期刊文献+
共找到426篇文章
< 1 2 22 >
每页显示 20 50 100
Land transaction trajectories of China's overseas industrial parks in developing countries:Evidence from Southeast Asia 被引量:1
1
作者 LI Dongxue HU Qiao 《Journal of Geographical Sciences》 2025年第6期1286-1310,共25页
Foreign-funded overseas industrial parks(OIPs)are crucial for attracting foreign investment and promoting globalization in developing countries.However,large-scale land acquisition for these parks generates conflicts ... Foreign-funded overseas industrial parks(OIPs)are crucial for attracting foreign investment and promoting globalization in developing countries.However,large-scale land acquisition for these parks generates conflicts between developers and local stakeholders,increasing development costs.A qualitative multicase study was conducted in this study to analyze the land transaction trajectories of China's OIPs.Four OIPs were selected to reveal the underlying mechanisms from the perspectives of institutional arrangements,governance mechanisms,and enterprise heterogeneity.The findings indicate that in host countries with insufficient institutional development,local governments are more inclined to directly engage in OIP land acquisition.High-level intergovernmental mechanisms facilitate land acquisition processes,although their efficacy depends largely on administrative power allocation across parks in host countries.The results also indicate that enterprise characteristics significantly influence land acquisition,where microscale private enterprises lacking political connections often employ low-cost,bottom-up strategies by leveraging international experience.In summary,policy-makers in developing countries should prioritize enhancing OIP governance to mitigate transaction costs,promote diversified land supply,and optimize land allocation.By depicting China's OIP land acquisition processes,this study deepens the academic understanding of OIP governance in developing countries and related international land transactions,offering practical OIP management insights for governments in both host and parent countries. 展开更多
关键词 land transaction trajectories institutional arrangements governance mechanisms enterprise heterogeneity overseas industrial parks developing countries
原文传递
Peer-to-peer transaction with voltage management strategy in distribution network considering trading risk
2
作者 Lei Dong Kuang Zhang +3 位作者 Shiming Zhang Tao Zhang Ye Li Ji Qiao 《Global Energy Interconnection》 2025年第4期685-699,共15页
P2P trading is driving the decentralization of the electricity market,the autonomy and privacy requirements of prosumers may intro-duce safety risks such as voltage violations.Existing security management methods base... P2P trading is driving the decentralization of the electricity market,the autonomy and privacy requirements of prosumers may intro-duce safety risks such as voltage violations.Existing security management methods based on price guidance may face unsolvable situa-tions in trading scenarios and have difficulty assessing the impact of P2P transactions on voltage security.To this end,this paper proposes a novel distribution system operator(DSO)-prosumers bi-level optimization framework incorporating the dynamic operating envelope(DOE)and risk coefficient-based network usage charge(RC-NUC).In the upper-level,the DOE is employed for dynamic voltage man-agement to prevent violations while the RC-NUC further guides prosumers to engage in grid-friendly transactions.The lower-level decen-tralized market enables prosumers to optimize trading decisions autonomously.Only price signals and energy quantities are exchanged between the two levels,ensuring the privacy of both parties.Additionally,an alternating direction method of multipliers(ADMM)with adaptive penalty factor is introduced to improve computational efficiency.Case studies on a modified IEEE 33-bus system demonstrate that the proposed method reduces voltage violation risks by 18.31%and enhances trading efficiency by 32.3%.These results highlight the feasibility and effectiveness of the approach in advancing secure and efficient distributed energy transactions. 展开更多
关键词 P2P transaction DOE RC-NUC Distribution network Distributed algorithm
在线阅读 下载PDF
HNND:Hybrid Neural Network Detection for Blockchain Abnormal Transaction Behaviors
3
作者 Jiling Wan Lifeng Cao +2 位作者 Jinlong Bai Jinhui Li Xuehui Du 《Computers, Materials & Continua》 2025年第6期4775-4794,共20页
