期刊文献+
共找到1,016篇文章
< 1 2 51 >
每页显示 20 50 100
Cross-chain mapping blockchain:Scalable data management in massive IoT networks
1
作者 Wenjian Hu Yao Yu +3 位作者 Xin Hao Phee Lep Yeoh Lei Guo Yonghui Li 《Digital Communications and Networks》 2025年第4期1124-1139,共16页
We propose a Cross-Chain Mapping Blockchain(CCMB)for scalable data management in massive Internet of Things(IoT)networks.Specifically,CCMB aims to improve the scalability of securely storing,tracing,and transmitting I... We propose a Cross-Chain Mapping Blockchain(CCMB)for scalable data management in massive Internet of Things(IoT)networks.Specifically,CCMB aims to improve the scalability of securely storing,tracing,and transmitting IoT behavior and reputation data based on our proposed cross-mapped Behavior Chain(BChain)and Reputation Chain(RChain).To improve off-chain IoT data storage scalability,we show that our lightweight CCMB architecture efficiently utilizes available fog-cloud resources.The scalability of on-chain IoT data tracing is enhanced using our Mapping Smart Contract(MSC)and cross-chain mapping design to perform rapid Reputation-to-Behavior(R2B)traceability queries between BChain and RChain blocks.To maximize off-chain to on-chain throughput,we optimize the CCMB block settings and producers based on a general Poisson Point Process(PPP)network model.The constrained optimization problem is formulated as a Markov Decision Process(MDP),and solved using a dual-network Deep Reinforcement Learning(DRL)algorithm.Simulation results validate CCMB’s scalability advantages in storage,traceability,and throughput.In specific massive IoT scenarios,CCMB can reduce the storage footprint by 50%and traceability query time by 90%,while improving system throughput by 55%compared to existing benchmarks. 展开更多
关键词 Blockchain cross-chain mappings Data management Internet of things Deep reinforcement learning
在线阅读 下载PDF
Analysis and Design of an ROS Attack-Resistant Adaptor Signature Scheme for Multiparty Cyclic Cross-Chain
2
作者 Mengyan Li Maoning Wang Meijiao Duan 《国际计算机前沿大会会议论文集》 2025年第1期459-485,共27页
To increase the interoperability and privacy of digital asset transactions in multiparty cross-chain scenarios,Chen et al.proposed a cross-chain protocol based on multi-signatures and adaptor signatures that does not ... To increase the interoperability and privacy of digital asset transactions in multiparty cross-chain scenarios,Chen et al.proposed a cross-chain protocol based on multi-signatures and adaptor signatures that does not rely on smart contracts but instead depends on underlying scripts and signatures.However,since the protocol was designed without considering concurrent execution scenarios,it may still be vulnerable to certain types of attacks,posing potential security risks in practical applications.Therefore,this paper first presents an ROS attack against Chen et al.’s scheme,in which ROS attack was originally proposed by Benhamouda et al.in 2022 against the Schnorr-type threshold and multi-signatures and our attack exploits the random numbers generated by users in the offline-tolerant mechanism.By using a system of equations construction method,it is possible to forge valid signatures for arbitrary messages.Subsequently,the existing Chen et al.’s