期刊文献+
共找到41,686篇文章
< 1 2 250 >
每页显示 20 50 100
Contract Mechanism of Water Environment Regulation for Small and Medium Sized Enterprises Based on Optimal Control Theory
1
作者 Shuang Zhao Hongbin Gu +2 位作者 Lianfang Xue Dongsheng Wang Bin Huang 《Journal of Water Resource and Protection》 CAS 2024年第7期538-556,共20页
The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of trea... The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of treatment. How enterprises can make reasonable decisions on their water environment behavior based on the external environment and their own factors is of great significance for scientifically and effectively designing water environment regulation mechanisms. Based on optimal control theory, this study investigates the design of contractual mechanisms for water environmental regulation for small and medium-sized enterprises. The enterprise is regarded as an independent economic entity that can adopt optimal control strategies to maximize its own interests. Based on the participation of multiple subjects including the government, enterprises, and the public, an optimal control strategy model for enterprises under contractual water environmental regulation is constructed using optimal control theory, and a method for calculating the amount of unit pollutant penalties is derived. The water pollutant treatment cost data of a paper company is selected to conduct empirical numerical analysis on the model. The results show that the increase in the probability of government regulation and public participation, as well as the decrease in local government protection for enterprises, can achieve the same regulatory effect while reducing the number of administrative penalties per unit. Finally, the implementation process of contractual water environmental regulation for small and medium-sized enterprises is designed. 展开更多
关键词 Optimal Control Theory Small and Medium-Sized Enterprises Water Environment Regulation contract Mechanism
下载PDF
Bipartite consensus problems of Lurie multi-agent systems over signed graphs: A contraction approach
2
作者 张晓娇 吴祥 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期137-145,共9页
This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theor... This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theory, some new conditions for the nonlinear Lurie multi-agent systems reaching bipartite leaderless consensus and bipartite tracking consensus are presented. Compared with the traditional methods, this approach degrades the dimensions of the conditions, eliminates some restrictions of the system matrix, and extends the range of the nonlinear function. Finally, two numerical examples are provided to illustrate the efficiency of our results. 展开更多
关键词 contraction theory virtual system bipartite consensus Lurie multi-agent systems
下载PDF
Smart Contract Vulnerability Detection Method Based on Feature Graph and Multiple Attention Mechanisms
3
作者 Zhenxiang He Zhenyu Zhao +1 位作者 Ke Chen Yanlin Liu 《Computers, Materials & Continua》 SCIE EI 2024年第5期3023-3045,共23页
The fast-paced development of blockchain technology is evident.Yet,the security concerns of smart contracts represent a significant challenge to the stability and dependability of the entire blockchain ecosystem.Conve... The fast-paced development of blockchain technology is evident.Yet,the security concerns of smart contracts represent a significant challenge to the stability and dependability of the entire blockchain ecosystem.Conventional smart contract vulnerability detection primarily relies on static analysis tools,which are less efficient and accurate.Although deep learning methods have improved detection efficiency,they are unable to fully utilize the static relationships within contracts.Therefore,we have adopted the advantages of the above two methods,combining feature extraction mode of tools with deep learning techniques.Firstly,we have constructed corresponding feature extraction mode for different vulnerabilities,which are used to extract feature graphs from the source code of smart contracts.Then,the node features in feature graphs are fed into a graph convolutional neural network for training,and the edge features are processed using a method that combines attentionmechanismwith gated units.Ultimately,the revised node features and edge features are concatenated through amulti-head attentionmechanism.The result of the splicing is a global representation of the entire feature graph.Our method was tested on three types of data:Timestamp vulnerabilities,reentrancy vulnerabilities,and access control vulnerabilities,where the F1 score of our method reaches 84.63%,92.55%,and 61.36%.The results indicate that our method surpasses most others in detecting smart contract vulnerabilities. 展开更多