Blockchain platform swith the unique characteristics of anonymity,decentralization,and transparency of their transactions,which are faced with abnormal activities such as money laundering,phishing scams,and fraudulent... Blockchain platform swith the unique characteristics of anonymity,decentralization,and transparency of their transactions,which are faced with abnormal activities such as money laundering,phishing scams,and fraudulent behavior,posing a serious threat to account asset security.For these potential security risks,this paper proposes a hybrid neural network detection method(HNND)that learns multiple types of account features and enhances fusion information among them to effectively detect abnormal transaction behaviors in the blockchain.In HNND,the Temporal Transaction Graph Attention Network(T2GAT)is first designed to learn biased aggregation representation of multi-attribute transactions among nodes,which can capture key temporal information from node neighborhood transactions.Then,the Graph Convolutional Network(GCN)is adopted which captures abstract structural features of the transaction network.Further,the Stacked Denoising Autoencode(SDA)is developed to achieve adaptive fusion of thses features from different modules.Moreover,the SDA enhances robustness and generalization ability of node representation,leading to higher binary classification accuracy in detecting abnormal behaviors of blockchain accounts.Evaluations on a real-world abnormal transaction dataset demonstrate great advantages of the proposed HNND method over other compared methods. 展开更多
关键词 Blockchain security abnormal transaction detection network representation learning hybrid neural network
在线阅读 下载PDF
A Hybrid Feature Selection and Clustering-Based Ensemble Learning Approach for Real-Time Fraud Detection in Financial Transactions
4
作者 Naif Almusallam Junaid Qayyum 《Computers, Materials & Continua》 2025年第11期3653-3687,共35页
This paper proposes a novel hybrid fraud detection framework that integrates multi-stage feature selection,unsupervised clustering,and ensemble learning to improve classification performance in financial transaction m... This paper proposes a novel hybrid fraud detection framework that integrates multi-stage feature selection,unsupervised clustering,and ensemble learning to improve classification performance in financial transaction monitoring systems.The framework is structured into three core layers:(1)feature selection using Recursive Feature Elimination(RFE),Principal Component Analysis(PCA),and Mutual Information(MI)to reduce dimensionality and enhance input relevance;(2)anomaly detection through unsupervised clustering using K-Means,Density-Based Spatial Clustering(DBSCAN),and Hierarchical Clustering to flag suspicious patterns in unlabeled data;and(3)final classification using a voting-based hybrid ensemble of Support Vector Machine(SVM),Random Forest(RF),and Gradient Boosting Classifier(GBC).The experimental evaluation is conducted on a synthetically generated dataset comprising one million financial transactions,with 5% labelled as fraudulent,simulating realistic fraud rates and behavioural features,including transaction time,origin,amount,and geo-location.The proposed model demonstrated a significant improvement over baseline classifiers,achieving an accuracy of 99%,a precision of 99%,a recall of 97%,and an F1-score of 99%.Compared to individual models,it yielded a 9% gain in overall detection accuracy.It reduced the false positive rate to below 3.5%,thereby minimising the operational costs associated with manually reviewing false alerts.The model’s interpretability is enhanced by the integration of Shapley Additive Explanations(SHAP)values for feature importance,supporting transparency and regulatory auditability.These results affirm the practical relevance of the proposed system for deployment in real-time fraud detection scenarios such as credit card transactions,mobile banking,and cross-border payments.The study also highlights future directions,including the deployment of lightweight models and the integration of multimodal data for scalable fraud analytics. 展开更多
关键词 Fraud detection financial transactions economic impact feature selection CLUSTERING ensemble learning
在线阅读 下载PDF
Digital Transformation Drives the Upgrade of Corporate Accounting Functions:The Transformation Path from Transactional to Value Management-Oriented
5
作者 Hang Guo 《Proceedings of Business and Economic Studies》 2025年第6期114-120,共7页
The global wave of digitalization has accelerated the process of corporate digital transformation,placing higher demands on financial and accounting management.Since then,accounting work has shifted from the tradition... The global wave of digitalization has accelerated the process of corporate digital transformation,placing higher demands on financial and accounting management.Since then,accounting work has shifted from the traditional transactional model to a modern value management-oriented model,leading to a transformation of accounting functions.As corporate managers,they must advance their work proactively,empower the modernization and innovation of financial accounting with digital technology,and transition to management accounting to ensure enterprises keep pace with the times.Therefore,this paper explores the current status of corporate financial and accounting work amid the digital wave,identifies the challenges in the transformation of accounting from transactional to value management-oriented,and finally proposes several feasible and effective improvement strategies,aiming to provide more references for relevant practitioners. 展开更多
