期刊文献+
共找到411篇文章
< 1 2 21 >
每页显示 20 50 100
Tilt and decentration with various intraocular lenses: A narrative review 被引量:5
1
作者 Xiao-Yong Chen Yu-Chen Wang +2 位作者 Tian-Yao Zhao Zi-Zhen Wang Wei Wang 《World Journal of Clinical Cases》 SCIE 2022年第12期3639-3646,共8页
We find that tilt and decentration of intraocular lens (IOL) commonly cause visualquality deterioration after cataract surgery. Multiple factors affect IOL tilt anddecentration in the pre-, mid-, and post-operation ph... We find that tilt and decentration of intraocular lens (IOL) commonly cause visualquality deterioration after cataract surgery. Multiple factors affect IOL tilt anddecentration in the pre-, mid-, and post-operation phases. Moreover, the tilt anddecentration of 1-piece IOL are less correlated with internal ocular HOAs thanthose of 3-piece IOL. Aspherical IOLs are more sensitive to decentration or tiltthan spherical IOLs. Furthermore, the optical performance of toric IOLs with anaccurate axis remains stable irrespective of tilt and decentration. The opticalquality of asymmetric multifocal IOLs varies significantly after decentration andtilt in different directions. The image quality enhances or deteriorates in thedirection of the decentered IOL. An extended depth of focus IOL can achievegood visual acuity in the distant, intermediate, and near range. Additionally, itstilt and decentration have less impact on the vision than bifocal and trifocal IOL.This is the first review that compares the effect of IOL tilt and decentration onimage quality for various IOL designs. The result indicates that a deeperunderstanding of tilt and decentration of various IOLs can help achieve a bettervisual effect to visually improve refractive cataract surgery. 展开更多
关键词 Intraocular lens Tilt and decentration High order aberration Visual quality
暂未订购
Angle measurement error and compensation for decentration rotation of circular gratings 被引量:4
2
作者 陈希军 王振桓 曾庆双 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2010年第4期536-539,共4页
As the geometric center of circular grating does not coincide with the rotation center,the angle measurement error of circular grating is analyzed. Based on the moire fringe equations in decentration condition,the mat... As the geometric center of circular grating does not coincide with the rotation center,the angle measurement error of circular grating is analyzed. Based on the moire fringe equations in decentration condition,the mathematical model of angle measurement error is derived. It is concluded that the decentration between the centre of circular grating and the center of revolving shaft leads to the first-harmonic error of angle measurement. The correctness of the result is proved by experimental data. The method of error compensation is presented,and the angle measurement accuracy of the circular grating is effectively improved by the error compensation. 展开更多
关键词 circular grating decentration moire fringe first-harmonic error
在线阅读 下载PDF
Optical performance of toric intraocular lenses in the presence of decentration 被引量:2
3
作者 Bin Zhang Jin-Xue Ma +3 位作者 Dan-Yan Liu Ying-Hua Du Cong-Rong Guo Yue-Xian Cui 《International Journal of Ophthalmology(English edition)》 SCIE CAS 2015年第4期730-735,共6页
· AIM: To evaluate the optical performance of toric intraocular lenses(IOLs) after decentration and with different pupil diameters, but with the IOL astigmatic axis aligned.· METHODS: Optical performances of... · AIM: To evaluate the optical performance of toric intraocular lenses(IOLs) after decentration and with different pupil diameters, but with the IOL astigmatic axis aligned.· METHODS: Optical performances of toric T5 and SN60 AT spherical IOLs after decentration were tested on a theoretical pseudophakic model eye based on the Hwey-Lan Liou schematic eye using the Zemax ray-tracing program. Changes in optical performance were analyzed in model eyes with 3-mm, 4-mm, and 5-mm pupil diameters and decentered from 0.25 mm to 0.75 mm with an interval of 5° at the meridian direction from0° to 90°. The ratio of the modulation transfer function(MTF) between a decentered and a centered IOL(MTFDecentration/MTFCentration) was calculated to analyze the decrease in optical performance.· RESULTS: Optical performance of the toric IOL remained unchanged when IOLs were decentered in any meridian direction. The MTFs of the two IOLs decreased,whereas optical performance remained equivalent after decentration. The MTFDecentration/MTFCentrationratios of the IOLs at a decentration from 0.25 mm to 0.75 mm were comparable in the toric and SN60 AT IOLs. After decentration, MTF decreased further, with the MTF of the toric IOL being slightly lower than that of the SN60 AT IOL. Imaging qualities of the two IOLs decreased when the pupil diameter and the degree of decentration increased, but the decrease was similar in the toric and spherical IOLs.· CONCLUSION: Toric IOLs were comparable to spherical IOLs in terms of tolerance to decentration at the correct axial position. 展开更多
关键词 LENS artificial ASTIGMATISM CORNEA decentration MODEL
原文传递
