期刊文献+
共找到41,742篇文章
< 1 2 250 >
每页显示 20 50 100
A Review of Deep Learning-Based Vulnerability Detection Tools for Ethernet Smart Contracts
1
作者 Huaiguang Wu Yibo Peng +1 位作者 Yaqiong He Jinlin Fan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期77-108,共32页
In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerabi... In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerability detection has become particularly important.With the popular use of neural network model,there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts.This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts.Subsequently,it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection.These tools are categorized based on their open-source status,the data format and the type of feature extraction they employ.Then we conduct a comprehensive comparative analysis of these tools,selecting representative tools for experimental validation and comparing them with traditional tools in terms of detection coverage and accuracy.Finally,Based on the insights gained from the experimental results and the current state of research in the field of smart contract vulnerability detection tools,we suppose to provide a reference standard for developers of contract vulnerability detection tools.Meanwhile,forward-looking research directions are also proposed for deep learning-based smart contract vulnerability detection. 展开更多
关键词 Smart contract vulnerability detection deep learning
下载PDF
Contract Mechanism of Water Environment Regulation for Small and Medium Sized Enterprises Based on Optimal Control Theory
2
作者 Shuang Zhao Hongbin Gu +2 位作者 Lianfang Xue Dongsheng Wang Bin Huang 《Journal of Water Resource and Protection》 CAS 2024年第7期538-556,共20页
The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of trea... The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of treatment. How enterprises can make reasonable decisions on their water environment behavior based on the external environment and their own factors is of great significance for scientifically and effectively designing water environment regulation mechanisms. Based on optimal control theory, this study investigates the design of contractual mechanisms for water environmental regulation for small and medium-sized enterprises. The enterprise is regarded as an independent economic entity that can adopt optimal control strategies to maximize its own interests. Based on the participation of multiple subjects including the government, enterprises, and the public, an optimal control strategy model for enterprises under contractual water environmental regulation is constructed using optimal control theory, and a method for calculating the amount of unit pollutant penalties is derived. The water pollutant treatment cost data of a paper company is selected to conduct empirical numerical analysis on the model. The results show that the increase in the probability of government regulation and public participation, as well as the decrease in local government protection for enterprises, can achieve the same regulatory effect while reducing the number of administrative penalties per unit. Finally, the implementation process of contractual water environmental regulation for small and medium-sized enterprises is designed. 展开更多
关键词 Optimal Control theory Small and Medium-Sized Enterprises Water Environment Regulation contract Mechanism
下载PDF
A Systematic Review and Performance Evaluation of Open-Source Tools for Smart Contract Vulnerability Detection
3
作者 Yaqiong He Jinlin Fan Huaiguang Wu 《Computers, Materials & Continua》 SCIE EI 2024年第7期995-1032,共38页
With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges su... With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges such as slow updates,usability issues,and limited installation methods.These challenges hinder the adoption and practicality of these tools.This paper examines smart contract vulnerability detection tools from 2016 to 2023,sourced from the Web of Science(WOS)and Google Scholar.By systematically collecting,screening,and synthesizing relevant research,38 open-source tools that provide installation methods were selected for further investigation.From a developer’s perspective,this paper offers a comprehensive survey of these 38 open-source tools,discussing their operating principles,installation methods,environmental dependencies,update frequencies,and installation challenges.Based on this,we propose an Ethereum smart contract vulnerability detection framework.This framework enables developers to easily utilize various detection tools and accurately analyze contract security issues.To validate the framework’s stability,over 1700 h of testing were conducted.Additionally,a comprehensive performance test was performed on the mainstream detection tools integrated within the framework,assessing their hardware requirements and vulnerability detection coverage.Experimental results indicate that the Slither tool demonstrates satisfactory performance in terms of system resource consumption and vulnerability detection coverage.This study represents the first performance evaluation of testing tools in this domain,providing significant reference value. 展开更多
关键词 Blockchain security ethereum smart contracts detection tools evaluation
下载PDF
The Impact of Corporate Governance and Fair Value Accounting on Debt Contracts
4
作者 Dan Wu 《Proceedings of Business and Economic Studies》 2024年第4期202-206,共5页