关键词 Accounting functions DIGITALIZATION Enterprises transactional(accounting) Value management-oriented(accounting)
在线阅读 下载PDF
A Blockchain Cross-Chain Transaction Protection Scheme Based on FHE
6
作者 Hongliang Tian Zuoqing Li 《Computers, Materials & Continua》 2025年第3期3983-4002,共20页
Low data encryption efficiency and inadequate security are two issues with the current blockchain cross-chain transaction protection schemes.To address these issues,a blockchain cross-chain transaction protection sche... Low data encryption efficiency and inadequate security are two issues with the current blockchain cross-chain transaction protection schemes.To address these issues,a blockchain cross-chain transaction protection scheme based on Fully Homomorphic Encryption(FHE)is proposed.In the proposed scheme,the functional relationship is established by Box-Muller,Discrete Gaussian Distribution Function(DGDF)and Uniform Random Distribution Func-tion(URDF)are used to improve the security and efficiency of key generation.Subsequently,the data preprocessing function is introduced to perform cleaning,deduplication,and normalization operations on the transaction data of multi-key signature,and it is classified into interactive data and asset data,so as to perform different homomorphic operations in the FHE encryption stage.Ultimately,in the FHE encryption stage,homomorphic multiplication and homomorphic addition are used targeted for the interactive data and asset data,thereby reducing the computational complexity and enhancing the FHE encryption efficiency.The significance of the proposed scheme is proved by experimental results:Firstly,the multi-key generation function and its specific sampling method and transformation ensure the security and efficiency of key generation.Data preprocessing can also accelerate the FHE encryption process by eliminating invalid data and redundancy,so the FHE encryption efficiency is significantly improved.Secondly,the FHE encryption method based on discrete logarithm problem enhances the security of transaction data and can effectively resist multiple attacks.In addition,the preprocessed data also has good performance in capacity storage.The proposed scheme has significant impacts on key indicators such as encryption efficiency and security,it provides a new reference for blockchain cross-chain transaction protection technology and has an important impact on the security improvement of various cross-chain transaction data. 展开更多
关键词 Blockchain cross-chain transactions fully homomorphic encryption(FHE)
在线阅读 下载PDF
Optimized scheduling of integrated energy systems for low carbon economy considering carbon transaction costs 被引量:3
7
作者 Chao Liu Weiru Wang +2 位作者 Jing Li Xinyuan Liu Yongning Chi 《Global Energy Interconnection》 EI CSCD 2024年第4期377-390,共14页
With the introduction of the“dual carbon”goal and the continuous promotion of low-carbon development,the integrated energy system(IES)has gradually become an effective way to save energy and reduce emissions.This st... With the introduction of the“dual carbon”goal and the continuous promotion of low-carbon development,the integrated energy system(IES)has gradually become an effective way to save energy and reduce emissions.This study proposes a low-carbon economic optimization scheduling model for an IES that considers carbon trading costs.With the goal of minimizing the total operating cost of the IES and considering the transferable and curtailable characteristics of the electric and thermal flexible loads,an optimal scheduling model of the IES that considers the cost of carbon trading and flexible loads on the user side was established.The role of flexible loads in improving the economy of an energy system was investigated using examples,and the rationality and effectiveness of the study were verified through a comparative analysis of different scenarios.The results showed that the total cost of the system in different scenarios was reduced by 18.04%,9.1%,3.35%,and 7.03%,respectively,whereas the total carbon emissions of the system were reduced by 65.28%,20.63%,3.85%,and 18.03%,respectively,when the carbon trading cost and demand-side flexible electric and thermal load responses were considered simultaneously.Flexible electrical and thermal loads did not have the same impact on the system performance.In the analyzed case,the total cost and carbon emissions of the system when only the flexible electrical load response was considered were lower than those when only the flexible thermal load response was taken into account.Photovoltaics have an excess of carbon trading credits and can profit from selling them,whereas other devices have an excess of carbon trading and need to buy carbon credits. 展开更多
