The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmu...The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmust be tailored to meet the dynamic needs of enterprises. However, internal research and development can beprohibitively expensive, driving many enterprises to outsource software development and upgrades to externalservice providers. This paper presents a software upgrade outsourcing model for enterprises and service providersthat accounts for the impact of market fluctuations on software adaptability. To mitigate the risk of adverseselection due to asymmetric information about the service provider’s cost and asymmetric information aboutthe enterprise’s revenues, we propose pay-per-time and revenue-sharing contracts in two distinct informationasymmetry scenarios. These two contracts specify the time and transfer payments for software upgrades. Througha comparative analysis of the optimal solutions under the two contracts and centralized decision-making withfull-information, we examine the characteristics of the solutions under two information asymmetry scenarios andanalyze the incentive effects of the two contracts on the various stakeholders. Overall, our study offers valuableinsights for firms seeking to optimize their outsourcing strategies and maximize their returns on investment insoftware upgrades.展开更多
With the further development of service-oriented,performance-based contracting(PBC)has been widely adopted in industry and manufacturing.However,maintenance optimization problems under PBC have not received enough att...With the further development of service-oriented,performance-based contracting(PBC)has been widely adopted in industry and manufacturing.However,maintenance optimization problems under PBC have not received enough attention.To further extend the scope of PBC’s application in the field of maintenance optimization,we investigate the condition-based maintenance(CBM)optimization for gamma deteriorating systems under PBC.Considering the repairable single-component system subject to the gamma degradation process,this paper proposes a CBM optimization model to maximize the profit and improve system performance at a relatively low cost under PBC.In the proposed CBM model,the first inspection interval has been considered in order to reduce the inspection frequency and the cost rate.Then,a particle swarm algorithm(PSO)and related solution procedure are presented to solve the multiple decision variables in our proposed model.In the end,a numerical example is provided so as to demonstrate the superiority of the presented model.By comparing the proposed policy with the conventional ones,the superiority of our proposed policy is proved,which can bring more profits to providers and improve performance.Sensitivity analysis is conducted in order to research the effect of corrective maintenance cost and time required for corrective maintenance on optimization policy.A comparative study is given to illustrate the necessity of distinguishing the first inspection interval or not.展开更多
The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of trea...The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of treatment. How enterprises can make reasonable decisions on their water environment behavior based on the external environment and their own factors is of great significance for scientifically and effectively designing water environment regulation mechanisms. Based on optimal control theory, this study investigates the design of contractual mechanisms for water environmental regulation for small and medium-sized enterprises. The enterprise is regarded as an independent economic entity that can adopt optimal control strategies to maximize its own interests. Based on the participation of multiple subjects including the government, enterprises, and the public, an optimal control strategy model for enterprises under contractual water environmental regulation is constructed using optimal control theory, and a method for calculating the amount of unit pollutant penalties is derived. The water pollutant treatment cost data of a paper company is selected to conduct empirical numerical analysis on the model. The results show that the increase in the probability of government regulation and public participation, as well as the decrease in local government protection for enterprises, can achieve the same regulatory effect while reducing the number of administrative penalties per unit. Finally, the implementation process of contractual water environmental regulation for small and medium-sized enterprises is designed.展开更多
This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theor...This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theory, some new conditions for the nonlinear Lurie multi-agent systems reaching bipartite leaderless consensus and bipartite tracking consensus are presented. Compared with the traditional methods, this approach degrades the dimensions of the conditions, eliminates some restrictions of the system matrix, and extends the range of the nonlinear function. Finally, two numerical examples are provided to illustrate the efficiency of our results.展开更多
In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerabi...In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerability detection has become particularly important.With the popular use of neural network model,there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts.This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts.Subsequently,it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection.These tools are categorized based on their open-source status,the data format and the type of feature extraction they employ.Then we conduct a comprehensive comparative analysis of these tools,selecting representative tools for experimental validation and comparing them with traditional tools in terms of detection coverage and accuracy.Finally,Based on the insights gained from the experimental results and the current state of research in the field of smart contract vulnerability detection tools,we suppose to provide a reference standard for developers of contract vulnerability detection tools.Meanwhile,forward-looking research directions are also proposed for deep learning-based smart contract vulnerability detection.展开更多