关键词 Blockchain smart contracts deep learning graph neural networks
下载PDF
A Review of Deep Learning-Based Vulnerability Detection Tools for Ethernet Smart Contracts
4
作者 Huaiguang Wu Yibo Peng +1 位作者 Yaqiong He Jinlin Fan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期77-108,共32页
In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerabi... In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerability detection has become particularly important.With the popular use of neural network model,there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts.This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts.Subsequently,it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection.These tools are categorized based on their open-source status,the data format and the type of feature extraction they employ.Then we conduct a comprehensive comparative analysis of these tools,selecting representative tools for experimental validation and comparing them with traditional tools in terms of detection coverage and accuracy.Finally,Based on the insights gained from the experimental results and the current state of research in the field of smart contract vulnerability detection tools,we suppose to provide a reference standard for developers of contract vulnerability detection tools.Meanwhile,forward-looking research directions are also proposed for deep learning-based smart contract vulnerability detection. 展开更多
关键词 Smart contract vulnerability detection deep learning
下载PDF
Preserving Data Secrecy and Integrity for Cloud Storage Using Smart Contracts and Cryptographic Primitives
5
作者 Maher Alharby 《Computers, Materials & Continua》 SCIE EI 2024年第5期2449-2463,共15页
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This a... Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic primitives.The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data.To preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing it.An extensive performance analysis is conducted to illustrate the efficiency of the proposed mechanism.Additionally,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running costs.The security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious entities.The proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems. 展开更多
关键词 Cloud storage data secrecy data integrity smart contracts CRYPTOGRAPHY
下载PDF
A Systematic Review and Performance Evaluation of Open-Source Tools for Smart Contract Vulnerability Detection
6
作者 Yaqiong He Jinlin Fan Huaiguang Wu 《Computers, Materials & Continua》 SCIE EI 2024年第7期995-1032,共38页
With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges su... With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges such as slow updates,usability issues,and limited installation methods.These challenges hinder the adoption and practicality of these tools.This paper examines smart contract vulnerability detection tools from 2016 to 2023,sourced from the Web of Science(WOS)and Google Scholar.By systematically collecting,screening,and synthesizing relevant research,38 open-source tools that provide installation methods were selected for further investigation.From a developer’s perspective,this paper offers a comprehensive survey of these 38 open-source tools,discussing their operating principles,installation methods,environmental dependencies,update frequencies,and installation challenges.Based on this,we propose an Ethereum smart contract vulnerability detection framework.This framework enables developers to easily utilize various detection tools and accurately analyze contract security issues.To validate the framework’s stability,over 1700 h of testing were conducted.Additionally,a comprehensive performance test was performed on the mainstream detection tools integrated within the framework,assessing their hardware requirements and vulnerability detection coverage.Experimental results indicate that the Slither tool demonstrates satisfactory performance in terms of system resource consumption and vulnerability detection coverage.This study represents the first performance evaluation of testing tools in this domain,providing significant reference value. 展开更多
关键词 Blockchain security ethereum smart contracts detection tools evaluation
下载PDF
Mitigating Blackhole and Greyhole Routing Attacks in Vehicular Ad Hoc Networks Using Blockchain Based Smart Contracts
7
作者 Abdulatif Alabdulatif Mada Alharbi +1 位作者 Abir Mchergui Tarek Moulahi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期2005-2021,共17页
