期刊文献+
共找到298篇文章
< 1 2 15 >
每页显示 20 50 100
Effectiveness of Group Therapy Based on Transactional Analysis (TA) in Marital Burnout and Forbearance of Female Students
1
作者 Sedigheh Sakaki Toozandehjani Hassan 《Open Journal of Medical Psychology》 2017年第2期76-85,共10页
This research is a semi-experimental study (pretest-posttest design with unequal control group). This study aimed to investigate the effectiveness of the group therapy based on transactional analysis in marital burnou... This research is a semi-experimental study (pretest-posttest design with unequal control group). This study aimed to investigate the effectiveness of the group therapy based on transactional analysis in marital burnout and forbearance of married female students. The research on statistical population comprised all married female students studying in humanities subjects in Neishabour Islamic Azad University in the academic year 2015-16. The sample included 24 of these students, who were selected voluntarily and through Random sampling method and were randomly assigned into two experimental and control groups. Measurement tools consisted of Couple Burnout Measure (CBM) and Evans marital forbearance questionnaire. The experimental group received 10 one-half hour sessions of the treatment based on the transactional analysis whereas in the meantime, the control group received nutritional trainings. The results indicated that the therapy based on the transactional analysis had been effective in reducing marital burnout and increasing the forbearance of couples. 展开更多
关键词 GROUP THERAPY transactional Analysis (TA) MARITAL BURNOUT and Forbearance
下载PDF
Effect of Count Estimation in Finding Frequent Itemsets over Online Transactional Data Streams 被引量:2
2
作者 JoongHyukChang WonSukLee 《Journal of Computer Science & Technology》 SCIE EI CSCD 2005年第1期63-69,共7页
A data stream is a massive unbounded sequence of data elements continuouslygenerated at a rapid rate. Due to this reason, most algorithms for data streams sacrifice thecorrectness of their results for fast processing ... A data stream is a massive unbounded sequence of data elements continuouslygenerated at a rapid rate. Due to this reason, most algorithms for data streams sacrifice thecorrectness of their results for fast processing time. The processing time is greatly influenced bythe amount of information that should be maintained. This issue becomes more serious in findingfrequent itemsets or frequency counting over an online transactional data stream since there can bea large number of itemsets to be monitored. We have proposed a method called the estDec method forfinding frequent itemsets over an online data stream. In order to reduce the number of monitoreditemsets in this method, monitoring the count of an itemset is delayed until its support is largeenough to become a frequent itemset in the near future. For this purpose, the count of an itemsetshould be estimated. Consequently, how to estimate the count of an itemset is a critical issue inminimizing memory usage as well as processing time. In this paper, the effects of various countestimation methods for finding frequent itemsets are analyzed in terms of mining accuracy, memoryusage and processing time. 展开更多
关键词 count estimation frequent itemsets transactional data streams
原文传递
Certifying Concurrent Programs Using Transactional Memory 被引量:1
3
作者 李隆 张昱 +1 位作者 陈意云 李勇 《Journal of Computer Science & Technology》 SCIE EI CSCD 2009年第1期110-121,共12页
Transactional memory (TM) is a new promising concurrency-control mechanism that can avoid many of the pitfalls of the traditional lock-based techniques. TM systems handle data races between threads automatically so ... Transactional memory (TM) is a new promising concurrency-control mechanism that can avoid many of the pitfalls of the traditional lock-based techniques. TM systems handle data races between threads automatically so that programmers do not have to reason about the interaction of threads manually. TM provides a programming model that may make the development of multi-threaded programs easier. Much work has been done to explore the various implementation strategies of TM systems and to achieve better performance, but little has been done on how to formally reason about programs using TM and how to make sure that such reasoning is sound. In this paper, we focus on the semantics of transactional memory and present a proof-carrying code (PCC) system for reasoning about programs using TM . We formalize our reasoning with respect to the TM semantics, prove its soundness, and use examples to demonstrate its effectiveness. 展开更多
关键词 program verification transactional memory proof-carrying code concurrent program safety
原文传递
A Cross-Cultural Reflection on Shusterman's Suggestion of the "Transactional" Body 被引量:1
4
作者 Eva Kit Wah Man 《Frontiers of Philosophy in China》 2015年第2期181-191,共11页
