Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This a...Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic primitives.The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data.To preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing it.An extensive performance analysis is conducted to illustrate the efficiency of the proposed mechanism.Additionally,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running costs.The security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious entities.The proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems.展开更多
This paper investigates the theoretical relationship between corporate governance,fair value accounting,and debt contracts.It primarily examines the individual impacts of corporate governance and fair value accounting...This paper investigates the theoretical relationship between corporate governance,fair value accounting,and debt contracts.It primarily examines the individual impacts of corporate governance and fair value accounting on debt contracts,while also exploring the influence of corporate governance on fair value accounting.The study emphasizes the importance of considering the interests and legal status of creditors in the context of debt contracts.The findings indicate that strong corporate governance can reduce the likelihood of debt default and that the company’s restructuring costs in the event of a default determine whether improved corporate governance will increase or decrease debt costs.Additionally,the study reveals that the strength of corporate governance affects the value relevance of fair value accounting.However,the impact of fair value accounting on debt contracts is not inherently positive or negative;for instance,companies may use fair value adjustments with manipulative intent to enhance performance.Ultimately,the research highlights that discussions about corporate governance should not prioritize shareholder interests exclusively but also consider the legitimate position of creditors.展开更多
The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced techno...The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced technology,such as Intelligent Transportation Systems(ITS),enables improved traffic management,helps eliminate congestion,and supports a safer environment.ITS provides real-time information on vehicle traffic and transportation systems that can improve decision-making for road users.However,ITS suffers from routing issues at the network layer when utilising Vehicular Ad Hoc Networks(VANETs).This is because each vehicle plays the role of a router in this network,which leads to a complex vehicle communication network,causing issues such as repeated link breakages between vehicles resulting from the mobility of the network and rapid topological variation.This may lead to loss or delay in packet transmissions;this weakness can be exploited in routing attacks,such as black-hole and gray-hole attacks,that threaten the availability of ITS services.In this paper,a Blockchain-based smart contracts model is proposed to offer convenient and comprehensive security mechanisms,enhancing the trustworthiness between vehicles.Self-Classification Blockchain-Based Contracts(SCBC)and Voting-Classification Blockchain-Based Contracts(VCBC)are utilised in the proposed protocol.The results show that VCBC succeeds in attaining better results in PDR and TP performance even in the presence of Blackhole and Grayhole attacks.展开更多
In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerabi...In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerability detection has become particularly important.With the popular use of neural network model,there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts.This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts.Subsequently,it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection.These tools are categorized based on their open-source status,the data format and the type of feature extraction they employ.Then we conduct a comprehensive comparative analysis of these tools,selecting representative tools for experimental validation and comparing them with traditional tools in terms of detection coverage and accuracy.Finally,Based on the insights gained from the experimental results and the current state of research in the field of smart contract vulnerability detection tools,we suppose to provide a reference standard for developers of contract vulnerability detection tools.Meanwhile,forward-looking research directions are also proposed for deep learning-based smart contract vulnerability detection.展开更多
With the increasing popularity of Ethereum,smart contracts have become a prime target for fraudulent activities such as Ponzi,honeypot,gambling,and phishing schemes.While some researchers have studied intelligent frau...With the increasing popularity of Ethereum,smart contracts have become a prime target for fraudulent activities such as Ponzi,honeypot,gambling,and phishing schemes.While some researchers have studied intelligent fraud detection,most research has focused on identifying Ponzi contracts,with little attention given to detecting and preventing gambling or phishing contracts.There are three main issues with current research.Firstly,there exists a severe data imbalance between fraudulent and non-fraudulent contracts.Secondly,the existing detection methods rely on diverse raw features that may not generalize well in identifying various classes of fraudulent contracts.Lastly,most prior studies have used contract source code as raw features,but many smart contracts only exist in bytecode.To address these issues,we propose a fraud detection method that utilizes Efficient Channel Attention EfficientNet(ECA-EfficientNet)and data enhancement.Our method begins by converting bytecode into Red Green Blue(RGB)three-channel images and then applying channel exchange data enhancement.We then use the enhanced ECA-EfficientNet approach to classify fraudulent smart contract RGB images.Our proposed method achieves high F1-score and Recall on both publicly available Ponzi datasets and self-built multi-classification datasets that include Ponzi,honeypot,gambling,and phishing smart contracts.The results of the experiments demonstrate that our model outperforms current methods and their variants in Ponzi contract detection.Our research addresses a significant problem in smart contract security and offers an effective and efficient solution for detecting fraudulent contracts.展开更多