The fast-paced development of blockchain technology is evident.Yet,the security concerns of smart contracts represent a significant challenge to the stability and dependability of the entire blockchain ecosystem.Conve...The fast-paced development of blockchain technology is evident.Yet,the security concerns of smart contracts represent a significant challenge to the stability and dependability of the entire blockchain ecosystem.Conventional smart contract vulnerability detection primarily relies on static analysis tools,which are less efficient and accurate.Although deep learning methods have improved detection efficiency,they are unable to fully utilize the static relationships within contracts.Therefore,we have adopted the advantages of the above two methods,combining feature extraction mode of tools with deep learning techniques.Firstly,we have constructed corresponding feature extraction mode for different vulnerabilities,which are used to extract feature graphs from the source code of smart contracts.Then,the node features in feature graphs are fed into a graph convolutional neural network for training,and the edge features are processed using a method that combines attentionmechanismwith gated units.Ultimately,the revised node features and edge features are concatenated through amulti-head attentionmechanism.The result of the splicing is a global representation of the entire feature graph.Our method was tested on three types of data:Timestamp vulnerabilities,reentrancy vulnerabilities,and access control vulnerabilities,where the F1 score of our method reaches 84.63%,92.55%,and 61.36%.The results indicate that our method surpasses most others in detecting smart contract vulnerabilities.展开更多
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This a...Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic primitives.The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data.To preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing it.An extensive performance analysis is conducted to illustrate the efficiency of the proposed mechanism.Additionally,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running costs.The security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious entities.The proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems.展开更多
With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges su...With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges such as slow updates,usability issues,and limited installation methods.These challenges hinder the adoption and practicality of these tools.This paper examines smart contract vulnerability detection tools from 2016 to 2023,sourced from the Web of Science(WOS)and Google Scholar.By systematically collecting,screening,and synthesizing relevant research,38 open-source tools that provide installation methods were selected for further investigation.From a developer’s perspective,this paper offers a comprehensive survey of these 38 open-source tools,discussing their operating principles,installation methods,environmental dependencies,update frequencies,and installation challenges.Based on this,we propose an Ethereum smart contract vulnerability detection framework.This framework enables developers to easily utilize various detection tools and accurately analyze contract security issues.To validate the framework’s stability,over 1700 h of testing were conducted.Additionally,a comprehensive performance test was performed on the mainstream detection tools integrated within the framework,assessing their hardware requirements and vulnerability detection coverage.Experimental results indicate that the Slither tool demonstrates satisfactory performance in terms of system resource consumption and vulnerability detection coverage.This study represents the first performance evaluation of testing tools in this domain,providing significant reference value.展开更多
The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced techno...The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced technology,such as Intelligent Transportation Systems(ITS),enables improved traffic management,helps eliminate congestion,and supports a safer environment.ITS provides real-time information on vehicle traffic and transportation systems that can improve decision-making for road users.However,ITS suffers from routing issues at the network layer when utilising Vehicular Ad Hoc Networks(VANETs).This is because each vehicle plays the role of a router in this network,which leads to a complex vehicle communication network,causing issues such as repeated link breakages between vehicles resulting from the mobility of the network and rapid topological variation.This may lead to loss or delay in packet transmissions;this weakness can be exploited in routing attacks,such as black-hole and gray-hole attacks,that threaten the availability of ITS services.In this paper,a Blockchain-based smart contracts model is proposed to offer convenient and comprehensive security mechanisms,enhancing the trustworthiness between vehicles.Self-Classification Blockchain-Based Contracts(SCBC)and Voting-Classification Blockchain-Based Contracts(VCBC)are utilised in the proposed protocol.The results show that VCBC succeeds in attaining better results in PDR and TP performance even in the presence of Blackhole and Grayhole attacks.展开更多
Nowadays manufacturers are facing fierce challenge.Apart from the products,providing customers with multiple maintenance options in the service contract becomes more popular,since it can help to improve customer satis...Nowadays manufacturers are facing fierce challenge.Apart from the products,providing customers with multiple maintenance options in the service contract becomes more popular,since it can help to improve customer satisfaction,and ultimately promote sales and maximize profit for the manufacturer.By considering the combinations of corrective maintenance and preventive maintenance,totally three types of maintenance service contracts are designed.Moreover,attractive incentive and penalty mechanisms are adopted in the contracts.On this basis,Nash non-cooperative game is applied to analyze the revenue for both the manufacturer and customers,and so as to optimize the pricing mechanism of maintenance service contract and achieve a win-win situation.Numerical experiments are conducted.The results show that by taking into account the incentive and penalty mechanisms,the revenue can be improved for both the customers and manufacturer.Moreover,with the increase of repair rate and improvement factor in the preventive maintenance,the revenue will increase gradually for both the parties.展开更多
This paper investigates the theoretical relationship between corporate governance,fair value accounting,and debt contracts.It primarily examines the individual impacts of corporate governance and fair value accounting...This paper investigates the theoretical relationship between corporate governance,fair value accounting,and debt contracts.It primarily examines the individual impacts of corporate governance and fair value accounting on debt contracts,while also exploring the influence of corporate governance on fair value accounting.The study emphasizes the importance of considering the interests and legal status of creditors in the context of debt contracts.The findings indicate that strong corporate governance can reduce the likelihood of debt default and that the company’s restructuring costs in the event of a default determine whether improved corporate governance will increase or decrease debt costs.Additionally,the study reveals that the strength of corporate governance affects the value relevance of fair value accounting.However,the impact of fair value accounting on debt contracts is not inherently positive or negative;for instance,companies may use fair value adjustments with manipulative intent to enhance performance.Ultimately,the research highlights that discussions about corporate governance should not prioritize shareholder interests exclusively but also consider the legitimate position of creditors.展开更多