This short article explores the meaning of Shusterman's "transactional body," derived from his statement that the will is not a purely mental affair that is independent of physical modality but is always an interac... This short article explores the meaning of Shusterman's "transactional body," derived from his statement that the will is not a purely mental affair that is independent of physical modality but is always an interaction with its environment. While he appreciates the Deweyan interaetional model, he develops the "transactional mode," which he implies should expand the body-mind unity to the level of social and cultural conditions. Shusterman finds similar integrations and transactions among the mental, psychophysical and physical levels in Asian philosophical traditions. This article conducts a comparative study between his theory and Mencius' understanding of the body. Within the discussion, the analysis of aesthetic experience explicated by Dewey and Shusterman is reviewed as the link to the comparison. 展开更多
关键词 Richard Shusterman BODY CROSS-CULTURAL transactional interactional heaven aesthetic experience
原文传递
Blockchain-Enabled Cybersecurity Provision for Scalable Heterogeneous Network:A Comprehensive Survey
5
作者 Md.Shohidul Islam Md.Arafatur Rahman +3 位作者 Mohamed Ariff Bin Ameedeen Husnul Ajra Zahian Binti Ismail Jasni Mohamad Zain 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期43-123,共81页
Blockchain-enabled cybersecurity system to ensure and strengthen decentralized digital transaction is gradually gaining popularity in the digital era for various areas like finance,transportation,healthcare,education,... Blockchain-enabled cybersecurity system to ensure and strengthen decentralized digital transaction is gradually gaining popularity in the digital era for various areas like finance,transportation,healthcare,education,and supply chain management.Blockchain interactions in the heterogeneous network have fascinated more attention due to the authentication of their digital application exchanges.However,the exponential development of storage space capabilities across the blockchain-based heterogeneous network has become an important issue in preventing blockchain distribution and the extension of blockchain nodes.There is the biggest challenge of data integrity and scalability,including significant computing complexity and inapplicable latency on regional network diversity,operating system diversity,bandwidth diversity,node diversity,etc.,for decision-making of data transactions across blockchain-based heterogeneous networks.Data security and privacy have also become the main concerns across the heterogeneous network to build smart IoT ecosystems.To address these issues,today’s researchers have explored the potential solutions of the capability of heterogeneous network devices to perform data transactions where the system stimulates their integration reliably and securely with blockchain.The key goal of this paper is to conduct a state-of-the-art and comprehensive survey on cybersecurity enhancement using blockchain in the heterogeneous network.This paper proposes a full-fledged taxonomy to identify the main obstacles,research gaps,future research directions,effective solutions,andmost relevant blockchain-enabled cybersecurity systems.In addition,Blockchain based heterogeneous network framework with cybersecurity is proposed in this paper tomeet the goal of maintaining optimal performance data transactions among organizations.Overall,this paper provides an in-depth description based on the critical analysis to overcome the existing work gaps for future research where it presents a potential cybersecurity design with key requirements of blockchain across a heterogeneous network. 展开更多
关键词 Blockchain CYBERSECURITY data transaction diversity heterogeneous
下载PDF
An Energy Trading Method Based on Alliance Blockchain and Multi-Signature
6
作者 Hongliang Tian Jiaming Wang 《Computers, Materials & Continua》 SCIE EI 2024年第2期1611-1629,共19页
Blockchain,known for its secure encrypted ledger,has garnered attention in financial and data transfer realms,including the field of energy trading.However,the decentralized nature and identity anonymity of user nodes... Blockchain,known for its secure encrypted ledger,has garnered attention in financial and data transfer realms,including the field of energy trading.However,the decentralized nature and identity anonymity of user nodes raise uncertainties in energy transactions.The broadcast consensus authentication slows transaction speeds,and frequent single-point transactions in multi-node settings pose key exposure risks without protective measures during user signing.To address these,an alliance blockchain scheme is proposed,reducing the resource-intensive identity verification among nodes.It integrates multi-signature functionality to fortify user resources and transac-tion security.A novel multi-signature process within this framework involves neutral nodes established through central nodes.These neutral nodes participate in multi-signature’s signing and verification,ensuring user identity