ella Hassanien Sameh H.Basha 《Computers, Materials & Continua》 SCIE EI 2021年第11期2367-2385,共19页
Identity verification using authenticity evaluation of handwritten signatures is an important issue.There have been several approaches for the verification of signatures using dynamics of the signing process.Most of t... Identity verification using authenticity evaluation of handwritten signatures is an important issue.There have been several approaches for the verification of signatures using dynamics of the signing process.Most of these approaches extract only global characteristics.With the aim of capturing both dynamic global and local features,this paper introduces a novel model for verifying handwritten dynamic signatures using neutrosophic rule-based verification system(NRVS)and Genetic NRVS(GNRVS)models.The neutrosophic Logic is structured to reflect multiple types of knowledge and relations among all features using three values:truth,indeterminacy,and falsity.These three values are determined by neutrosophic membership functions.The proposed model also is able to deal with all features without the need to select from them.In the GNRVS model,the neutrosophic rules are automatically chosen by Genetic Algorithms.The performance of the proposed system is tested on the MCYT-Signature-100 dataset.In terms of the accuracy,average error rate,false acceptance rate,and false rejection rate,the experimental results indicate that the proposed model has a significant advantage compared to different well-known models. 展开更多
关键词 BIOMETRICS online signature verification neutrosophic rule-based verification system
下载PDF
Multi Layered Rule-Based Technique for Explicit Aspect Extraction from Online Reviews
6
作者 Mubashar Hussain Toqir A.Rana +4 位作者 Aksam Iftikhar M.Usman Ashraf Muhammad Waseem Iqbal Ahmed Alshaflut Abdullah Alourani 《Computers, Materials & Continua》 SCIE EI 2022年第12期4641-4656,共16页
In the field of sentiment analysis,extracting aspects or opinion targets fromuser reviews about a product is a key task.Extracting the polarity of an opinion is much more useful if we also know the targeted Aspect or ... In the field of sentiment analysis,extracting aspects or opinion targets fromuser reviews about a product is a key task.Extracting the polarity of an opinion is much more useful if we also know the targeted Aspect or Feature.Rule based approaches,like dependency-based rules,are quite popular and effective for this purpose.However,they are heavily dependent on the authenticity of the employed parts-of-speech(POS)tagger and dependency parser.Another popular rule based approach is to use sequential rules,wherein the rules formulated by learning from the user’s behavior.However,in general,the sequential rule-based approaches have poor generalization capability.Moreover,existing approaches mostly consider an aspect as a noun or noun phrase,so these approaches are unable to extract verb aspects.In this article,we have proposed a multi-layered rule-based(ML-RB)technique using the syntactic dependency parser based rules along with some selective sequential rules in separate layers to extract noun aspects.Additionally,after rigorous analysis,we have also constructed rules for the extraction of verb aspects.These verb rules primarily based on the association between verb and opinion words.The proposed multi-layer technique compensates for the weaknesses of individual layers and yields improved results on two publicly available customer review datasets.The F1 score for both the datasets are 0.90 and 0.88,respectively,which are better than existing approaches.These improved results can be attributed to the application of sequential/syntactic rules in a layered manner as well as the capability to extract both noun and verb aspects. 展开更多
关键词 Explicit aspect aspect extraction opinion mining rule-based verb aspects
下载PDF
Generating Fuzzy Rule-based Systems from Examples Based on Robust Support Vector Machine
7
作者 贾泂 张浩然 《Journal of Donghua University(English Edition)》 EI CAS 2006年第6期144-147,共4页
This paper firstly proposes a new support vector machine regression (SVR) with a robust loss function, and designs a gradient based algorithm for implementation of the SVR, then uses the SVR to extract fuzzy rules and... This paper firstly proposes a new support vector machine regression (SVR) with a robust loss function, and designs a gradient based algorithm for implementation of the SVR, then uses the SVR to extract fuzzy rules and designs fuzzy rule-based system. Simulations show that fuzzy rule-based system technique based on robust SVR achieves superior performance to the conventional fuzzy inference method, the proposed method provides satisfactory performance with excellent approximation and generalization property than the existing algorithm. 展开更多
关键词 support vector machine fuzzy rules rule-based system generalization.
