期刊文献+
共找到41,499篇文章
< 1 2 250 >
每页显示 20 50 100
Research on Alliance Decision of Dual-Channel Remanufacturing Supply Chain Considering Bidirectional Free-Riding and Cost-Sharing
1
作者 Lina Dong Yeming Dai 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期2913-2956,共44页
This study delves into the formation dynamics of alliances within a closed-loop supply chain(CLSC)that encom-passes a manufacturer,a retailer,and an e-commerce platform.It leverages Stackelberg game for this explorati... This study delves into the formation dynamics of alliances within a closed-loop supply chain(CLSC)that encom-passes a manufacturer,a retailer,and an e-commerce platform.It leverages Stackelberg game for this exploration,contrasting the equilibrium outcomes of a non-alliance model with those of three differentiated alliance models.The non-alliance model acts as a crucial benchmark,enabling the evaluation of the motivations for various supply chain entities to engage in alliance formations.Our analysis is centered on identifying the most effective alliance strategies and establishing a coordination within these partnerships.We thoroughly investigate the consequences of diverse alliance behaviors,bidirectional free-riding and cost-sharing,and the resultant effects on the optimal decision-making among supply chain actors.The findings underscore several pivotal insights:(1)The behavior of alliances within the supply chain exerts variable impacts on the optimal pricing and demand of its members.In comparison to the non-alliance(D)model,the manufacturer-retailer(MR)and manufacturer-e-commerce platform(ME)alliances significantly lower both offline and online resale prices for new and remanufactured goods.This adjustment leads to an enhanced demand for products via the MR alliance’s offline outlets and the ME alliance’s online platforms,thereby augmenting the profits for those within the alliance.Conversely,retailer-e-commerce platform(ER)alliance tends to increase the optimal retail price and demand across both online and offline channels.Under specific conditions,alliance behavior can also increase the profits of non-alliance members,and the profits derived through alliance channels also exceed those from non-alliance channels.(2)The prevalence of bidirectional free-riding behavior largely remains constant across different alliance configurations.Across these models,bidirectional free-riding typically elevates the equilibrium prices in offline channel while negatively affecting the equilibrium prices in other channel.(3)The effect of cost-sharing shows relative uniformity across the various alliance models.Across all configurations,cost-sharing tends to reduce the manufacturer’s profits.Nonetheless,alliances initiated by the manufacturer can counteract these negative impacts,providing a strategic pathway to bolster CLSC profitability. 展开更多
关键词 Dual-channel remanufacturing supply chain ALLIANCE remanufactured products bidirectional free-riding cost-sharing
下载PDF
Carbon Abatement Cost-Sharing Strategy for Electric Power Sector Based on Incentive and Subsidy Mechanisms
2
作者 Hui Wang Wen Wang Wenhui Zhao 《Energy Engineering》 EI 2024年第10期2907-2935,共29页
The green and low carbon transition and development of the electricity industry is the most crucial task in realizing the“dual-carbon target”,and it is urgent to explore the incentive and subsidy mechanism to promot... The green and low carbon transition and development of the electricity industry is the most crucial task in realizing the“dual-carbon target”,and it is urgent to explore the incentive and subsidy mechanism to promote green electricity consumption and the cost-sharing strategy of carbon reduction,to alleviate the pressure of carbon abatement cost of each subject of the electricity supply chain.Against this background,this paper takes into account the low-carbon subsidies provided by the government and the incentive subsidies for users,and studies the optimal decision-making of each subject in the electricity supply chain,so that each of them can obtain the optimal profit and achieve carbon emission reduction at the same time.Firstly,taking into account the direct power purchase mode of large users and the electricity-selling companies emerging after the reform of the power sales side,we have established a cooperative mechanism for sharing the cost of carbon emission reduction in the electricity supply chain and clarified the relationship between the supply and demand of electricity among the main parties.Subsequently,considering government low-carbon subsidies and user incentive subsidies,the optimal decisionmaking model is established under two scenarios of decentralized and centralized cooperative games in the supply chain,respectively,with the objective of maximizing profits and carbon reduction rates.Solving for the optimal proportion of carbon abatement costs shared by each participant in the electricity supply chain in achieving game equilibrium.Finally,we analyze the role of the government’s low-carbon subsidies,users’incentive subsidies,and other factors on the profit and carbon reduction effect of the electricity industry through the example analysis and further analyze the impact of carbon abatement cost-sharing measures to provide recommendations for the electricity industry to realize low-carbon abatement and make decisions. 展开更多