Decentration and tilt of plate-haptic multifocal intraocular lenses in myopic eyes 被引量:14
4
作者 Jiaqi Meng Wenwen He +3 位作者 Xianfang Rong Ao Miao Yi Lu Xiangjia Zhu 《Eye and Vision》 SCIE CSCD 2020年第1期162-170,共9页
Background:To investigate the decentration and tilt of plate-haptic multifocal intraocular lenses(MfIOLs)in myopic eyes.Methods:Myopic(axial length[AXL]>24.5 mm)and non-myopic(21.0 mm<AXL≤24.5 mm)cataract eyes ... Background:To investigate the decentration and tilt of plate-haptic multifocal intraocular lenses(MfIOLs)in myopic eyes.Methods:Myopic(axial length[AXL]>24.5 mm)and non-myopic(21.0 mm<AXL≤24.5 mm)cataract eyes were enrolled in this prospective study and randomly assigned to receive implantation of Zeiss AT LISA tri 839MP lenses(Group A)or Tecnis ZMB00 lenses(Group B).In total,122 eyes of 122 patients were available for analysis.Decentration and tilt of MfIOLs,high-order aberrations(HOAs),and modulation transfer functions(MTFs)were evaluated using the OPD-Scan III aberrometer 3 months postoperatively.Subjective symptoms were assessed with a Quality of Vision questionnaire.Results:Near and distance visual acuities,tilt and horizontal decentration did not differ between the two groups,postoperatively.However,myopic eyes of Group B showed greater vertical decentration than those of Group A(−0.17±0.14 mm vs.-0.03±0.09 mm,respectively),particularly when the MfIOLs were placed horizontally or obliquely.Overall decentration of myopic eyes was greater in Group B than in Group A(0.41±0.15 mm vs.0.16±0.10 mm,respectively).In Group B,AXL was negatively correlated with vertical decentration and positively correlated with overall decentration.No such correlations were found in Group A.Intraocular total HOAs,coma,trefoil and spherical aberrations were lower in Group A than in Group B for a 6.0 mm pupil among myopic eyes.Generally,Group A had better MTFs and fewer subjective symptoms than Group B among myopic eyes.Conclusions:Plate-haptic design of MfIOLs may be a suggested option for myopic cataract eyes due to the less inferior decentration and better visual quality postoperatively. 展开更多
关键词 decentration TILT Multifocal intraocular lens High myopia Cataract surgery
原文传递
Influence of overnight orthokeratology lens fitting decentration on corneal topography reshaping 被引量:10
5
作者 Jiaojie Chen Wei Huang +2 位作者 Rong Zhu Jun Jiang Yiyu Li 《Eye and Vision》 SCIE 2018年第1期48-58,共11页
Background:This retrospective study was designed to investigate the sole influence of orthokeratology(OK)lens fitting decentration on the Zernike coefficients of the reshaped anterior corneal surface.Methods:This stud... Background:This retrospective study was designed to investigate the sole influence of orthokeratology(OK)lens fitting decentration on the Zernike coefficients of the reshaped anterior corneal surface.Methods:This study comprised a review of 106 right eyes and measurements of corneal topography both before OK and at 1-month follow-up visit.A routine was designed to calculate local corneal surface astigmatism and assist the determination of OK lens fitting decentration from pupil center.The pupil-centered corneal Zernike coefficients of baseline(PCCB)and post-treatment(PCCP)were calculated.Meanwhile,the OK-lens-centered corneal Zernike coefficients of post-treatment(OCCP)were also calculated and considered as the presumptive ideal fitting group without decentration.Relationships between lens fitting decentration and the change of Zernike coefficients including(PCCP−PCCB)and(PCCP−OCCP)were analyzed.Results:Patients with a mean age of 11±2.36 years old had an average spherical equivalent refractive error of−3.52±1.06 D before OK.One month after treatment,OK lens fitting decentration from pupil center was 0.68±0.35 mm.RMS of 3rd-order(P<0.05),RMS of 4th-order(P<0.001)and RMS of total high order(P<0.001)corneal Zernike coefficients were increased in PCCP by comparing with OCCP,which was solely caused by lens fitting decentration.Nevertheless,no significant difference was observed in C^(0)_(2)(P>0.05).For the high order corneal Zernike coefficients in(PCCP–OCCP),radial distance of decentration was correlated with C^(−1)_(3)(r=−0.296,P<0.05),C^(1)_(3)(r=−0.396,P<0.001),and C^(0)_(4)(r=0.449,P<0.001),horizontal decentration was significantly correlated with C^(1)_(3)(r=0.901,P<0.001)and C^(1)_(5)(r=0.340,P<0.001),and vertical decentration was significantly correlated with C^(−1)_(3)(r=0.904,P<0.001).Conclusions:OK lens fitting decentration within 1.5 mm hardly influenced the change of corneal spherical power for myopia correction,but significantly induced additional corneal high order Zernike coefficients including C^(−1)_(3),C^(1)_(3),C^(0)_(4),and C^(1)_(5). 展开更多
关键词 ORTHOKERATOLOGY Lens fitting decentration Zernike coefficients Contact lens Corneal topography
原文传递
Beyond the Cloud: Federated Learning and Edge AI for the Next Decade 被引量:1
6
作者 Sooraj George Thomas Praveen Kumar Myakala 《Journal of Computer and Communications》 2025年第2期37-50,共14页