scheme is improved by establishing a nonlinear dependency between the random number and the message,without introducing additional interaction rounds or random parameters.This improvement eliminates the solvability of the linear system of equations in the ROS attack,thereby defending against this type of attack.Furthermore,security definitions and proofs are provided,detailing the complete properties of the improved adaptor signature scheme.Therefore,the proposed scheme in this paper enhances the theoretical security strength while maintaining the functionality and efficiency of Chen et al.’s scheme,and hence has more effective practicality. 展开更多
关键词 Blockchain cross-chain Swap Ad aptorSignature·Multi-Signature
原文传递
A Blockchain Cross-Chain Transaction Protection Scheme Based on FHE
3
作者 Hongliang Tian Zuoqing Li 《Computers, Materials & Continua》 2025年第3期3983-4002,共20页
Low data encryption efficiency and inadequate security are two issues with the current blockchain cross-chain transaction protection schemes.To address these issues,a blockchain cross-chain transaction protection sche... Low data encryption efficiency and inadequate security are two issues with the current blockchain cross-chain transaction protection schemes.To address these issues,a blockchain cross-chain transaction protection scheme based on Fully Homomorphic Encryption(FHE)is proposed.In the proposed scheme,the functional relationship is established by Box-Muller,Discrete Gaussian Distribution Function(DGDF)and Uniform Random Distribution Func-tion(URDF)are used to improve the security and efficiency of key generation.Subsequently,the data preprocessing function is introduced to perform cleaning,deduplication,and normalization operations on the transaction data of multi-key signature,and it is classified into interactive data and asset data,so as to perform different homomorphic operations in the FHE encryption stage.Ultimately,in the FHE encryption stage,homomorphic multiplication and homomorphic addition are used targeted for the interactive data and asset data,thereby reducing the computational complexity and enhancing the FHE encryption efficiency.The significance of the proposed scheme is proved by experimental results:Firstly,the multi-key generation function and its specific sampling method and transformation ensure the security and efficiency of key generation.Data preprocessing can also accelerate the FHE encryption process by eliminating invalid data and redundancy,so the FHE encryption efficiency is significantly improved.Secondly,the FHE encryption method based on discrete logarithm problem enhances the security of transaction data and can effectively resist multiple attacks.In addition,the preprocessed data also has good performance in capacity storage.The proposed scheme has significant impacts on key indicators such as encryption efficiency and security,it provides a new reference for blockchain cross-chain transaction protection technology and has an important impact on the security improvement of various cross-chain transaction data. 展开更多
关键词 Blockchain cross-chain transactions fully homomorphic encryption(FHE)
在线阅读 下载PDF
A notary group-based cross-chain mechanism 被引量:10
4
