期刊文献+
共找到13,185篇文章
< 1 2 250 >
每页显示 20 50 100
Mitigating Blockchain Extractable Value threats by Distributed Transaction Sequencing Strategy
1
作者 Xiongfei Zhao Hou-Wan Long +2 位作者 Zhengzhe Li Jiangchuan Liu Yain-Whar Si 《Digital Communications and Networks》 2025年第5期1394-1409,共16页
The rapid growth of blockchain and Decentralized Finance(DeFi)has introduced new challenges and vulnerabilities that threaten the integrity and efficiency of the ecosystem.This study identifies critical issues such as... The rapid growth of blockchain and Decentralized Finance(DeFi)has introduced new challenges and vulnerabilities that threaten the integrity and efficiency of the ecosystem.This study identifies critical issues such as Transaction Order Dependence(TOD),Blockchain Extractable Value(BEV),and Transaction Importance Diversity(TID),which collectively undermine the fairness and security of DeFi systems.BEV-related activities,including sandwich attacks,liquidations,transaction replay etc.have emerged as significant threats,collectively generating$540.54 million in losses over 32 months across 11,289 addresses,involving 49,691 cryptocurrencies and 60,830 on-chain markets.These attacks exploit transaction mechanics to manipulate asset prices and extract value at the expense of other participants,with sandwich attacks being particularly impactful.Additionally,the growing adoption of blockchain in traditional finance highlights the challenge of TID,wherein high transaction volumes can strain systems and compromise time-sensitive operations.To address these pressing issues,we propose a novel Distributed Transaction Sequencing Strategy(DTSS)that integrates forking mechanisms with an Analytic Hierarchy Process(AHP)to enforce fair and transparent transaction ordering in a decentralized manner.Our approach is further enhanced by an optimization framework and the introduction of a Normalized Allocation Disparity Metric(NADM)that ensures optimal parameter selection for transaction prioritization.Experimental evaluations demonstrated that the DTSS effectively mitigated BEV risks,enhanced transaction fairness,and significantly improved the security and transparency of DeFi ecosystems. 展开更多
关键词 Blockchain transaction ordering Blockchain extractable value Distributed transaction sequencing strategy
在线阅读 下载PDF
A Semantics-based Cooperative Transaction Model
2
作者 申石磊 刘先省 《Chinese Quarterly Journal of Mathematics》 CSCD 2002年第1期52-57,共6页
In CSCW system, there are many long-time, cooperative, interactive transactions. Traditional transaction model and advanced transaction model do not effectively support transaction processing in CSCW system. In this p... In CSCW system, there are many long-time, cooperative, interactive transactions. Traditional transaction model and advanced transaction model do not effectively support transaction processing in CSCW system. In this paper, a semantics-based cooperative transaction model(SCTM) is put forward. This model is based on the semantics information of cooperative process and data objects, and can satisfy the demands of transaction processing in CSCW system. 展开更多
关键词 transactION sub-transaction cooperative transaction
在线阅读 下载PDF
Land transaction trajectories of China's overseas industrial parks in developing countries:Evidence from Southeast Asia 被引量:1
3
作者 LI Dongxue HU Qiao 《Journal of Geographical Sciences》 2025年第6期1286-1310,共25页
Foreign-funded overseas industrial parks(OIPs)are crucial for attracting foreign investment and promoting globalization in developing countries.However,large-scale land acquisition for these parks generates conflicts ... Foreign-funded overseas industrial parks(OIPs)are crucial for attracting foreign investment and promoting globalization in developing countries.However,large-scale land acquisition for these parks generates conflicts between developers and local stakeholders,increasing development costs.A qualitative multicase study was conducted in this study to analyze the land transaction trajectories of China's OIPs.Four OIPs were selected to reveal the underlying mechanisms from the perspectives of institutional arrangements,governance mechanisms,and enterprise heterogeneity.The findings indicate that in host countries with insufficient institutional development,local governments are more inclined to directly engage in OIP land acquisition.High-level intergovernmental mechanisms facilitate land acquisition processes,although their efficacy depends largely on administrative power allocation across parks in host countries.The results also indicate that enterprise characteristics significantly influence land acquisition,where microscale private enterprises lacking political connections often employ low-cost,bottom-up strategies by leveraging international experience.In summary,policy-makers in developing countries should prioritize enhancing OIP governance to mitigate transaction costs,promote diversified land supply,and optimize land allocation.By depicting China's OIP land acquisition processes,this study deepens the academic understanding of OIP governance in developing countries and related international land transactions,offering practical OIP management insights for governments in both host and parent countries. 展开更多