下载PDF
A Rule-Based Approach for Grey Hole Attack Prediction in Wireless Sensor Networks
8
作者 C.Gowdham S.Nithyanandam 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3815-3827,共13页
The Wireless Sensor Networks(WSN)are vulnerable to assaults due to the fact that the devices connected to them have a reliable connection to the inter-net.A malicious node acts as the controller and uses a grey hole a... The Wireless Sensor Networks(WSN)are vulnerable to assaults due to the fact that the devices connected to them have a reliable connection to the inter-net.A malicious node acts as the controller and uses a grey hole attack to get the data from all of the other nodes in the network.Additionally,the nodes are dis-carding and modifying the data packets according to the requirements of the sys-tem.The assault modifies the fundamental concept of the WSNs,which is that different devices should communicate with one another.In the proposed system,there is a fuzzy idea offered for the purpose of preventing the grey hole attack from making effective communication among the WSN devices.The currently available model is unable to recognise the myriad of different kinds of attacks.The fuzzy engine identified suspicious actions by utilising the rules that were gen-erated to make a prediction about the malicious node that would halt the process.Experiments conducted using simulation are used to determine delay,accuracy,energy consumption,throughput,and the ratio of packets successfully delivered.It stands in contrast to the model that was suggested,as well as the methodologies that are currently being used,and analogue behavioural modelling.In comparison to the existing method,the proposed model achieves an accuracy rate of 45 per-cent,a packet delivery ratio of 79 percent,and a reduction in energy usage of around 35.6 percent.These results from the simulation demonstrate that the fuzzy grey detection technique that was presented has the potential to increase the net-work’s capability of detecting grey hole assaults. 展开更多
关键词 Attack prediction grey hole wireless sensor networks rule-based model grey attack
下载PDF
Representing the Knowledge of Public Construction Project Cost Estimator by Using Rule-Based Method
9
作者 Abelrahman Osman Elfaki Saleh Alatawi 《Journal of Building Construction and Planning Research》 2015年第4期189-195,共7页
Despite the presence of various construction project cost estimate softwares, human experience and knowledge cannot be disregarded. This fact has been proven in practice, where the success of construction cost estimat... Despite the presence of various construction project cost estimate softwares, human experience and knowledge cannot be disregarded. This fact has been proven in practice, where the success of construction cost estimate process is mainly based on knowledge of human estimator. The main question concerns what human knowledge determines the success of the construction cost estimation process. To address this question we have applied Delphi technique and the output is eleven factors that are enough to precisely represent construction cost estimator knowledge. Then we have used First Order Logic (FOL) to represent these factors in terms of predicates and rules. These FOL rules could be used for evaluating construction cost estimator knowledge in five classes: fail, pass, acceptable, good, and very good. As a validation process we have done experiments using history data and the results have proved the accuracy of our proposed method. 展开更多
关键词 CONSTRUCTION MANAGEMENT CONSTRUCTION COST Estimation rule-based System
下载PDF
Applying Fuzzy Rule-Based System on FMEA to Assess the Risks on Project-Based Software Engineering Education
10
作者 Issarapong Khuankrue Fumihiro Kumeno +1 位作者 Yutaro Ohashi Yasuhiro Tsujimura 《Journal of Software Engineering and Applications》 2017年第7期591-604,共14页
Project-based learning has been in widespread use in education. However, project managers are unaware of the students’ lack of experience and treat them as if they were professional staff. This paper proposes the app... Project-based learning has been in widespread use in education. However, project managers are unaware of the students’ lack of experience and treat them as if they were professional staff. This paper proposes the application of a fuzzy failure mode and effects analysis model for project-based software engineering education. This method integrates the fuzzy rule-based system with learning agents. The agents construct the membership function from historical data. Data are processed by a clustering process that facilitates the construction of the membership function. It helps students who lack experience in risk assessment to develop their expertise in that skill. The paper also suggests a classification technique for a fuzzy rule-based system that can be used to judge risk based on a fuzzy inference system. The student project will thus be further enhanced with respect to risk assessment. We then discuss the design of experiments to verify the proposed model. 展开更多
关键词 Risk Assessment PROJECT-BASED Learning Failure Mode and Effects Analysis Fuzzy rule-based System Intelligent AGENTS
