期刊文献+
共找到13,178篇文章
< 1 2 250 >
每页显示 20 50 100
Land transaction trajectories of China's overseas industrial parks in developing countries:Evidence from Southeast Asia 被引量:1
1
作者 LI Dongxue HU Qiao 《Journal of Geographical Sciences》 2025年第6期1286-1310,共25页
Foreign-funded overseas industrial parks(OIPs)are crucial for attracting foreign investment and promoting globalization in developing countries.However,large-scale land acquisition for these parks generates conflicts ... Foreign-funded overseas industrial parks(OIPs)are crucial for attracting foreign investment and promoting globalization in developing countries.However,large-scale land acquisition for these parks generates conflicts between developers and local stakeholders,increasing development costs.A qualitative multicase study was conducted in this study to analyze the land transaction trajectories of China's OIPs.Four OIPs were selected to reveal the underlying mechanisms from the perspectives of institutional arrangements,governance mechanisms,and enterprise heterogeneity.The findings indicate that in host countries with insufficient institutional development,local governments are more inclined to directly engage in OIP land acquisition.High-level intergovernmental mechanisms facilitate land acquisition processes,although their efficacy depends largely on administrative power allocation across parks in host countries.The results also indicate that enterprise characteristics significantly influence land acquisition,where microscale private enterprises lacking political connections often employ low-cost,bottom-up strategies by leveraging international experience.In summary,policy-makers in developing countries should prioritize enhancing OIP governance to mitigate transaction costs,promote diversified land supply,and optimize land allocation.By depicting China's OIP land acquisition processes,this study deepens the academic understanding of OIP governance in developing countries and related international land transactions,offering practical OIP management insights for governments in both host and parent countries. 展开更多
关键词 land transaction trajectories institutional arrangements governance mechanisms enterprise heterogeneity overseas industrial parks developing countries
原文传递
Mitigating Blockchain Extractable Value threats by Distributed Transaction Sequencing Strategy
2
作者 Xiongfei Zhao Hou-Wan Long +2 位作者 Zhengzhe Li Jiangchuan Liu Yain-Whar Si 《Digital Communications and Networks》 2025年第5期1394-1409,共16页
The rapid growth of blockchain and Decentralized Finance(DeFi)has introduced new challenges and vulnerabilities that threaten the integrity and efficiency of the ecosystem.This study identifies critical issues such as... The rapid growth of blockchain and Decentralized Finance(DeFi)has introduced new challenges and vulnerabilities that threaten the integrity and efficiency of the ecosystem.This study identifies critical issues such as Transaction Order Dependence(TOD),Blockchain Extractable Value(BEV),and Transaction Importance Diversity(TID),which collectively undermine the fairness and security of DeFi systems.BEV-related activities,including sandwich attacks,liquidations,transaction replay etc.have emerged as significant threats,collectively generating$540.54 million in losses over 32 months across 11,289 addresses,involving 49,691 cryptocurrencies and 60,830 on-chain markets.These attacks exploit transaction mechanics to manipulate asset prices and extract value at the expense of other participants,with sandwich attacks being particularly impactful.Additionally,the growing adoption of blockchain in traditional finance highlights the challenge of TID,wherein high transaction volumes can strain systems and compromise time-sensitive operations.To address these pressing issues,we propose a novel Distributed Transaction Sequencing Strategy(DTSS)that integrates forking mechanisms with an Analytic Hierarchy Process(AHP)to enforce fair and transparent transaction ordering in a decentralized manner.Our approach is further enhanced by an optimization framework and the introduction of a Normalized Allocation Disparity Metric(NADM)that ensures optimal parameter selection for transaction prioritization.Experimental evaluations demonstrated that the DTSS effectively mitigated BEV risks,enhanced transaction fairness,and significantly improved the security and transparency of DeFi ecosystems. 展开更多