关键词 land transaction trajectories institutional arrangements governance mechanisms enterprise heterogeneity overseas industrial parks developing countries
原文传递
Peer-to-peer transaction with voltage management strategy in distribution network considering trading risk
4
作者 Lei Dong Kuang Zhang +3 位作者 Shiming Zhang Tao Zhang Ye Li Ji Qiao 《Global Energy Interconnection》 2025年第4期685-699,共15页
P2P trading is driving the decentralization of the electricity market,the autonomy and privacy requirements of prosumers may intro-duce safety risks such as voltage violations.Existing security management methods base... P2P trading is driving the decentralization of the electricity market,the autonomy and privacy requirements of prosumers may intro-duce safety risks such as voltage violations.Existing security management methods based on price guidance may face unsolvable situa-tions in trading scenarios and have difficulty assessing the impact of P2P transactions on voltage security.To this end,this paper proposes a novel distribution system operator(DSO)-prosumers bi-level optimization framework incorporating the dynamic operating envelope(DOE)and risk coefficient-based network usage charge(RC-NUC).In the upper-level,the DOE is employed for dynamic voltage man-agement to prevent violations while the RC-NUC further guides prosumers to engage in grid-friendly transactions.The lower-level decen-tralized market enables prosumers to optimize trading decisions autonomously.Only price signals and energy quantities are exchanged between the two levels,ensuring the privacy of both parties.Additionally,an alternating direction method of multipliers(ADMM)with adaptive penalty factor is introduced to improve computational efficiency.Case studies on a modified IEEE 33-bus system demonstrate that the proposed method reduces voltage violation risks by 18.31%and enhances trading efficiency by 32.3%.These results highlight the feasibility and effectiveness of the approach in advancing secure and efficient distributed energy transactions. 展开更多
关键词 P2P transaction DOE RC-NUC Distribution network Distributed algorithm
在线阅读 下载PDF
A Hybrid Feature Selection and Clustering-Based Ensemble Learning Approach for Real-Time Fraud Detection in Financial Transactions
5
作者 Naif Almusallam Junaid Qayyum 《Computers, Materials & Continua》 2025年第11期3653-3687,共35页
This paper proposes a novel hybrid fraud detection framework that integrates multi-stage feature selection,unsupervised clustering,and ensemble learning to improve classification performance in financial transaction m... This paper proposes a novel hybrid fraud detection framework that integrates multi-stage feature selection,unsupervised clustering,and ensemble learning to improve classification performance in financial transaction monitoring systems.The framework is structured into three core layers:(1)feature selection using Recursive Feature Elimination(RFE),Principal Component Analysis(PCA),and Mutual Information(MI)to reduce dimensionality and enhance input relevance;(2)anomaly detection through unsupervised clustering using K-Means,Density-Based Spatial Clustering(DBSCAN),and Hierarchical Clustering to flag suspicious patterns in unlabeled data;and(3)final classification using a voting-based hybrid ensemble of Support Vector Machine(SVM),Random Forest(RF),and Gradient Boosting Classifier(GBC).The experimental evaluation is conducted on a synthetically generated dataset comprising one million financial transactions,with 5% labelled as fraudulent,simulating realistic fraud rates and behavioural features,including transaction time,origin,amount,and geo-location.The proposed model demonstrated a significant improvement over baseline classifiers,achieving an accuracy of 99%,a precision of 99%,a recall of 97%,and an F1-score of 99%.Compared to individual models,it yielded a 9% gain in overall detection accuracy.It reduced the false positive rate to below 3.5%,thereby minimising the operational costs associated with manually reviewing false alerts.The model’s interpretability is enhanced by the integration of Shapley Additive Explanations(SHAP)values for feature importance,supporting transparency and regulatory auditability.These results affirm the practical relevance of the proposed system for deployment in real-time fraud detection scenarios such as credit card transactions,mobile banking,and cross-border payments.The study also highlights future directions,including the deployment of lightweight models and the integration of multimodal data for scalable fraud analytics. 展开更多
关键词 Fraud detection financial transactions economic impact feature selection CLUSTERING ensemble learning
在线阅读 下载PDF
Digital Transformation Drives the Upgrade of Corporate Accounting Functions:The Transformation Path from Transactional to Value Management-Oriented
6
作者 Hang Guo 《Proceedings of Business and Economic Studies》 2025年第6期114-120,共7页