and transaction content privacy.Reducing interactions among user nodes enhances transaction efficiency by minimizing communication overhead during verification and consensus stages.Rigorous assessments on reliability and operational speed highlight superior security performance,resilient against conventional attack vectors.Simulation shows that compared to traditional solutions,this scheme has advantages in terms of running speed.In conclusion,the alliance blockchain framework introduces a novel approach to tackle blockchain’s limitations in energy transactions.The integrated multi-signature process,involving neutral nodes,significantly enhances security and privacy.The scheme’s efficiency,validated through analytical assessments and simulations,indicates robustness against security threats and improved transactional speeds.This research underscores the potential for improved security and efficiency in blockchain-enabled energy trading systems. 展开更多
关键词 Alliance blockchain MULTI-SIGNATURE energy trading security performance transaction efficiency
下载PDF
A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems
7
作者 Jingyu Zhang Pian Zhou +3 位作者 Jin Wang Osama Alfarraj Saurabh Singh Min Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1613-1633,共21页
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems... Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems. 展开更多
关键词 Blockchain architecture transaction verification information security heterogeneous Merkle tree distributed systems
下载PDF
A Fair and Trusted Trading Scheme for Medical Data Based on Smart Contracts
8
作者 Xiaohui Yang Kun Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第2期1843-1859,共17页
Data is regarded as a valuable asset,and sharing data is a prerequisite for fully exploiting the value of data.However,the current medical data sharing scheme lacks a fair incentive mechanism,and the authenticity of d... Data is regarded as a valuable asset,and sharing data is a prerequisite for fully exploiting the value of data.However,the current medical data sharing scheme lacks a fair incentive mechanism,and the authenticity of data cannot be guaranteed,resulting in low enthusiasm of participants.A fair and trusted medical data trading scheme based on smart contracts is proposed,which aims to encourage participants to be honest and improve their enthusiasm for participation.The scheme uses zero-knowledge range proof for trusted verification,verifies the authenticity of the patient’s data and the specific attributes of the data before the transaction,and realizes privacy protection.At the same time,the game pricing strategy selects the best revenue strategy for all parties involved and realizes the fairness and incentive of the transaction price.The smart contract is used to complete the verification and game bargaining process,and the blockchain is used as a distributed ledger to record the medical data transaction process to prevent data tampering and transaction denial.Finally,by deploying smart contracts on the Ethereum test network and conducting experiments and theoretical calculations,it is proved that the transaction scheme achieves trusted verification and fair bargaining while ensuring privacy protection in a decentralized environment.The experimental results show that the model improves the credibility and fairness of medical data transactions,maximizes social benefits,encourages more patients and medical institutions to participate in the circulation of medical data,and more fully taps the potential value of medical data. 展开更多
关键词 Blockchain data transactions zero-knowledge proof game pricing
下载PDF
ISO/TC 321电子商务标准化工作对非洲发展中国家的启示
9
作者 Liberty Artwell Mareya 宋明顺 吴宏宽 《China Standardization》 2024年第2期73-76,共4页
This paper draws on the experience of the eighth plenary meeting of the ISO/TC 321, Transaction assurance in e-commerce, held in Hangzhou of China in November 2023, and explores potential ways in which developing coun... This paper draws on the experience of the eighth plenary meeting of the ISO/TC 321, Transaction assurance in e-commerce, held in Hangzhou of China in November 2023, and explores potential ways in which developing countries in Africa can drive their development and contribute to global industrial progress by leveraging ISO/TC 321 standards. It provides practical recommendations for utilizing e-commerce standardization and related standards to stimulate economic growth and enhance business practices. 展开更多
关键词 ISO/TC 321 E-COMMERCE transaction assurance China developing countries AFRICA
下载PDF
Optimization of High-Concurrency Conflict Issues in Execute-Order-Validate Blockchain
10
作者 MA Qianli ZHANG Shengli +2 位作者 WANG Taotao YANG Qing WANG Jigang 《ZTE Communications》 2024年第2期19-29,共11页