作者 Anping Xiong Guihua Liu +2 位作者 Qingyi Zhu Ankui Jing Seng W.Loke 《Digital Communications and Networks》 SCIE CSCD 2022年第6期1059-1067,共9页
As an emerging distributed technology, blockchain has begun to penetrate into many fields such as finance, healthcare, supply chain, intelligent transportation. However, the interoperability and value exchange between... As an emerging distributed technology, blockchain has begun to penetrate into many fields such as finance, healthcare, supply chain, intelligent transportation. However, the interoperability and value exchange between different independent blockchain systems is restricting the expansion of blockchain. In this paper, a notary group-based cross-chain interaction model is proposed to achieve the interoperability between different blockchains. Firstly, a notary election mechanism is proposed to choose one notary from the notary group to act as a bridge for cross-chain transactions. Secondly, a margin pool is introduced to limit the misconduct of the elected notary and ensure the value transfer between the involved blockchains. Moreover, a reputation based incentive mechanism is used to encourage members of the notary group to participate in cross-chain transactions. Ethereum-based experiments demonstrate that the proposed mechanism can provide an acceptable performance for cross-chain transactions and provide a higher security level than ordinary cross-chain mechanisms. 展开更多
关键词 Blockchain cross-chain Notary group Reputation ranking Incentive mechanisms
在线阅读 下载PDF
Attacks Against Cross-Chain Systems and Defense Approaches:A Contemporary Survey 被引量:7
5
作者 Li Duan Yangyang Sun +3 位作者 Wei Ni Weiping Ding Jiqiang Liu Wei Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第8期1647-1667,共21页
The blockchain cross-chain is a significant technology for inter-chain interconnection and value transfer among different blockchain networks.Cross-chain overcomes the“information island”problem of the closed blockc... The blockchain cross-chain is a significant technology for inter-chain interconnection and value transfer among different blockchain networks.Cross-chain overcomes the“information island”problem of the closed blockchain network and is increasingly applied to multiple critical areas such as finance and the internet of things(IoT).Blockchain can be divided into three main categories of blockchain networks:public blockchains,private blockchains,and consortium blockchains.However,there are differences in block structures,consensus mechanisms,and complex working mechanisms among heterogeneous blockchains.The fragility of the cross-chain system itself makes the cross-chain system face some potential security and privacy threats.This paper discusses security defects on the cross-chain implementation mechanism,and discusses the impact of the structural features of blockchain networks on cross-chain security.In terms of cross-chain intercommunication,a cross-chain attack can be divided into a multi-chain combination attack,native chain attack,and inter-chain attack diffusion.Then various security threats and attack paths faced by the cross-chain system are analyzed.At last,the corresponding security defense methods of cross-chain security threats and future research directions for cross-chain applications are put forward. 展开更多