关键词 Electricity supply chain incentive subsidy mechanisms carbon abatement cost-sharing green electricity consumption
下载PDF
Service-Cost-Sharing Contract Design for a Dual-Channel Supply Chain with Free Riding
3
作者 Jinsen Guo Yongwu Zhou Baixun Li 《Journal of Systems Science and Systems Engineering》 SCIE EI CSCD 2022年第3期338-358,共21页
This paper considers a dual channel supply chain,where a manufacturer sells a single product through his/her online channel and a traditional retailer,who provides consumers with pre-sale services.The manufacturer'... This paper considers a dual channel supply chain,where a manufacturer sells a single product through his/her online channel and a traditional retailer,who provides consumers with pre-sale services.The manufacturer's online channel may free-ride the retailer's pre-sale service,which reduces the retailer's desired effort level,and hence may hurt the manufacturer's and the overall supply chain performance.Under both Manufacturer-and Retailer-Stackelberg settings,we study how the manufacturer designs a service-cost-sharing(SCS for brevity)contract to enhance the retailer's service effort level,and how free riding influences two members'optimal decisions.We design an algorithm for determining the two members’optimal decisions under each setting.The three main findings are found:(i)In the Manufacturer-Stackelberg setting,the SCS contract can enhance the retailer's service effort level and eliminate the negative impact incurred by free riding,but can't in the Retailer-Stackelberg setting,(ii)Under the SCS contract,the smaller the fraction of service cost the retailer is requested to share,the more detrimental to the retailer it will be under certain conditions.That is,the phenomenon called"counter-profit cost-sharing"appears,(iii)Both players like to act as a leader if the price competition between the two channels is not relatively very fierce,otherwise they both like to act as a follower. 展开更多
关键词 Free riding pricing strategy service cost-sharing contract stackelberg game channel conflict
原文传递
Contract Mechanism of Water Environment Regulation for Small and Medium Sized Enterprises Based on Optimal Control Theory
4
作者 Shuang Zhao Hongbin Gu +2 位作者 Lianfang Xue Dongsheng Wang Bin Huang 《Journal of Water Resource and Protection》 CAS 2024年第7期538-556,共20页
The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of trea... The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of treatment. How enterprises can make reasonable decisions on their water environment behavior based on the external environment and their own factors is of great significance for scientifically and effectively designing water environment regulation mechanisms. Based on optimal control theory, this study investigates the design of contractual mechanisms for water environmental regulation for small and medium-sized enterprises. The enterprise is regarded as an independent economic entity that can adopt optimal control strategies to maximize its own interests. Based on the participation of multiple subjects including the government, enterprises, and the public, an optimal control strategy model for enterprises under contractual water environmental regulation is constructed using optimal control theory, and a method for calculating the amount of unit pollutant penalties is derived. The water pollutant treatment cost data of a paper company is selected to conduct empirical numerical analysis on the model. The results show that the increase in the probability of government regulation and public participation, as well as the decrease in local government protection for enterprises, can achieve the same regulatory effect while reducing the number of administrative penalties per unit. Finally, the implementation process of contractual water environmental regulation for small and medium-sized enterprises is designed. 展开更多
关键词 Optimal Control Theory Small and Medium-Sized Enterprises Water Environment Regulation contract Mechanism
下载PDF
Bipartite consensus problems of Lurie multi-agent systems over signed graphs: A contraction approach
5
作者 张晓娇 吴祥 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期137-145,共9页
This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theor... This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theory, some new conditions for the nonlinear Lurie multi-agent systems reaching bipartite leaderless consensus and bipartite tracking consensus are presented. Compared with the traditional methods, this approach degrades the dimensions of the conditions, eliminates some restrictions of the system matrix, and extends the range of the nonlinear function. Finally, two numerical examples are provided to illustrate the efficiency of our results. 展开更多
关键词 contraction theory virtual system bipartite consensus Lurie multi-agent systems
下载PDF
A Review of Deep Learning-Based Vulnerability Detection Tools for Ethernet Smart Contracts
6
作者 Huaiguang Wu Yibo Peng +1 位作者 Yaqiong He Jinlin Fan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期77-108,共32页