The global wave of digitalization has accelerated the process of corporate digital transformation,placing higher demands on financial and accounting management.Since then,accounting work has shifted from the tradition... The global wave of digitalization has accelerated the process of corporate digital transformation,placing higher demands on financial and accounting management.Since then,accounting work has shifted from the traditional transactional model to a modern value management-oriented model,leading to a transformation of accounting functions.As corporate managers,they must advance their work proactively,empower the modernization and innovation of financial accounting with digital technology,and transition to management accounting to ensure enterprises keep pace with the times.Therefore,this paper explores the current status of corporate financial and accounting work amid the digital wave,identifies the challenges in the transformation of accounting from transactional to value management-oriented,and finally proposes several feasible and effective improvement strategies,aiming to provide more references for relevant practitioners. 展开更多
关键词 Accounting functions DIGITALIZATION Enterprises transactional(accounting) Value management-oriented(accounting)
在线阅读 下载PDF
HNND:Hybrid Neural Network Detection for Blockchain Abnormal Transaction Behaviors
7
作者 Jiling Wan Lifeng Cao +2 位作者 Jinlong Bai Jinhui Li Xuehui Du 《Computers, Materials & Continua》 2025年第6期4775-4794,共20页
Blockchain platform swith the unique characteristics of anonymity,decentralization,and transparency of their transactions,which are faced with abnormal activities such as money laundering,phishing scams,and fraudulent... Blockchain platform swith the unique characteristics of anonymity,decentralization,and transparency of their transactions,which are faced with abnormal activities such as money laundering,phishing scams,and fraudulent behavior,posing a serious threat to account asset security.For these potential security risks,this paper proposes a hybrid neural network detection method(HNND)that learns multiple types of account features and enhances fusion information among them to effectively detect abnormal transaction behaviors in the blockchain.In HNND,the Temporal Transaction Graph Attention Network(T2GAT)is first designed to learn biased aggregation representation of multi-attribute transactions among nodes,which can capture key temporal information from node neighborhood transactions.Then,the Graph Convolutional Network(GCN)is adopted which captures abstract structural features of the transaction network.Further,the Stacked Denoising Autoencode(SDA)is developed to achieve adaptive fusion of thses features from different modules.Moreover,the SDA enhances robustness and generalization ability of node representation,leading to higher binary classification accuracy in detecting abnormal behaviors of blockchain accounts.Evaluations on a real-world abnormal transaction dataset demonstrate great advantages of the proposed HNND method over other compared methods. 展开更多
关键词 Blockchain security abnormal transaction detection network representation learning hybrid neural network
在线阅读 下载PDF
A Blockchain Cross-Chain Transaction Protection Scheme Based on FHE
8
作者 Hongliang Tian Zuoqing Li 《Computers, Materials & Continua》 2025年第3期3983-4002,共20页
Low data encryption efficiency and inadequate security are two issues with the current blockchain cross-chain transaction protection schemes.To address these issues,a blockchain cross-chain transaction protection sche... Low data encryption efficiency and inadequate security are two issues with the current blockchain cross-chain transaction protection schemes.To address these issues,a blockchain cross-chain transaction protection scheme based on Fully Homomorphic Encryption(FHE)is proposed.In the proposed scheme,the functional relationship is established by Box-Muller,Discrete Gaussian Distribution Function(DGDF)and Uniform Random Distribution Func-tion(URDF)are used to improve the security and efficiency of key generation.Subsequently,the data preprocessing function is introduced to perform cleaning,deduplication,and normalization operations on the transaction data of multi-key signature,and it is classified into interactive data and asset data,so as to perform different homomorphic operations in the FHE encryption stage.Ultimately,in the FHE encryption stage,homomorphic multiplication and homomorphic addition are used targeted for the interactive data and asset data,thereby reducing the computational complexity and enhancing the FHE encryption efficiency.The significance of the proposed scheme is proved by experimental results:Firstly,the multi-key generation function and its specific sampling method and transformation ensure the security and efficiency of key generation.Data preprocessing can also accelerate the FHE encryption process by eliminating invalid data and redundancy,so the FHE encryption efficiency is significantly improved.Secondly,the FHE encryption method based on discrete logarithm problem enhances the security of transaction data and can effectively resist multiple attacks.In addition,the preprocessed data also has good performance in capacity storage.The proposed scheme has significant impacts on key indicators such as encryption efficiency and security,it provides a new reference for blockchain cross-chain transaction protection technology and has an important impact on the security improvement of various cross-chain transaction data. 展开更多