The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced techno... The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced technology,such as Intelligent Transportation Systems(ITS),enables improved traffic management,helps eliminate congestion,and supports a safer environment.ITS provides real-time information on vehicle traffic and transportation systems that can improve decision-making for road users.However,ITS suffers from routing issues at the network layer when utilising Vehicular Ad Hoc Networks(VANETs).This is because each vehicle plays the role of a router in this network,which leads to a complex vehicle communication network,causing issues such as repeated link breakages between vehicles resulting from the mobility of the network and rapid topological variation.This may lead to loss or delay in packet transmissions;this weakness can be exploited in routing attacks,such as black-hole and gray-hole attacks,that threaten the availability of ITS services.In this paper,a Blockchain-based smart contracts model is proposed to offer convenient and comprehensive security mechanisms,enhancing the trustworthiness between vehicles.Self-Classification Blockchain-Based Contracts(SCBC)and Voting-Classification Blockchain-Based Contracts(VCBC)are utilised in the proposed protocol.The results show that VCBC succeeds in attaining better results in PDR and TP performance even in the presence of Blackhole and Grayhole attacks. 展开更多
关键词 Blockchain data privacy machine learning routing attacks smart contract VANET
下载PDF
Strategic Contracting for Software Upgrade Outsourcing in Industry 4.0
8
作者 Cheng Wang Zhuowei Zheng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1563-1592,共30页
The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmu... The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmust be tailored to meet the dynamic needs of enterprises. However, internal research and development can beprohibitively expensive, driving many enterprises to outsource software development and upgrades to externalservice providers. This paper presents a software upgrade outsourcing model for enterprises and service providersthat accounts for the impact of market fluctuations on software adaptability. To mitigate the risk of adverseselection due to asymmetric information about the service provider’s cost and asymmetric information aboutthe enterprise’s revenues, we propose pay-per-time and revenue-sharing contracts in two distinct informationasymmetry scenarios. These two contracts specify the time and transfer payments for software upgrades. Througha comparative analysis of the optimal solutions under the two contracts and centralized decision-making withfull-information, we examine the characteristics of the solutions under two information asymmetry scenarios andanalyze the incentive effects of the two contracts on the various stakeholders. Overall, our study offers valuableinsights for firms seeking to optimize their outsourcing strategies and maximize their returns on investment insoftware upgrades. 展开更多
关键词 Software upgrade outsourcing the principal-agent information asymmetry reverse selection contract design
下载PDF
Revisiting the Electron Radius in Light of Length Contraction
9
作者 Julie Marty 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第4期1743-1748,共6页
In previous work, the electron radius was identified as the “actual electron radius.” However, this is more accurately described as the electron radius at rest. This study reexamines the electron with an emphasis on... In previous work, the electron radius was identified as the “actual electron radius.” However, this is more accurately described as the electron radius at rest. This study reexamines the electron with an emphasis on the electron radius under motion, incorporating the effects of length contraction. The findings suggest that the radius is subject to Lorentz contraction, which has interesting implications for relativistic effects at the subatomic level. 展开更多
关键词 Electron Radius Length contraction Lorentz Factor Relativistic Effects Subatomic Particles Compton Scattering
下载PDF
Design and pricing of maintenance service contract based on Nash non-cooperative game approach
10
作者 SU Chun HUANG Kui 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2024年第1期118-129,共12页
Nowadays manufacturers are facing fierce challenge.Apart from the products,providing customers with multiple maintenance options in the service contract becomes more popular,since it can help to improve customer satis... Nowadays manufacturers are facing fierce challenge.Apart from the products,providing customers with multiple maintenance options in the service contract becomes more popular,since it can help to improve customer satisfaction,and ultimately promote sales and maximize profit for the manufacturer.By considering the combinations of corrective maintenance and preventive maintenance,totally three types of maintenance service contracts are designed.Moreover,attractive incentive and penalty mechanisms are adopted in the contracts.On this basis,Nash non-cooperative game is applied to analyze the revenue for both the manufacturer and customers,and so as to optimize the pricing mechanism of maintenance service contract and achieve a win-win situation.Numerical experiments are conducted.The results show that by taking into account the incentive and penalty mechanisms,the revenue can be improved for both the customers and manufacturer.Moreover,with the increase of repair rate and improvement factor in the preventive maintenance,the revenue will increase gradually for both the parties. 展开更多