Recently,security issues of smart contracts are arising great attention due to the enormous financial loss caused by vulnerability attacks.There is an increasing need to detect similar codes for hunting vulnerability ...Recently,security issues of smart contracts are arising great attention due to the enormous financial loss caused by vulnerability attacks.There is an increasing need to detect similar codes for hunting vulnerability with the increase of critical security issues in smart contracts.Binary similarity detection that quantitatively measures the given code diffing has been widely adopted to facilitate critical security analysis.However,due to the difference between common programs and smart contract,such as diversity of bytecode generation and highly code homogeneity,directly adopting existing graph matching and machine learning based techniques to smart contracts suffers from low accuracy,poor scalability and the limitation of binary similarity on function level.Therefore,this paper investigates graph neural network to detect smart contract binary code similarity at the program level,where we conduct instruction-level normalization to reduce the noise code for smart contract pre-processing and construct contract control flow graphs to represent smart contracts.In particular,two improved Graph Convolutional Network(GCN)and Message Passing Neural Network(MPNN)models are explored to encode the contract graphs into quantitatively vectors,which can capture the semantic information and the program-wide control flow information with temporal orders.Then we can efficiently accomplish the similarity detection by measuring the distance between two targeted contract embeddings.To evaluate the effectiveness and efficient of our proposed method,extensive experiments are performed on two real-world datasets,i.e.,smart contracts from Ethereum and Enterprise Operation System(EOS)blockchain-based platforms.The results show that our proposed approach outperforms three state-of-the-art methods by a large margin,achieving a great improvement up to 6.1%and 17.06%in accuracy.展开更多
The challenge for supply chain management is to create appropriate supply chain contracts so as to optimize the system performance. To examine the role of asymmetric information in a two-echelon supply chain system an...The challenge for supply chain management is to create appropriate supply chain contracts so as to optimize the system performance. To examine the role of asymmetric information in a two-echelon supply chain system and derive supply chain contracts to deal with existing asymmetric information, a two level supply chain model including one Supplier and one retailer under the demand of price elasticity is developed. By using the principalagent principle and the optimal control theory, three types of supply chain contract, i. e. , a wholesale pricing contract, a two-parameter linear and a two-parameter nonlinear contracts are obtained. In these contracts, the Supplier has asymmetric information about the retailer cost structure. Simulation results show that the two-parameter contracts are more effective strategies to achieve supply chain coordination.展开更多
A majority of contracts will use many prepositions and prepositional phrases to reflect their preciseness which cause the treaty wording complicated and hard to understand. This paper tends to demonstrate the characte...A majority of contracts will use many prepositions and prepositional phrases to reflect their preciseness which cause the treaty wording complicated and hard to understand. This paper tends to demonstrate the characteristics of the prepositions and prepositional phrases used in business English contracts and explore the translation strategies used in translating the features of the prepositions and the prepositional phrases in business English contracts. The findings of this paper can provide a reference for the majority of the trade workers, which can help them accurately and effectively draft or translate a contract and avoid unnecessary disputes.展开更多
In this paper,we deal with questions related to blockchains in complex Internet of Things(IoT)-based ecosystems.Such ecosystems are typically composed of IoT devices,edge devices,cloud computing software services,as w...In this paper,we deal with questions related to blockchains in complex Internet of Things(IoT)-based ecosystems.Such ecosystems are typically composed of IoT devices,edge devices,cloud computing software services,as well as people,who are decision makers in scenarios such as smart cities.Many decisions related to analytics can be based on data coming from IoT sensors,software services,and people.However,they are typically based on different levels of abstraction and granularity.This poses a number of challenges when multiple blockchains are used together with smart contracts.This work proposes to apply our concept of elasticity to smart contracts and thereby enabling analytics in and between multiple blockchains in the context of IoT.We propose a reference architecture for Elastic Smart Contracts and evaluate the approach in a smart city scenario,discussing the benefits in terms of performance and self-adaptability of our solution.展开更多