This paper investigates the theoretical relationship between corporate governance,fair value accounting,and debt contracts.It primarily examines the individual impacts of corporate governance and fair value accounting... This paper investigates the theoretical relationship between corporate governance,fair value accounting,and debt contracts.It primarily examines the individual impacts of corporate governance and fair value accounting on debt contracts,while also exploring the influence of corporate governance on fair value accounting.The study emphasizes the importance of considering the interests and legal status of creditors in the context of debt contracts.The findings indicate that strong corporate governance can reduce the likelihood of debt default and that the company’s restructuring costs in the event of a default determine whether improved corporate governance will increase or decrease debt costs.Additionally,the study reveals that the strength of corporate governance affects the value relevance of fair value accounting.However,the impact of fair value accounting on debt contracts is not inherently positive or negative;for instance,companies may use fair value adjustments with manipulative intent to enhance performance.Ultimately,the research highlights that discussions about corporate governance should not prioritize shareholder interests exclusively but also consider the legitimate position of creditors. 展开更多
关键词 Corporate governance Debt contracts Debt default Fair value accounting
下载PDF
A Study on the Contemporary Value of the De Facto Contract Theory: From the Perspective of Article 471 of the Civil Code of the People’s Republic of China
5
作者 Qi Shaoming 《Contemporary Social Sciences》 2023年第5期81-101,共21页
Article 471 of the Civil Code of the People’s Republic of China(hereinafter referred to as“the Civil Code”)stipulates that contracts may be formed not only through offer and acceptance but also through“other means... Article 471 of the Civil Code of the People’s Republic of China(hereinafter referred to as“the Civil Code”)stipulates that contracts may be formed not only through offer and acceptance but also through“other means.”However,the Civil Code does not provide further clarification on what“other means”entail.This statutory provision represents a departure from the traditional theory of contract formation,which requires a“meeting of the minds.”This study seeks to identify the jurisprudential basis of the Civil Code as a positive law and finds that the theory of de facto contracts,proposed by German scholar Günter Haupt in his lecture titled“On Factual Contractual Relationships”provides a theoretical foundation for the Civil Code’s inclusion of alternative methods of contract conclusion.The theory of de facto contracts argues that for certain types of conduct,the formalities of offer and acceptance are not essential.Instead,contracts can be established through factual processes.This view introduces flexibility to the otherwise rigid doctrine of contractual freedom,allowing for more streamlined and logical judicial analysis.It also balances economic efficiency with principles of fairness and justice,serving the normative values underlying contract law.In this paper,the author proposes that the term“de facto contract”be precisely defined within the context of legislative and judicial practice.This article also recommends limiting the original concept described by Haupt to contracts formed based on legally prescribed factual processes or behaviors.Such contracts can be tentatively termed as“statutory de facto contracts,”which could be examined as a distinct category of contracts in legal theory. 展开更多
关键词 de facto contract offer and acceptance declaration of intention mutual assent
下载PDF
Automated Vulnerability Detection of Blockchain Smart Contacts Based on BERT Artificial Intelligent Model
6
作者 Feng Yiting Ma Zhaofeng +1 位作者 Duan Pengfei Luo Shoushan 《China Communications》 SCIE CSCD 2024年第7期237-251,共15页
The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.De... The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.Despite the benefits of virtual currency,vulnerabilities in smart contracts have resulted in substantial losses to users.While researchers have identified these vulnerabilities and developed tools for detecting them,the accuracy of these tools is still far from satisfactory,with high false positive and false negative rates.In this paper,we propose a new method for detecting vulnerabilities in smart contracts using the BERT pre-training model,which can quickly and effectively process and detect smart contracts.More specifically,we preprocess and make symbol substitution in the contract,which can make the pre-training model better obtain contract features.We evaluate our method on four datasets and compare its performance with other deep learning models and vulnerability detection tools,demonstrating its superior accuracy. 展开更多
关键词 BERT blockchain smart contract vulnerability detection
下载PDF
A Review on the Security of the Ethereum-Based DeFi Ecosystem
7
作者 Yue Xue Dunqiu Fan +4 位作者 Shen Su Jialu Fu Ning Hu Wenmao Liu Zhihong Tian 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期69-101,共33页