As AI systems scale, the limitations of cloud-based architectures, including latency, bandwidth, and privacy concerns, demand decentralized alternatives. Federated learning (FL) and Edge AI provide a paradigm shift by... As AI systems scale, the limitations of cloud-based architectures, including latency, bandwidth, and privacy concerns, demand decentralized alternatives. Federated learning (FL) and Edge AI provide a paradigm shift by combining privacy preserving training with efficient, on device computation. This paper introduces a cutting-edge FL-edge integration framework, achieving a 10% to 15% increase in model accuracy and reducing communication costs by 25% in heterogeneous environments. Blockchain based secure aggregation ensures robust and tamper-proof model updates, while exploratory quantum AI techniques enhance computational efficiency. By addressing key challenges such as device variability and non-IID data, this work sets the stage for the next generation of adaptive, privacy-first AI systems, with applications in IoT, healthcare, and autonomous systems. 展开更多
关键词 Federated Learning Edge AI Decentralized Computing Privacy-Preserving AI Blockchain Quantum AI
在线阅读 下载PDF
Scalable Ir‑Doped NiFe_(2)O_(4)/TiO_(2) Heterojunction Anode for Decentralized Saline Wastewater Treatment and H_(2) Production
7
作者 Sukhwa Hong Jiseon Kim +3 位作者 Jaebeom Park Sunmi Im Michael R.Hoffmann Kangwoo Cho 《Nano-Micro Letters》 SCIE EI CAS 2025年第3期1-18,共18页
Wastewater electrolysis cells(WECs)for decentralized wastewater treatment/reuse coupled with H_(2) production can reduce the carbon footprint associated with transportation of water,waste,and energy carrier.This study... Wastewater electrolysis cells(WECs)for decentralized wastewater treatment/reuse coupled with H_(2) production can reduce the carbon footprint associated with transportation of water,waste,and energy carrier.This study reports Ir-doped NiFe_(2)O_(4)(NFI,~5 at%Ir)spinel layer with TiO_(2) overlayer(NFI/TiO_(2)),as a scalable heterojunction anode for direct electrolysis of wastewater with circumneutral pH in a single-compartment cell.In dilute(0.1 M)NaCl solutions,the NFI/TiO_(2) marks superior activity and selectivity for chlorine evolution reaction,outperforming the benchmark IrO_(2).Robust operation in near-neutral pH was confirmed.Electroanalyses including operando X-ray absorption spectroscopy unveiled crucial roles of TiO_(2) which serves both as the primary site for Cl−chemisorption and a protective layer for NFI as an ohmic contact.Galvanostatic electrolysis of NH4+-laden synthetic wastewater demonstrated that NFI/TiO_(2)not only achieves quasi-stoichiometric NH_(4)^(+)-to-N_(2)conversion,but also enhances H_(2)generation efficiency with minimal competing reactions such as reduction of dissolved oxygen and reactive chlorine.The scaled-up WEC with NFI/TiO_(2)was demonstrated for electrolysis of toilet wastewater. 展开更多
关键词 Wastewater electrolysis cell Ir-doped NiFe_(2)O_(4) Reactive chlorine species Decentralized H_(2)production On-site wastewater treatment
在线阅读 下载PDF
Does Federal System Perform Better in Managing Diversity and Reducing Conflicts in Africa? The Case of South Sudan
8
作者 Luka Biong Deng Kuol 《International Relations and Diplomacy》 2025年第2期74-95,共22页
The relation between conflict and governance has been dominated by type of government rather than by system of government.With increasing conflict in countries with ethnic and religious diversity,the debate has gradua... The relation between conflict and governance has been dominated by type of government rather than by system of government.With increasing conflict in countries with ethnic and religious diversity,the debate has gradually shifted to understand better the link between conflict and system of government.There is a growing evidence that suggests federal system performs better than unitary system in managing diversity and reducing conflict.Decentralization is even seen to be more effective than federal system not only in managing diversity and reducing conflict but also in delivering public goods.This article provides an account of evolution of system of government in South Sudan.It finds a clear association of centralized unitary system with violent conflict and a relative peace during period of decentralized government or federal system.A decentralized federal system may be appropriate for South Sudan in managing diversity and mitigating conflict.Despite the popular demand by their citizens for a federal system to manage diversity and reduce violent conflict,the ruling elites in the post-independent South Sudan adopted instead an autocratic centralized unitary system that contributed among other factors to the persistent violent conflicts,erosion of social cohesion,and rising mistrust between state and citizens and between and among the communities of South Sudan. 展开更多
关键词 FEDERALISM DECENTRALIZATION UNITARY CONFLICT South Sudan diversity
在线阅读 下载PDF
Computer Modeling Approaches for Blockchain-Driven Supply Chain Intelligence:A Review on Enhancing Transparency,Security,and Efficiency
9