关键词 Blockchain cross-chain DEFENSE distributed private key control hash-locking NOTARY security threats sidechain/relay
在线阅读 下载PDF
Model of decentralized cross-chain energy trading for power systems 被引量:5
6
作者 Shaomin Zhang Cong Hou 《Global Energy Interconnection》 EI CAS CSCD 2021年第3期324-334,共11页
With the development of the energy Internet, more distributed generators are connected to the power grid, resulting in numerous heterogeneous energy networks. However, different energy networks cannot perform efficien... With the development of the energy Internet, more distributed generators are connected to the power grid, resulting in numerous heterogeneous energy networks. However, different energy networks cannot perform efficient energy trading in the centralized management mode, this deeply affecting the complementary ability of heterogeneous energy, resulting in the islanded energy phenomenon. In this model, the same energy on the chain is traded within the chain, and the heterogeneous energy on different chains is traded across chains. To trade energy between heterogeneous energy networks more efficiently, the blockchain-based cross-chain model is proposed based on the existing infrastructure. Heterogeneous energy nodes are assigned to different energy sub-chains and cross-chain energy transactions are performed through a relay-chain, which utilizes the improved Boneh–Lynn–Shacham signature scheme consensus algorithm based on the proof-of-stake and practical Byzantine fault tolerance. The experimental simulations on energy trading efficiency, throughput, and security, show its superiority over existing systems. Further, the simulation results provide a reference for the application of cross-chain technology in energy interconnection. 展开更多
关键词 Energy internet Blockchain cross-chain transaction Distributed generation Consensus algorithm
在线阅读 下载PDF
An Understandable Cross-Chain Authentication Mechanism for JointCloud Computing
7
作者 Feng Jiang Huai-Min Wang +4 位作者 Pei-Chang Shi Xiang Fu Liao-Liao Feng Rui Li Mo-Heng Lin 《Journal of Computer Science & Technology》 2025年第3期621-636,共16页
JointCloud computing is a new computing paradigm that supports cloud services to achieve mutually beneficial outcomes.A key component of this model is the JointCloud computing distributed ledger,which ensures trust am... JointCloud computing is a new computing paradigm that supports cloud services to achieve mutually beneficial outcomes.A key component of this model is the JointCloud computing distributed ledger,which ensures trust among cloud entities with diverse interests by providing digital space evidence.Blockchain forms the foundation of this framework,and its adoption is growing in various fields to optimize workflows.However,challenges related to blockchain interoperability and cross-chain data authentication remain unresolved,hindering the broader establishment of trust among cloud entities.This paper focuses on the specific scenario of cross-chain data authentication and provides a secure and easy-to-deploy solution.Drawing on the concepts of relay chain and notary mechanism in cross-chain methods,our solution leverages smart contracts and on-chain proofs to ensure security,thereby reducing