关键词 Blockchain cross-chain transactions fully homomorphic encryption(FHE)
在线阅读 下载PDF
Data Flow&Transaction Mode Classification and An Explorative Estimation on Data Storage&Transaction Volume 被引量:4
9
作者 Cai Yuezhou Liu Yuexin 《China Economist》 2022年第6期78-112,共35页
The public has shown great interest in the data factor and data transactions,but the current attention is overly focused on personal behavioral data and transactions happening at Data Exchanges.To deliver a complete p... The public has shown great interest in the data factor and data transactions,but the current attention is overly focused on personal behavioral data and transactions happening at Data Exchanges.To deliver a complete picture of data flaw and transaction,this paper presents a systematic overview of the flow and transaction of personal,corporate and public data on the basis of data factor classification from various perspectives.By utilizing various sources of information,this paper estimates the volume of data generation&storage and the volume&trend of data market transactions for major economies in the world with the following findings:(i)Data classification is diverse due to a broad variety of applying scenarios,and data transaction and profit distribution are complex due to heterogenous entities,ownerships,information density and other attributes of different data types.(ii)Global data transaction has presented with the characteristics of productization,servitization and platform-based mode.(iii)For major economies,there is a commonly observed disequilibrium between data generation scale and storage scale,which is particularly striking for China.(i^v)The global data market is in a nascent stage of rapid development with a transaction volume of about 100 billion US dollars,and China s data market is even more underdeveloped and only accounts for some 10%of the world total.All sectors of the society should be flly aware of the diversity and complexity of data factor classification and data transactions,as well as the arduous and long-term nature of developing and improving relevant institutional systems.Adapting to such features,efforts should be made to improve data classification,enhance computing infrastructure development,foster professional data transaction and development institutions,and perfect the data governance system. 展开更多
关键词 Data factor data classification data transaction mode data generation&storage volume data transaction volume
在线阅读 下载PDF
Blockchain Based Enhanced ERP Transaction Integrity Architecture and PoET Consensus 被引量:1
10
作者 Tehreem Aslam Ayesha Maqbool +4 位作者 Maham Akhtar Alina Mirza Muhammad Anees Khan Wazir Zada Khan Shadab Alam 《Computers, Materials & Continua》 SCIE EI 2022年第1期1089-1109,共21页
Enterprise Resource Planning(ERP)software is extensively used for the management of business processes.ERP offers a system of integrated applications with a shared central database.Storing all business-critical inform... Enterprise Resource Planning(ERP)software is extensively used for the management of business processes.ERP offers a system of integrated applications with a shared central database.Storing all business-critical information in a central place raises various issues such as data integrity assurance and a single point of failure,which makes the database vulnerable.This paper investigates database and Blockchain integration,where the Blockchain network works in synchronization with the database system,and offers a mechanism to validate the transactions and ensure data integrity.Limited research exists on Blockchain-based solutions for the single point of failure in ERP.We established in our study that for concurrent access control andmonitoring of ERP,private permissioned Blockchain using Proof of Elapsed Time consensus is more suitable.The study also investigated the bottleneck issue of transaction processing rates(TPR)of Blockchain consensus,specifically ERP’s TPR.The paper presents systemarchitecture that integrates Blockchain with an ERP system using an application interface. 展开更多
关键词 transaction security enterprise systems blockchain transaction integrity hyperledger sawtooth PoET consensus
在线阅读 下载PDF
Throughput-oriented associated transaction assignment in sharding blockchains for IoT social data storage 被引量:1
11
作者 Liping Tao Yang Lu +2 位作者 Xu Ding Yuqi Fan Jung Yoon Kim 《Digital Communications and Networks》 SCIE CSCD 2022年第6期885-899,共15页