With the maturation and advancement of blockchain technology,a novel execute-order-validate(EOV)architecture has been proposed,allowing transactions to be executed in parallel during the execution phase.However,parall... With the maturation and advancement of blockchain technology,a novel execute-order-validate(EOV)architecture has been proposed,allowing transactions to be executed in parallel during the execution phase.However,parallel execution may lead to multi-version concurrency control(MVCC)conflicts during the validation phase,resulting in transaction invalidation.Based on different causes,we categorize conflicts in the EOV blockchain into two types:within-block conflicts and cross-block conflicts,and propose an optimization solution called FabricMan based on Fabric v2.4.For within-block conflicts,a reordering algorithm is designed to improve the transaction success rate and parallel validation is implemented based on the transaction conflict graph.We also merge transfer transactions to prevent triggering multiple version checks.For cross-block conflicts,a cache-based version validation mechanism is implemented to detect and terminate invalid transactions in advance.Experimental comparisons are conducted between FabricMan and two other systems,Fabric and Fabric++.The results show that FabricMan outperforms the other two systems in terms of throughput,transaction abort rate,algorithm execution time,and other experimental metrics. 展开更多
关键词 blockchain MVCC conflict REORDERING parallel validation transaction merging
下载PDF
TRADE DEPENDENCIES AND TRANSACTION COSTS: THE OC-CUPATION OF DECELEA HIGHLIGHTS BOTH THE BENEFITS AND THE DRAWBACKS OF A MARITIME ECONOMY
11
作者 Pascal Warnking 《Journal of Ancient Civilizations》 2024年第1期29-50,123,共23页
Thucydides asserts that the occupation of Decelea by the Spartans in 413 BC made the grain supply for Athens costly by forcing the transport from land onto the sea.This calls into question the well-established consens... Thucydides asserts that the occupation of Decelea by the Spartans in 413 BC made the grain supply for Athens costly by forcing the transport from land onto the sea.This calls into question the well-established consensus that sea transport was far cheaper than land transport.This paper contends that the cost of protecting supply lines-specifically the expenses associated with the warships which escorted the supply ships-rendered the grain transported on the new route exceptionally costly.In this paper,the benefits and drawbacks of a maritime economy,including transaction costs,trade dependencies,and the capabilities of warships and supply ships are discussed. 展开更多
关键词 convoy Decelea maritime dependencies maritime economy sea routes shipping costs transaction costs
下载PDF
Are transactional political connections more valuable to firms than relational political connections?
12
作者 Taufiq Arifin Rezaul Kabir +1 位作者 Katherin Marthon Sutaryo Sutaryo 《Economic and Political Studies》 2022年第3期266-278,共13页
Political connections are an increasingly important part of firms’strategies to develop relationships with the government and poli-ticians.This study examines the impact of transactional and rela-tional political con... Political connections are an increasingly important part of firms’strategies to develop relationships with the government and poli-ticians.This study examines the impact of transactional and rela-tional political connections on firm value.The results show that transactionally connected firms are more likely to exhibit greater firm value than their relationally connected and non-connected counterparts.This study further finds evidence of a long-term value-enhancing effect of the transactional approach to political connections.A variety of robustness tests with alternative model specifications continue to show that transactional political con-nections lead to higher firm value.The findings indicate that firms with transactional political connections are provided with better networks with the political regime in power compared with those with relational political connections.These transactionally con-nected firms may enjoy preferential treatment from the govern-ment,in the form of lower taxes,and the access to government loans,subsidies,bailouts,and/or procurement contracts. 展开更多
关键词 Political connections transactional connections relational connections firm value
原文传递
Transactional Network Analysis and Money Laundering Behavior Identification of Central Bank Digital Currency of China
13
作者 Ziyu Li Yanmei Zhang +1 位作者 Qian Wang Shiping Chen 《Journal of Social Computing》 EI 2022年第3期219-230,共12页