To cultivate new professional farmers is a key way for rural labor development, resolving existing problems such as how to farming. It is notable that government and market take advantages in training of new professio...To cultivate new professional farmers is a key way for rural labor development, resolving existing problems such as how to farming. It is notable that government and market take advantages in training of new professional farmers. Therefore, it is necessary to guarantee government and market playing the roles. The research explored market-oriented farmer training model and the characteristics and investigated training routes for new professional farmers.展开更多
In this paper, the asymmetric laminar flow in a porous channel with expanding or contracting walls is investigated. The governing equations are reduced to ordinary ones by using suitable similar transformations. Homot...In this paper, the asymmetric laminar flow in a porous channel with expanding or contracting walls is investigated. The governing equations are reduced to ordinary ones by using suitable similar transformations. Homotopy analysis method (HAM) is employed to obtain the expres- sions for velocity fields. Graphs are sketched for values of parameters and associated dynamic characteristics, especially the expansion ratio, are analyzed in detail.展开更多
The impact of environmental regulation on technology innovation is a hot spot in current research where a large number of empirical studies are based on Porter Hypothesis(PH). However, there are still controversies in...The impact of environmental regulation on technology innovation is a hot spot in current research where a large number of empirical studies are based on Porter Hypothesis(PH). However, there are still controversies in academia about the establishment of "weak" and "narrow" versions of PH. Based on the panel data of application for patent of energy conservation and emission reduction(ECER) technology of Chinese city scale during 2008-2014, comprehensive energy price, pollutant emission, etc., mixed regression model and systematic generalized method of moments method were adopted, respectively,to study the impact of market-oriented and command-and-control policy tool on China's ECER technology innovation. The results show that the environmental regulation hindered the technological innovation in the immediate phase; however, it turned out to be positive in the first-lag phase. Hence, the establishment of "weak" PH is time-bounded. The command-and-control policy tool played a more positive role in promoting technological innovation in the first-lag phase than market-oriented policy tool. Therefore, "narrow" PH is not tenable. The reason is that the main participants of China's ECER technology innovation are state-owned companies and public institutions. Regionally speaking, the impact which command-and-control policy tool has on technological innovation at sight was nonsignificant in the eastern, the central, and the western regions of China whilst market-oriented policy tool had a negative effect. And market-oriented policy tool in the central region had strongest negative effect, which would diminish in the eastern region and become weakest in the western region. This was related to regional energy consumption level and the market economic vitality.展开更多
Energy Performance Contracting was introduced into China in the mid 1990s. Since western energy service companies came to China, their management pattern has undergone major changes. Why did such changes occur? Mainly...Energy Performance Contracting was introduced into China in the mid 1990s. Since western energy service companies came to China, their management pattern has undergone major changes. Why did such changes occur? Mainly because these companies encountered two difficulties in China: tax and financing.展开更多
Objective Patients with repaired tetralogy of Fallot(rTOF)account for the majority of cases with late onset right ventricle(RV)failure.The current surgical approach,including pulmonary valve replacement/insertion(PVR)...Objective Patients with repaired tetralogy of Fallot(rTOF)account for the majority of cases with late onset right ventricle(RV)failure.The current surgical approach,including pulmonary valve replacement/insertion(PVR),has yielded mixed results with some patients recover RV function and some do not.An innovative surgical approach was proposed to help ventricle to contract and improve RV function qualified by ejection fraction with one or more active contracting bands.Computational biomechanical modelling is a widely used method in cardiovascular study for investigation of mechanisms governing disease development,quantitative diagnostic and treatment strategies and improving surgical designs for better outcome.Muscle active contraction caused by zero-load sarcomere shortening leads to change of zero-load configurations.In lieu of experimenting using real surgery on animal or human,computational simulations(virtual surgery)were performed to test different band combination and insertion options to identify optimal surgery design and band insertion plan.Methods Cardiac magnetic resonance(CMR)data were obtained from one rTOF patient(sex:male,age:22.5 y)before pulmonary valve replacement surgery.The patient was suffering from RV dilation and dysfunction with RV end-systole volume 254.49ml and end-diastole volume 406.91 mL.A total of 15 computational RV/LV/Patch/Band combination models based on(CMR)imaging were constructed to investigate the influence of different band insertion surgery plans.These models included 5 different band insertion models combined and 3 different band contraction ratio(10%,15%and 20%band zero-stress length reduction).These models included 5 different band insertion models:Model 1 with one band at anterior to the middle of papillary muscle;Model 2 with one band at posterior to the middle of papillary muscle;Model 3 with 2 bands which are the ones from Models 1&2 combined;Model 4 with a band at the base of the papillary muscle;Model 5 with 3 bands which is a combination of Models 3&4.A pre-shrink process was performed on in-vivo begin-filling and end-systole MRI data to obtain diastole and systole zero4oad ventricle geometries.An extra 5%-8%shrinkage was applied to obtain corresponding systole zero-load geometry reflecting myocardium sarcomere shortening.The zero-load band length in systole was 10%,15%and 20%shorter than that in diastole according to their corresponding contraction ratio.The nonlinear Mooney-Rivlin model was used to describe the ventricle material properties with their material parameter values adjusted