作者 Puranam Revanth Kumar Gouse Baig Mohammad +4 位作者 Pallati Narsimhulu Dharnisha Narasappa Lakshmana Phaneendra Maguluri Subhav Singh Shitharth Selvarajan 《Computer Modeling in Engineering & Sciences》 2025年第9期2779-2818,共40页
Blockchain Technology(BT)has emerged as a transformative solution for improving the efficacy,security,and transparency of supply chain intelligence.Traditional Supply Chain Management(SCM)systems frequently have probl... Blockchain Technology(BT)has emerged as a transformative solution for improving the efficacy,security,and transparency of supply chain intelligence.Traditional Supply Chain Management(SCM)systems frequently have problems such as data silos,a lack of visibility in real time,fraudulent activities,and inefficiencies in tracking and traceability.Blockchain’s decentralized and irreversible ledger offers a solid foundation for dealing with these issues;it facilitates trust,security,and the sharing of data in real-time among all parties involved.Through an examination of critical technologies,methodology,and applications,this paper delves deeply into computer modeling based-blockchain framework within supply chain intelligence.The effect of BT on SCM is evaluated by reviewing current research and practical applications in the field.As part of the process,we delved through the research on blockchain-based supply chain models,smart contracts,Decentralized Applications(DApps),and how they connect to other cutting-edge innovations like Artificial Intelligence(AI)and the Internet of Things(IoT).To quantify blockchain’s performance,the study introduces analytical models for efficiency improvement,security enhancement,and scalability,enabling computational assessment and simulation of supply chain scenarios.These models provide a structured approach to predicting system performance under varying parameters.According to the results,BT increases efficiency by automating transactions using smart contracts,increases security by using cryptographic techniques,and improves transparency in the supply chain by providing immutable records.Regulatory concerns,challenges with interoperability,and scalability all work against broad adoption.To fully automate and intelligently integrate blockchain with AI and the IoT,additional research is needed to address blockchain’s current limitations and realize its potential for supply chain intelligence. 展开更多
关键词 Blockchain supply chain management TRANSPARENCY SECURITY smart contracts DECENTRALIZATION EFFICIENCY
在线阅读 下载PDF
Quantum-Resilient Blockchain for Secure Digital Identity Verification in DeFi
10
作者 Ahmed I.Alutaibi 《Computers, Materials & Continua》 2025年第10期875-903,共29页
The rapid evolution of quantum computing poses significant threats to traditional cryptographic schemes,particularly in Decentralized Finance(DeFi)systems that rely on legacy mechanisms like RSA and ECDSA for digital ... The rapid evolution of quantum computing poses significant threats to traditional cryptographic schemes,particularly in Decentralized Finance(DeFi)systems that rely on legacy mechanisms like RSA and ECDSA for digital identity verification.This paper proposes a quantum-resilient,blockchain-based identity verification framework designed to address critical challenges in privacy preservation,scalability,and post-quantum security.The proposed model integrates Post-quantum Cryptography(PQC),specifically lattice-based cryptographic primitives,with Decentralized Identifiers(DIDs)and Zero-knowledge Proofs(ZKPs)to ensure verifiability,anonymity,and resistance to quantum attacks.A dual-layer architecture is introduced,comprising an identity layer for credential generation and validation,and an application layer for DeFi protocol integration.To evaluate its performance,the framework is tested on multiple real-world DeFi platforms using metrics such as verification latency,throughput,attack resistance,energy efficiency,and quantum attack simulation.The results demonstrate that the proposed framework achieves 90%latency reduction and over 35%throughput improvement compared to traditional blockchain identity solutions.It also exhibits a high quantum resistance score(95/100),with successful secure verification under simulated quantum adversaries.The revocation mechanism—implemented using Merkle-tree-based proofs—achieves average response times under 40 ms,and the system maintains secure operations with energy consumption below 9 J per authentication cycle.Additionally,the paper presents a security and cost tradeoff analysis using ZKP schemes such as Bulletproofs and STARKs,revealing superior bits-per-byte efficiency and reduced proof sizes.Real-world adoption scenarios,including integration with six major DeFi protocols,indicate a 25%increase in verified users and a 15%improvement in Total Value Locked(TVL).The proposed solution is projected to remain secure until 2041(basic version)and 2043(advanced version),ensuring long-term sustainability and future-proofing against evolving quantum threats.This work establishes a scalable,privacy-preserving identity model that aligns with emerging post-quantum security standards for decentralized ecosystems. 展开更多