With the gradual application of central bank digital currency(CBDC)in China,it brings new payment methods,but also potentially derives new money laundering paths.Two typical application scenarios of CBDC are considere... With the gradual application of central bank digital currency(CBDC)in China,it brings new payment methods,but also potentially derives new money laundering paths.Two typical application scenarios of CBDC are considered,namely the anonymous transaction scenario and real-name transaction scenario.First,starting from the interaction network of transactional groups,the degree distribution,density,and modularity of normal and money laundering transactions in two transaction scenarios are compared and analyzed,so as to clarify the characteristics and paths of money laundering transactions.Then,according to the two typical application scenarios,different transaction datasets are selected,and different models are used to train the models on the recognition of money laundering behaviors in the two datasets.Among them,in the anonymous transaction scenario,the graph convolutional neural network is used to identify the spatial structure,the recurrent neural network is fused to obtain the dynamic pattern,and the model ChebNet-GRU is constructed.The constructed ChebNet-GRU model has the best effect in the recognition of money laundering behavior,with a precision of 94.3%,a recall of 59.5%,an F1 score of 72.9%,and a microaverage F1 score of 97.1%.While in the real-name transaction scenario,the traditional machine learning method is far better than the deep learning method,and the micro-average F1 score of the random forest and XGBoost models both reach 99.9%,which can effectively identify money laundering in currency transactions. 展开更多
关键词 central bank digital currency(CBDC) transactional network money laundering behavior identification
原文传递
Constraints-Aware Scheduling for Transactional Services Composition
14
作者 刘安 刘海 +2 位作者 李青 黄刘生 肖明军 《Journal of Computer Science & Technology》 SCIE EI CSCD 2009年第4期638-651,共14页
Composite Web services need transactional support to guarantee their consistent and reliable execution. Due to the long running and inter-organizational characteristics of Web services, current approaches for transact... Composite Web services need transactional support to guarantee their consistent and reliable execution. Due to the long running and inter-organizational characteristics of Web services, current approaches for transactional Web setvices composition adopt compensation mechanism to maintain atomicity. A common assumption is that a compensation operation can be applied at any time with no cost. However, compensation operations are typically associated with temporal and cost constraints, which make compensation mechanism problematic in this new environment. To address this problem, we distinguish two types of scheduling for transactional Web services composition: time aware scheduling and cost aware scheduling. We devise several algorithms for scheduling, which can ensure the atomicity of composite services when compensation operations have temporal constraints, and assist composite services to maintain atomicity with minimum compensation cost when compensation operations have cost constraints. We benchmark our algorithms by simulations and the results show that our algorithm decreases the compensation cost and in turn improves the QoS of transactional services composition. 展开更多
关键词 COMPENSATION COST service composition time TRANSACTION
原文传递
A Novel Stackelberg-Game-Based Energy Storage Sharing Scheme Under Demand Charge 被引量:2
15
作者 Bingyun Li Qinmin Yang Innocent Kamwa 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第2期462-473,共12页
Demand response(DR)using shared energy storage systems(ESSs)is an appealing method to save electricity bills for users under demand charge and time-of-use(TOU)price.A novel Stackelberg-game-based ESS sharing scheme is... Demand response(DR)using shared energy storage systems(ESSs)is an appealing method to save electricity bills for users under demand charge and time-of-use(TOU)price.A novel Stackelberg-game-based ESS sharing scheme is proposed and analyzed in this study.In this scheme,the interactions between selfish users and an operator are characterized as a Stackelberg game.Operator holds a large-scale ESS that is shared among users in the form of energy transactions.It sells energy to users and sets the selling price first.It maximizes its profit through optimal pricing and ESS dispatching.Users purchase some energy from operator for the reduction of their demand charges after operator's selling price is announced.This game-theoretic ESS sharing scheme is characterized and analyzed by formulating and solving a bi-level optimization model.The upper-level optimization maximizes operator's profit and the lower-level optimization minimizes users'costs.The bi-level model is transformed and linearized into a mixed-integer linear programming(MILP)model using the mathematical programming with equilibrium constraints(MPEC)method and model linearizing techniques.Case studies with actual data are carried out to explore the economic performances of the proposed ESS sharing scheme. 展开更多
关键词 Bi-level optimization demand charge energy storage system(ESS)sharing energy transaction mathematical program with equilibrium constraints(MPEC) stackelberg game
下载PDF
An Enhanced Security System Using Blockchain Technology for Strong FMC Relationship 被引量:1
16
作者 K.Meenakshi K.Sashi Rekha 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期111-128,共18页