关键词 Blockchain transaction ordering Blockchain extractable value Distributed transaction sequencing strategy
在线阅读 下载PDF
Peer-to-peer transaction with voltage management strategy in distribution network considering trading risk
3
作者 Lei Dong Kuang Zhang +3 位作者 Shiming Zhang Tao Zhang Ye Li Ji Qiao 《Global Energy Interconnection》 2025年第4期685-699,共15页
P2P trading is driving the decentralization of the electricity market,the autonomy and privacy requirements of prosumers may intro-duce safety risks such as voltage violations.Existing security management methods base... P2P trading is driving the decentralization of the electricity market,the autonomy and privacy requirements of prosumers may intro-duce safety risks such as voltage violations.Existing security management methods based on price guidance may face unsolvable situa-tions in trading scenarios and have difficulty assessing the impact of P2P transactions on voltage security.To this end,this paper proposes a novel distribution system operator(DSO)-prosumers bi-level optimization framework incorporating the dynamic operating envelope(DOE)and risk coefficient-based network usage charge(RC-NUC).In the upper-level,the DOE is employed for dynamic voltage man-agement to prevent violations while the RC-NUC further guides prosumers to engage in grid-friendly transactions.The lower-level decen-tralized market enables prosumers to optimize trading decisions autonomously.Only price signals and energy quantities are exchanged between the two levels,ensuring the privacy of both parties.Additionally,an alternating direction method of multipliers(ADMM)with adaptive penalty factor is introduced to improve computational efficiency.Case studies on a modified IEEE 33-bus system demonstrate that the proposed method reduces voltage violation risks by 18.31%and enhances trading efficiency by 32.3%.These results highlight the feasibility and effectiveness of the approach in advancing secure and efficient distributed energy transactions. 展开更多
关键词 P2P transaction DOE RC-NUC Distribution network Distributed algorithm
在线阅读 下载PDF
HNND:Hybrid Neural Network Detection for Blockchain Abnormal Transaction Behaviors
4
作者 Jiling Wan Lifeng Cao +2 位作者 Jinlong Bai Jinhui Li Xuehui Du 《Computers, Materials & Continua》 2025年第6期4775-4794,共20页
Blockchain platform swith the unique characteristics of anonymity,decentralization,and transparency of their transactions,which are faced with abnormal activities such as money laundering,phishing scams,and fraudulent... Blockchain platform swith the unique characteristics of anonymity,decentralization,and transparency of their transactions,which are faced with abnormal activities such as money laundering,phishing scams,and fraudulent behavior,posing a serious threat to account asset security.For these potential security risks,this paper proposes a hybrid neural network detection method(HNND)that learns multiple types of account features and enhances fusion information among them to effectively detect abnormal transaction behaviors in the blockchain.In HNND,the Temporal Transaction Graph Attention Network(T2GAT)is first designed to learn biased aggregation representation of multi-attribute transactions among nodes,which can capture key temporal information from node neighborhood transactions.Then,the Graph Convolutional Network(GCN)is adopted which captures abstract structural features of the transaction network.Further,the Stacked Denoising Autoencode(SDA)is developed to achieve adaptive fusion of thses features from different modules.Moreover,the SDA enhances robustness and generalization ability of node representation,leading to higher binary classification accuracy in detecting abnormal behaviors of blockchain accounts.Evaluations on a real-world abnormal transaction dataset demonstrate great advantages of the proposed HNND method over other compared methods. 展开更多
关键词 Blockchain security abnormal transaction detection network representation learning hybrid neural network
在线阅读 下载PDF
A Hybrid Feature Selection and Clustering-Based Ensemble Learning Approach for Real-Time Fraud Detection in Financial Transactions