关键词 Quantum-resistant cryptography decentralized identity DeFi blockchain zero-knowledge proofs post-quantum security lattice-based encryption
在线阅读 下载PDF
K-Corruption Intermittent Attacks for Violating the Codiagnosability
11
作者 Ruotian Liu Yihui Hu +1 位作者 Agostino Marcello Mangini Maria Pia Fanti 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期159-172,共14页
In this work, we address the codiagnosability analysis problem of a networked discrete event system under malicious attacks. The considered system is modeled by a labeled Petri net and is monitored by a series of site... In this work, we address the codiagnosability analysis problem of a networked discrete event system under malicious attacks. The considered system is modeled by a labeled Petri net and is monitored by a series of sites, in which each site possesses its own set of sensors, without requiring communication among sites or to any coordinators. A net is said to be codiagnosable with respect to a fault if at least one site could deduce the occurrence of this fault within finite steps. In this context, we focus on a type of malicious attack that is called stealthy intermittent replacement attack. The stealthiness demands that the corrupted observations should be consistent with the system's normal behavior, while the intermittent replacement setting entails that the replaced transition labels must be recovered within a bounded of consecutive corrupted observations(called as K-corruption intermittent attack). Particularly, there exists a coordination between attackers that are separately effected on different sites, which holds the same corrupted observation for each common transition under attacks. From an attacker viewpoint, this work aims to design Kcorruption intermittent attacks for violating the codiagnosability of systems. For this purpose, we propose an attack automaton to analyze K-corruption intermittent attack for each site, and build a new structure called complete attack graph that is used to analyze all the potential attacked paths. Finally, an algorithm is inferred to obtain the K-corruption intermittent attacks, and examples are given to show the proposed attack strategy. 展开更多
关键词 Codiagnosability decentralized structure discrete event system intermittent attack Petri net
在线阅读 下载PDF
Proof-of-trusted-work:A lightweight blockchain consensus for decentralized IoT networks
12
作者 Pengzhan Jiang Long Shi +3 位作者 Bin Cao Taotao Wang Baofeng Ji Jun Li 《Digital Communications and Networks》 2025年第4期1054-1065,共12页
Traditional Internet of Things(IoT)architectures that rely on centralized servers for data management and decision-making are vulnerable to security threats and privacy leakage.To address this issue,blockchain has bee... Traditional Internet of Things(IoT)architectures that rely on centralized servers for data management and decision-making are vulnerable to security threats and privacy leakage.To address this issue,blockchain has been advocated for decentralized data management in a tamper-resistance,traceable,and transparent manner.However,a major issue that hinders the integration of blockchain and IoT lies in that,it is rather challenging for resource-constrained IoT devices to perform computation-intensive blockchain consensuses such as Proof-of-Work(PoW).Furthermore,the incentive mechanism of PoW pushes lightweight IoT nodes to aggregate their computing power to increase the possibility of successful block generation.Nevertheless,this eventually leads to the formation of computing power alliances,and significantly compromises the decentralization and security of BlockChain-aided IoT(BC-IoT)networks.To cope with these issues,we propose a lightweight consensus protocol for BC-IoT,called Proof-of-Trusted-Work(PoTW).The goal of the proposed consensus is to disincentivize the centralization of computing power and encourage the independent participation of lightweight IoT nodes in blockchain consensus.First,we put forth an on-chain reputation evaluation rule and a reputation chain for PoTW to enable the verifiability and traceability of nodes’reputations based on their contributions of computing power to the blockchain consensus,and we incorporate the multi-level block generation difficulty as a rewards for nodes to accumulate reputations.Second,we model the block generation process of PoTW and analyze the block throughput using the continuous time Markov chain.Additionally,we define and optimize the relative throughput gain to quantify and maximize the capability of PoTW that suppresses the computing power centralization(i.e.,centralization suppression).Furthermore,we investigate the impact of the computing power of the computing power alliance and the levels of block generation difficulty on the centralization suppression capability of PoTW.Finally,simulation results demonstrate the consistency of the analytical results in terms of block throughput.In particular,the results show that PoTW effectively reduces the block generation proportion of the computing power alliance compared with PoW,while simultaneously improving that of individual lightweight nodes.This indicates that PoTW is capable of suppressing the centralization of computing power to a certain degree.Moreover,as the levels of block generation difficulty in PoTW increase,its centralization suppression capability strengthens. 展开更多