Decentralized finance(DeFi)is a general term for a series of financial products and services.It is based on blockchain technology and has attracted people’s attention because of its open,transparent,and intermediary ... Decentralized finance(DeFi)is a general term for a series of financial products and services.It is based on blockchain technology and has attracted people’s attention because of its open,transparent,and intermediary free.Among them,the DeFi ecosystem based on Ethereum-based blockchains attracts the most attention.However,the current decentralized financial system built on the Ethereum architecture has been exposed to many smart contract vulnerabilities during the last few years.Herein,we believe it is time to improve the understanding of the prevailing Ethereum-based DeFi ecosystem security issues.To that end,we investigate the Ethereum-based DeFi security issues:1)inherited from the real-world financial system,which can be solved by macro-control;2)induced by the problems of blockchain architecture,which require a better blockchain platform;3)caused by DeFi invented applications,which should be focused on during the project development.Based on that,we further discuss the current solutions and potential directions ofDeFi security.According to our research,we could provide a comprehensive vision to the research community for the improvement of Ethereum-basedDeFi ecosystem security. 展开更多
关键词 Blockchain smart contract decentralized finance DeFi SECURITY
下载PDF
Bipartite consensus problems of Lurie multi-agent systems over signed graphs: A contraction approach
8
作者 张晓娇 吴祥 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期137-145,共9页
This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theor... This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theory, some new conditions for the nonlinear Lurie multi-agent systems reaching bipartite leaderless consensus and bipartite tracking consensus are presented. Compared with the traditional methods, this approach degrades the dimensions of the conditions, eliminates some restrictions of the system matrix, and extends the range of the nonlinear function. Finally, two numerical examples are provided to illustrate the efficiency of our results. 展开更多
关键词 contraction theory virtual system bipartite consensus Lurie multi-agent systems
下载PDF
Preserving Data Secrecy and Integrity for Cloud Storage Using Smart Contracts and Cryptographic Primitives
9
作者 Maher Alharby 《Computers, Materials & Continua》 SCIE EI 2024年第5期2449-2463,共15页
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This a... Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic primitives.The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data.To preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing it.An extensive performance analysis is conducted to illustrate the efficiency of the proposed mechanism.Additionally,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running costs.The security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious entities.The proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems. 展开更多
关键词 Cloud storage data secrecy data integrity smart contracts CRYPtoGRAPHY
下载PDF
The role of time preferences in contract breach:Evidence from Chinese poultry farmers participating in contract farming 被引量:1
10
作者 HOU Jing ZHOU Li +1 位作者 Jennifer IFFT YING Rui-yao 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2023年第2期623-641,共19页
Farmers’contract breach behavior is cited as one of the major stumbling blocks in the sustainable expansion of contract farming in many developing countries.This paper examines farmers’contract breach decisions from... Farmers’contract breach behavior is cited as one of the major stumbling blocks in the sustainable expansion of contract farming in many developing countries.This paper examines farmers’contract breach decisions from the perspective of time preferences.The empirical analysis is based on a household survey and economic field experiments of poultry households participating in contract farming conducted in Jiangsu Province,China.A discounted utility model and a maximum likelihood technique are applied to estimate farmers’time preferences and the effect of time preferences on contract breach in the production and sales phases are explored with a bivariate probit model.The results show that,on average,the poultry farmers in the sample are generally present biased and impatient regarding future utility.The regression results show that farmers with a higher preference for the present and a higher discount rate are more likely to breach contracts,and time preferences play a greater role in the production phase than in the sales phase.When considering heterogeneity,specific investments and transaction costs promote contract stability only for farmers with a low degree of impatience.Moreover,compared with large-scale farmers,small-scale farmers’contract breach decisions are more significantly affected by their time preferences.These results have implications for contract stability policies and other issues that are impacted by the linking of behavioral preferences to agricultural decisions. 展开更多
关键词 time preferences contract breach contract farming economic field experiments China
下载PDF
Strategic Contracting for Software Upgrade Outsourcing in Industry 4.0
11
作者 Cheng Wang Zhuowei Zheng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1563-1592,共30页