The emergence of smart contracts has increased the attention of industry and academia to blockchain technology,which is tamper-proofing,decentralized,autonomous,and enables decentralized applications to operate in unt...The emergence of smart contracts has increased the attention of industry and academia to blockchain technology,which is tamper-proofing,decentralized,autonomous,and enables decentralized applications to operate in untrustworthy environments.However,these features of this technology are also easily exploited by unscrupulous individuals,a typical example of which is the Ponzi scheme in Ethereum.The negative effect of unscrupulous individuals writing Ponzi scheme-type smart contracts in Ethereum and then using these contracts to scam large amounts of money has been significant.To solve this problem,we propose a detection model for detecting Ponzi schemes in smart contracts using bytecode.In this model,our innovation is shown in two aspects:We first propose to use two bytes as one characteristic,which can quickly transform the bytecode into a high-dimensional matrix,and this matrix contains all the implied characteristics in the bytecode.Then,We innovatively transformed the Ponzi schemes detection into an anomaly detection problem.Finally,an anomaly detection algorithm is used to identify Ponzi schemes in smart contracts.Experimental results show that the proposed detection model can greatly improve the accuracy of the detection of the Ponzi scheme contracts.Moreover,the F1-score of this model can reach 0.88,which is far better than those of other traditional detection models.展开更多
In the global supply chain in a setting characterized by exchange rate uncertainties,it is quite necessary to focus on comparative research trying to find out which kind of purchasing strategy is better in different s...In the global supply chain in a setting characterized by exchange rate uncertainties,it is quite necessary to focus on comparative research trying to find out which kind of purchasing strategy is better in different situations.The two common global purchasing strategies,risk sharing(RS)and quantity flexibility(QF),are selected to be compared.Using a real-options approach,the valuation models of RS and QF purchasing contracts are established.By means of binomial lattice technique,numerical simulation and sensitivity analysis of two stochastic dynamic programs are presented.The effects on expected discounted value by changing relative parameters are described clearly.Based on comparative analysis,it is concluded that the QF purchasing strategy is better than that of the RS especially where great volatility exists for exchange rate processes in the global supply chain.展开更多
Forestry contracts of the Qing Dynasty in Jinping County, southwest China’s Guizhou Province, are a unique historical legacy of China. It came into being with the development of society and economy of Jinping. Resear...Forestry contracts of the Qing Dynasty in Jinping County, southwest China’s Guizhou Province, are a unique historical legacy of China. It came into being with the development of society and economy of Jinping. Research on these contracts is becoming widespread domestically and abroad as well. This paper is intended to make a review of the collection and research of forestry contracts in Jinping according to the chronological sequence.展开更多
The study was conducted with the aim of exploring the barriers to the adoption of BOT contract systems for infrastructural development of technical universities in Ghana. In an empirical questionnaire survey with prof...The study was conducted with the aim of exploring the barriers to the adoption of BOT contract systems for infrastructural development of technical universities in Ghana. In an empirical questionnaire survey with professionals and experts in the construction and education sector, the respondents were invited to rate their perception on the barriers to the adoption of the BOT contracts systems. An interview session to satisfy ways of adopting the BOT contracts for infrastructural development in technical universities was conducted with selected professionals. The study revealed that the major barriers to the adoption of the BOT contract system are: delays in approval, corruption, reliability and credit worthiness of entities and expropriation. The study suggested that detailed policy or framework for implementing BOT contracts;proper planning by technical universities;and adequate protection for lenders is required for successful BOT implementation. Therefore there is a need to explore this concept, using adequate policy initiatives, proper measures and support from government to improve on the proper implementation of the BOT contracts in Technical Universities in Ghana.展开更多
This paper presents the role of E-commerce and E-technology in simplifying operations of preparing quotations and contracts of supporting engineering and scientific laboratories by required equipments and tools at Jor...This paper presents the role of E-commerce and E-technology in simplifying operations of preparing quotations and contracts of supporting engineering and scientific laboratories by required equipments and tools at Jordanian universities.The experimental and practical sides of education in scientific colleges in Jordanian universities is very important,so many quotations and contacts are performed and required each year,and E-commerce also offers the required information and specifications to persons responsible to do such contacts by using Business-to-Consumer,Consumer-to-Consumer or Business-to-Business principles.By searching about such equipments using search engines,many companies present their products and their specifications and give you the opportunity to select the suitable devices and tools depending on their specifications and prices.Case studies are discussed for some devices to show how much E-commerce simplifies this operation.It was found that E-commerce and E-technology reduces both time and efforts required to support both engineering and scientific labs with their needs from equipments,catalogs and tools required to such devices.展开更多