5
作者 Naif Almusallam Junaid Qayyum 《Computers, Materials & Continua》 2025年第11期3653-3687,共35页
This paper proposes a novel hybrid fraud detection framework that integrates multi-stage feature selection,unsupervised clustering,and ensemble learning to improve classification performance in financial transaction m... This paper proposes a novel hybrid fraud detection framework that integrates multi-stage feature selection,unsupervised clustering,and ensemble learning to improve classification performance in financial transaction monitoring systems.The framework is structured into three core layers:(1)feature selection using Recursive Feature Elimination(RFE),Principal Component Analysis(PCA),and Mutual Information(MI)to reduce dimensionality and enhance input relevance;(2)anomaly detection through unsupervised clustering using K-Means,Density-Based Spatial Clustering(DBSCAN),and Hierarchical Clustering to flag suspicious patterns in unlabeled data;and(3)final classification using a voting-based hybrid ensemble of Support Vector Machine(SVM),Random Forest(RF),and Gradient Boosting Classifier(GBC).The experimental evaluation is conducted on a synthetically generated dataset comprising one million financial transactions,with 5% labelled as fraudulent,simulating realistic fraud rates and behavioural features,including transaction time,origin,amount,and geo-location.The proposed model demonstrated a significant improvement over baseline classifiers,achieving an accuracy of 99%,a precision of 99%,a recall of 97%,and an F1-score of 99%.Compared to individual models,it yielded a 9% gain in overall detection accuracy.It reduced the false positive rate to below 3.5%,thereby minimising the operational costs associated with manually reviewing false alerts.The model’s interpretability is enhanced by the integration of Shapley Additive Explanations(SHAP)values for feature importance,supporting transparency and regulatory auditability.These results affirm the practical relevance of the proposed system for deployment in real-time fraud detection scenarios such as credit card transactions,mobile banking,and cross-border payments.The study also highlights future directions,including the deployment of lightweight models and the integration of multimodal data for scalable fraud analytics. 展开更多
关键词 Fraud detection financial transactions economic impact feature selection CLUSTERING ensemble learning
在线阅读 下载PDF
Digital Transformation Drives the Upgrade of Corporate Accounting Functions:The Transformation Path from Transactional to Value Management-Oriented
6
作者 Hang Guo 《Proceedings of Business and Economic Studies》 2025年第6期114-120,共7页
The global wave of digitalization has accelerated the process of corporate digital transformation,placing higher demands on financial and accounting management.Since then,accounting work has shifted from the tradition... The global wave of digitalization has accelerated the process of corporate digital transformation,placing higher demands on financial and accounting management.Since then,accounting work has shifted from the traditional transactional model to a modern value management-oriented model,leading to a transformation of accounting functions.As corporate managers,they must advance their work proactively,empower the modernization and innovation of financial accounting with digital technology,and transition to management accounting to ensure enterprises keep pace with the times.Therefore,this paper explores the current status of corporate financial and accounting work amid the digital wave,identifies the challenges in the transformation of accounting from transactional to value management-oriented,and finally proposes several feasible and effective improvement strategies,aiming to provide more references for relevant practitioners. 展开更多
关键词 Accounting functions DIGITALIZATION Enterprises transactional(accounting) Value management-oriented(accounting)
在线阅读 下载PDF
A Blockchain Cross-Chain Transaction Protection Scheme Based on FHE
7
作者 Hongliang Tian Zuoqing Li 《Computers, Materials & Continua》 2025年第3期3983-4002,共20页