the reliance on relay nodes.In cases of data falsification,our method offers mechanisms for accountability and data revocation,further enhancing security.Additionally,participating blockchains do not need to alter their data structures or network compositions for authentication,which makes the solution easy to deploy.Experimental results demonstrate that our design can be easily deployed on both homogeneous and heterogeneous blockchains.While maintaining performance comparable to existing solutions,it significantly enhances system security.In the event of data falsification,the solution can quickly hold individuals accountable and eliminate the impact of falsified data,reducing the time to mitigate the impact by half compared with other solutions. 展开更多
关键词 blockchain JointCloud computing smart contract cross-chain data authentication ACCOUNTABILITY
原文传递
Anti-quantum cross-chain identity authentication approach using dynamic group signature
8
作者 Huifang YU Mengjie HUANG 《Frontiers of Information Technology & Electronic Engineering》 2025年第5期742-752,共11页
To solve the privacy leakage and identity island problems in cross-chain interaction,we propose an anti-quantum cross-chain identity authentication approach based on dynamic group signature(DGS-AQCCIDAA)for smart educ... To solve the privacy leakage and identity island problems in cross-chain interaction,we propose an anti-quantum cross-chain identity authentication approach based on dynamic group signature(DGS-AQCCIDAA)for smart education.The relay-based cross-chain model promotes interconnection in heterogeneous consortium blockchains.DGS is used as the endorsement strategy for cross-chain identity authentication.Our approach can ensure quantum security under the learning with error(LWE)and inhomogeneous small integer solution(ISIS)assumptions,and it uses non-interactive zero-knowledge proof(NIZKP)to protect user identity privacy.Our scheme has low calculation overhead and provides anonymous cross-chain identity authentication in the smart education system. 展开更多
关键词 cross-chain Identity authentication Dynamic group signature(DGS) Anti-quantum security Zero-knowledge proof
原文传递
数据资产跨链交易系统架构研究
9
作者 李守伟 唐潇雨 张嘉政 《信息安全研究》 北大核心 2026年第4期366-375,共10页
在数字化时代背景下数据已成为关键生产要素,其交易和管理对促进社会经济增长至关重要.旨在解决现有数据资产所面临的非同一平台跨链交易挑战,分析了数据资产的价值转换路径和交易主体,设计了一个包含系统架构、网络结构和功能流程的跨... 在数字化时代背景下数据已成为关键生产要素,其交易和管理对促进社会经济增长至关重要.旨在解决现有数据资产所面临的非同一平台跨链交易挑战,分析了数据资产的价值转换路径和交易主体,设计了一个包含系统架构、网络结构和功能流程的跨链交易模型.该模型通过区分数据的所有者,建立资产交易链与个人授权链进行跨链数据交易,提高了数据交易的效率和监管的便利性.在此基础上通过构建一个安全、可靠的数据资产跨链交易平台,确保交易的公正性和透明度,同时保护参与者的隐私和数据安全,为数据资产交易市场的稳定发展提供理论和实践上的支持,推动数字经济的进一步发展. 展开更多
关键词 数据资产 数字经济 个人数据 数据交易 跨链
在线阅读 下载PDF
推动中俄投资合作创新发展
10
作者 刘华芹 《俄罗斯学刊》 2026年第2期44-65,共22页
近年来,中俄投资合作快速发展的主要原因包括:夯实投资合作的法律基础、提升投资便利化水平、推动规则标准互联互通、创造双向投资的贸易条件等。中俄双向投资合作的新特征体现在两个方面:一是中方对俄投资增长超乎预期,投资规模迅速扩... 近年来,中俄投资合作快速发展的主要原因包括:夯实投资合作的法律基础、提升投资便利化水平、推动规则标准互联互通、创造双向投资的贸易条件等。中俄双向投资合作的新特征体现在两个方面:一是中方对俄投资增长超乎预期,投资规模迅速扩大,投资所涵盖产业更加多元化,民营企业发挥重要作用;二是俄罗斯企业在总部经济、商贸流通和制造业领域稳步拓展对华投资,发展态势积极。中俄投资合作的模式不断创新,在农业、制造业和高科技领域构建了多种跨境产业链。中俄投资合作也面临诸多挑战,如美欧对俄经济制裁不断升级、俄罗斯营商环境的不确定性有所增加、投资合作的制度性障碍亟待消除等。展望未来,中俄双方应坚持两国元首在《中华人民共和国主席和俄罗斯联邦总统关于2030年前中俄经济合作重点方向发展规划的联合声明》中提出的合作方向,扎实推进合作进程,秉持互利共赢原则,积极推动投资合作提质增效。 展开更多
关键词 投资合作 贸易 便利化 跨境产业链
在线阅读 下载PDF
构建基于医防管协同的重大传染病跨境输入全链条防控体系