下载PDF
Applying DNA Computation to Error Detection Problem in Rule-Based Systems
11
作者 Behrouz Madahian Amin Salighehdar Reza Amini 《Journal of Intelligent Learning Systems and Applications》 2015年第1期21-36,共16页
As rule-based systems (RBS) technology gains wider acceptance, the need to create and maintain large knowledge bases will assume greater importance. Demonstrating a rule base to be free from error remains one of the o... As rule-based systems (RBS) technology gains wider acceptance, the need to create and maintain large knowledge bases will assume greater importance. Demonstrating a rule base to be free from error remains one of the obstacles to the adoption of this technology. In the past several years, a vast body of research has been carried out in developing various graphical techniques such as utilizing Petri Nets to analyze structural errors in rule-based systems, which utilize propositional logic. Four typical errors in rule-based systems are redundancy, circularity, incompleteness, and inconsistency. Recently, a DNA-based computing approach to detect these errors has been proposed. That paper presents algorithms which are able to detect structural errors just for special cases. For a rule base, which contains multiple starting nodes and goal nodes, structural errors are not removed correctly by utilizing the algorithms proposed in that paper and algorithms lack generality. In this study algorithms mainly based on Adleman’s operations, which are able to detect structural errors, in any form that they may arise in rule base, are presented. The potential of applying our algorithm is auspicious giving the operational time complexity of O(n*(Max{q, K, z})), in which n is the number of fact clauses;q is the number of rules in the longest inference chain;K is the number of tubes containing antecedents which are comprised of distinct number of starting nodes;and z denotes the maximum number of distinct antecedents comprised of the same number of starting nodes. 展开更多
关键词 DNA COMPUTING rule-based Systems RULE VERIFICATION Structural ERRORS
下载PDF
Contract Mechanism of Water Environment Regulation for Small and Medium Sized Enterprises Based on Optimal Control Theory
12
作者 Shuang Zhao Hongbin Gu +2 位作者 Lianfang Xue Dongsheng Wang Bin Huang 《Journal of Water Resource and Protection》 CAS 2024年第7期538-556,共20页
The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of trea... The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of treatment. How enterprises can make reasonable decisions on their water environment behavior based on the external environment and their own factors is of great significance for scientifically and effectively designing water environment regulation mechanisms. Based on optimal control theory, this study investigates the design of contractual mechanisms for water environmental regulation for small and medium-sized enterprises. The enterprise is regarded as an independent economic entity that can adopt optimal control strategies to maximize its own interests. Based on the participation of multiple subjects including the government, enterprises, and the public, an optimal control strategy model for enterprises under contractual water environmental regulation is constructed using optimal control theory, and a method for calculating the amount of unit pollutant penalties is derived. The water pollutant treatment cost data of a paper company is selected to conduct empirical numerical analysis on the model. The results show that the increase in the probability of government regulation and public participation, as well as the decrease in local government protection for enterprises, can achieve the same regulatory effect while reducing the number of administrative penalties per unit. Finally, the implementation process of contractual water environmental regulation for small and medium-sized enterprises is designed. 展开更多
关键词 Optimal Control Theory Small and Medium-Sized Enterprises Water Environment Regulation contract Mechanism
下载PDF
Bipartite consensus problems of Lurie multi-agent systems over signed graphs: A contraction approach
13
作者 张晓娇 吴祥 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期137-145,共9页
This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theor... This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theory, some new conditions for the nonlinear Lurie multi-agent systems reaching bipartite leaderless consensus and bipartite tracking consensus are presented. Compared with the traditional methods, this approach degrades the dimensions of the conditions, eliminates some restrictions of the system matrix, and extends the range of the nonlinear function. Finally, two numerical examples are provided to illustrate the efficiency of our results. 展开更多
关键词 contraction theory virtual system bipartite consensus Lurie multi-agent systems
下载PDF
Smart Contract Vulnerability Detection Method Based on Feature Graph and Multiple Attention Mechanisms
14
作者 Zhenxiang He Zhenyu Zhao +1 位作者 Ke Chen Yanlin Liu 《Computers, Materials & Continua》 SCIE EI 2024年第5期3023-3045,共23页