In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerabi... In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerability detection has become particularly important.With the popular use of neural network model,there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts.This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts.Subsequently,it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection.These tools are categorized based on their open-source status,the data format and the type of feature extraction they employ.Then we conduct a comprehensive comparative analysis of these tools,selecting representative tools for experimental validation and comparing them with traditional tools in terms of detection coverage and accuracy.Finally,Based on the insights gained from the experimental results and the current state of research in the field of smart contract vulnerability detection tools,we suppose to provide a reference standard for developers of contract vulnerability detection tools.Meanwhile,forward-looking research directions are also proposed for deep learning-based smart contract vulnerability detection. 展开更多
关键词 Smart contract vulnerability detection deep learning
下载PDF
Smart Contract Vulnerability Detection Method Based on Feature Graph and Multiple Attention Mechanisms
7
作者 Zhenxiang He Zhenyu Zhao +1 位作者 Ke Chen Yanlin Liu 《Computers, Materials & Continua》 SCIE EI 2024年第5期3023-3045,共23页
The fast-paced development of blockchain technology is evident.Yet,the security concerns of smart contracts represent a significant challenge to the stability and dependability of the entire blockchain ecosystem.Conve... The fast-paced development of blockchain technology is evident.Yet,the security concerns of smart contracts represent a significant challenge to the stability and dependability of the entire blockchain ecosystem.Conventional smart contract vulnerability detection primarily relies on static analysis tools,which are less efficient and accurate.Although deep learning methods have improved detection efficiency,they are unable to fully utilize the static relationships within contracts.Therefore,we have adopted the advantages of the above two methods,combining feature extraction mode of tools with deep learning techniques.Firstly,we have constructed corresponding feature extraction mode for different vulnerabilities,which are used to extract feature graphs from the source code of smart contracts.Then,the node features in feature graphs are fed into a graph convolutional neural network for training,and the edge features are processed using a method that combines attentionmechanismwith gated units.Ultimately,the revised node features and edge features are concatenated through amulti-head attentionmechanism.The result of the splicing is a global representation of the entire feature graph.Our method was tested on three types of data:Timestamp vulnerabilities,reentrancy vulnerabilities,and access control vulnerabilities,where the F1 score of our method reaches 84.63%,92.55%,and 61.36%.The results indicate that our method surpasses most others in detecting smart contract vulnerabilities. 展开更多
关键词 Blockchain smart contracts deep learning graph neural networks
下载PDF
Preserving Data Secrecy and Integrity for Cloud Storage Using Smart Contracts and Cryptographic Primitives
8
作者 Maher Alharby 《Computers, Materials & Continua》 SCIE EI 2024年第5期2449-2463,共15页
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This a... Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic primitives.The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data.To preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing it.An extensive performance analysis is conducted to illustrate the efficiency of the proposed mechanism.Additionally,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running costs.The security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious entities.The proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems. 展开更多
关键词 Cloud storage data secrecy data integrity smart contracts CRYPTOGRAPHY
下载PDF
A Systematic Review and Performance Evaluation of Open-Source Tools for Smart Contract Vulnerability Detection
9
作者 Yaqiong He Jinlin Fan Huaiguang Wu 《Computers, Materials & Continua》 SCIE EI 2024年第7期995-1032,共38页
With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges su... With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges such as slow updates,usability issues,and limited installation methods.These challenges hinder the adoption and practicality of these tools.This paper examines smart contract vulnerability detection tools from 2016 to 2023,sourced from the Web of Science(WOS)and Google Scholar.By systematically collecting,screening,and synthesizing relevant research,38 open-source tools that provide installation methods were selected for further investigation.From a developer’s perspective,this paper offers a comprehensive survey of these 38 open-source tools,discussing their operating principles,installation methods,environmental dependencies,update frequencies,and installation challenges.Based on this,we propose an Ethereum smart contract vulnerability detection framework.This framework enables developers to easily utilize various detection tools and accurately analyze contract security issues.To validate the framework’s stability,over 1700 h of testing were conducted.Additionally,a comprehensive performance test was performed on the mainstream detection tools integrated within the framework,assessing their hardware requirements and vulnerability detection coverage.Experimental results indicate that the Slither tool demonstrates satisfactory performance in terms of system resource consumption and vulnerability detection coverage.This study represents the first performance evaluation of testing tools in this domain,providing significant reference value. 展开更多