Blockchain is a viable solution to provide data integrity for the enormous volume of 5G IoT social data, while we need to break through the throughput bottleneck of blockchain. Sharding is a promising technology to so... Blockchain is a viable solution to provide data integrity for the enormous volume of 5G IoT social data, while we need to break through the throughput bottleneck of blockchain. Sharding is a promising technology to solve the problem of low throughput in blockchains. However, cross-shard communication hinders the effective improvement of blockchain throughput. Therefore, it is critical to reasonably allocate transactions to different shards to improve blockchain throughput. Existing research on blockchain sharding mainly focuses on shards formation, configuration, and consensus, while ignoring the negative impact of cross-shard communication on blockchain throughput. Aiming to maximize the throughput of transaction processing, we study how to allocate blockchain transactions to shards in this paper. We propose an Associated Transaction assignment algorithm based on Closest Fit (ATCF). ATCF classifies associated transactions into transaction groups which are then assigned to different shards in the non-ascending order of transaction group sizes periodically. Within each epoch, ATCF tries to select a shard that can handle all the transactions for each transaction group. If there are multiple such shards, ATCF selects the shard with the remaining processing capacity closest to the number of transactions in the transaction group. When no such shard exists, ATCF chooses the shard with the largest remaining processing capacity for the transaction group. The transaction groups that cannot be completely processed within the current epoch will be allocated in the subsequent epochs. We prove that ATCF is a 2-approximation algorithm for the associated transaction assignment problem. Simulation results show that ATCF can effectively improve the blockchain throughput and reduce the number of cross-shard transactions. 展开更多
关键词 IoT social data Blockchain Shar ding Associated transactions transaction assi gnment
在线阅读 下载PDF
An Interoperability Cross-Block Chain Framework for Secure Transactions in IoT
12
作者 N.Anand Kumar A.Grace Selvarani P.Vivekanandan 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期1077-1090,共14页
The purpose of this research is to deal with effective block chain framework for secure transactions.The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved ... The purpose of this research is to deal with effective block chain framework for secure transactions.The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved in Blockchain and to tackle this issue,Cross-Chain based Transaction(CCT)is introduced.Traditional industries have been restructured by the introduction of Internet of Things(IoT)to become smart industries through the feature of data-driven decision-making.Still,there are a few limitations,like decentralization,security vulnerabilities,poor interoperability,as well as privacy concerns in IoTs.To overcome this limitation,Blockchain has been employed to assure a safer transaction process,especially in asset exchanges.In recent decades,scalable local ledgers implement Blockchains,simultaneously sustaining peer validations of transactions which can be at local or global levels.From the single Hyperledger-based blockchains system,the CCT takes the transaction amid various chains.In addition,the most significant factor for this registration processing strategy is the Signature to ensure security.The application of the Quantum cryptographic algorithm amplifies the proposed Hyperledger-based blockchains,to strengthen the safety of the process.The key has been determined by restricting the number of transactions that reach the global Blockchain using the quantum-based hash function and accomplished by scalable local ledgers,and peer validations of transactions at local and global levels without any issues.The rate of transaction processing for entire peers has enhanced with the ancillary aid of the proposed solution,as it includes the procedure of load distribution.Without any boosted enhancement,the recommended solution utilizes the current transaction strategy,and also,it’s aimed at scalability,resource conservation,and interoperability.The experimental results of the system have been evaluated using the metrics like block weight,ledger memory,the usage of the central processing unit,and the communication overhead. 展开更多
关键词 Internet of Things(IoT) scalability blockchain INTEROPERABILITY security ledger size transaction rate cross-chain based transaction(CCT) quantum cryptographic algorithm
在线阅读 下载PDF
Securing Stock Transactions Using Blockchain Technology: Architecture for Identifying and Reducing Vulnerabilities Linked to the Web Applications Used (MAHV-BC)
13
作者 Kpinna Tiekoura Coulibaly Abdou Maïga +1 位作者 Jerome Diako Moustapha Diaby 《Open Journal of Applied Sciences》 2023年第11期2080-2093,共14页