The fast-paced development of blockchain technology is evident.Yet,the security concerns of smart contracts represent a significant challenge to the stability and dependability of the entire blockchain ecosystem.Conve... The fast-paced development of blockchain technology is evident.Yet,the security concerns of smart contracts represent a significant challenge to the stability and dependability of the entire blockchain ecosystem.Conventional smart contract vulnerability detection primarily relies on static analysis tools,which are less efficient and accurate.Although deep learning methods have improved detection efficiency,they are unable to fully utilize the static relationships within contracts.Therefore,we have adopted the advantages of the above two methods,combining feature extraction mode of tools with deep learning techniques.Firstly,we have constructed corresponding feature extraction mode for different vulnerabilities,which are used to extract feature graphs from the source code of smart contracts.Then,the node features in feature graphs are fed into a graph convolutional neural network for training,and the edge features are processed using a method that combines attentionmechanismwith gated units.Ultimately,the revised node features and edge features are concatenated through amulti-head attentionmechanism.The result of the splicing is a global representation of the entire feature graph.Our method was tested on three types of data:Timestamp vulnerabilities,reentrancy vulnerabilities,and access control vulnerabilities,where the F1 score of our method reaches 84.63%,92.55%,and 61.36%.The results indicate that our method surpasses most others in detecting smart contract vulnerabilities. 展开更多
关键词 Blockchain smart contracts deep learning graph neural networks
下载PDF
A Review of Deep Learning-Based Vulnerability Detection Tools for Ethernet Smart Contracts
15
作者 Huaiguang Wu Yibo Peng +1 位作者 Yaqiong He Jinlin Fan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期77-108,共32页
In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerabi... In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerability detection has become particularly important.With the popular use of neural network model,there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts.This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts.Subsequently,it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection.These tools are categorized based on their open-source status,the data format and the type of feature extraction they employ.Then we conduct a comprehensive comparative analysis of these tools,selecting representative tools for experimental validation and comparing them with traditional tools in terms of detection coverage and accuracy.Finally,Based on the insights gained from the experimental results and the current state of research in the field of smart contract vulnerability detection tools,we suppose to provide a reference standard for developers of contract vulnerability detection tools.Meanwhile,forward-looking research directions are also proposed for deep learning-based smart contract vulnerability detection. 展开更多
关键词 Smart contract vulnerability detection deep learning
下载PDF
Preserving Data Secrecy and Integrity for Cloud Storage Using Smart Contracts and Cryptographic Primitives
16
作者 Maher Alharby 《Computers, Materials & Continua》 SCIE EI 2024年第5期2449-2463,共15页
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This a... Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic primitives.The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data.To preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing it.An extensive performance analysis is conducted to illustrate the efficiency of the proposed mechanism.Additionally,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running costs.The security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious entities.The proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems. 展开更多
关键词 Cloud storage data secrecy data integrity smart contracts CRYPTOGRAPHY
下载PDF
A Systematic Review and Performance Evaluation of Open-Source Tools for Smart Contract Vulnerability Detection
17
作者 Yaqiong He Jinlin Fan Huaiguang Wu 《Computers, Materials & Continua》 SCIE EI 2024年第7期995-1032,共38页
With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges su... With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges such as slow updates,usability issues,and limited installation methods.These challenges hinder the adoption and practicality of these tools.This paper examines smart contract vulnerability detection tools from 2016 to 2023,sourced from the Web of Science(WOS)and Google Scholar.By systematically collecting,screening,and synthesizing relevant research,38 open-source tools that provide installation methods were selected for further investigation.From a developer’s perspective,this paper offers a comprehensive survey of these 38 open-source tools,discussing their operating principles,installation methods,environmental dependencies,update frequencies,and installation challenges.Based on this,we propose an Ethereum smart contract vulnerability detection framework.This framework enables developers to easily utilize various detection tools and accurately analyze contract security issues.To validate the framework’s stability,over 1700 h of testing were conducted.Additionally,a comprehensive performance test was performed on the mainstream detection tools integrated within the framework,assessing their hardware requirements and vulnerability detection coverage.Experimental results indicate that the Slither tool demonstrates satisfactory performance in terms of system resource consumption and vulnerability detection coverage.This study represents the first performance evaluation of testing tools in this domain,providing significant reference value. 展开更多