The aim of this paper is to verify the existence of a clause in contracts of promise of property sale which defines the consequences of delay in the delivery of property, and to discover whether owners demanded any co...The aim of this paper is to verify the existence of a clause in contracts of promise of property sale which defines the consequences of delay in the delivery of property, and to discover whether owners demanded any compensation for delays occurred. The number of buildings delivered after the scheduled deadline in two cities between December 2009 and January 2011 was found (n = 542), and a sample of 82 residential units was taken. In order to obtain the data, a semi-structured questionnaire was given to the homeowners. It was observed that only 35% (n = 29) of the contracts included a penalty clause for delay. However, in 19 of the 29 contracts the clause regarding delay came with other clauses that allowed the company to delay the delivery of the building for up to six months. This clause is considered null in Brazilian legislation. As for compensation, only one (1.82%) owner demanded that the company provide a rental property during the period of delay. It could be concluded that contractors are not observing Brazilian legislation regarding the delay in the delivery of residential units. In addition, conformism is perceived in the attitude of the homeowners.展开更多
The problem that consumers often fail to read the standard form contracts they willingly enter into has been recognized by many scholars.This is a pressing issue because it may result in the consumers being disadvanta...The problem that consumers often fail to read the standard form contracts they willingly enter into has been recognized by many scholars.This is a pressing issue because it may result in the consumers being disadvantaged in bargains.Several laws have already been put in place to protect consumers,but the protection is often inadequate.This essay assesses how the current solutions are carried out and investigates whether new methods can be put in place.It argues that the key to dealing with the no-reading phenomenon is to make contracts more accessible to consumers so that they can be more inclined to guard their own interests.展开更多
This article questions the reliability of the amount of revenue recognized in the percentage of completion (POC) method of revenue recognition in construction industry and recommends a new method based on the progre...This article questions the reliability of the amount of revenue recognized in the percentage of completion (POC) method of revenue recognition in construction industry and recommends a new method based on the progress billing which is more reliable. The most commonly used method of revenue recognition in the construction industry is the percentage of completion method (POC), where the revenue is recognized on the basis of the percentage of work completed. The calculation of percentage of work completed is made on the basis of the cost incurred for the contract work during the financial period and the cost required for completion of the work as estimated by the contractor. Here, the acceptance of the product by the buyer (contractee) is not involved in recognizing the revenue. The reliability of the amount of revenue and its collectability can be assured only when the buyer accepts the product. The approval of the progress bill by the contractee is needed to assure the reliability and collectability and it must be the event that triggers the recognition of revenue.展开更多
This study explores the translation of business English contracts from English to Chinese from the perspective of functional equivalence.The functional equivalence theory involves three aspects of functional equivalen...This study explores the translation of business English contracts from English to Chinese from the perspective of functional equivalence.The functional equivalence theory involves three aspects of functional equivalence:lexical equivalence,sentential equivalence,and textual equivalence.As far as translation is concerned,translators adopt different translation techniques for different types of texts,striving to achieve equivalence in lexical,sentential,and textual functions.Therefore,translators are to recognize the different characteristics of business English contracts and highlight English translation styles and characteristics with the help of the functional equivalence theory.展开更多
The Chongqing Branch of the China National Packaging Import and Export Corporation is an economic entity integrating trade with industry and technology. It specializes in importing and exporting packaging materials an...The Chongqing Branch of the China National Packaging Import and Export Corporation is an economic entity integrating trade with industry and technology. It specializes in importing and exporting packaging materials and a range of other commodities in Chongqing.展开更多
文摘Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic primitives.The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data.To preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing it.An extensive performance analysis is conducted to illustrate the efficiency of the proposed mechanism.Additionally,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running costs.The security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious entities.The proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems.