This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data ... This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data in the stock market being crucial, the implementation of robust systems which guarantee trust between the different actors is essential. We therefore proposed, after analyzing the limits of several security approaches in the literature, an architecture based on blockchain technology making it possible to both identify and reduce the vulnerabilities linked to the design, implementation work or the use of web applications used for transactions. Our proposal makes it possible, thanks to two-factor authentication via the Blockchain, to strengthen the security of investors’ accounts and the automated recording of transactions in the Blockchain while guaranteeing the integrity of stock market operations. It also provides an application vulnerability report. To validate our approach, we compared our results to those of three other security tools, at the level of different metrics. Our approach achieved the best performance in each case. 展开更多
关键词 Stock Market transactions Action Smart Contracts ARCHITECTURE Security Vulnerability Web Applications Blockchain and Finance Cryptography Authentication Data Integrity transaction Confidentiality Trust Economy
在线阅读 下载PDF
基于Transaction模式的SoC软硬件协同验证策略 被引量:1
14
作者 魏小义 李平 +1 位作者 廖永波 贾宇明 《陕西理工学院学报(自然科学版)》 2006年第2期42-45,共4页
SoC的验证越来越成为集成电路发展的突出问题,而传统的信号级别的验证方法由于工作量巨大,已经很难满足系统的要求。研究了基于Transaction模式的验证方法,并通过开发的验证平台,用实验进行了验证。该方法在Transaction级别上实现对系... SoC的验证越来越成为集成电路发展的突出问题,而传统的信号级别的验证方法由于工作量巨大,已经很难满足系统的要求。研究了基于Transaction模式的验证方法,并通过开发的验证平台,用实验进行了验证。该方法在Transaction级别上实现对系统的验证,提高了验证速度,可以缩短设计周期,降低设计成本。 展开更多
关键词 transaction模式 SOC SYSTEMC 验证
在线阅读 下载PDF
Design of ECC based Secured Cloud Storage Mechanism for Transaction Rich Applications 被引量:5
15
作者 V.Gopinath R.S.Bhuvaneswaran 《Computers, Materials & Continua》 SCIE EI 2018年第11期341-352,共12页
Cloud computing is the highly demanded technology nowadays.Due to the service oriented architecture,seamless accessibility and other advantages of this advent technology,many transaction rich applications are making u... Cloud computing is the highly demanded technology nowadays.Due to the service oriented architecture,seamless accessibility and other advantages of this advent technology,many transaction rich applications are making use of it.At the same time,it is vulnerable to hacks and threats.Hence securing this environment is of at most important and many research works are being reported focusing on it.This paper proposes a safe storage mechanism using Elliptic curve cryptography(ECC)for the Transaction Rich Applications(TRA).With ECC based security scheme,the security level of the protected system will be increased and it is more suitable to secure the delivered data in the portable devices.The proposed scheme shields the aligning of different kind of data elements to each provider using an ECC algorithm.Analysis,comparison and simulation prove that the proposed system is more effective and secure for the Transaction rich applications in Cloud. 展开更多
关键词 ECC SSL VPN cloud computing BANKING security transaction rich applications
在线阅读 下载PDF
Nested Transaction Concurrency Control in Parallel Real-Time Dat-abases 被引量:7
16
作者 潘怡 卢炎生 《Journal of Donghua University(English Edition)》 EI CAS 2005年第2期114-119,共6页
An integrated method for concurrency control in parallel real-time databases has been proposed in this paper. The nested transaction model has been investigated to offer more atomic execution units and finer grained c... An integrated method for concurrency control in parallel real-time databases has been proposed in this paper. The nested transaction model has been investigated to offer more atomic execution units and finer grained control within in a transaction. Based on the classical nested locking protocol and the speculative concurrency control approach, a two-shadow adaptive concurrency control protocol, which combines the Sacrifice based Optimistic Concurrency Control (OPT-Sacrifice) and High Priority two-phase locking (HP2PL) algorithms together to support both optimistic and pessimistic shadow of each sub-transaction, has been proposed to increase the likelihood of successful timely commitment and to avoid unnecessary replication overload. 展开更多
关键词 Parallel Database Peal-Time Database Nested transaction Concurrency Control
在线阅读 下载PDF
A Storage Optimization Scheme for Blockchain Transaction Databases 被引量:7
17
作者 Jingyu Zhang Siqi Zhong +2 位作者 Jin Wang Xiaofeng Yu Osama Alfarraj 《Computer Systems Science & Engineering》 SCIE EI 2021年第3期521-535,共15页
As the typical peer-to-peer distributed networks, blockchain systemsrequire each node to copy a complete transaction database, so as to ensure newtransactions can by verified independently. In a blockchain system (e.g... As the typical peer-to-peer distributed networks, blockchain systemsrequire each node to copy a complete transaction database, so as to ensure newtransactions can by verified independently. In a blockchain system (e.g., bitcoinsystem), the node does not rely on any central organization, and every node keepsan entire copy of the transaction database. However, this feature determines thatthe size of blockchain transaction database is growing rapidly. Therefore, with thecontinuous system operations, the node memory also needs to be expanded tosupport the system running. Especially in the big data era, the increasing networktraffic will lead to faster transaction growth rate. This paper analyzes blockchaintransaction databases and proposes a storage optimization scheme. The proposedscheme divides blockchain transaction database into cold zone and hot zone usingexpiration recognition method based on Least Recently Used (LRU) algorithm. Itcan achieve storage optimization by moving unspent transaction outputs outsidethe in-memory transaction databases. We present the theoretical analysis on theoptimization method to validate the effectiveness. Extensive experiments showour proposed method outperforms the current mechanism for the blockchaintransaction databases. 展开更多