to match measured data with CMR.The band material properties were in the same scale with healthy right ventricle.The RV/LV/Band model construction and solution procedures were the same as described.Results Model 5 with band contraction ratio of 20%has the ability to improve RV ejection fraction to 41.07%,which represented a 3.61%absolute improvement,or 9.6%relative improvement using pre-PVR ejection fraction as the baseline number.The ejection fractions for Models 1-4 with band contraction ratio of 20%were 39.28%,39.47%,38.87%and 40.34%respectively.Compared to models with band contraction ratio15%and 20%,models with band contraction ratio 10%has the least ability on RV ejection fraction improvement with ejection fraction 38.28%,38.00%,38.81%,38.50%and 39.36%corresponding to Models 1-5.Conclusions This pilot work demonstrated that the band insertion surgery may have great potential to improve post-PVR RV cardiac function for patients with repaired TOF.More band contraction ratio and inserted band number may lead to better post-surgery outcome.Further investigations using in-vitro animal experiments and final patient studies are warranted.展开更多
Farmers’contract breach behavior is cited as one of the major stumbling blocks in the sustainable expansion of contract farming in many developing countries.This paper examines farmers’contract breach decisions from...Farmers’contract breach behavior is cited as one of the major stumbling blocks in the sustainable expansion of contract farming in many developing countries.This paper examines farmers’contract breach decisions from the perspective of time preferences.The empirical analysis is based on a household survey and economic field experiments of poultry households participating in contract farming conducted in Jiangsu Province,China.A discounted utility model and a maximum likelihood technique are applied to estimate farmers’time preferences and the effect of time preferences on contract breach in the production and sales phases are explored with a bivariate probit model.The results show that,on average,the poultry farmers in the sample are generally present biased and impatient regarding future utility.The regression results show that farmers with a higher preference for the present and a higher discount rate are more likely to breach contracts,and time preferences play a greater role in the production phase than in the sales phase.When considering heterogeneity,specific investments and transaction costs promote contract stability only for farmers with a low degree of impatience.Moreover,compared with large-scale farmers,small-scale farmers’contract breach decisions are more significantly affected by their time preferences.These results have implications for contract stability policies and other issues that are impacted by the linking of behavioral preferences to agricultural decisions.展开更多
An incompressible flow in a porous channel with expanding or contacting walls in the presence of a transverse magnetic field is considered. Using similarity transformations, the governing equations are reduced to the ...An incompressible flow in a porous channel with expanding or contacting walls in the presence of a transverse magnetic field is considered. Using similarity transformations, the governing equations are reduced to the nonlinear ordinary differential equations. The exact similar solutions for the different cases of the expansion ratio and the Hartmann number are obtained with a singular perturbation method, and the associated behavior is discussed in detail.展开更多
The flow of a micropolar fluid in a semi-porous channel with an expanding or contracting wall is investigated. The governing equations are reduced to ordinary ones by using similar transformations. To get the analytic...The flow of a micropolar fluid in a semi-porous channel with an expanding or contracting wall is investigated. The governing equations are reduced to ordinary ones by using similar transformations. To get the analytic solution to the problem, the homotopy analysis method (HAM) is employed to obtain the expressions for velocity fields. Graphs are sketched and discussed for various parameters, especially the effect of the expansion ratio on velocity and micro-rotation fields.展开更多
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily lives.While IIoT brings us much convenience,a series of security and scalability ...Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily lives.While IIoT brings us much convenience,a series of security and scalability issues related to permission operations rise to the surface during device communications.Hence,at present,a reliable and dynamic access control management system for IIoT is in urgent need.Up till now,numerous access control architectures have been proposed for IIoT.However,owing to centralized models and heterogeneous devices,security and scalability requirements still cannot be met.In this paper,we offer a smart contract token-based solution for decentralized access control in IIoT systems.Specifically,there are three smart contracts in our system,including the Token Issue Contract(TIC),User Register Contract(URC),and Manage Contract(MC).These three contracts collaboratively supervise and manage various events in IIoT environments.We also utilize the lightweight and post-quantum encryption algorithm-Nth-degree Truncated Polynomial Ring Units(NTRU)to preserve user privacy during the registration process.Subsequently,to evaluate our proposed architecture's performance,we build a prototype platform that connects to the local blockchain.Finally,experiment results show that our scheme has achieved secure and dynamic access control for the IIoT system compared with related research.展开更多
文摘The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmust be tailored to meet the dynamic needs of enterprises. However, internal research and development can beprohibitively expensive, driving many enterprises to outsource software development and upgrades to externalservice providers. This paper presents a software upgrade outsourcing model for enterprises and service providersthat accounts for the impact of market fluctuations on software adaptability. To mitigate the risk of adverseselection due to asymmetric information about the service provider’s cost and asymmetric information aboutthe enterprise’s revenues, we propose pay-per-time and revenue-sharing contracts in two distinct informationasymmetry scenarios. These two contracts specify the time and transfer payments for software upgrades. Througha comparative analysis of the optimal solutions under the two contracts and centralized decision-making withfull-information, we examine the characteristics of the solutions under two information asymmetry scenarios andanalyze the incentive effects of the two contracts on the various stakeholders. Overall, our study offers valuableinsights for firms seeking to optimize their outsourcing strategies and maximize their returns on investment insoftware upgrades.