Blockchain technology is a shared database of logs of all consumer transactions which are registered on all machines on a network.Both transactions in the system are carried out by consensus processes and to preserve ... Blockchain technology is a shared database of logs of all consumer transactions which are registered on all machines on a network.Both transactions in the system are carried out by consensus processes and to preserve confidentiality all thefiles contained cannot be changed.Blockchain technology is the fundamental software behind digital currencies like Bitcoin,which is common in the marketplace.Cloud computing is a method of using a network of external machines to store,monitor,and process information,rather than using the local computer or a local personal computer.The software is currently facing multiple problems including lack of data protection,data instability,and reliability.This paper aims to give the highest security for multiple user environments in cloud for storing and accessing the data in blocks.The users who are legitimate are only allowed for storing and accessing the data as like a secured block chain approach.As like the Blockchain which does not require a centralized system for transactions,the proposed system is also independent on centralized network interface.The decentralized system is developed in such a way to avoid counterfeiting.The system enables the fabricator to spend less or null resources to perform the validations for its direct operated stores.This ensures the product fabricator to avoid the circulation of its duplicate products.The customer as an end-user is also ensured to have only the genuine products from the fabricator.The Fabricator(F),Merchant(M)and consumer(C)forms an interconnected triangular structure without allowing any counterfeiting agents in their secured cloud chain.The pro-posed approach provides the stability in the security system of the cloud using the chaining mechanism within different blocks at each node.It takes roughly 4.7,6.2,and 7.5 ms,respectively,to register each node in the proposed system for 5,10,and 15 nodes.The overall registration time for each scenario is 11.9,26.2,and 53.1 ms,despite the fact that each node’s registration time was greatest for 10 nodes.By looking at the data,it’s clear that the number of nodes is a func-tion of time. 展开更多
关键词 Blockchain bitcoin CUSTOMER MERCHANT data protection digital currencies TRANSACTION
下载PDF
Evaluation method for assessing the auxiliary service transaction mechanism in regional power markets
17
作者 Le Liu Xueyu Chen +3 位作者 Dexin Li Chang Liu Dunnan Liu Genzhu Li 《Global Energy Interconnection》 EI CAS CSCD 2023年第2期238-252,共15页
Accurate and seamless auxiliary services in the power market can guarantee smooth and continuous power system operation. China’s new round of power system reform has entered a critical period, and reform implementati... Accurate and seamless auxiliary services in the power market can guarantee smooth and continuous power system operation. China’s new round of power system reform has entered a critical period, and reform implementation requires comprehensive improvements in the maturity of the supporting auxiliary service market. This study reviews the development status and evolution path of the European unified power market and the US regional power market, provides experience for the development of China’s regional power market, then identifies the key influencing factors of auxiliary service trading mechanism design in regional power markets. To analyze the rationality of the auxiliary service trading evaluation index, this paper established an evaluation model for assessing regional power markets. Using combined weight optimization, the gray correlation TOPSIS method was applied to comprehensively evaluate auxiliary service trading in the regional power market. Finally, the application of the proposed evaluation method was briefly analyzed to examine four regional power markets in China and evaluate the effectiveness of current market construction in different regions and provide suggestions for future market construction. 展开更多
关键词 Power market Auxiliary services Transaction mechanism Evaluation index Evaluation model
下载PDF
An Interoperability Cross-Block Chain Framework for Secure Transactions in IoT
18
作者 N.Anand Kumar A.Grace Selvarani P.Vivekanandan 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期1077-1090,共14页