文摘This paper investigates the theoretical relationship between corporate governance,fair value accounting,and debt contracts.It primarily examines the individual impacts of corporate governance and fair value accounting on debt contracts,while also exploring the influence of corporate governance on fair value accounting.The study emphasizes the importance of considering the interests and legal status of creditors in the context of debt contracts.The findings indicate that strong corporate governance can reduce the likelihood of debt default and that the company’s restructuring costs in the event of a default determine whether improved corporate governance will increase or decrease debt costs.Additionally,the study reveals that the strength of corporate governance affects the value relevance of fair value accounting.However,the impact of fair value accounting on debt contracts is not inherently positive or negative;for instance,companies may use fair value adjustments with manipulative intent to enhance performance.Ultimately,the research highlights that discussions about corporate governance should not prioritize shareholder interests exclusively but also consider the legitimate position of creditors.
文摘The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced technology,such as Intelligent Transportation Systems(ITS),enables improved traffic management,helps eliminate congestion,and supports a safer environment.ITS provides real-time information on vehicle traffic and transportation systems that can improve decision-making for road users.However,ITS suffers from routing issues at the network layer when utilising Vehicular Ad Hoc Networks(VANETs).This is because each vehicle plays the role of a router in this network,which leads to a complex vehicle communication network,causing issues such as repeated link breakages between vehicles resulting from the mobility of the network and rapid topological variation.This may lead to loss or delay in packet transmissions;this weakness can be exploited in routing attacks,such as black-hole and gray-hole attacks,that threaten the availability of ITS services.In this paper,a Blockchain-based smart contracts model is proposed to offer convenient and comprehensive security mechanisms,enhancing the trustworthiness between vehicles.Self-Classification Blockchain-Based Contracts(SCBC)and Voting-Classification Blockchain-Based Contracts(VCBC)are utilised in the proposed protocol.The results show that VCBC succeeds in attaining better results in PDR and TP performance even in the presence of Blackhole and Grayhole attacks.
基金funded by the Major PublicWelfare Special Fund of Henan Province(No.201300210200)the Major Science and Technology Research Special Fund of Henan Province(No.221100210400).
文摘In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerability detection has become particularly important.With the popular use of neural network model,there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts.This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts.Subsequently,it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection.These tools are categorized based on their open-source status,the data format and the type of feature extraction they employ.Then we conduct a comprehensive comparative analysis of these tools,selecting representative tools for experimental validation and comparing them with traditional tools in terms of detection coverage and accuracy.Finally,Based on the insights gained from the experimental results and the current state of research in the field of smart contract vulnerability detection tools,we suppose to provide a reference standard for developers of contract vulnerability detection tools.Meanwhile,forward-looking research directions are also proposed for deep learning-based smart contract vulnerability detection.
基金supported by the National Natural Science Foundation of China,Grant Number:U1603115Science and Technology Project of Autonomous Region,Grant Number:2020A02001-1Research on Short-Term and Impending Precipitation Prediction Model and Accuracy Evaluation in Northern Xinjiang Based on Deep Learning,Grant Number:2021D01C080.