关键词 Demand response Combined cooling Heating and power system Carbon transaction costs Flexible electric and thermal loads Optimal scheduling
在线阅读 下载PDF
A Semantics-based Cooperative Transaction Model
8
作者 申石磊 刘先省 《Chinese Quarterly Journal of Mathematics》 CSCD 2002年第1期52-57,共6页
In CSCW system, there are many long-time, cooperative, interactive transactions. Traditional transaction model and advanced transaction model do not effectively support transaction processing in CSCW system. In this p... In CSCW system, there are many long-time, cooperative, interactive transactions. Traditional transaction model and advanced transaction model do not effectively support transaction processing in CSCW system. In this paper, a semantics-based cooperative transaction model(SCTM) is put forward. This model is based on the semantics information of cooperative process and data objects, and can satisfy the demands of transaction processing in CSCW system. 展开更多
关键词 transaction sub-transaction cooperative transaction
在线阅读 下载PDF
A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems
9
作者 Jingyu Zhang Pian Zhou +3 位作者 Jin Wang Osama Alfarraj Saurabh Singh Min Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1613-1633,共21页
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems... Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems. 展开更多
关键词 Blockchain architecture transaction verification information security heterogeneous Merkle tree distributed systems
在线阅读 下载PDF
TRADE DEPENDENCIES AND TRANSACTION COSTS: THE OC-CUPATION OF DECELEA HIGHLIGHTS BOTH THE BENEFITS AND THE DRAWBACKS OF A MARITIME ECONOMY
10
作者 Pascal Warnking 《Journal of Ancient Civilizations》 2024年第1期29-50,123,共23页
Thucydides asserts that the occupation of Decelea by the Spartans in 413 BC made the grain supply for Athens costly by forcing the transport from land onto the sea.This calls into question the well-established consens... Thucydides asserts that the occupation of Decelea by the Spartans in 413 BC made the grain supply for Athens costly by forcing the transport from land onto the sea.This calls into question the well-established consensus that sea transport was far cheaper than land transport.This paper contends that the cost of protecting supply lines-specifically the expenses associated with the warships which escorted the supply ships-rendered the grain transported on the new route exceptionally costly.In this paper,the benefits and drawbacks of a maritime economy,including transaction costs,trade dependencies,and the capabilities of warships and supply ships are discussed. 展开更多
关键词 convoy Decelea maritime dependencies maritime economy sea routes shipping costs transaction costs
在线阅读 下载PDF
The Application of Transaction Cost Theory in Supply Chain Management
11
作者 Zimeng Zhu 《Open Journal of Applied Sciences》 2024年第11期3216-3225,共10页
In the context of globalization and digitalization, the application of transaction cost theory in supply chain management has become increasingly important. As business environments grow more complex, enterprises face... In the context of globalization and digitalization, the application of transaction cost theory in supply chain management has become increasingly important. As business environments grow more complex, enterprises face challenges in effectively managing supply chain transaction costs. This paper systematically explores the application of transaction cost theory in supply chain management, covering key areas such as supplier selection, supply chain integration, and risk management. The research finds that supplier evaluation models based on transaction costs can help enterprises make more comprehensive selection decisions. In terms of supply chain integration, transaction cost theory provides important guidance for vertical integration decisions and the design of collaboration mechanisms. The application of digital technologies has both reduced traditional transaction costs and introduced new cost considerations. Faced with emerging risks such as cybersecurity and geopolitical issues, enterprises need to adopt dynamic transaction cost management strategies. In the future, the application of transaction cost theory in supply chain management will likely place greater emphasis on interdisciplinary integration and sustainable development, providing theoretical support for enterprises to achieve efficient, flexible, and sustainable supply chain management in the changing global business environment. 展开更多
关键词 transaction Cost Theory Supply Chain Management Digital Transformation Risk Management Supplier Selection
在线阅读 下载PDF
Unsupervised clustering of bitcoin transactions