关键词 Internet of things Blockchain DECENTRALIZATION Lightweight consensus Proof-of-trusted-work
在线阅读 下载PDF
Robust Detection and Analysis of Smart Contract Vulnerabilities with Large Language Model Agents
13
作者 Nishank P. Kuppa Vijay K. Madisetti 《Journal of Information Security》 2025年第1期197-226,共30页
Smart contracts on the Ethereum blockchain continue to revolutionize decentralized applications (dApps) by allowing for self-executing agreements. However, bad actors have continuously found ways to exploit smart cont... Smart contracts on the Ethereum blockchain continue to revolutionize decentralized applications (dApps) by allowing for self-executing agreements. However, bad actors have continuously found ways to exploit smart contracts for personal financial gain, which undermines the integrity of the Ethereum blockchain. This paper proposes a computer program called SADA (Static and Dynamic Analyzer), a novel approach to smart contract vulnerability detection using multiple Large Language Model (LLM) agents to analyze and flag suspicious Solidity code for Ethereum smart contracts. SADA not only improves upon existing vulnerability detection methods but also paves the way for more secure smart contract development practices in the rapidly evolving blockchain ecosystem. 展开更多
关键词 Blockchain Ethereum Smart Contracts Security Decentralized Applications WEB3 Cryptocurrency Large Language Models
在线阅读 下载PDF
Toward next-generation networks:A blockchain-based approach for core network architecture and roaming identity verification
14
作者 Yi Gong Boyuan Yu +4 位作者 Lei Yang Fanke Meng Lei Liu Xinjue Hu Zhan Xu 《Digital Communications and Networks》 2025年第2期326-336,共11页
With the evolution of next-generation communication networks,ensuring robust Core Network(CN)architecture and data security has become paramount.This paper addresses critical vulnerabilities in the architecture of CN ... With the evolution of next-generation communication networks,ensuring robust Core Network(CN)architecture and data security has become paramount.This paper addresses critical vulnerabilities in the architecture of CN and data security by proposing a novel framework based on blockchain technology that is specifically designed for communication networks.Traditional centralized network architectures are vulnerable to Distributed Denial of Service(DDoS)attacks,particularly in roaming scenarios where there is also a risk of private data leakage,which imposes significant operational demands.To address these issues,we introduce the Blockchain-Enhanced Core Network Architecture(BECNA)and the Secure Decentralized Identity Authentication Scheme(SDIDAS).The BECNA utilizes blockchain technology to decentralize data storage,enhancing network security,stability,and reliability by mitigating Single Points of Failure(SPoF).The SDIDAS utilizes Decentralized Identity(DID)technology to secure user identity data and streamline authentication in roaming scenarios,significantly reducing the risk of data breaches during cross-network transmissions.Our framework employs Ethereum,free5GC,Wireshark,and UERANSIM tools to create a robust,tamper-evident system model.A comprehensive security analysis confirms substantial improvements in user privacy and network security.Simulation results indicate that our approach enhances communication CNs security and reliability,while also ensuring data security. 展开更多
关键词 Blockchain Core network Privacy data protection Decentralized identity Roaming identity verification
在线阅读 下载PDF
The Application of Blockchain Technology in the Financial Field
15
作者 Yanling Liu Yun Li 《Proceedings of Business and Economic Studies》 2025年第2期191-197,共7页
Blockchain technology,as a revolutionary tool,is profoundly changing the way the financial field works.Its application has expanded from digital currency to many fields,such as smart contracts,cross-border payments,tr... Blockchain technology,as a revolutionary tool,is profoundly changing the way the financial field works.Its application has expanded from digital currency to many fields,such as smart contracts,cross-border payments,trade finance,and digital identity management,providing important support for simplifying financial service processes,reducing costs,and improving efficiency.However,the widespread application of blockchain technology still faces challenges such as scalability,regulatory compliance,and cybersecurity,limiting its full integration in the financial industry.This study systematically reviews the status quo,development history,and future trends of blockchain technology application in the financial sector,analyzes its key role in capital markets,decentralized finance(DeFi),and other fields,and explores the potential of emerging solutions such as hybrid blockchain and dynamic regulatory frameworks. 展开更多