关键词 maintenance service contract Nash game incentive and penalty mechanism corrective maintenance preventive maintenance
下载PDF
Allocation of Public Service Facilities in Villages and Towns from the Perspective of Smart Contraction: A Case Study of Zixi County, Jiangxi Province
11
作者 ZHANG Xiaoli 《Journal of Landscape Research》 2024年第5期56-58,共3页
The limitation of traditional layout system and the continuous contraction of villages and towns have brought challenges to the layout of public service facilities.It is an imperative task against this background to i... The limitation of traditional layout system and the continuous contraction of villages and towns have brought challenges to the layout of public service facilities.It is an imperative task against this background to integrate space resources and allocate public service facilities scientifically and reasonably.This paper took the system and method of rural public service facility allocation from the perspective of smart contraction as the theoretic support,and Zixi County in Jiangxi Province for example,built the four-level life circle of“county-fundamental-basic-routine”based on the influence factors of facility allocation,village and town contraction strength,rural comprehensive assessment results,residents’trip willingness and demands on public service facilities,finally proposed the suggestions for optimizing the allocation of village and town public service facilities. 展开更多
关键词 Smart contraction Village and town Public service facility Allocation research Zixi County
下载PDF
The Impact of Corporate Governance and Fair Value Accounting on Debt Contracts
12
作者 Dan Wu 《Proceedings of Business and Economic Studies》 2024年第4期202-206,共5页
This paper investigates the theoretical relationship between corporate governance,fair value accounting,and debt contracts.It primarily examines the individual impacts of corporate governance and fair value accounting... This paper investigates the theoretical relationship between corporate governance,fair value accounting,and debt contracts.It primarily examines the individual impacts of corporate governance and fair value accounting on debt contracts,while also exploring the influence of corporate governance on fair value accounting.The study emphasizes the importance of considering the interests and legal status of creditors in the context of debt contracts.The findings indicate that strong corporate governance can reduce the likelihood of debt default and that the company’s restructuring costs in the event of a default determine whether improved corporate governance will increase or decrease debt costs.Additionally,the study reveals that the strength of corporate governance affects the value relevance of fair value accounting.However,the impact of fair value accounting on debt contracts is not inherently positive or negative;for instance,companies may use fair value adjustments with manipulative intent to enhance performance.Ultimately,the research highlights that discussions about corporate governance should not prioritize shareholder interests exclusively but also consider the legitimate position of creditors. 展开更多
关键词 Corporate governance Debt contracts Debt default Fair value accounting
下载PDF
Construction of the“Micro-Ideological and Political”Model for Ideological and Political Teaching Reform in Bidding and Contract Management Courses
13
作者 Dongchun Xia 《Journal of Contemporary Educational Research》 2024年第11期326-332,共7页
In the context of deepening educational reforms,the significance of ideological and political education has become increasingly prominent,emerging as a crucial aspect of enhancing students’comprehensive qualities.To ... In the context of deepening educational reforms,the significance of ideological and political education has become increasingly prominent,emerging as a crucial aspect of enhancing students’comprehensive qualities.To ensure the orderly progress of ideological and political education in courses,it is essential to actively promote the integration of ideological and political elements within coursework.This integration aims to align professional course education with ideological and political education,fostering a collaborative educational model.Therefore,in the teaching of bidding and contract management courses,constructing a“micro-ideological and political”teaching model has emerged as a critical component.The implementation of this model facilitates the seamless integration of bidding and contract management coursework with ideological and political education,thereby elevating the teaching quality of these courses.Additionally,it leverages the synergistic role of coursework and ideology in educating students,ultimately enhancing the quality and level of talent cultivation.Hence,this paper proposes strategies for constructing a“microideological and political”model within the context of ideological and political teaching reforms in bidding and contract management courses,inviting discussion and exchange on this topic. 展开更多