12
作者 George Vlahavas Kostas Karasavvas Athena Vakali 《Financial Innovation》 2024年第1期3469-3499,共31页
Since its inception in 2009,Bitcoin has become and is currently the most successful and widely used cryptocurrency.It introduced blockchain technology,which allows transactions that transfer funds between users to tak... Since its inception in 2009,Bitcoin has become and is currently the most successful and widely used cryptocurrency.It introduced blockchain technology,which allows transactions that transfer funds between users to take place online,in an immutable manner.No real-world identities are needed or stored in the blockchain.At the same time,all transactions are publicly available and auditable,making Bitcoin a pseudo-anonymous ledger of transactions.The volume of transactions that are broadcast on a daily basis is considerably large.We propose a set of features that can be extracted from transaction data.Using this,we apply a data processing pipeline to ultimately cluster transactions via a k-means clustering algorithm,according to the transaction properties.Finally,according to these properties,we are able to characterize these clusters and the transactions they include.Our work mainly differentiates from previous studies in that it applies an unsupervised learning method to cluster transactions instead of addresses.Using the novel features we introduce,our work classifies transactions in multiple clusters,while previous studies only attempt binary classification.Results indicate that most transactions fall into a cluster that can be described as common user transactions.Other clusters include transactions made by online exchanges and lending services,those relating to mining activities as well as smaller clusters,one of which contains possibly illicit or fraudulent transactions.We evaluated our results against an online database of addresses that belong to known actors,such as online exchanges,and found that our results generally agree with them,which enhances the validity of our methods. 展开更多
关键词 Bitcoin Blockchain transactionS CLUSTERING
在线阅读 下载PDF
Current Trends in the Management of Distributed Transactions in Micro-Services Architectures: A Systematic Literature Review
13
作者 Samuel Lungu Mayumbo Nyirenda 《Open Journal of Applied Sciences》 2024年第9期2519-2543,共25页
In the evolving landscape of software engineering, Microservice Architecture (MSA) has emerged as a transformative approach, facilitating enhanced scalability, agility, and independent service deployment. This systema... In the evolving landscape of software engineering, Microservice Architecture (MSA) has emerged as a transformative approach, facilitating enhanced scalability, agility, and independent service deployment. This systematic literature review (SLR) explores the current state of distributed transaction management within MSA, focusing on the unique challenges, strategies, and technologies utilized in this domain. By synthesizing findings from 16 primary studies selected based on rigorous criteria, the review identifies key trends and best practices for maintaining data consistency and integrity across microservices. This SLR provides a comprehensive understanding of the complexities associated with distributed transactions in MSA, offering actionable insights and potential research directions for software architects, developers, and researchers. 展开更多
关键词 Microservice Architecture Distributed transactions Two-Phase Commit (2PC)
在线阅读 下载PDF
Data Flow&Transaction Mode Classification and An Explorative Estimation on Data Storage&Transaction Volume 被引量:4
14
作者 Cai Yuezhou Liu Yuexin 《China Economist》 2022年第6期78-112,共35页
The public has shown great interest in the data factor and data transactions,but the current attention is overly focused on personal behavioral data and transactions happening at Data Exchanges.To deliver a complete p... The public has shown great interest in the data factor and data transactions,but the current attention is overly focused on personal behavioral data and transactions happening at Data Exchanges.To deliver a complete picture of data flaw and transaction,this paper presents a systematic overview of the flow and transaction of personal,corporate and public data on the basis of data factor classification from various perspectives.By utilizing various sources of information,this paper estimates the volume of data generation&storage and the volume&trend of data market transactions for major economies in the world with the following findings:(i)Data classification is diverse due to a broad variety of applying scenarios,and data transaction and profit distribution are complex due to heterogenous entities,ownerships,information density and other attributes of different data types.(ii)Global data transaction has presented with the characteristics of productization,servitization and platform-based mode.