Low data encryption efficiency and inadequate security are two issues with the current blockchain cross-chain transaction protection schemes.To address these issues,a blockchain cross-chain transaction protection sche... Low data encryption efficiency and inadequate security are two issues with the current blockchain cross-chain transaction protection schemes.To address these issues,a blockchain cross-chain transaction protection scheme based on Fully Homomorphic Encryption(FHE)is proposed.In the proposed scheme,the functional relationship is established by Box-Muller,Discrete Gaussian Distribution Function(DGDF)and Uniform Random Distribution Func-tion(URDF)are used to improve the security and efficiency of key generation.Subsequently,the data preprocessing function is introduced to perform cleaning,deduplication,and normalization operations on the transaction data of multi-key signature,and it is classified into interactive data and asset data,so as to perform different homomorphic operations in the FHE encryption stage.Ultimately,in the FHE encryption stage,homomorphic multiplication and homomorphic addition are used targeted for the interactive data and asset data,thereby reducing the computational complexity and enhancing the FHE encryption efficiency.The significance of the proposed scheme is proved by experimental results:Firstly,the multi-key generation function and its specific sampling method and transformation ensure the security and efficiency of key generation.Data preprocessing can also accelerate the FHE encryption process by eliminating invalid data and redundancy,so the FHE encryption efficiency is significantly improved.Secondly,the FHE encryption method based on discrete logarithm problem enhances the security of transaction data and can effectively resist multiple attacks.In addition,the preprocessed data also has good performance in capacity storage.The proposed scheme has significant impacts on key indicators such as encryption efficiency and security,it provides a new reference for blockchain cross-chain transaction protection technology and has an important impact on the security improvement of various cross-chain transaction data. 展开更多
关键词 Blockchain cross-chain transactions fully homomorphic encryption(FHE)
在线阅读 下载PDF
Optimized scheduling of integrated energy systems for low carbon economy considering carbon transaction costs 被引量:3
8
作者 Chao Liu Weiru Wang +2 位作者 Jing Li Xinyuan Liu Yongning Chi 《Global Energy Interconnection》 EI CSCD 2024年第4期377-390,共14页
With the introduction of the“dual carbon”goal and the continuous promotion of low-carbon development,the integrated energy system(IES)has gradually become an effective way to save energy and reduce emissions.This st... With the introduction of the“dual carbon”goal and the continuous promotion of low-carbon development,the integrated energy system(IES)has gradually become an effective way to save energy and reduce emissions.This study proposes a low-carbon economic optimization scheduling model for an IES that considers carbon trading costs.With the goal of minimizing the total operating cost of the IES and considering the transferable and curtailable characteristics of the electric and thermal flexible loads,an optimal scheduling model of the IES that considers the cost of carbon trading and flexible loads on the user side was established.The role of flexible loads in improving the economy of an energy system was investigated using examples,and the rationality and effectiveness of the study were verified through a comparative analysis of different scenarios.The results showed that the total cost of the system in different scenarios was reduced by 18.04%,9.1%,3.35%,and 7.03%,respectively,whereas the total carbon emissions of the system were reduced by 65.28%,20.63%,3.85%,and 18.03%,respectively,when the carbon trading cost and demand-side flexible electric and thermal load responses were considered simultaneously.Flexible electrical and thermal loads did not have the same impact on the system performance.In the analyzed case,the total cost and carbon emissions of the system when only the flexible electrical load response was considered were lower than those when only the flexible thermal load response was taken into account.Photovoltaics have an excess of carbon trading credits and can profit from selling them,whereas other devices have an excess of carbon trading and need to buy carbon credits. 展开更多