关键词 Blockchain security ethereum smart contracts detection tools evaluation
下载PDF
Mitigating Blackhole and Greyhole Routing Attacks in Vehicular Ad Hoc Networks Using Blockchain Based Smart Contracts
10
作者 Abdulatif Alabdulatif Mada Alharbi +1 位作者 Abir Mchergui Tarek Moulahi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期2005-2021,共17页
The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced techno... The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced technology,such as Intelligent Transportation Systems(ITS),enables improved traffic management,helps eliminate congestion,and supports a safer environment.ITS provides real-time information on vehicle traffic and transportation systems that can improve decision-making for road users.However,ITS suffers from routing issues at the network layer when utilising Vehicular Ad Hoc Networks(VANETs).This is because each vehicle plays the role of a router in this network,which leads to a complex vehicle communication network,causing issues such as repeated link breakages between vehicles resulting from the mobility of the network and rapid topological variation.This may lead to loss or delay in packet transmissions;this weakness can be exploited in routing attacks,such as black-hole and gray-hole attacks,that threaten the availability of ITS services.In this paper,a Blockchain-based smart contracts model is proposed to offer convenient and comprehensive security mechanisms,enhancing the trustworthiness between vehicles.Self-Classification Blockchain-Based Contracts(SCBC)and Voting-Classification Blockchain-Based Contracts(VCBC)are utilised in the proposed protocol.The results show that VCBC succeeds in attaining better results in PDR and TP performance even in the presence of Blackhole and Grayhole attacks. 展开更多
关键词 Blockchain data privacy machine learning routing attacks smart contract VANET
下载PDF
Strategic Contracting for Software Upgrade Outsourcing in Industry 4.0
11
作者 Cheng Wang Zhuowei Zheng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1563-1592,共30页
The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmu... The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmust be tailored to meet the dynamic needs of enterprises. However, internal research and development can beprohibitively expensive, driving many enterprises to outsource software development and upgrades to externalservice providers. This paper presents a software upgrade outsourcing model for enterprises and service providersthat accounts for the impact of market fluctuations on software adaptability. To mitigate the risk of adverseselection due to asymmetric information about the service provider’s cost and asymmetric information aboutthe enterprise’s revenues, we propose pay-per-time and revenue-sharing contracts in two distinct informationasymmetry scenarios. These two contracts specify the time and transfer payments for software upgrades. Througha comparative analysis of the optimal solutions under the two contracts and centralized decision-making withfull-information, we examine the characteristics of the solutions under two information asymmetry scenarios andanalyze the incentive effects of the two contracts on the various stakeholders. Overall, our study offers valuableinsights for firms seeking to optimize their outsourcing strategies and maximize their returns on investment insoftware upgrades. 展开更多
关键词 Software upgrade outsourcing the principal-agent information asymmetry reverse selection contract design
下载PDF
Design and pricing of maintenance service contract based on Nash non-cooperative game approach
12
作者 SU Chun HUANG Kui 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2024年第1期118-129,共12页
Nowadays manufacturers are facing fierce challenge.Apart from the products,providing customers with multiple maintenance options in the service contract becomes more popular,since it can help to improve customer satis... Nowadays manufacturers are facing fierce challenge.Apart from the products,providing customers with multiple maintenance options in the service contract becomes more popular,since it can help to improve customer satisfaction,and ultimately promote sales and maximize profit for the manufacturer.By considering the combinations of corrective maintenance and preventive maintenance,totally three types of maintenance service contracts are designed.Moreover,attractive incentive and penalty mechanisms are adopted in the contracts.On this basis,Nash non-cooperative game is applied to analyze the revenue for both the manufacturer and customers,and so as to optimize the pricing mechanism of maintenance service contract and achieve a win-win situation.Numerical experiments are conducted.The results show that by taking into account the incentive and penalty mechanisms,the revenue can be improved for both the customers and manufacturer.Moreover,with the increase of repair rate and improvement factor in the preventive maintenance,the revenue will increase gradually for both the parties. 展开更多