The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmu... The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmust be tailored to meet the dynamic needs of enterprises. However, internal research and development can beprohibitively expensive, driving many enterprises to outsource software development and upgrades to externalservice providers. This paper presents a software upgrade outsourcing model for enterprises and service providersthat accounts for the impact of market fluctuations on software adaptability. To mitigate the risk of adverseselection due to asymmetric information about the service provider’s cost and asymmetric information aboutthe enterprise’s revenues, we propose pay-per-time and revenue-sharing contracts in two distinct informationasymmetry scenarios. These two contracts specify the time and transfer payments for software upgrades. Througha comparative analysis of the optimal solutions under the two contracts and centralized decision-making withfull-information, we examine the characteristics of the solutions under two information asymmetry scenarios andanalyze the incentive effects of the two contracts on the various stakeholders. Overall, our study offers valuableinsights for firms seeking to optimize their outsourcing strategies and maximize their returns on investment insoftware upgrades. 展开更多
关键词 Software upgrade outsourcing the principal-agent information asymmetry reverse selection contract design
下载PDF
Design and pricing of maintenance service contract based on Nash non-cooperative game approach
12
作者 SU Chun HUANG Kui 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2024年第1期118-129,共12页
Nowadays manufacturers are facing fierce challenge.Apart from the products,providing customers with multiple maintenance options in the service contract becomes more popular,since it can help to improve customer satis... Nowadays manufacturers are facing fierce challenge.Apart from the products,providing customers with multiple maintenance options in the service contract becomes more popular,since it can help to improve customer satisfaction,and ultimately promote sales and maximize profit for the manufacturer.By considering the combinations of corrective maintenance and preventive maintenance,totally three types of maintenance service contracts are designed.Moreover,attractive incentive and penalty mechanisms are adopted in the contracts.On this basis,Nash non-cooperative game is applied to analyze the revenue for both the manufacturer and customers,and so as to optimize the pricing mechanism of maintenance service contract and achieve a win-win situation.Numerical experiments are conducted.The results show that by taking into account the incentive and penalty mechanisms,the revenue can be improved for both the customers and manufacturer.Moreover,with the increase of repair rate and improvement factor in the preventive maintenance,the revenue will increase gradually for both the parties. 展开更多
关键词 maintenance service contract Nash game incentive and penalty mechanism corrective maintenance preventive maintenance
下载PDF
A Structural Interpretation Model and Restoration of the Mesozoic Proto-basin for the Kuqa Depression,Tarim Basin 被引量:1
13
作者 QI Jiafu LI Yong +2 位作者 XU Zhenping YANG Shujiang SUN Tong 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2023年第1期207-225,共19页
A thrust-fold belt consisting of a series of thrusts and buckling folds developed in the Mesozoic and Cenozoic strata within the Kuqa Depression,Tarim Basin.In this study,a structural interpretation model of the Kuqa ... A thrust-fold belt consisting of a series of thrusts and buckling folds developed in the Mesozoic and Cenozoic strata within the Kuqa Depression,Tarim Basin.In this study,a structural interpretation model of the Kuqa Depression is established and the Mesozoic proto-basin is reconstructed on the basis of outcrop geology along the basin margin,seismic,well-log and CEMP data.The model is called‘delaminate contractional deformation',which emphasizes the decoupling between the Cenozoic,Mesozoic,pre-Mesozoic and the basin-basement within the Kuqa Depression,but there is no unified detachment.The model has a shortening amount ranging from 12 km to 16 km and the depth involved in contractional deformation ranges from 21 km to 28 km.A prototype of the Mesozoic basin reconstructed by interpretation model is a subbasin superposed on the transitional zone between the uplift at the northern edge of the Tarim Craton and the southern Tianshan orogenic wedge formed in the Hercynian orogeny.Lithospheric thermal and crustal isostatic activity after the Hercynian orogeny maybe the controlling dynamic factors of basin subsidence during the Mesozoic and early Cenozoic,the difference in rock mechanical properties between different levels,craton and orogenic wedge being the major cause of the‘delaminate contractional deformation'during the Himalayan orogeny. 展开更多
关键词 delaminate contractional deformation balanced cross-section Mesozoic proto-basin flexural depression Kuqa Depression of Tarim Basin
下载PDF
Cost Control Strategies in the Pre-Construction Period of Highway Construction
14
作者 Chunbo Chen 《Journal of Architectural Research and Development》 2024年第3期104-109,共6页
Effective cost control in the investment and design phases of highway construction is crucial for managing project expenses.However,current management practices often overlook pre-construction cost management,leading ... Effective cost control in the investment and design phases of highway construction is crucial for managing project expenses.However,current management practices often overlook pre-construction cost management,leading to budget overruns and project delays during later stages.To ensure the smooth execution and cost control of highway construction projects,this paper examines the significance of cost control,evaluates the current state and challenges of highway construction,and proposes strategies for cost management.These strategies aim to establish a robust foundation for cost management in highway projects. 展开更多