关键词 Blockchain security ethereum smart contracts detection tools evaluation
下载PDF
Mitigating Blackhole and Greyhole Routing Attacks in Vehicular Ad Hoc Networks Using Blockchain Based Smart Contracts
18
作者 Abdulatif Alabdulatif Mada Alharbi +1 位作者 Abir Mchergui Tarek Moulahi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期2005-2021,共17页
The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced techno... The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced technology,such as Intelligent Transportation Systems(ITS),enables improved traffic management,helps eliminate congestion,and supports a safer environment.ITS provides real-time information on vehicle traffic and transportation systems that can improve decision-making for road users.However,ITS suffers from routing issues at the network layer when utilising Vehicular Ad Hoc Networks(VANETs).This is because each vehicle plays the role of a router in this network,which leads to a complex vehicle communication network,causing issues such as repeated link breakages between vehicles resulting from the mobility of the network and rapid topological variation.This may lead to loss or delay in packet transmissions;this weakness can be exploited in routing attacks,such as black-hole and gray-hole attacks,that threaten the availability of ITS services.In this paper,a Blockchain-based smart contracts model is proposed to offer convenient and comprehensive security mechanisms,enhancing the trustworthiness between vehicles.Self-Classification Blockchain-Based Contracts(SCBC)and Voting-Classification Blockchain-Based Contracts(VCBC)are utilised in the proposed protocol.The results show that VCBC succeeds in attaining better results in PDR and TP performance even in the presence of Blackhole and Grayhole attacks. 展开更多
关键词 Blockchain data privacy machine learning routing attacks smart contract VANET
下载PDF
Strategic Contracting for Software Upgrade Outsourcing in Industry 4.0
19
作者 Cheng Wang Zhuowei Zheng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1563-1592,共30页
The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmu... The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmust be tailored to meet the dynamic needs of enterprises. However, internal research and development can beprohibitively expensive, driving many enterprises to outsource software development and upgrades to externalservice providers. This paper presents a software upgrade outsourcing model for enterprises and service providersthat accounts for the impact of market fluctuations on software adaptability. To mitigate the risk of adverseselection due to asymmetric information about the service provider’s cost and asymmetric information aboutthe enterprise’s revenues, we propose pay-per-time and revenue-sharing contracts in two distinct informationasymmetry scenarios. These two contracts specify the time and transfer payments for software upgrades. Througha comparative analysis of the optimal solutions under the two contracts and centralized decision-making withfull-information, we examine the characteristics of the solutions under two information asymmetry scenarios andanalyze the incentive effects of the two contracts on the various stakeholders. Overall, our study offers valuableinsights for firms seeking to optimize their outsourcing strategies and maximize their returns on investment insoftware upgrades. 展开更多
关键词 Software upgrade outsourcing the principal-agent information asymmetry reverse selection contract design
下载PDF
Revisiting the Electron Radius in Light of Length Contraction
20
作者 Julie Marty 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第4期1743-1748,共6页
In previous work, the electron radius was identified as the “actual electron radius.” However, this is more accurately described as the electron radius at rest. This study reexamines the electron with an emphasis on... In previous work, the electron radius was identified as the “actual electron radius.” However, this is more accurately described as the electron radius at rest. This study reexamines the electron with an emphasis on the electron radius under motion, incorporating the effects of length contraction. The findings suggest that the radius is subject to Lorentz contraction, which has interesting implications for relativistic effects at the subatomic level. 展开更多
关键词 Electron Radius Length contraction Lorentz Factor Relativistic Effects Subatomic Particles Compton Scattering
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部