文摘With the further development of service-oriented,performance-based contracting(PBC)has been widely adopted in industry and manufacturing.However,maintenance optimization problems under PBC have not received enough attention.To further extend the scope of PBC’s application in the field of maintenance optimization,we investigate the condition-based maintenance(CBM)optimization for gamma deteriorating systems under PBC.Considering the repairable single-component system subject to the gamma degradation process,this paper proposes a CBM optimization model to maximize the profit and improve system performance at a relatively low cost under PBC.In the proposed CBM model,the first inspection interval has been considered in order to reduce the inspection frequency and the cost rate.Then,a particle swarm algorithm(PSO)and related solution procedure are presented to solve the multiple decision variables in our proposed model.In the end,a numerical example is provided so as to demonstrate the superiority of the presented model.By comparing the proposed policy with the conventional ones,the superiority of our proposed policy is proved,which can bring more profits to providers and improve performance.Sensitivity analysis is conducted in order to research the effect of corrective maintenance cost and time required for corrective maintenance on optimization policy.A comparative study is given to illustrate the necessity of distinguishing the first inspection interval or not.
文摘The small and scattered enterprise pattern in the county economy has formed numerous sporadic pollution sources, hindering the centralized treatment of the water environment, increasing the cost and difficulty of treatment. How enterprises can make reasonable decisions on their water environment behavior based on the external environment and their own factors is of great significance for scientifically and effectively designing water environment regulation mechanisms. Based on optimal control theory, this study investigates the design of contractual mechanisms for water environmental regulation for small and medium-sized enterprises. The enterprise is regarded as an independent economic entity that can adopt optimal control strategies to maximize its own interests. Based on the participation of multiple subjects including the government, enterprises, and the public, an optimal control strategy model for enterprises under contractual water environmental regulation is constructed using optimal control theory, and a method for calculating the amount of unit pollutant penalties is derived. The water pollutant treatment cost data of a paper company is selected to conduct empirical numerical analysis on the model. The results show that the increase in the probability of government regulation and public participation, as well as the decrease in local government protection for enterprises, can achieve the same regulatory effect while reducing the number of administrative penalties per unit. Finally, the implementation process of contractual water environmental regulation for small and medium-sized enterprises is designed.
基金Project supported by the National Natural Science Foundation of China(Grant No.62363005)the Jiangxi Provincial Natural Science Foundation(Grant Nos.20161BAB212032 and 20232BAB202034)the Science and Technology Research Project of Jiangxi Provincial Department of Education(Grant Nos.GJJ202602 and GJJ202601)。
文摘This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theory, some new conditions for the nonlinear Lurie multi-agent systems reaching bipartite leaderless consensus and bipartite tracking consensus are presented. Compared with the traditional methods, this approach degrades the dimensions of the conditions, eliminates some restrictions of the system matrix, and extends the range of the nonlinear function. Finally, two numerical examples are provided to illustrate the efficiency of our results.
基金funded by the Major PublicWelfare Special Fund of Henan Province(No.201300210200)the Major Science and Technology Research Special Fund of Henan Province(No.221100210400).
文摘In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerability detection has become particularly important.With the popular use of neural network model,there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts.This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts.Subsequently,it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection.These tools are categorized based on their open-source status,the data format and the type of feature extraction they employ.Then we conduct a comprehensive comparative analysis of these tools,selecting representative tools for experimental validation and comparing them with traditional tools in terms of detection coverage and accuracy.Finally,Based on the insights gained from the experimental results and the current state of research in the field of smart contract vulnerability detection tools,we suppose to provide a reference standard for developers of contract vulnerability detection tools.Meanwhile,forward-looking research directions are also proposed for deep learning-based smart contract vulnerability detection.
基金the Gansu Province Higher Education Institutions Industrial Support Program:Security Situational Awareness with Artificial Intelligence and Blockchain Technology.Project Number(2020C-29).