关键词 Blockchain Decentralized finance Smart contracts Cross-border payments
在线阅读 下载PDF
Renewable Energy-Based Solutions for Decentralized Electrification:Demand Assessment andMulti-Tier Framework Approach
16
作者 Jacob Manyuon Deng Cyrus Wabuge Wekesa +1 位作者 Khan Jean De Dieu Hakizimana Joseph Nzabahimana 《Energy Engineering》 2025年第5期1839-1862,共24页
Energy access remains a critical challenge in rural South Sudan,with communities heavily relying on expensive and unfriendly environmental energy sources such as diesel generators and biomass.This study addresses the ... Energy access remains a critical challenge in rural South Sudan,with communities heavily relying on expensive and unfriendly environmental energy sources such as diesel generators and biomass.This study addresses the predicament by evaluating the feasibility of renewable energy-based decentralized electrification in the selected village ofDoleibHill,UpperNile,South Sudan.Using a demand assessment and theMulti-Tier Framework(MTF)approach,it categorizes households,public facilities,private sector,Non-GovernmentalOrganizations(NGOs)and business energy needs and designs an optimized hybrid energy system incorporating solar Photovoltaic(PV),wind turbines,batteries,and a generator.The proposed system,simulated in Hybrid Optimization Model Electric Renewable(HOMER)Pro,demonstrates strong economic viability,with a present worth of$292,145,an annual worth of$22,854,a return on investment(ROI)of 36.5%,and an internal rate of return(IRR)of 42.1%.The simple payback period is 2.31 years,and the discounted payback period is 2.62 years.The system achieves a levelized cost of energy(LCOE)of$0.276/kWh and significantly reduces dependence on diesel,producing 798,800 kWh annually fromwind energy.This research provides a replicable model for cost-effective,sustainable rural electrification,offering valuable insights for policymakers and energy planners seeking to expand electricity access in off-grid communities. 展开更多
关键词 Decentralized electrification demand assessment multi-tier framework South Sudan off-grid solutions payback period
在线阅读 下载PDF
FedStrag:Straggler-aware federated learning for low resource devices
17
作者 Aditya Kumar Satish Narayana Srirama 《Digital Communications and Networks》 2025年第4期1213-1223,共11页
Federated Learning(FL)has become a popular training paradigm in recent years.However,stragglers are critical bottlenecks in an Internet of Things(IoT)network while training.These nodes produce stale updates to the ser... Federated Learning(FL)has become a popular training paradigm in recent years.However,stragglers are critical bottlenecks in an Internet of Things(IoT)network while training.These nodes produce stale updates to the server,which slow down the convergence.In this paper,we studied the impact of the stale updates on the global model,which is observed to be significant.To address this,we propose a weighted averaging scheme,FedStrag,that optimizes the training with stale updates.The work is focused on training a model in an IoT network that has multiple challenges,such as resource constraints,stragglers,network issues,device heterogeneity,etc.To this end,we developed a time-bounded asynchronous FL paradigm that can train a model on the continuous iflow of data in the edge-fog-cloud continuum.To test the FedStrag approach,a model is trained with multiple stragglers scenarios on both Independent and Identically Distributed(IID)and non-IID datasets on Raspberry Pis.The experiment results suggest that the FedStrag outperforms the baseline FedAvg in all possible cases. 展开更多
关键词 Internet of things Decentralized training Fog computing Federated learning Distributed computing Straggler
在线阅读 下载PDF
Navigating the Blockchain Trilemma:A Review of Recent Advances and Emerging Solutions in Decentralization,Security,and Scalability Optimization
18
作者 Saha Reno Koushik Roy 《Computers, Materials & Continua》 2025年第8期2061-2119,共59页
The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneousl... The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneously continues to elude most blockchain systems,often forcing trade-offs that limit their real-world applicability.This review paper synthesizes current research efforts aimed at resolving the trilemma,focusing on innovative consensus mechanisms,sharding techniques,layer-2 protocols,and hybrid architectural models.We critically analyze recent breakthroughs,including Directed Acyclic Graph(DAG)-based structures,cross-chain interoperability frameworks,and zero-knowledge proof(ZKP)enhancements,which aimto reconcile scalability with robust security and decentralization.Furthermore,we evaluate the trade-offs inherent in these approaches,highlighting their practical implications for enterprise adoption,decentralized finance(DeFi),and Web3 ecosystems.By mapping the evolving landscape of solutions,this review identifies gaps in currentmethodologies and proposes future research directions,such as adaptive consensus algorithms and artificial intelligence-driven(AI-driven)governance models.Our analysis underscores that while no universal solution exists,interdisciplinary innovations are progressively narrowing the trilemma’s constraints,paving the way for next-generation blockchain infrastructures. 展开更多