关键词 maintenance service contract Nash game incentive and penalty mechanism corrective maintenance preventive maintenance
下载PDF
The Impact of Corporate Governance and Fair Value Accounting on Debt Contracts
13
作者 Dan Wu 《Proceedings of Business and Economic Studies》 2024年第4期202-206,共5页
This paper investigates the theoretical relationship between corporate governance,fair value accounting,and debt contracts.It primarily examines the individual impacts of corporate governance and fair value accounting... This paper investigates the theoretical relationship between corporate governance,fair value accounting,and debt contracts.It primarily examines the individual impacts of corporate governance and fair value accounting on debt contracts,while also exploring the influence of corporate governance on fair value accounting.The study emphasizes the importance of considering the interests and legal status of creditors in the context of debt contracts.The findings indicate that strong corporate governance can reduce the likelihood of debt default and that the company’s restructuring costs in the event of a default determine whether improved corporate governance will increase or decrease debt costs.Additionally,the study reveals that the strength of corporate governance affects the value relevance of fair value accounting.However,the impact of fair value accounting on debt contracts is not inherently positive or negative;for instance,companies may use fair value adjustments with manipulative intent to enhance performance.Ultimately,the research highlights that discussions about corporate governance should not prioritize shareholder interests exclusively but also consider the legitimate position of creditors. 展开更多
关键词 Corporate governance Debt contracts Debt default Fair value accounting
下载PDF
Study of the Mode of Cost-sharing by Indi-viduals for Higher Education in China 被引量:1
14
作者 LI Qiang WANG Zhi-ning 《Journal of China University of Mining and Technology》 EI 2006年第1期86-89,共4页
In recent years, financial crises of higher education have become universal. The policy of cost-sharing by in- dividuals was tried out in many countries. However, empirical studies have shown that the policy has, to a... In recent years, financial crises of higher education have become universal. The policy of cost-sharing by in- dividuals was tried out in many countries. However, empirical studies have shown that the policy has, to a certain de- gree, negative effects for the poor in accepting higher education costs. This paper points out it is the mismatch between tuition fees and the ability to pay that causes the problem. Using two dimensions of group and time to pay, a mode sys- tem, including seven modes for the individual to share the cost of higher education, was constructed. It is suggested that only three modes of pay-immediately have been carried out in China and they all have same shortcomings. To try new modes and exercise different modes synthetically will be meaningful for solving the questions that exist in the current policy. 展开更多
关键词 cost for higher education cost-sharing MODE
下载PDF
The role of time preferences in contract breach:Evidence from Chinese poultry farmers participating in contract farming 被引量:1
15
作者 HOU Jing ZHOU Li +1 位作者 Jennifer IFFT YING Rui-yao 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2023年第2期623-641,共19页
Farmers’contract breach behavior is cited as one of the major stumbling blocks in the sustainable expansion of contract farming in many developing countries.This paper examines farmers’contract breach decisions from... Farmers’contract breach behavior is cited as one of the major stumbling blocks in the sustainable expansion of contract farming in many developing countries.This paper examines farmers’contract breach decisions from the perspective of time preferences.The empirical analysis is based on a household survey and economic field experiments of poultry households participating in contract farming conducted in Jiangsu Province,China.A discounted utility model and a maximum likelihood technique are applied to estimate farmers’time preferences and the effect of time preferences on contract breach in the production and sales phases are explored with a bivariate probit model.The results show that,on average,the poultry farmers in the sample are generally present biased and impatient regarding future utility.The regression results show that farmers with a higher preference for the present and a higher discount rate are more likely to breach contracts,and time preferences play a greater role in the production phase than in the sales phase.When considering heterogeneity,specific investments and transaction costs promote contract stability only for farmers with a low degree of impatience.Moreover,compared with large-scale farmers,small-scale farmers’contract breach decisions are more significantly affected by their time preferences.These results have implications for contract stability policies and other issues that are impacted by the linking of behavioral preferences to agricultural decisions. 展开更多