文摘The fast-paced development of blockchain technology is evident.Yet,the security concerns of smart contracts represent a significant challenge to the stability and dependability of the entire blockchain ecosystem.Conventional smart contract vulnerability detection primarily relies on static analysis tools,which are less efficient and accurate.Although deep learning methods have improved detection efficiency,they are unable to fully utilize the static relationships within contracts.Therefore,we have adopted the advantages of the above two methods,combining feature extraction mode of tools with deep learning techniques.Firstly,we have constructed corresponding feature extraction mode for different vulnerabilities,which are used to extract feature graphs from the source code of smart contracts.Then,the node features in feature graphs are fed into a graph convolutional neural network for training,and the edge features are processed using a method that combines attentionmechanismwith gated units.Ultimately,the revised node features and edge features are concatenated through amulti-head attentionmechanism.The result of the splicing is a global representation of the entire feature graph.Our method was tested on three types of data:Timestamp vulnerabilities,reentrancy vulnerabilities,and access control vulnerabilities,where the F1 score of our method reaches 84.63%,92.55%,and 61.36%.The results indicate that our method surpasses most others in detecting smart contract vulnerabilities.
文摘Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic primitives.The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data.To preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing it.An extensive performance analysis is conducted to illustrate the efficiency of the proposed mechanism.Additionally,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running costs.The security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious entities.The proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems.
基金supported by the Major Public Welfare Special Fund of Henan Province(No.201300210200)the Major Science and Technology Research Special Fund of Henan Province(No.221100210400).
文摘With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges such as slow updates,usability issues,and limited installation methods.These challenges hinder the adoption and practicality of these tools.This paper examines smart contract vulnerability detection tools from 2016 to 2023,sourced from the Web of Science(WOS)and Google Scholar.By systematically collecting,screening,and synthesizing relevant research,38 open-source tools that provide installation methods were selected for further investigation.From a developer’s perspective,this paper offers a comprehensive survey of these 38 open-source tools,discussing their operating principles,installation methods,environmental dependencies,update frequencies,and installation challenges.Based on this,we propose an Ethereum smart contract vulnerability detection framework.This framework enables developers to easily utilize various detection tools and accurately analyze contract security issues.To validate the framework’s stability,over 1700 h of testing were conducted.Additionally,a comprehensive performance test was performed on the mainstream detection tools integrated within the framework,assessing their hardware requirements and vulnerability detection coverage.Experimental results indicate that the Slither tool demonstrates satisfactory performance in terms of system resource consumption and vulnerability detection coverage.This study represents the first performance evaluation of testing tools in this domain,providing significant reference value.
文摘The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced technology,such as Intelligent Transportation Systems(ITS),enables improved traffic management,helps eliminate congestion,and supports a safer environment.ITS provides real-time information on vehicle traffic and transportation systems that can improve decision-making for road users.However,ITS suffers from routing issues at the network layer when utilising Vehicular Ad Hoc Networks(VANETs).This is because each vehicle plays the role of a router in this network,which leads to a complex vehicle communication network,causing issues such as repeated link breakages between vehicles resulting from the mobility of the network and rapid topological variation.This may lead to loss or delay in packet transmissions;this weakness can be exploited in routing attacks,such as black-hole and gray-hole attacks,that threaten the availability of ITS services.In this paper,a Blockchain-based smart contracts model is proposed to offer convenient and comprehensive security mechanisms,enhancing the trustworthiness between vehicles.Self-Classification Blockchain-Based Contracts(SCBC)and Voting-Classification Blockchain-Based Contracts(VCBC)are utilised in the proposed protocol.The results show that VCBC succeeds in attaining better results in PDR and TP performance even in the presence of Blackhole and Grayhole attacks.
基金supported by the National Natural Science Foundation of China(71671035)。
文摘Nowadays manufacturers are facing fierce challenge.Apart from the products,providing customers with multiple maintenance options in the service contract becomes more popular,since it can help to improve customer satisfaction,and ultimately promote sales and maximize profit for the manufacturer.By considering the combinations of corrective maintenance and preventive maintenance,totally three types of maintenance service contracts are designed.Moreover,attractive incentive and penalty mechanisms are adopted in the contracts.On this basis,Nash non-cooperative game is applied to analyze the revenue for both the manufacturer and customers,and so as to optimize the pricing mechanism of maintenance service contract and achieve a win-win situation.Numerical experiments are conducted.The results show that by taking into account the incentive and penalty mechanisms,the revenue can be improved for both the customers and manufacturer.Moreover,with the increase of repair rate and improvement factor in the preventive maintenance,the revenue will increase gradually for both the parties.