文摘With the increasing popularity of Ethereum,smart contracts have become a prime target for fraudulent activities such as Ponzi,honeypot,gambling,and phishing schemes.While some researchers have studied intelligent fraud detection,most research has focused on identifying Ponzi contracts,with little attention given to detecting and preventing gambling or phishing contracts.There are three main issues with current research.Firstly,there exists a severe data imbalance between fraudulent and non-fraudulent contracts.Secondly,the existing detection methods rely on diverse raw features that may not generalize well in identifying various classes of fraudulent contracts.Lastly,most prior studies have used contract source code as raw features,but many smart contracts only exist in bytecode.To address these issues,we propose a fraud detection method that utilizes Efficient Channel Attention EfficientNet(ECA-EfficientNet)and data enhancement.Our method begins by converting bytecode into Red Green Blue(RGB)three-channel images and then applying channel exchange data enhancement.We then use the enhanced ECA-EfficientNet approach to classify fraudulent smart contract RGB images.Our proposed method achieves high F1-score and Recall on both publicly available Ponzi datasets and self-built multi-classification datasets that include Ponzi,honeypot,gambling,and phishing smart contracts.The results of the experiments demonstrate that our model outperforms current methods and their variants in Ponzi contract detection.Our research addresses a significant problem in smart contract security and offers an effective and efficient solution for detecting fraudulent contracts.
基金supported by the Basic Research Program(No.JCKY2019210B029)Network threat depth analysis software(KY10800210013).
文摘Recently,security issues of smart contracts are arising great attention due to the enormous financial loss caused by vulnerability attacks.There is an increasing need to detect similar codes for hunting vulnerability with the increase of critical security issues in smart contracts.Binary similarity detection that quantitatively measures the given code diffing has been widely adopted to facilitate critical security analysis.However,due to the difference between common programs and smart contract,such as diversity of bytecode generation and highly code homogeneity,directly adopting existing graph matching and machine learning based techniques to smart contracts suffers from low accuracy,poor scalability and the limitation of binary similarity on function level.Therefore,this paper investigates graph neural network to detect smart contract binary code similarity at the program level,where we conduct instruction-level normalization to reduce the noise code for smart contract pre-processing and construct contract control flow graphs to represent smart contracts.In particular,two improved Graph Convolutional Network(GCN)and Message Passing Neural Network(MPNN)models are explored to encode the contract graphs into quantitatively vectors,which can capture the semantic information and the program-wide control flow information with temporal orders.Then we can efficiently accomplish the similarity detection by measuring the distance between two targeted contract embeddings.To evaluate the effectiveness and efficient of our proposed method,extensive experiments are performed on two real-world datasets,i.e.,smart contracts from Ethereum and Enterprise Operation System(EOS)blockchain-based platforms.The results show that our proposed approach outperforms three state-of-the-art methods by a large margin,achieving a great improvement up to 6.1%and 17.06%in accuracy.
文摘The challenge for supply chain management is to create appropriate supply chain contracts so as to optimize the system performance. To examine the role of asymmetric information in a two-echelon supply chain system and derive supply chain contracts to deal with existing asymmetric information, a two level supply chain model including one Supplier and one retailer under the demand of price elasticity is developed. By using the principalagent principle and the optimal control theory, three types of supply chain contract, i. e. , a wholesale pricing contract, a two-parameter linear and a two-parameter nonlinear contracts are obtained. In these contracts, the Supplier has asymmetric information about the retailer cost structure. Simulation results show that the two-parameter contracts are more effective strategies to achieve supply chain coordination.
文摘A majority of contracts will use many prepositions and prepositional phrases to reflect their preciseness which cause the treaty wording complicated and hard to understand. This paper tends to demonstrate the characteristics of the prepositions and prepositional phrases used in business English contracts and explore the translation strategies used in translating the features of the prepositions and the prepositional phrases in business English contracts. The findings of this paper can provide a reference for the majority of the trade workers, which can help them accurately and effectively draft or translate a contract and avoid unnecessary disputes.