关键词 Bidding and contract management courses Ideological and political elements “Micro-ideological and political”model
下载PDF
Research on telecommunication resale service supply chain coordination with revenue-sharing contract 被引量:5
14
作者 郑惠莉 达庆利 曹爱红 《Journal of Southeast University(English Edition)》 EI CAS 2004年第1期113-116,共4页
The competition and cooperation between traditional telecom operators and resale operators in the supply chain are discussed, when the telecom industry developed telecommunication resale service. Supply chain contract... The competition and cooperation between traditional telecom operators and resale operators in the supply chain are discussed, when the telecom industry developed telecommunication resale service. Supply chain contract is an effective way to coordinate the supply chain. This paper analyzes the revenue-sharing contract between telecom operators and resale operators. The study shows that by setting up a rational revenue-sharing ratio and wholesale price, a revenue-sharing contract can coordinate this supply chain, and telecom operators and resale operators can achieve a 'win-win' solution. 展开更多
关键词 telecommunication resale service supply chain coordination revenue-sharing contract
下载PDF
Application of combination weighting method in contract risk's evaluation of third party logistics 被引量:3
15
作者 傅新平 邹敏 《Journal of Southeast University(English Edition)》 EI CAS 2007年第S1期128-132,共5页
First,the analytical hierarchy process(AHP),which stands for the subjective weighting method,and the entropy method,which stands for the objective weighting method,are chosen to calculate the index weights of the cont... First,the analytical hierarchy process(AHP),which stands for the subjective weighting method,and the entropy method,which stands for the objective weighting method,are chosen to calculate the index weights of the contract risks of third party logistics(TPL),respectively.Then,they can determine the combination weights using the combination weighting method.Second,using the combination weights,the contract risks of TPL are evaluated through the fuzzy comprehensive evaluation method.According to the combination weights,the most important risk factor of the contract risks of TPL is choosing sub-contractors.The results are basically consistent with the facts and show that the weights determined by the combination weighting method can avoid the man-made deviations of the subjective weighting method on the one hand,and prevent results opposite to the reality brought about by the objective weighting method on the other hand.Meanwhile,the results of the fuzzy comprehensive evaluation are that the contract risks of TPL are at a high risk level.Roughly this matches real situations,and it indicates that the combination weighting method can generate the comprehensive assessment more scientifically and more reasonably as well. 展开更多
关键词 analytical hierarchy process(AHP) entropy method combination weighting method contract risk
下载PDF
Supply chain coordination with participators' risk bias under buy-back contract
16
作者 孙华 何建敏 庄亚明 《Journal of Southeast University(English Edition)》 EI CAS 2007年第S1期133-139,共7页
Considering participators' risk bias,which is measured by the method of value at risk,the risk constraints in a two-echelon supply chain coordination under buy-back contract is equal to giving the order of an uppe... Considering participators' risk bias,which is measured by the method of value at risk,the risk constraints in a two-echelon supply chain coordination under buy-back contract is equal to giving the order of an upper bound.With a risk-averse dominant enterprise(M)and a risk-neutral non-dominant one(R),the coordination which optimizes the supply chain under the risk constraints is achieved by a penalty mechanism L to reduce R's order.With risk-neutral M and risk-averse R,M can motivate R to increase his order by providing a risk subsidy K,and two cases are discussed.If the risk constraints of R cannot satisfy M's participation constraint to offer K,M will prefer to accept R's order to obtain a sub-optimization solution of the supply chain.Or else,with M's K,R's optimal order just coordinates the supply chain,which is equal to the case without risk bias,and in this situation R's risk bias only affects the profit distribution between the participators. 展开更多