文摘This paper investigates the theoretical relationship between corporate governance,fair value accounting,and debt contracts.It primarily examines the individual impacts of corporate governance and fair value accounting on debt contracts,while also exploring the influence of corporate governance on fair value accounting.The study emphasizes the importance of considering the interests and legal status of creditors in the context of debt contracts.The findings indicate that strong corporate governance can reduce the likelihood of debt default and that the company’s restructuring costs in the event of a default determine whether improved corporate governance will increase or decrease debt costs.Additionally,the study reveals that the strength of corporate governance affects the value relevance of fair value accounting.However,the impact of fair value accounting on debt contracts is not inherently positive or negative;for instance,companies may use fair value adjustments with manipulative intent to enhance performance.Ultimately,the research highlights that discussions about corporate governance should not prioritize shareholder interests exclusively but also consider the legitimate position of creditors.
基金Supported by Chongqing Education Science Planning Program(2013-ZJ-060)Humanities and Social Science Research Planning Program of Ministry of Education(13YJA630042)+1 种基金Humanities and Social Science Research Program of Chongqing Education Committee(14SKN03)S&T Innovation Team Construction and Planning Foundation of Yangtze Normal University(2014XJTD03)~~
文摘To cultivate new professional farmers is a key way for rural labor development, resolving existing problems such as how to farming. It is notable that government and market take advantages in training of new professional farmers. Therefore, it is necessary to guarantee government and market playing the roles. The research explored market-oriented farmer training model and the characteristics and investigated training routes for new professional farmers.
基金supported by the National Natural Science Foundations of China (50936003, 50905013)The Open Project of State Key Lab. for Adv. Matals and Materials (2009Z-02)Research Foundation of Engineering Research Institute of USTB
文摘In this paper, the asymmetric laminar flow in a porous channel with expanding or contracting walls is investigated. The governing equations are reduced to ordinary ones by using suitable similar transformations. Homotopy analysis method (HAM) is employed to obtain the expres- sions for velocity fields. Graphs are sketched for values of parameters and associated dynamic characteristics, especially the expansion ratio, are analyzed in detail.
文摘The impact of environmental regulation on technology innovation is a hot spot in current research where a large number of empirical studies are based on Porter Hypothesis(PH). However, there are still controversies in academia about the establishment of "weak" and "narrow" versions of PH. Based on the panel data of application for patent of energy conservation and emission reduction(ECER) technology of Chinese city scale during 2008-2014, comprehensive energy price, pollutant emission, etc., mixed regression model and systematic generalized method of moments method were adopted, respectively,to study the impact of market-oriented and command-and-control policy tool on China's ECER technology innovation. The results show that the environmental regulation hindered the technological innovation in the immediate phase; however, it turned out to be positive in the first-lag phase. Hence, the establishment of "weak" PH is time-bounded. The command-and-control policy tool played a more positive role in promoting technological innovation in the first-lag phase than market-oriented policy tool. Therefore, "narrow" PH is not tenable. The reason is that the main participants of China's ECER technology innovation are state-owned companies and public institutions. Regionally speaking, the impact which command-and-control policy tool has on technological innovation at sight was nonsignificant in the eastern, the central, and the western regions of China whilst market-oriented policy tool had a negative effect. And market-oriented policy tool in the central region had strongest negative effect, which would diminish in the eastern region and become weakest in the western region. This was related to regional energy consumption level and the market economic vitality.
文摘Energy Performance Contracting was introduced into China in the mid 1990s. Since western energy service companies came to China, their management pattern has undergone major changes. Why did such changes occur? Mainly because these companies encountered two difficulties in China: tax and financing.
基金supported in part by National Sciences Foundation of China grants ( 11672001, 81571691,81771844)
文摘Objective Patients with repaired tetralogy of Fallot(rTOF)account for the majority of cases with late onset right ventricle(RV)failure.The current surgical approach,including pulmonary valve replacement/insertion(PVR),has yielded mixed results with some patients recover RV function and some do not.An innovative surgical approach was proposed to help ventricle to contract and improve RV function qualified by ejection fraction with one or more active contracting bands.Computational biomechanical modelling is a widely used method in cardiovascular study for investigation of mechanisms governing disease development,quantitative diagnostic and treatment strategies and improving surgical designs for better outcome.Muscle active contraction caused by zero-load sarcomere shortening leads to change of zero-load configurations.In lieu of experimenting using real surgery on animal or human,computational simulations(virtual surgery)were performed to test different band combination and insertion options to identify optimal surgery design and band insertion plan.Methods Cardiac magnetic resonance(CMR)data were obtained from one rTOF patient(sex:male,age:22.5 y)before pulmonary valve replacement surgery.The patient was suffering from RV dilation and dysfunction with RV end-systole volume 254.49ml and end-diastole volume 406.91 mL.A total of 15 computational RV/LV/Patch/Band combination models based on(CMR)imaging were constructed to investigate the influence of different band insertion surgery plans.These models included 5 different band insertion models combined and 3 different band contraction