11
作者 宿昆 唐远航 +4 位作者 刘煜亮 朱钦翥 陈亿 程刚 乔甫 《华西医学》 2026年第3期363-367,共5页
随着全球化进程加快和人员流动日益频繁,重大传染病跨境输入对我国公共卫生安全构成持续威胁。该文分析了我国面临的重大传染病跨境输入风险与挑战,研究了防控思路与对策,提出了构建以医防管协同为核心的重大传染病跨境输入“境外-口岸... 随着全球化进程加快和人员流动日益频繁,重大传染病跨境输入对我国公共卫生安全构成持续威胁。该文分析了我国面临的重大传染病跨境输入风险与挑战,研究了防控思路与对策,提出了构建以医防管协同为核心的重大传染病跨境输入“境外-口岸-境内”三大环节全链条闭环防控体系的实现路径,旨在为我国提升重大传染病跨境输入防控能力提供理论支撑与实践路径。 展开更多
关键词 重大传染病 医防管 跨境输入 全链条防控 公共卫生安全
原文传递
基于BERT模型的跨链异常交易检测
12
作者 申振龙 童燕翔 +2 位作者 王萧 王奔 张鹏程 《计算机工程》 北大核心 2026年第1期254-265,共12页
跨链是一种打破区块链网络“信息孤岛”,实现不同区块链网络之间互操作的重要技术。作为跨链实现的产物,跨链桥已成为异构区块链之间实现资产转移和信息传递的重要解决方案。近几年,针对跨链桥漏洞的攻击频繁发生,攻击导致的跨链交易异... 跨链是一种打破区块链网络“信息孤岛”,实现不同区块链网络之间互操作的重要技术。作为跨链实现的产物,跨链桥已成为异构区块链之间实现资产转移和信息传递的重要解决方案。近几年,针对跨链桥漏洞的攻击频繁发生,攻击导致的跨链交易异常已造成高达数十亿的经济损失。然而,目前对跨链桥的异常交易问题研究较少,且仅有的一些检测工作高度依赖于人工总结的交易序列异常模式。针对这一问题,提出一种基于BERT(Bidirectional Encoder Representations from Transformers)模型的跨链异常交易检测方法,通过提供基于特征提取的2种检测模式,克服现有检测方法对人工经验依赖的局限性。第1种模式旨在更精准地提取特征,先根据交易状态从跨链原生交易数据中自动抽取具有关键特征的跨链交易序列,再通过跨链交易序列文本数据微调BERT-Base-Uncased预训练模型适应异常交易检测任务;第2种模式旨在弥补仅考虑关键跨链交易序列可能带来的特征不足,直接通过具有全面特征的原始交易文本数据微调BERT-Base-Uncased预训练模型进而解决异常交易检测任务。实验使用现有工作的真实跨链数据评估所提检测方法,结果表明,2种检测模式均能有效检测出异常的跨链交易,精确率、召回率及F1值均达到了100%。 展开更多
关键词 区块链 跨链桥 跨链交易 漏洞 交易序列
在线阅读 下载PDF
基于区块链的数据安全共享研究
13
作者 郭毅 李旭青 +3 位作者 张子蛟 张宏涛 张连成 张香丽 《信息网络安全》 北大核心 2026年第1期1-23,共23页
数据作为数字化时代的“新石油”,要挖掘其蕴含的重要价值,必须保障数据共享的绝对安全。传统数据安全共享模式存在集权化和信任缺失的问题,易引发“单点故障”。区块链技术具备去中心化、透明可追溯和不可篡改的特性,将其应用于数据共... 数据作为数字化时代的“新石油”,要挖掘其蕴含的重要价值,必须保障数据共享的绝对安全。传统数据安全共享模式存在集权化和信任缺失的问题,易引发“单点故障”。区块链技术具备去中心化、透明可追溯和不可篡改的特性,将其应用于数据共享领域,能够显著提升共享过程的安全性与可信性。文章对基于区块链的数据安全共享相关研究工作进行综述。首先,构建了基于区块链的数据安全共享模型,并阐释了数据存储、访问控制、数据传输及隐私保护这3种关键技术的概念与定义;然后,针对数据存储、访问控制、数据传输及隐私保护、跨链技术的相关研究,从基本思想、优缺点及适用场景3个维度展开详细分析与对比;最后,探讨了当前基于区块链的数据安全共享面临的权限动态调整困难、数据隐私与透明性冲突等核心问题,并提出了若干可行的解决思路,同时对未来研究方向进行了展望。 展开更多
关键词 区块链 数据存储 访问控制 数据传输及隐私保护 跨链
在线阅读 下载PDF
跨境数据流动限制对生产性服务业全球价值链分工地位的影响研究
14
作者 袁红林 刘冬雪 《当代财经》 北大核心 2026年第3期127-139,共13页
随着数字经济在全球范围内的深入发展,跨境数据流动对生产性服务业全球价值链分工地位具有重要影响。基于欧洲国际政治经济中心(ECIPE)的数字贸易限制指数数据库,对2014—2018年42个经济体的五大生产性服务业的跨境数据流动限制进行量化... 随着数字经济在全球范围内的深入发展,跨境数据流动对生产性服务业全球价值链分工地位具有重要影响。基于欧洲国际政治经济中心(ECIPE)的数字贸易限制指数数据库,对2014—2018年42个经济体的五大生产性服务业的跨境数据流动限制进行量化,并进一步就其对生产性服务业全球价值链分工地位的具体影响进行实证分析。研究发现,跨境数据流动限制显著抑制生产性服务业全球价值链分工地位的提升。异质性分析显示,批发零售业、交通运输和仓储业、租赁及其他商务服务业的全球价值链分工地位受抑制程度显著高于邮政电信业和金融保险业;相比于发达经济体,发展中经济体的生产性服务业全球价值链分工地位受到的抑制作用更大,而经济自由度较高的经济体能有效应对跨境数据流动限制的消极影响。机制分析表明,跨境数据流动限制通过抑制研发创新、引发人力资本结构失衡及增加贸易成本三条路径降低生产性服务业全球价值链分工地位。因此,政府应进一步完善平衡安全与效率的数据流动治理框架,通过激励技术创新、优化人力资本结构和降低贸易成本来强化要素支撑。同时应推动国际数据标准对接,并提升政策弹性与经济自由度,从而促进生产性服务业在跨境数据规制下的高质量发展。 展开更多
关键词 跨境数据流动 生产性服务业 全球价值链分工
原文传递
数字技术赋能跨境贸易全链条协同:模式重构、技术路径与运作质效
15
作者 王华 王灵乐 《西安交通大学学报(社会科学版)》 北大核心 2026年第1期154-176,共23页
在经济全球化与“一带一路”倡议推进背景下,跨境贸易作为“双循环”关键纽带,其数字化、便利化水平直接影响开放型经济质量。尽管中国跨境贸易数字化建设取得阶段性成效,但传统“分段式协同”模式仍存在主体协同壁垒、流程协同缺陷、... 在经济全球化与“一带一路”倡议推进背景下,跨境贸易作为“双循环”关键纽带,其数字化、便利化水平直接影响开放型经济质量。尽管中国跨境贸易数字化建设取得阶段性成效,但传统“分段式协同”模式仍存在主体协同壁垒、流程协同缺陷、监管与服务协同失衡等核心痛点,难以满足全链条贯通的现实需求。数字技术与跨境贸易全链条协同需求的高度适配性,为突破上述瓶颈提供了关键路径。围绕模式重构、技术路径、运作质效框架,系统解析数字技术赋能跨境贸易全链条协同的内在逻辑与实践路径。在模式重构层面,针对传统协同瓶颈,构建“运营—业务—管理(OBM)”多域数据协同模式,实现“商流、物流、资金流、信息流”的有效解耦与重组;同时搭建“政务—企业”一站式协同模式,推动政务服务与企业服务深度融合,并衍生跨业务场景全流程协同、多式联运协同两类子模式,形成覆盖多主体、全流程的协同框架。在技术路径层面,构建“底层数据协同、全流程效率优化、全链条监管”的一体化技术体系。底层数据协同通过多域数据分类与共享、事理认知图谱构建与推理、贸易单据智能化处理、跨域模块化可信数据中台四大技术,筑牢标准化、可信化数据底座;全流程效率优化聚焦“交易—物流—支付”核心场景,以商品碳足迹统计监测、多式联运物流效率优化、物权信息授信供应链金融服务三大技术,实现效率提升与价值优化;全链条监管依托跨境贸易主体动态信用评估、全链条风险评估技术,构建“信用驱动+风险预警”的监管体系,平衡合规与服务需求。在运作质效层面,数字技术从效率、成本、风险三个维度实现系统性提升。效率方面,单据处理时间大幅缩短,跨部门审核周期显著压缩,多式联运路径实现自动规划;成本方面,自动化技术降低企业人工成本,多式联运优化减少物流支出,合规预警规避违规损失,同时通过资源优化配置降低社会层面资源消耗;风险方面,全链条风险管理模型提升异常行为识别准确率,数据安全技术满足跨境数据合规要求,为协同提供安全保障。通过模式重构与技术落地,推动跨境贸易从“碎片化环节优化”向“全链条系统协同”转型,实现“企业受益、政府提效、社会节约”的多赢格局,可为企业数字化转型提供实践指引,为政府部门完善跨境贸易便利化政策、构建“效率高、成本低、服务优”的国际贸易通道提供理论与实证支撑。 展开更多