关键词 Highway construction Preliminary management Cost control contract management Investment estimate
下载PDF
Smart contract token-based privacy-preserving access control system for industrial Internet of Things
15
作者 Weizheng Wang Huakun Huang +3 位作者 Zhimeng Yin Thippa Reddy Gadekallu Mamoun Alazab Chunhua Su 《Digital Communications and Networks》 SCIE CSCD 2023年第2期337-346,共10页
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily lives.While IIoT brings us much convenience,a series of security and scalability ... Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily lives.While IIoT brings us much convenience,a series of security and scalability issues related to permission operations rise to the surface during device communications.Hence,at present,a reliable and dynamic access control management system for IIoT is in urgent need.Up till now,numerous access control architectures have been proposed for IIoT.However,owing to centralized models and heterogeneous devices,security and scalability requirements still cannot be met.In this paper,we offer a smart contract token-based solution for decentralized access control in IIoT systems.Specifically,there are three smart contracts in our system,including the Token Issue Contract(TIC),User Register Contract(URC),and Manage Contract(MC).These three contracts collaboratively supervise and manage various events in IIoT environments.We also utilize the lightweight and post-quantum encryption algorithm-Nth-degree Truncated Polynomial Ring Units(NTRU)to preserve user privacy during the registration process.Subsequently,to evaluate our proposed architecture's performance,we build a prototype platform that connects to the local blockchain.Finally,experiment results show that our scheme has achieved secure and dynamic access control for the IIoT system compared with related research. 展开更多
关键词 Blockchain Privacy preservation Smart contract Industrial IoT
下载PDF
The Detection of Fraudulent Smart Contracts Based on ECA-EfficientNet and Data Enhancement
16
作者 Xuanchen Zhou Wenzhong Yang +3 位作者 Liejun Wang Fuyuan Wei KeZiErBieKe HaiLaTi Yuanyuan Liao 《Computers, Materials & Continua》 SCIE EI 2023年第12期4073-4087,共15页
With the increasing popularity of Ethereum,smart contracts have become a prime target for fraudulent activities such as Ponzi,honeypot,gambling,and phishing schemes.While some researchers have studied intelligent frau... With the increasing popularity of Ethereum,smart contracts have become a prime target for fraudulent activities such as Ponzi,honeypot,gambling,and phishing schemes.While some researchers have studied intelligent fraud detection,most research has focused on identifying Ponzi contracts,with little attention given to detecting and preventing gambling or phishing contracts.There are three main issues with current research.Firstly,there exists a severe data imbalance between fraudulent and non-fraudulent contracts.Secondly,the existing detection methods rely on diverse raw features that may not generalize well in identifying various classes of fraudulent contracts.Lastly,most prior studies have used contract source code as raw features,but many smart contracts only exist in bytecode.To address these issues,we propose a fraud detection method that utilizes Efficient Channel Attention EfficientNet(ECA-EfficientNet)and data enhancement.Our method begins by converting bytecode into Red Green Blue(RGB)three-channel images and then applying channel exchange data enhancement.We then use the enhanced ECA-EfficientNet approach to classify fraudulent smart contract RGB images.Our proposed method achieves high F1-score and Recall on both publicly available Ponzi datasets and self-built multi-classification datasets that include Ponzi,honeypot,gambling,and phishing smart contracts.The results of the experiments demonstrate that our model outperforms current methods and their variants in Ponzi contract detection.Our research addresses a significant problem in smart contract security and offers an effective and efficient solution for detecting fraudulent contracts. 展开更多
关键词 Fraud detection smart contract ECA-EfficientNet Ethereum
下载PDF
Physical Transformations of Agri-Food Products during Their Convective Drying: Characterization of the Contraction and Isotropicity of Okra
17
作者 Kondia Honoré Ouoba Abdou-Salam Ganame +2 位作者 Désiré Bama Abdoul Salam Ibrango Salifou Ouedraogo 《Journal of Minerals and Materials Characterization and Engineering》 2023年第6期249-259,共11页
The physical transformations in terms of contraction of okra dimensions during convective drying were examined. During drying, the lateral and longitudinal dimensions of okra decrease over time. The lateral dimensions... The physical transformations in terms of contraction of okra dimensions during convective drying were examined. During drying, the lateral and longitudinal dimensions of okra decrease over time. The lateral dimensions go from their initial value to around 53%, 65% and 66% of this value after 530 min. The length of the two samples used goes from 8.65 and 9.02 cm to 6.79 and 7.52 cm after 14,300 min, i.e. a variation of 78.50% and 83.37%. All the two directions give variations almost linear depending on the water content. These linear contractions result in a volume contraction of the okra. It considerably decreases in volume during the drying process. The volume goes from 831.32 cm<sup>3</sup> to 367.57 cm<sup>3</sup> in min, a variation of 44.22%. The isotropic index reveals that okra does not behave the same in the lateral and longitudinal directions. It contracts its diameter more than its length. 展开更多