ratio(10%,15%and 20%band zero-stress length reduction).These models included 5 different band insertion models:Model 1 with one band at anterior to the middle of papillary muscle;Model 2 with one band at posterior to the middle of papillary muscle;Model 3 with 2 bands which are the ones from Models 1&2 combined;Model 4 with a band at the base of the papillary muscle;Model 5 with 3 bands which is a combination of Models 3&4.A pre-shrink process was performed on in-vivo begin-filling and end-systole MRI data to obtain diastole and systole zero4oad ventricle geometries.An extra 5%-8%shrinkage was applied to obtain corresponding systole zero-load geometry reflecting myocardium sarcomere shortening.The zero-load band length in systole was 10%,15%and 20%shorter than that in diastole according to their corresponding contraction ratio.The nonlinear Mooney-Rivlin model was used to describe the ventricle material properties with their material parameter values adjusted to match measured data with CMR.The band material properties were in the same scale with healthy right ventricle.The RV/LV/Band model construction and solution procedures were the same as described.Results Model 5 with band contraction ratio of 20%has the ability to improve RV ejection fraction to 41.07%,which represented a 3.61%absolute improvement,or 9.6%relative improvement using pre-PVR ejection fraction as the baseline number.The ejection fractions for Models 1-4 with band contraction ratio of 20%were 39.28%,39.47%,38.87%and 40.34%respectively.Compared to models with band contraction ratio15%and 20%,models with band contraction ratio 10%has the least ability on RV ejection fraction improvement with ejection fraction 38.28%,38.00%,38.81%,38.50%and 39.36%corresponding to Models 1-5.Conclusions This pilot work demonstrated that the band insertion surgery may have great potential to improve post-PVR RV cardiac function for patients with repaired TOF.More band contraction ratio and inserted band number may lead to better post-surgery outcome.Further investigations using in-vitro animal experiments and final patient studies are warranted.
基金supported by the National Natural Science Foundation of China(72003082 and 71573130)the Project of Philosophy and Social Science Research in Colleges and Universities in Jiangsu Province of China(2020SJA1015)+1 种基金the Priority Academic Program Development of Jiangsu Higher Education Institutions,China(PAPD)the China Center for Food Security Studies,Nanjing Agricultural University,China。
文摘Farmers’contract breach behavior is cited as one of the major stumbling blocks in the sustainable expansion of contract farming in many developing countries.This paper examines farmers’contract breach decisions from the perspective of time preferences.The empirical analysis is based on a household survey and economic field experiments of poultry households participating in contract farming conducted in Jiangsu Province,China.A discounted utility model and a maximum likelihood technique are applied to estimate farmers’time preferences and the effect of time preferences on contract breach in the production and sales phases are explored with a bivariate probit model.The results show that,on average,the poultry farmers in the sample are generally present biased and impatient regarding future utility.The regression results show that farmers with a higher preference for the present and a higher discount rate are more likely to breach contracts,and time preferences play a greater role in the production phase than in the sales phase.When considering heterogeneity,specific investments and transaction costs promote contract stability only for farmers with a low degree of impatience.Moreover,compared with large-scale farmers,small-scale farmers’contract breach decisions are more significantly affected by their time preferences.These results have implications for contract stability policies and other issues that are impacted by the linking of behavioral preferences to agricultural decisions.
文摘An incompressible flow in a porous channel with expanding or contacting walls in the presence of a transverse magnetic field is considered. Using similarity transformations, the governing equations are reduced to the nonlinear ordinary differential equations. The exact similar solutions for the different cases of the expansion ratio and the Hartmann number are obtained with a singular perturbation method, and the associated behavior is discussed in detail.
基金Project supported by the National Natural Science Foundation of China(Nos.50936003 and 50905013)the Open Project of State Key Laboratory for Advanced Metals and Materials (No.2009Z-02)
文摘The flow of a micropolar fluid in a semi-porous channel with an expanding or contracting wall is investigated. The governing equations are reduced to ordinary ones by using similar transformations. To get the analytic solution to the problem, the homotopy analysis method (HAM) is employed to obtain the expressions for velocity fields. Graphs are sketched and discussed for various parameters, especially the effect of the expansion ratio on velocity and micro-rotation fields.
文摘Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily lives.While IIoT brings us much convenience,a series of security and scalability issues related to permission operations rise to the surface during device communications.Hence,at present,a reliable and dynamic access control management system for IIoT is in urgent need.Up till now,numerous access control architectures have been proposed for IIoT.However,owing to centralized models and heterogeneous devices,security and scalability requirements still cannot be met.In this paper,we offer a smart contract token-based solution for decentralized access control in IIoT systems.Specifically,there are three smart contracts in our system,including the Token Issue Contract(TIC),User Register Contract(URC),and Manage Contract(MC).These three contracts collaboratively supervise and manage various events in IIoT environments.We also utilize the lightweight and post-quantum encryption algorithm-Nth-degree Truncated Polynomial Ring Units(NTRU)to preserve user privacy during the registration process.Subsequently,to evaluate our proposed architecture's performance,we build a prototype platform that connects to the local blockchain.Finally,experiment results show that our scheme has achieved secure and dynamic access control for the IIoT system compared with related research.