关键词 value at risk buy-back contract supply chain coordination risk bias
下载PDF
OPTIMAL CONTRACTS IN TWO-ECHELON SUPPLY CHAIN UNDER ASYMMETRIC INFORMATION AND NONLINEAR DEMAND
17
作者 庄品 赵林度 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第1期74-80,共7页
The challenge for supply chain management is to create appropriate supply chain contracts so as to optimize the system performance. To examine the role of asymmetric information in a two-echelon supply chain system an... The challenge for supply chain management is to create appropriate supply chain contracts so as to optimize the system performance. To examine the role of asymmetric information in a two-echelon supply chain system and derive supply chain contracts to deal with existing asymmetric information, a two level supply chain model including one Supplier and one retailer under the demand of price elasticity is developed. By using the principalagent principle and the optimal control theory, three types of supply chain contract, i. e. , a wholesale pricing contract, a two-parameter linear and a two-parameter nonlinear contracts are obtained. In these contracts, the Supplier has asymmetric information about the retailer cost structure. Simulation results show that the two-parameter contracts are more effective strategies to achieve supply chain coordination. 展开更多
关键词 supply chains contractS optimal control asymmetric information
下载PDF
DIRECTED HYPERGRAPH THEORY AND DECOMPOSITION CONTRACTION METHOD
18
作者 黄汝激 《International Journal of Minerals,Metallurgy and Materials》 SCIE EI CAS CSCD 1995年第2期123+114-123,共11页
A new branch of hypergraph theory-directed hyperaph theory and a kind of new methods-dicomposition contraction(DCP, PDCP and GDC) methods are presented for solving hypernetwork problems.lts computing time is lower tha... A new branch of hypergraph theory-directed hyperaph theory and a kind of new methods-dicomposition contraction(DCP, PDCP and GDC) methods are presented for solving hypernetwork problems.lts computing time is lower than that of ECP method in several order of magnitude. 展开更多
关键词 directed hypergraph theory decomposition contraction method hypernetwork
下载PDF
ContractGuard:面向以太坊区块链智能合约的入侵检测系统 被引量:3
19
作者 赵淦森 谢智健 +6 位作者 王欣明 何嘉浩 张成志 林成创 Ziheng Zhou 陈冰川 Chunming Rong 《网络与信息安全学报》 2020年第2期35-55,共21页
以太坊智能合约本质上是一种在网络上由相互间没有信任关系的节点共同执行的已被双方认证程序。目前,大量的智能合约被用于管理数字资产,使智能合约成为黑客的重要攻击对象。常见的攻击方法是通过利用智能合约的漏洞来实现特定操作的入... 以太坊智能合约本质上是一种在网络上由相互间没有信任关系的节点共同执行的已被双方认证程序。目前,大量的智能合约被用于管理数字资产,使智能合约成为黑客的重要攻击对象。常见的攻击方法是通过利用智能合约的漏洞来实现特定操作的入侵攻击。ContractGuard是首次提出面向以太坊区块链智能合约的入侵检测系统,它能检测智能合约的潜在攻击行为。ContractGuard的入侵检测主要依赖检测潜在攻击可能引发的异常控制流来实现。由于智能合约运行在去中心化的环境以及在高度受限的环境中运行,现有的IDS技术或者工具等以外部拦截形式的部署架构不适合于以太坊智能合约。为了解决这些问题,通过设计一个嵌入式的架构,实现了把ContractGuard直接嵌入智能合约的执行代码中,作为智能合约的一部分。在运行时刻,ContractGuard通过相应的context-tagged无环路径来实现入侵检测,从而保护智能合约。由于嵌入了额外的代码,ContractGuard一定程度上会增加智能合约的部署开销与运行开销,为了降低这两方面的开销,基于以太坊智能合约的特性对ContractGuard进行优化。实验结果显示,可有效地检测83%的异常行为,其部署开销仅增加了36.14%,运行开销仅增加了28.17%。 展开更多
关键词 区块链 以太坊智能合约 入侵检测系统 异常检测
下载PDF
农村地区高血压患者服药情况及影响因素研究:基于家庭医生签约服务
20
作者 马晓燕 崔恩慈 +5 位作者 薛群 刘荣 张学武 王浅 王德斌 沈兴蓉 《中国全科医学》 CAS 北大核心 2025年第3期365-371,共7页
背景高血压是心血管疾病主要的危险因素,降压用药不仅要考虑患者血压特征,也要考虑患者合并症情况。现阶段,基于家庭医生签约服务对高血压患者的服药状况及影响因素研究比较缺乏。目的调查安徽省界首市家庭医生签约服务的高血压患者服... 背景高血压是心血管疾病主要的危险因素,降压用药不仅要考虑患者血压特征,也要考虑患者合并症情况。现阶段,基于家庭医生签约服务对高血压患者的服药状况及影响因素研究比较缺乏。目的调查安徽省界首市家庭医生签约服务的高血压患者服药现状,描述患者服药行为与患者特征之间的关联,探索患者用药调整的影响因素,并分析基层高血压患者用药的合理性。方法采用整群抽样的方法,于2021年7—8月从安徽省界首市随机抽取48个行政村,通过面对面调查法采用自制问卷收集患者特征和服药数据,参照《国家基层高血压防治管理指南2020版》将问卷中患者提到的降压药分为如下5类:A类为血管紧张素转换酶抑制剂(ACEI)和血管紧张素受体阻滞剂(ARB),B类为β受体阻滞剂,C类为钙通道阻滞剂(CCB),D类为利尿剂,E类为单片复方制剂。通过科大讯飞智能语音血压计的后台获取患者上传的近1年血压数据,分析不同特征患者的服药行为。采用多因素Logistic回归分析探讨高血压患者用药调整的影响因素。本研究中联合用药是指服用复方制剂或2种以上降压药,用药调整是指患者过去服用其他降压药。结果本研究共纳入高血压患者3005例,其中男1291例(43.0%)、女1714例(57.0%),平均年龄为(65.5±9.8)岁,高血压服药率为79.1%,联合用药率为40.2%。2376例服用降压药的患者中,不同类型降压药服用率从高到低依次为(部分患者存在联合用药):E类(39.6%)、C类(35.1%)、D类(20.3%)、A类(20.1%)、B类(3.7%);服用最多的降压药为复方利血平(33.7%)。对于年均血压≥160/100mm Hg的患者,仍有12.2%和4.9%未服用降压药。患者联合用药以E类降压药为主。年均“舒张压≥100 mm Hg”且“患合并症”的患者,调整后A类和C类降压药的服用率增加相对较多,年均“收缩压≥160 mm Hg”且“未患合并症”的患者,调整后E类降压药的服用率增加相对较多。多因素Logistic回归结果显示,服药年数长(OR=1.042,95%CI=1.031~1.053,P<0.001)、初中以上文化程度(OR=1.488,95%CI=1.195~1.853,P<0.001)、合并高脂血症(OR=1.267,95%CI=1.052~1.525,P=0.013)、合并心血管疾病(OR=1.394,95%CI=1.166~1.667,P<0.001)、合并脑血管疾病(OR=1.258,95%CI=1.040~1.522,P=0.018)是患者用药调整的促进因素,高龄(OR=0.980,95%CI=0.971~0.990,P<0.001)是用药调整的抑制因素。结论界首市农村地区高血压患者的服药率较高,主要服用E类和C类降压药。服药年数长、初中以上文化程度、合并高脂血症、合并心脑血管疾病是患者用药调整的促进因素,高龄是用药调整的抑制因素。 展开更多
关键词 高血压 抗高血压药 合并症 联合用药 农村地区 界首 家庭医生签约服务
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部