关键词 Demand response Combined cooling Heating and power system Carbon transaction costs Flexible electric and thermal loads Optimal scheduling
在线阅读 下载PDF
A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems
9
作者 Jingyu Zhang Pian Zhou +3 位作者 Jin Wang Osama Alfarraj Saurabh Singh Min Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1613-1633,共21页
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems... Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems. 展开更多
关键词 Blockchain architecture transaction verification information security heterogeneous Merkle tree distributed systems
在线阅读 下载PDF
TRADE DEPENDENCIES AND TRANSACTION COSTS: THE OC-CUPATION OF DECELEA HIGHLIGHTS BOTH THE BENEFITS AND THE DRAWBACKS OF A MARITIME ECONOMY
10
作者 Pascal Warnking 《Journal of Ancient Civilizations》 2024年第1期29-50,123,共23页
Thucydides asserts that the occupation of Decelea by the Spartans in 413 BC made the grain supply for Athens costly by forcing the transport from land onto the sea.This calls into question the well-established consens... Thucydides asserts that the occupation of Decelea by the Spartans in 413 BC made the grain supply for Athens costly by forcing the transport from land onto the sea.This calls into question the well-established consensus that sea transport was far cheaper than land transport.This paper contends that the cost of protecting supply lines-specifically the expenses associated with the warships which escorted the supply ships-rendered the grain transported on the new route exceptionally costly.In this paper,the benefits and drawbacks of a maritime economy,including transaction costs,trade dependencies,and the capabilities of warships and supply ships are discussed. 展开更多
关键词 convoy Decelea maritime dependencies maritime economy sea routes shipping costs transaction costs
在线阅读 下载PDF
The Application of Transaction Cost Theory in Supply Chain Management
11
作者 Zimeng Zhu 《Open Journal of Applied Sciences》 2024年第11期3216-3225,共10页
In the context of globalization and digitalization, the application of transaction cost theory in supply chain management has become increasingly important. As business environments grow more complex, enterprises face... In the context of globalization and digitalization, the application of transaction cost theory in supply chain management has become increasingly important. As business environments grow more complex, enterprises face challenges in effectively managing supply chain transaction costs. This paper systematically explores the application of transaction cost theory in supply chain management, covering key areas such as supplier selection, supply chain integration, and risk management. The research finds that supplier evaluation models based on transaction costs can help enterprises make more comprehensive selection decisions. In terms of supply chain integration, transaction cost theory provides important guidance for vertical integration decisions and the design of collaboration mechanisms. The application of digital technologies has both reduced traditional transaction costs and introduced new cost considerations. Faced with emerging risks such as cybersecurity and geopolitical issues, enterprises need to adopt dynamic transaction cost management strategies. In the future, the application of transaction cost theory in supply chain management will likely place greater emphasis on interdisciplinary integration and sustainable development, providing theoretical support for enterprises to achieve efficient, flexible, and sustainable supply chain management in the changing global business environment. 展开更多
关键词 transaction Cost Theory Supply Chain Management Digital Transformation Risk Management Supplier Selection
在线阅读 下载PDF
Unsupervised clustering of bitcoin transactions
12
作者 George Vlahavas Kostas Karasavvas Athena Vakali 《Financial Innovation》 2024年第1期3469-3499,共31页