关键词 Blockchain trilemma SCALABILITY DECENTRALIZATION SECURITY consensus algorithms sharding layer-2 solutions DAG-based architectures cross-chain interoperability blockchain optimization
在线阅读 下载PDF
Decentralized Federated Graph Learning via Surrogate Model
19
作者 Bolin Zhang Ruichun Gu Haiying Liu 《Computers, Materials & Continua》 2025年第2期2521-2535,共15页
Federated Graph Learning (FGL) enables model training without requiring each client to share local graph data, effectively breaking data silos by aggregating the training parameters from each terminal while safeguardi... Federated Graph Learning (FGL) enables model training without requiring each client to share local graph data, effectively breaking data silos by aggregating the training parameters from each terminal while safeguarding data privacy. Traditional FGL relies on a centralized server for model aggregation;however, this central server presents challenges such as a single point of failure and high communication overhead. Additionally, efficiently training a robust personalized local model for each client remains a significant objective in federated graph learning. To address these issues, we propose a decentralized Federated Graph Learning framework with efficient communication, termed Decentralized Federated Graph Learning via Surrogate Model (SD_FGL). In SD_FGL, each client is required to maintain two models: a private model and a surrogate model. The surrogate model is publicly shared and can exchange and update information directly with any client, eliminating the need for a central server and reducing communication overhead. The private model is independently trained by each client, allowing it to calculate similarity with other clients based on local data as well as information shared through the surrogate model. This enables the private model to better adjust its training strategy and selectively update its parameters. Additionally, local differential privacy is incorporated into the surrogate model training process to enhance privacy protection. Testing on three real-world graph datasets demonstrates that the proposed framework improves accuracy while achieving decentralized Federated Graph Learning with lower communication overhead and stronger privacy safeguards. 展开更多
关键词 Federated learning federated graph learning DECENTRALIZED graph neural network privacy preservation
在线阅读 下载PDF
Federated Learning and Blockchain Framework for Scalable and Secure IoT Access Control
20
作者 Ammar Odeh Anas Abu Taleb 《Computers, Materials & Continua》 2025年第7期447-461,共15页
The increasing deployment of Internet of Things(IoT)devices has introduced significant security chal-lenges,including identity spoofing,unauthorized access,and data integrity breaches.Traditional security mechanisms r... The increasing deployment of Internet of Things(IoT)devices has introduced significant security chal-lenges,including identity spoofing,unauthorized access,and data integrity breaches.Traditional security mechanisms rely on centralized frameworks that suffer from single points of failure,scalability issues,and inefficiencies in real-time security enforcement.To address these limitations,this study proposes the Blockchain-Enhanced Trust and Access Control for IoT Security(BETAC-IoT)model,which integrates blockchain technology,smart contracts,federated learning,and Merkle tree-based integrity verification to enhance IoT security.The proposed model eliminates reliance on centralized authentication by employing decentralized identity management,ensuring tamper-proof data storage,and automating access control through smart contracts.Experimental evaluation using a synthetic IoT dataset shows that the BETAC-IoT model improves access control enforcement accuracy by 92%,reduces device authentication time by 52%(from 2.5 to 1.2 s),and enhances threat detection efficiency by 7%(from 85%to 92%)using federated learning.Additionally,the hybrid blockchain architecture achieves a 300%increase in transaction throughput when comparing private blockchain performance(1200 TPS)to public chains(300 TPS).Access control enforcement accuracy was quantified through confusion matrix analysis,with high precision and minimal false positives observed across access decision categories.Although the model presents advantages in security and scalability,challenges such as computational overhead,blockchain storage constraints,and interoperability with existing IoT systems remain areas for future research.This study contributes to advancing decentralized security frameworks for IoT,providing a resilient and scalable solution for securing connected environments. 展开更多
关键词 Blockchain IoT security access control federated learning merkle tree decentralized identity manage-ment threat detection
在线阅读 下载PDF
上一页 1 2 21 下一页 到第
使用帮助 返回顶部