关键词 Blockchain distributed systems transaction databases
在线阅读 下载PDF
Optimized scheduling of integrated energy systems for low carbon economy considering carbon transaction costs 被引量:3
18
作者 Chao Liu Weiru Wang +2 位作者 Jing Li Xinyuan Liu Yongning Chi 《Global Energy Interconnection》 EI CSCD 2024年第4期377-390,共14页
With the introduction of the“dual carbon”goal and the continuous promotion of low-carbon development,the integrated energy system(IES)has gradually become an effective way to save energy and reduce emissions.This st... With the introduction of the“dual carbon”goal and the continuous promotion of low-carbon development,the integrated energy system(IES)has gradually become an effective way to save energy and reduce emissions.This study proposes a low-carbon economic optimization scheduling model for an IES that considers carbon trading costs.With the goal of minimizing the total operating cost of the IES and considering the transferable and curtailable characteristics of the electric and thermal flexible loads,an optimal scheduling model of the IES that considers the cost of carbon trading and flexible loads on the user side was established.The role of flexible loads in improving the economy of an energy system was investigated using examples,and the rationality and effectiveness of the study were verified through a comparative analysis of different scenarios.The results showed that the total cost of the system in different scenarios was reduced by 18.04%,9.1%,3.35%,and 7.03%,respectively,whereas the total carbon emissions of the system were reduced by 65.28%,20.63%,3.85%,and 18.03%,respectively,when the carbon trading cost and demand-side flexible electric and thermal load responses were considered simultaneously.Flexible electrical and thermal loads did not have the same impact on the system performance.In the analyzed case,the total cost and carbon emissions of the system when only the flexible electrical load response was considered were lower than those when only the flexible thermal load response was taken into account.Photovoltaics have an excess of carbon trading credits and can profit from selling them,whereas other devices have an excess of carbon trading and need to buy carbon credits. 展开更多
关键词 Demand response Combined cooling Heating and power system Carbon transaction costs Flexible electric and thermal loads Optimal scheduling
在线阅读 下载PDF
Massive Files Prefetching Model Based on LSTM Neural Network with Cache Transaction Strategy 被引量:3
19
作者 Dongjie Zhu Haiwen Du +6 位作者 Yundong Sun Xiaofang Li Rongning Qu Hao Hu Shuangshuang Dong Helen Min Zhou Ning Cao 《Computers, Materials & Continua》 SCIE EI 2020年第5期979-993,共15页
In distributed storage systems,file access efficiency has an important impact on the real-time nature of information forensics.As a popular approach to improve file accessing efficiency,prefetching model can fetches d... In distributed storage systems,file access efficiency has an important impact on the real-time nature of information forensics.As a popular approach to improve file accessing efficiency,prefetching model can fetches data before it is needed according to the file access pattern,which can reduce the I/O waiting time and increase the system concurrency.However,prefetching model needs to mine the degree of association between files to ensure the accuracy of prefetching.In the massive small file situation,the sheer volume of files poses a challenge to the efficiency and accuracy of relevance mining.In this paper,we propose a massive files prefetching model based on LSTM neural network with cache transaction strategy to improve file access efficiency.Firstly,we propose a file clustering algorithm based on temporal locality and spatial locality to reduce the computational complexity.Secondly,we propose a definition of cache transaction according to files occurrence in cache instead of time-offset distance based methods to extract file block feature accurately.Lastly,we innovatively propose a file access prediction algorithm based on LSTM neural network which predict the file that have high possibility to be accessed.Experiments show that compared with the traditional LRU and the plain grouping methods,the proposed model notably increase the cache hit rate and effectively reduces the I/O wait time. 展开更多
关键词 Massive files prefetching model cache transaction distributed storage systems LSTM neural network
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部