基金This work was partially supported by FEDER/Ministerio de Ciencia e Innovación-Agencia Estatal de Investigación under project HORATIO(RTI2018-101204-B-C21)by Junta de Andalucía under projects APOLO(US-1264651)and EKIPMENT-PLUS(P18-FR-2895)by the TU Wien Research Cluster Smart CT.
文摘In this paper,we deal with questions related to blockchains in complex Internet of Things(IoT)-based ecosystems.Such ecosystems are typically composed of IoT devices,edge devices,cloud computing software services,as well as people,who are decision makers in scenarios such as smart cities.Many decisions related to analytics can be based on data coming from IoT sensors,software services,and people.However,they are typically based on different levels of abstraction and granularity.This poses a number of challenges when multiple blockchains are used together with smart contracts.This work proposes to apply our concept of elasticity to smart contracts and thereby enabling analytics in and between multiple blockchains in the context of IoT.We propose a reference architecture for Elastic Smart Contracts and evaluate the approach in a smart city scenario,discussing the benefits in terms of performance and self-adaptability of our solution.
基金This work was supported by the Scientific and Technological Project of Henan Province(Grant No.202102310340)Foundation of University Young Key Teacher of Henan Province(Grant Nos.2019GGJS040,2020GGJS027)+1 种基金Key Scientific Research Projects of Colleges and Universities in Henan Province(Grant No.21A110005)National Natual Science Foundation of China(61701170).
文摘The emergence of smart contracts has increased the attention of industry and academia to blockchain technology,which is tamper-proofing,decentralized,autonomous,and enables decentralized applications to operate in untrustworthy environments.However,these features of this technology are also easily exploited by unscrupulous individuals,a typical example of which is the Ponzi scheme in Ethereum.The negative effect of unscrupulous individuals writing Ponzi scheme-type smart contracts in Ethereum and then using these contracts to scam large amounts of money has been significant.To solve this problem,we propose a detection model for detecting Ponzi schemes in smart contracts using bytecode.In this model,our innovation is shown in two aspects:We first propose to use two bytes as one characteristic,which can quickly transform the bytecode into a high-dimensional matrix,and this matrix contains all the implied characteristics in the bytecode.Then,We innovatively transformed the Ponzi schemes detection into an anomaly detection problem.Finally,an anomaly detection algorithm is used to identify Ponzi schemes in smart contracts.Experimental results show that the proposed detection model can greatly improve the accuracy of the detection of the Ponzi scheme contracts.Moreover,the F1-score of this model can reach 0.88,which is far better than those of other traditional detection models.
基金The National Key Technology R&D Program of China during the 11th Five-Year Plan Period(No.2006BAH02A06)CSC(China Scholarship Council)Scholarship Program for Graduate Student Studying Abroad 2007
文摘In the global supply chain in a setting characterized by exchange rate uncertainties,it is quite necessary to focus on comparative research trying to find out which kind of purchasing strategy is better in different situations.The two common global purchasing strategies,risk sharing(RS)and quantity flexibility(QF),are selected to be compared.Using a real-options approach,the valuation models of RS and QF purchasing contracts are established.By means of binomial lattice technique,numerical simulation and sensitivity analysis of two stochastic dynamic programs are presented.The effects on expected discounted value by changing relative parameters are described clearly.Based on comparative analysis,it is concluded that the QF purchasing strategy is better than that of the RS especially where great volatility exists for exchange rate processes in the global supply chain.
文摘Forestry contracts of the Qing Dynasty in Jinping County, southwest China’s Guizhou Province, are a unique historical legacy of China. It came into being with the development of society and economy of Jinping. Research on these contracts is becoming widespread domestically and abroad as well. This paper is intended to make a review of the collection and research of forestry contracts in Jinping according to the chronological sequence.