(iii)For major economies,there is a commonly observed disequilibrium between data generation scale and storage scale,which is particularly striking for China.(i^v)The global data market is in a nascent stage of rapid development with a transaction volume of about 100 billion US dollars,and China s data market is even more underdeveloped and only accounts for some 10%of the world total.All sectors of the society should be flly aware of the diversity and complexity of data factor classification and data transactions,as well as the arduous and long-term nature of developing and improving relevant institutional systems.Adapting to such features,efforts should be made to improve data classification,enhance computing infrastructure development,foster professional data transaction and development institutions,and perfect the data governance system. 展开更多
关键词 Data factor data classification data transaction mode data generation&storage volume data transaction volume
在线阅读 下载PDF
Blockchain Based Enhanced ERP Transaction Integrity Architecture and PoET Consensus 被引量:1
15
作者 Tehreem Aslam Ayesha Maqbool +4 位作者 Maham Akhtar Alina Mirza Muhammad Anees Khan Wazir Zada Khan Shadab Alam 《Computers, Materials & Continua》 SCIE EI 2022年第1期1089-1109,共21页
Enterprise Resource Planning(ERP)software is extensively used for the management of business processes.ERP offers a system of integrated applications with a shared central database.Storing all business-critical inform... Enterprise Resource Planning(ERP)software is extensively used for the management of business processes.ERP offers a system of integrated applications with a shared central database.Storing all business-critical information in a central place raises various issues such as data integrity assurance and a single point of failure,which makes the database vulnerable.This paper investigates database and Blockchain integration,where the Blockchain network works in synchronization with the database system,and offers a mechanism to validate the transactions and ensure data integrity.Limited research exists on Blockchain-based solutions for the single point of failure in ERP.We established in our study that for concurrent access control andmonitoring of ERP,private permissioned Blockchain using Proof of Elapsed Time consensus is more suitable.The study also investigated the bottleneck issue of transaction processing rates(TPR)of Blockchain consensus,specifically ERP’s TPR.The paper presents systemarchitecture that integrates Blockchain with an ERP system using an application interface. 展开更多
关键词 transaction security enterprise systems blockchain transaction integrity hyperledger sawtooth PoET consensus
在线阅读 下载PDF
Throughput-oriented associated transaction assignment in sharding blockchains for IoT social data storage 被引量:1
16
作者 Liping Tao Yang Lu +2 位作者 Xu Ding Yuqi Fan Jung Yoon Kim 《Digital Communications and Networks》 SCIE CSCD 2022年第6期885-899,共15页
Blockchain is a viable solution to provide data integrity for the enormous volume of 5G IoT social data, while we need to break through the throughput bottleneck of blockchain. Sharding is a promising technology to so... Blockchain is a viable solution to provide data integrity for the enormous volume of 5G IoT social data, while we need to break through the throughput bottleneck of blockchain. Sharding is a promising technology to solve the problem of low throughput in blockchains. However, cross-shard communication hinders the effective improvement of blockchain throughput. Therefore, it is critical to reasonably allocate transactions to different shards to improve blockchain throughput. Existing research on blockchain sharding mainly focuses on shards formation, configuration, and consensus, while ignoring the negative impact of cross-shard communication on blockchain throughput. Aiming to maximize the throughput of transaction processing, we study how to allocate blockchain transactions to shards in this paper. We propose an Associated Transaction assignment algorithm based on Closest Fit (ATCF). ATCF classifies associated transactions into transaction groups which are then assigned to different shards in the non-ascending order of transaction group sizes periodically. Within each epoch, ATCF tries to select a shard that can handle all the transactions for each transaction group. If there are multiple such shards, ATCF selects the shard with the remaining processing capacity closest to the number of transactions in the transaction group. When no such shard exists, ATCF chooses the shard with the largest remaining processing capacity for the transaction group. The transaction groups that cannot be completely processed within the current epoch will be allocated in the subsequent epochs. We prove that ATCF is a 2-approximation algorithm for the associated transaction assignment problem. Simulation results show that ATCF can effectively improve the blockchain throughput and reduce the number of cross-shard transactions. 展开更多