The purpose of this research is to deal with effective block chain framework for secure transactions.The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved ... The purpose of this research is to deal with effective block chain framework for secure transactions.The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved in Blockchain and to tackle this issue,Cross-Chain based Transaction(CCT)is introduced.Traditional industries have been restructured by the introduction of Internet of Things(IoT)to become smart industries through the feature of data-driven decision-making.Still,there are a few limitations,like decentralization,security vulnerabilities,poor interoperability,as well as privacy concerns in IoTs.To overcome this limitation,Blockchain has been employed to assure a safer transaction process,especially in asset exchanges.In recent decades,scalable local ledgers implement Blockchains,simultaneously sustaining peer validations of transactions which can be at local or global levels.From the single Hyperledger-based blockchains system,the CCT takes the transaction amid various chains.In addition,the most significant factor for this registration processing strategy is the Signature to ensure security.The application of the Quantum cryptographic algorithm amplifies the proposed Hyperledger-based blockchains,to strengthen the safety of the process.The key has been determined by restricting the number of transactions that reach the global Blockchain using the quantum-based hash function and accomplished by scalable local ledgers,and peer validations of transactions at local and global levels without any issues.The rate of transaction processing for entire peers has enhanced with the ancillary aid of the proposed solution,as it includes the procedure of load distribution.Without any boosted enhancement,the recommended solution utilizes the current transaction strategy,and also,it’s aimed at scalability,resource conservation,and interoperability.The experimental results of the system have been evaluated using the metrics like block weight,ledger memory,the usage of the central processing unit,and the communication overhead. 展开更多
关键词 Internet of Things(IoT) scalability blockchain INTEROPERABILITY security ledger size transaction rate cross-chain based transaction(CCT) quantum cryptographic algorithm
下载PDF
Transaction Frequency Based Trust for E-Commerce
19
作者 Dong Huang Sean Xu 《Computers, Materials & Continua》 SCIE EI 2023年第3期5319-5329,共11页
Most traditional trust computing models in E-commerce do not take the transaction frequency among participating entities into consideration,which makes it easy for one party of the transaction to obtain a high trust v... Most traditional trust computing models in E-commerce do not take the transaction frequency among participating entities into consideration,which makes it easy for one party of the transaction to obtain a high trust value in a short time,and brings many disadvantages,uncertainties and even attacks.To solve this problem,a transaction frequency based trust is proposed in this study.The proposed method is composed of two parts.The first part is built on the classic Bayes analysis based trust modelswhich are ease of computing for the E-commerce system.The second part is the transaction frequency module which can mitigate the potential insecurity caused by one participating entity gaining trust in a short time.Simulations show that the proposed method can effectively mitigate the self-promoting attacks so as to maintain the function of E-commerce system. 展开更多
关键词 Transaction frequency TRUST Bayes analysis E-COMMERCE
下载PDF
Lightweight Storage Framework for Blockchain-Enabled Internet of Things Under Cloud Computing
20
作者 Xinyi Qing Baopeng Ye +3 位作者 Yuanquan Shi Tao Li Yuling Chen Lei Liu 《Computers, Materials & Continua》 SCIE EI 2023年第5期3607-3624,共18页
Due to its decentralized,tamper-proof,and trust-free characteristics,blockchain is used in the Internet of Things(IoT)to guarantee the reliability of data.However,some technical flaws in blockchain itself prevent the ... Due to its decentralized,tamper-proof,and trust-free characteristics,blockchain is used in the Internet of Things(IoT)to guarantee the reliability of data.However,some technical flaws in blockchain itself prevent the development of these applications,such as the issue with linearly growing storage capacity of blockchain systems.On the other hand,there is a lack of storage resources for sensor devices in IoT,and numerous sensor devices will generate massive data at ultra-high speed,which makes the storage problem of the IoT enabled by blockchain more prominent.There are various solutions to reduce the storage burden by modifying the blockchain’s storage policy,but most of them do not consider the willingness of peers.In attempt to make the blockchain more compatible with the IoT,this paper proposes a storage optimization scheme that revisits the system data storage problem from amore practically oriented standpoint.Peers will only store transactional data that they are directly involved in.In addition,a transaction verification model is developed to enable peers to undertake transaction verification with the aid of cloud computing,and an incentive mechanism is premised on the storage optimization scheme to assure data integrity.The results of the simulation experiments demonstrate the proposed scheme’s advantage in terms of storage and throughput. 展开更多
关键词 Blockchain internet of things storage optimization transaction verification cloud computing incentive mechanism
下载PDF
上一页 1 2 15 下一页 到第
使用帮助 返回顶部