关键词 跨境贸易 数字技术 全链条协同 协同模式 一体化技术体系 数字贸易便利化
在线阅读 下载PDF
多区块链交互下跨链数据融合方案
16
作者 张中捷 余益民 冯立波 《计算机工程与应用》 北大核心 2026年第7期313-323,共11页
多个区块链进行交互时,存在交易数据结构不同、交易数据冲突的问题。针对这些问题,提出了多链数据融合方案(MCDFS),解决了多链数据获取、解析、融合、再上链的问题。设计了交易实体解析(TER)算法,解决了交易实体解析和实体分类的问题;... 多个区块链进行交互时,存在交易数据结构不同、交易数据冲突的问题。针对这些问题,提出了多链数据融合方案(MCDFS),解决了多链数据获取、解析、融合、再上链的问题。设计了交易实体解析(TER)算法,解决了交易实体解析和实体分类的问题;提出了同构实体的交易融合算法(HEF)以及异构实体的交易融合算法(DEF),解决了交易数据融合的问题;对TER算法、HEF算法以及DEF算法进行了实验分析。实验结果表明HEF算法和DEF算法随参数以及交易数量的增加延迟呈线性上升的趋势,系统在融合前后进行100次事务的延迟最大不超过231 ms。MCDFS方法可以很好实现多链数据的融合。 展开更多
关键词 区块链 跨链技术 数据融合 哈希算法
在线阅读 下载PDF
大规模任务场景下多无人机协同任务分配方法
17
作者 王俊杰 闫东宇 +1 位作者 郝永平 徐九龙 《兵工学报》 北大核心 2026年第1期244-260,共17页
目前,多无人机(Unmanned Aerial Vehicle,UAV)在大规模任务场景下的任务分配问题仍是一个挑战性问题。传统启发式算法可在较低计算复杂度下得到满意的解,但收敛速度慢且难以收敛到全局最优解。为此提出一种基于UAV链、任务链和双阶段修... 目前,多无人机(Unmanned Aerial Vehicle,UAV)在大规模任务场景下的任务分配问题仍是一个挑战性问题。传统启发式算法可在较低计算复杂度下得到满意的解,但收敛速度慢且难以收敛到全局最优解。为此提出一种基于UAV链、任务链和双阶段修复策略的遗传算法(Genetic Algorithm Based on UAV-chain,Task-chain,and Two-Stage Repair strategy,UTTSRGA)。在编码结构中设计UAV链和任务链来量化任务执行代价,增强了编码中的信息承载能力并显著提升搜索效率。针对交叉操作后出现任务缺失与任务重复问题,设计双阶段修复策略。第一阶段设计随机填充机制,增强对解空间的全局搜索能力;第二阶段设计邻接映射表修复机制,根据任务间的邻接关系提供进化方向,有效引导种群向当前最优解快速收敛。提出动态复合变异策略,融合自适应变异率与基于任务链值的变异点选择,并设计4种功能互补的变异算子,多维度协同优化解的质量。针对大规模场景下的路径交叉问题,引入路径优化策略,从实践角度进一步优化任务分配方案。实验结果表明,UTTSRGA在不同任务规模下,尤其是大规模复杂任务场景中,在解的质量、收敛速度和鲁棒性3个方面均表现出显著优势。 展开更多
关键词 多无人机协同 无人机链 任务链 双阶段修复机制 路径交叉
在线阅读 下载PDF
Research on cross-chain and interoperability for blockchain system 被引量:1
18
作者 Li Ming Qiu Honglin +2 位作者 Xu Quanqing Song Wenpeng Liu Baixiang 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2021年第5期1-17,26,共18页
At present, there is an urgent need for blockchain interoperability technology to realize interconnection between various blockchains, data communication and value transfer between blockchains, so as to break the ‘va... At present, there is an urgent need for blockchain interoperability technology to realize interconnection between various blockchains, data communication and value transfer between blockchains, so as to break the ‘value silo’ phenomenon of each blockchain. Firstly, it lists what people understand about the concept of interoperability. Secondly, it gives the key technical issues of cross-chain, including cross-chain mechanism, interoperability, eventual consistency, and universality. Then, the implementation of each cross-chain key technology is analyzed, including Hash-locking, two-way peg, notary schemes, relay chain scheme, cross-chain protocol, and global identity system. Immediately after that, five typical cross-chain systems are introduced and comparative analysis is made. In addition, two examples of cross-chain programmability and their analysis are given. Finally, the current state of cross-chain technology is summarized from two aspects: key technology implementation and cross-chain application enforcement. The cross-chain technology as a whole has formed a centralized fixed mechanism, as well as a trend of modular design, and some of the solutions to mature applications were established in the relevant standards organizations, and the cross-chain technology architecture tends to be unified, which is expected to accelerate the evolution of the open cross-chain network that supports the real needs of the interconnection of all chains. 展开更多