关键词 Physical Transformations contractION Isotropicity OKRA
下载PDF
Smart Contract to Traceability of Food Social Selling
18
作者 Cristian Valencia-Payan JoséFernando Grass-Ramírez +1 位作者 Gustavo Ramirez-Gonzalez Juan Carlos Corrales 《Computers, Materials & Continua》 SCIE EI 2023年第3期4703-4728,共26页
Traditionally,food sustainability has been considered solely in the stage of agricultural production.However,globalization,the expansion of the food production industry,and the emergence of supermarket chains that con... Traditionally,food sustainability has been considered solely in the stage of agricultural production.However,globalization,the expansion of the food production industry,and the emergence of supermarket chains that control the retail food market require specific significant changes in supply chains in the food sector and,therefore,we need to address the economic,social,and environmental impacts of these events.On the other hand,social selling has increased rapidly in recent years,with a further boom,following current events related to the coronavirus disease(COVID-19).This explosion of social sales,where there are usually no control and regulation entities,can bring problems associated with mishandling items.In this paper,we expose how Blockchain technology supports the traceability of social sales by validating the data provided by the chain participants such as digital health passports,production and transport data in the sale process;the proposed solution generates recommendations on productmanagement considering the agreements previously made by the network actors.To evaluate the proposed smart contracts,we useHyperledger Caliper,obtaining an average throughput of 12.6 transactions per second and an average latency of 0.3 s for the asset update process.We also use a study case to evaluate the proposed project platform’s selling-transport stage using Internet of Things(IoT)sensors. 展开更多
关键词 Blockchain reliability smart contracts social selling TRACEABILITY artisan sweets
下载PDF
Development potential of the Northeast Passage based on a multinomial-logit-based stochastic user equilibrium model
19
作者 ZHOU Xuelian HU Maixiu 《Advances in Polar Science》 CSCD 2023年第1期45-55,共11页
We developed a multinomial-logit-based stochastic user equilibrium(MNL SUE)model incorporating time value of cargo to investigate future proportions of cargo flow through the Northeast Passage(NEP)and the Suez Canal R... We developed a multinomial-logit-based stochastic user equilibrium(MNL SUE)model incorporating time value of cargo to investigate future proportions of cargo flow through the Northeast Passage(NEP)and the Suez Canal Route between representative ports.We studied navigation during the ice-free and ice-covered seasons using sea ice projections for 2070 based on 1991–2021 NEP ice data.Sailing distance and time between selected ports are lower via the NEP than the Suez Canal Route.Under the scenario of year-round operation of the NEP,the proportion of cargo flow through the NEP is estimated to be 68.5%,which represents considerable commercial potential.Proportions are higher for the ice-free season and for ports at high latitudes.We also assessed flow under different scenarios.Under the scenario of fuel price increase,proportion of flow through the NEP in the ice-covered season is expected to increase.If time value is ignored,flow through the NEP is expected to increase all year round.If shippers become more cost-conscious,flow through the NEP is also expected to increase. 展开更多
关键词 Northeast Passage multinomial-logit-based stochastic user equilibrium(MNL sue) time value scenario analysis
下载PDF
Monitoring the security of audio biomedical signals communications in wearable IoT healthcare
20
作者 Saeid Yazdanpanah Saman Shojae Chaeikar Alireza Jolfaei 《Digital Communications and Networks》 SCIE CSCD 2023年第2期393-399,共7页
Smart home devices are vulnerable to a variety of attacks.The matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,S... Smart home devices are vulnerable to a variety of attacks.The matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart home).To handle these attacks,most studies have hitherto proposed authentication protocols that cannot necessarily be implemented in devices,especially during Device-to-Device(D2D)interactions.Tapping into the potential of Ethereum blockchain and smart contracts,this work proposes a lightweight authentication mechanism that enables safe D2D interactions in a smart home.The Ethereum blockchain enables the implementation of a decentralized prototype as well as a peer-to-peer distributed ledger system.The work also uses a single server queuing system model and the authentication mechanism to curtail DDoS attacks by controlling the number of service requests in the system.The simulation was conducted twenty times,each with varying number of devices chosen at random(ranging from 1 to 30).Each requester device sends an arbitrary request with a unique resource requirement at a time.This is done to measure the system's consistency across a variety of device capabilities.The experimental results show that the proposed protocol not only prevents colluding attacks,but also outperforms the benchmark protocols in terms of computational cost,message processing,and response times. 展开更多
关键词 DDoS attack Device-to-device Smart homes Blockchain AUtheNTICATION Ethereum smart contract
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部