关键词 IoT social data Blockchain Shar ding Associated transactions transaction assi gnment
在线阅读 下载PDF
An Interoperability Cross-Block Chain Framework for Secure Transactions in IoT
17
作者 N.Anand Kumar A.Grace Selvarani P.Vivekanandan 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期1077-1090,共14页
The purpose of this research is to deal with effective block chain framework for secure transactions.The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved ... The purpose of this research is to deal with effective block chain framework for secure transactions.The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved in Blockchain and to tackle this issue,Cross-Chain based Transaction(CCT)is introduced.Traditional industries have been restructured by the introduction of Internet of Things(IoT)to become smart industries through the feature of data-driven decision-making.Still,there are a few limitations,like decentralization,security vulnerabilities,poor interoperability,as well as privacy concerns in IoTs.To overcome this limitation,Blockchain has been employed to assure a safer transaction process,especially in asset exchanges.In recent decades,scalable local ledgers implement Blockchains,simultaneously sustaining peer validations of transactions which can be at local or global levels.From the single Hyperledger-based blockchains system,the CCT takes the transaction amid various chains.In addition,the most significant factor for this registration processing strategy is the Signature to ensure security.The application of the Quantum cryptographic algorithm amplifies the proposed Hyperledger-based blockchains,to strengthen the safety of the process.The key has been determined by restricting the number of transactions that reach the global Blockchain using the quantum-based hash function and accomplished by scalable local ledgers,and peer validations of transactions at local and global levels without any issues.The rate of transaction processing for entire peers has enhanced with the ancillary aid of the proposed solution,as it includes the procedure of load distribution.Without any boosted enhancement,the recommended solution utilizes the current transaction strategy,and also,it’s aimed at scalability,resource conservation,and interoperability.The experimental results of the system have been evaluated using the metrics like block weight,ledger memory,the usage of the central processing unit,and the communication overhead. 展开更多
关键词 Internet of Things(IoT) scalability blockchain INTEROPERABILITY security ledger size transaction rate cross-chain based transaction(CCT) quantum cryptographic algorithm
在线阅读 下载PDF
Securing Stock Transactions Using Blockchain Technology: Architecture for Identifying and Reducing Vulnerabilities Linked to the Web Applications Used (MAHV-BC)
18
作者 Kpinna Tiekoura Coulibaly Abdou Maïga +1 位作者 Jerome Diako Moustapha Diaby 《Open Journal of Applied Sciences》 2023年第11期2080-2093,共14页
This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data ... This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data in the stock market being crucial, the implementation of robust systems which guarantee trust between the different actors is essential. We therefore proposed, after analyzing the limits of several security approaches in the literature, an architecture based on blockchain technology making it possible to both identify and reduce the vulnerabilities linked to the design, implementation work or the use of web applications used for transactions. Our proposal makes it possible, thanks to two-factor authentication via the Blockchain, to strengthen the security of investors’ accounts and the automated recording of transactions in the Blockchain while guaranteeing the integrity of stock market operations. It also provides an application vulnerability report. To validate our approach, we compared our results to those of three other security tools, at the level of different metrics. Our approach achieved the best performance in each case. 展开更多
关键词 Stock Market transactions Action Smart Contracts ARCHITECTURE Security Vulnerability Web Applications Blockchain and Finance Cryptography Authentication Data Integrity transaction Confidentiality Trust Economy
在线阅读 下载PDF
基于Transaction模式的SoC软硬件协同验证策略 被引量:1
19
作者 魏小义 李平 +1 位作者 廖永波 贾宇明 《陕西理工学院学报(自然科学版)》 2006年第2期42-45,共4页
SoC的验证越来越成为集成电路发展的突出问题,而传统的信号级别的验证方法由于工作量巨大,已经很难满足系统的要求。研究了基于Transaction模式的验证方法,并通过开发的验证平台,用实验进行了验证。该方法在Transaction级别上实现对系... SoC的验证越来越成为集成电路发展的突出问题,而传统的信号级别的验证方法由于工作量巨大,已经很难满足系统的要求。研究了基于Transaction模式的验证方法,并通过开发的验证平台,用实验进行了验证。该方法在Transaction级别上实现对系统的验证,提高了验证速度,可以缩短设计周期,降低设计成本。 展开更多
关键词 transaction模式 SOC SYSTEMC 验证
在线阅读 下载PDF
上一页 1 2 22 下一页 到第
使用帮助 返回顶部