关键词 time preferences contract breach contract farming economic field experiments China
下载PDF
Smart contract token-based privacy-preserving access control system for industrial Internet of Things 被引量:1
16
作者 Weizheng Wang Huakun Huang +3 位作者 Zhimeng Yin Thippa Reddy Gadekallu Mamoun Alazab Chunhua Su 《Digital Communications and Networks》 SCIE CSCD 2023年第2期337-346,共10页
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily lives.While IIoT brings us much convenience,a series of security and scalability ... Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily lives.While IIoT brings us much convenience,a series of security and scalability issues related to permission operations rise to the surface during device communications.Hence,at present,a reliable and dynamic access control management system for IIoT is in urgent need.Up till now,numerous access control architectures have been proposed for IIoT.However,owing to centralized models and heterogeneous devices,security and scalability requirements still cannot be met.In this paper,we offer a smart contract token-based solution for decentralized access control in IIoT systems.Specifically,there are three smart contracts in our system,including the Token Issue Contract(TIC),User Register Contract(URC),and Manage Contract(MC).These three contracts collaboratively supervise and manage various events in IIoT environments.We also utilize the lightweight and post-quantum encryption algorithm-Nth-degree Truncated Polynomial Ring Units(NTRU)to preserve user privacy during the registration process.Subsequently,to evaluate our proposed architecture's performance,we build a prototype platform that connects to the local blockchain.Finally,experiment results show that our scheme has achieved secure and dynamic access control for the IIoT system compared with related research. 展开更多
关键词 Blockchain Privacy preservation Smart contract Industrial IoT
下载PDF
Research on optimal intelligent routing algorithm for IoV with machine learning and smart contract 被引量:1
17
作者 Baofeng Ji Mingkun Zhang +4 位作者 Ling Xing Xiaoli Li Chunguo Li Congzheng Han Hong Wen 《Digital Communications and Networks》 SCIE CSCD 2023年第1期47-55,共9页
The huge increase in the communication network rate has made the application fields and scenarios for vehicular ad hoc networks more abundant and diversified and proposed more requirements for the efficiency and quali... The huge increase in the communication network rate has made the application fields and scenarios for vehicular ad hoc networks more abundant and diversified and proposed more requirements for the efficiency and quality of data transmission.To improve the limited communication distance and poor communication quality of the Internet of Vehicles(IoV),an optimal intelligent routing algorithm is proposed in this paper.Combined multiweight decision algorithm with the greedy perimeter stateless routing protocol,designed and evaluated standardized function for link stability.Linear additive weighting is used to optimize link stability and distance to improve the packet delivery rate of the IoV.The blockchain system is used as the storage structure for relay data,and the smart contract incentive algorithm based on machine learning is used to encourage relay vehicles to provide more communication bandwidth for data packet transmission.The proposed scheme is simulated and analyzed under different scenarios and different parameters.The experimental results demonstrate that the proposed scheme can effectively reduce the packet loss rate and improve system performance. 展开更多
关键词 IoV Machine learning Smart contract Routing algorithm GPSR Relay transmission
下载PDF
Electronic Auction Scheme Based on Smart Contract and IPFS 被引量:1
18
作者 WU Xiaohua LIU Huan +1 位作者 WU Fengheng ZHANG Ke 《计算机工程》 CAS CSCD 北大核心 2023年第2期181-190,共10页
Sealed-bid auctions are a vital transaction tool in the e-commerce field.Traditional centralized auction schemes typically result in severe threats to data integrity,information transparency,and traceability owing to ... Sealed-bid auctions are a vital transaction tool in the e-commerce field.Traditional centralized auction schemes typically result in severe threats to data integrity,information transparency,and traceability owing to their excessive reliance on third parties,and blockchain-based auction schemes generally suffer from high storage costs and are deficient in functional and architectural design.To solve these problems,this study presents a sealed-bid auction scheme that removes the third-party based on an Ethereum smart contract,ensuring data integrity,openness,and transparency in the execution process.The commitment mechanism and distributed storage system help to significantly reduce the user’s storage cost and protect the privacy of user bids.For the functional design,this study introduces a fulltext-retrieval and dispute-processing module for commodities,which reduces the defects existing in the functional module design of existing auction systems.Furthermore,a prototype auction system on the Ethereum test chain is built to validate the proposed scheme.Experiments show that compared with traditional storage methods,indirect storage based on a distributed storage system of texts and images can reduce the storage cost by at least 50%while ensuring data integrity.Finally,the gas cost at each stage of the auction scheme and the time required for the full-text retrieval of products are recorded to evaluate the scheme performance and analyze the test results. 展开更多