关键词 blockchain distributed ledger technology cross-chain INTEROPERABILITY Hash-locking NOTARY RELAY multi-chain
原文传递
A verifiable and efficient cross-chain calculation model for charging pile reputation 被引量:1
19
作者 Cui Zhang Yunhua He +3 位作者 Bin Wu Hui Yang Ke Xiao Hong Li 《High-Confidence Computing》 EI 2024年第2期105-115,共11页
To solve the current situation of low vehicle-to-pile ratio,charging pile(CP)operators incorporate private CPs into the shared charging system.However,the introduction of private CP has brought about the problem of po... To solve the current situation of low vehicle-to-pile ratio,charging pile(CP)operators incorporate private CPs into the shared charging system.However,the introduction of private CP has brought about the problem of poor service quality.Reputation is a common service evaluation scheme,in which the third-party reputation scheme has the issue of single point of failure;although the blockchain-based reputation scheme solves the single point of failure issue,it also brings the challenges of storage and query efficiency.It is a feasible solution to classify and store information on multiple chains,and at this time,reputation needs to be calculated in a cross-chain mode.Crosschain reputation calculation faces the problems of correctness verification,integrity verification and efficiency.Therefore,this paper proposes a verifiable and efficient cross-chain calculation model for CP reputation.Specially,in this model,we propose a verifiable cross-chain contract calculation scheme that adopts polynomial commitment to solve the problems of polynomial damage and tampering that may be encountered in the crosschain process of outsourced polynomials,so as to ensure the integrity and correctness of polynomial calculations.In addition,the miner selection and incentive mechanism algorithm in this scheme ensures the correctness of extracted information when the outsourced polynomial is calculated on the blockchain.The security analysis and experimental results demonstrate that this scheme is feasible in practice. 展开更多
关键词 Blockchain Shared charging REPUTATION cross-chain Verifiable
在线阅读 下载PDF
亲子关系对学龄前儿童社会技能的影响:执行功能和情绪调节的跨时间链式中介作用
20
作者 李艳玮 邵雨琪 +4 位作者 曾群雅 田腾 李丹 姚梦梦 池霞 《中国当代儿科杂志》 北大核心 2026年第3期336-341,共6页
目的探讨亲子关系对学龄前儿童社会技能的影响,以及执行功能和情绪调节在该关系中的跨时间链式中介作用。方法根据分层随机取样的原则抽取南京市518名3~5岁的学龄前儿童并进行为期1年的追踪,通过问卷调查了解儿童的亲子关系质量、执行... 目的探讨亲子关系对学龄前儿童社会技能的影响,以及执行功能和情绪调节在该关系中的跨时间链式中介作用。方法根据分层随机取样的原则抽取南京市518名3~5岁的学龄前儿童并进行为期1年的追踪,通过问卷调查了解儿童的亲子关系质量、执行功能、情绪调节和社会技能。结果亲子关系(调查阶段一,T1)、执行功能(T1)、情绪调节(调查阶段二,T2)和社会技能(T1/T2)各变量之间两两相关(P<0.001),亲子关系(T1)可通过情绪调节(T2)的单独中介作用影响学龄前儿童的社会技能(T2),此效应占总间接效应的56.25%,也可通过执行功能(T1)和情绪调节(T2)的跨时间的链式中介作用影响学龄前儿童的社会技能(T2),此效应占总间接效应的31.25%。结论执行功能和情绪调节在亲子关系预测学龄前儿童社会技能的过程中发挥了跨时间的链式中介作用。 展开更多
关键词 亲子关系 社会技能 执行功能 情绪调节 跨时间链式中介模型 学龄前儿童
在线阅读 下载PDF
上一页 1 2 51 下一页 到第
使用帮助 返回顶部