文摘The study was conducted with the aim of exploring the barriers to the adoption of BOT contract systems for infrastructural development of technical universities in Ghana. In an empirical questionnaire survey with professionals and experts in the construction and education sector, the respondents were invited to rate their perception on the barriers to the adoption of the BOT contracts systems. An interview session to satisfy ways of adopting the BOT contracts for infrastructural development in technical universities was conducted with selected professionals. The study revealed that the major barriers to the adoption of the BOT contract system are: delays in approval, corruption, reliability and credit worthiness of entities and expropriation. The study suggested that detailed policy or framework for implementing BOT contracts;proper planning by technical universities;and adequate protection for lenders is required for successful BOT implementation. Therefore there is a need to explore this concept, using adequate policy initiatives, proper measures and support from government to improve on the proper implementation of the BOT contracts in Technical Universities in Ghana.
文摘This paper presents the role of E-commerce and E-technology in simplifying operations of preparing quotations and contracts of supporting engineering and scientific laboratories by required equipments and tools at Jordanian universities.The experimental and practical sides of education in scientific colleges in Jordanian universities is very important,so many quotations and contacts are performed and required each year,and E-commerce also offers the required information and specifications to persons responsible to do such contacts by using Business-to-Consumer,Consumer-to-Consumer or Business-to-Business principles.By searching about such equipments using search engines,many companies present their products and their specifications and give you the opportunity to select the suitable devices and tools depending on their specifications and prices.Case studies are discussed for some devices to show how much E-commerce simplifies this operation.It was found that E-commerce and E-technology reduces both time and efforts required to support both engineering and scientific labs with their needs from equipments,catalogs and tools required to such devices.
文摘The aim of this paper is to verify the existence of a clause in contracts of promise of property sale which defines the consequences of delay in the delivery of property, and to discover whether owners demanded any compensation for delays occurred. The number of buildings delivered after the scheduled deadline in two cities between December 2009 and January 2011 was found (n = 542), and a sample of 82 residential units was taken. In order to obtain the data, a semi-structured questionnaire was given to the homeowners. It was observed that only 35% (n = 29) of the contracts included a penalty clause for delay. However, in 19 of the 29 contracts the clause regarding delay came with other clauses that allowed the company to delay the delivery of the building for up to six months. This clause is considered null in Brazilian legislation. As for compensation, only one (1.82%) owner demanded that the company provide a rental property during the period of delay. It could be concluded that contractors are not observing Brazilian legislation regarding the delay in the delivery of residential units. In addition, conformism is perceived in the attitude of the homeowners.
文摘The problem that consumers often fail to read the standard form contracts they willingly enter into has been recognized by many scholars.This is a pressing issue because it may result in the consumers being disadvantaged in bargains.Several laws have already been put in place to protect consumers,but the protection is often inadequate.This essay assesses how the current solutions are carried out and investigates whether new methods can be put in place.It argues that the key to dealing with the no-reading phenomenon is to make contracts more accessible to consumers so that they can be more inclined to guard their own interests.
文摘This article questions the reliability of the amount of revenue recognized in the percentage of completion (POC) method of revenue recognition in construction industry and recommends a new method based on the progress billing which is more reliable. The most commonly used method of revenue recognition in the construction industry is the percentage of completion method (POC), where the revenue is recognized on the basis of the percentage of work completed. The calculation of percentage of work completed is made on the basis of the cost incurred for the contract work during the financial period and the cost required for completion of the work as estimated by the contractor. Here, the acceptance of the product by the buyer (contractee) is not involved in recognizing the revenue. The reliability of the amount of revenue and its collectability can be assured only when the buyer accepts the product. The approval of the progress bill by the contractee is needed to assure the reliability and collectability and it must be the event that triggers the recognition of revenue.
文摘This study explores the translation of business English contracts from English to Chinese from the perspective of functional equivalence.The functional equivalence theory involves three aspects of functional equivalence:lexical equivalence,sentential equivalence,and textual equivalence.As far as translation is concerned,translators adopt different translation techniques for different types of texts,striving to achieve equivalence in lexical,sentential,and textual functions.Therefore,translators are to recognize the different characteristics of business English contracts and highlight English translation styles and characteristics with the help of the functional equivalence theory.
文摘The Chongqing Branch of the China National Packaging Import and Export Corporation is an economic entity integrating trade with industry and technology. It specializes in importing and exporting packaging materials and a range of other commodities in Chongqing.