关键词 sealed bid auction Ethereum smart contract commitment Interplanetary File System(IPFS)
下载PDF
Analyzing Ethereum Smart Contract Vulnerabilities at Scale Based on Inter-Contract Dependency
19
作者 Qiuyun Lyu Chenhao Ma +3 位作者 Yanzhao Shen Shaopeng Jiao Yipeng Sun Liqin Hu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第5期1625-1647,共23页
Smart contracts running on public blockchains are permissionless and decentralized,attracting both developers and malicious participants.Ethereum,the world’s largest decentralized application platform on which more t... Smart contracts running on public blockchains are permissionless and decentralized,attracting both developers and malicious participants.Ethereum,the world’s largest decentralized application platform on which more than 40 million smart contracts are running,is frequently challenged by smart contract vulnerabilities.What’s worse,since the homogeneity of a wide range of smart contracts and the increase in inter-contract dependencies,a vulnerability in a certain smart contract could affect a large number of other contracts in Ethereum.However,little is known about how vulnerable contracts affect other on-chain contracts and which contracts can be affected.Thus,we first present the contract dependency graph(CDG)to perform a vulnerability analysis for Ethereum smart contracts,where CDG characterizes inter-contract dependencies formed by DELEGATECALL-type internal transaction in Ethereum.Then,three generic definitions of security violations against CDG are given for finding respective potential victim contracts affected by different types of vulnerable contracts.Further,we construct the CDG with 195,247 smart contracts active in the latest blocks of the Ethereum and verify the above security violations against CDG by detecting three representative known vulnerabilities.Compared to previous large-scale vulnerability analysis,our analysis scheme marks potential victim contracts that can be affected by different types of vulnerable contracts,and identify their possible risks based on the type of security violation actually occurring.The analysis results show that the proportion of potential victim contracts reaches 14.7%,far more than that of corresponding vulnerable contracts(less than 0.02%)in CDG. 展开更多
关键词 Smart contract vulnerability smart contract homogeneity contract dependency graph automated analysis
下载PDF
A Review of Smart Contract Blockchain Based on Multi-Criteria Analysis:Challenges and Motivations
20
作者 Norah M.Alshahrani M.L.Mat Kiah +2 位作者 B.B.Zaidan A.H.Alamoodi Abdu Saif 《Computers, Materials & Continua》 SCIE EI 2023年第5期2833-2858,共26页
A smart contract is a digital program of transaction protocol(rules of contract)based on the consensus architecture of blockchain.Smart contracts with Blockchain are modern technologies that have gained enormous atten... A smart contract is a digital program of transaction protocol(rules of contract)based on the consensus architecture of blockchain.Smart contracts with Blockchain are modern technologies that have gained enormous attention in scientific and practical applications.A smart contract is the central aspect of a blockchain that facilitates blockchain as a platformoutside the cryptocurrency spectrum.The development of blockchain technology,with a focus on smart contracts,has advanced significantly in recent years.However,research on the smart contract idea has weaknesses in the implementation sectors based on a decentralized network that shares an identical state.This paper extensively reviews smart contracts based on multi-criteria analysis,challenges and motivations.Therefore,implementing blockchain in multicriteria research is required to increase the efficiency of interaction between users via supporting information exchange with high trust.Implementing blockchain in the multi-criteria analysis is necessary to increase the efficiency of interaction between users via supporting information exchange and with high confidence,detecting malfunctioning,helping users with performance issues,reaching a consensus,deploying distributed solutions and allocating plans,tasks and joint missions.The smart contract with decision-making performance,planning and execution improves the implementation based on efficiency,sustainability and management.Furthermore,the uncertainty and supply chain performance lead to improved users’confidence in offering new solutions in exchange for problems in smart contacts.Evaluation includes code analysis and performance,while development performance can be under development. 展开更多
关键词 Blockchain smart contract MCDM MADM
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部