Since its inception in 2009,Bitcoin has become and is currently the most successful and widely used cryptocurrency.It introduced blockchain technology,which allows transactions that transfer funds between users to tak... Since its inception in 2009,Bitcoin has become and is currently the most successful and widely used cryptocurrency.It introduced blockchain technology,which allows transactions that transfer funds between users to take place online,in an immutable manner.No real-world identities are needed or stored in the blockchain.At the same time,all transactions are publicly available and auditable,making Bitcoin a pseudo-anonymous ledger of transactions.The volume of transactions that are broadcast on a daily basis is considerably large.We propose a set of features that can be extracted from transaction data.Using this,we apply a data processing pipeline to ultimately cluster transactions via a k-means clustering algorithm,according to the transaction properties.Finally,according to these properties,we are able to characterize these clusters and the transactions they include.Our work mainly differentiates from previous studies in that it applies an unsupervised learning method to cluster transactions instead of addresses.Using the novel features we introduce,our work classifies transactions in multiple clusters,while previous studies only attempt binary classification.Results indicate that most transactions fall into a cluster that can be described as common user transactions.Other clusters include transactions made by online exchanges and lending services,those relating to mining activities as well as smaller clusters,one of which contains possibly illicit or fraudulent transactions.We evaluated our results against an online database of addresses that belong to known actors,such as online exchanges,and found that our results generally agree with them,which enhances the validity of our methods. 展开更多
关键词 Bitcoin Blockchain transactionS CLUSTERING
在线阅读 下载PDF
Current Trends in the Management of Distributed Transactions in Micro-Services Architectures: A Systematic Literature Review
13
作者 Samuel Lungu Mayumbo Nyirenda 《Open Journal of Applied Sciences》 2024年第9期2519-2543,共25页
In the evolving landscape of software engineering, Microservice Architecture (MSA) has emerged as a transformative approach, facilitating enhanced scalability, agility, and independent service deployment. This systema... In the evolving landscape of software engineering, Microservice Architecture (MSA) has emerged as a transformative approach, facilitating enhanced scalability, agility, and independent service deployment. This systematic literature review (SLR) explores the current state of distributed transaction management within MSA, focusing on the unique challenges, strategies, and technologies utilized in this domain. By synthesizing findings from 16 primary studies selected based on rigorous criteria, the review identifies key trends and best practices for maintaining data consistency and integrity across microservices. This SLR provides a comprehensive understanding of the complexities associated with distributed transactions in MSA, offering actionable insights and potential research directions for software architects, developers, and researchers. 展开更多
关键词 Microservice Architecture Distributed transactions Two-Phase Commit (2PC)
在线阅读 下载PDF
数据要素可信流通交易的研究框架与展望 被引量:4
14
作者 刘业政 宗兰芳 +2 位作者 杨祖艳 钱洋 孙见山 《南开管理评论》 北大核心 2025年第4期158-170,共13页
研究和刻画数据要素流通交易中的可信保障,是应对数据交易中可信风险挑战、建立数据要素可信生态体系的关键。虽然学术界在该领域已取得较为丰富的研究成果,但尚未形成全面的、系统的数据要素可信流通交易的研究框架。本文采用文献分析... 研究和刻画数据要素流通交易中的可信保障,是应对数据交易中可信风险挑战、建立数据要素可信生态体系的关键。虽然学术界在该领域已取得较为丰富的研究成果,但尚未形成全面的、系统的数据要素可信流通交易的研究框架。本文采用文献分析法,按照“可信风险→可信体系→可信机制”路径,对现有研究进行系统梳理与整合,期望构建一个新颖、概括性的研究框架。首先,从多个视角分析数据交易中的可信风险;其次,基于信任理论,提出数据交易的PD CA可信体系,并从实践视角提供实现主体可信、数据可信、合约可信和算法可信的具体路径和措施;最后,针对数据要素可信流通交易的现实困境,给出未来的研究议题。本文对促进数据要素型企业有效应对可信风险管理的挑战,帮助政府高效构建数据要素可信生态体系具有重要启示。 展开更多
关键词 可信流通交易 可信风险 PDCA可信体系 可信机制
在线阅读 下载PDF
面向电商联盟的区块链营销标签交易系统 被引量:1
15
作者 代炜琦 李铭 +4 位作者 赵珂轩 姜文超 周蔚林 邹德清 金海 《计算机研究与发展》 北大核心 2025年第1期269-280,共12页
大数据电商时代,数据交易可使彼此孤立的数据资源得到协同共享与价值利用,营销标签作为电商业务中数据交易的主要形式,拥有巨大的潜在价值.然而传统数据交易市场面临3个主要问题:1)中心化平台信息不透明导致信任危机和恶意竞价排名;2)... 大数据电商时代,数据交易可使彼此孤立的数据资源得到协同共享与价值利用,营销标签作为电商业务中数据交易的主要形式,拥有巨大的潜在价值.然而传统数据交易市场面临3个主要问题:1)中心化平台信息不透明导致信任危机和恶意竞价排名;2)缺乏合理的激励机制来打破数据孤岛导致数据不流通和共享困难;3)数据安全威胁导致隐私泄露和数据倒卖盗卖等问题.为解决这些问题,设计了一种面向电商联盟的区块链营销标签交易机制DSTS(decentralized data security transaction system),以去中心化为基础设计上层共识激励机制,结合可信执行环境完成系统各项数据交易和计算业务,从而实现了一个安全完备的数据交易生态.通过真实性验证机制确保营销标签有效性,设计共识激励机制使用户积极共享数据,利用智能合约对角色行为按照系统设计规范进行有效约束;随后通过SGX(software guard extensions)远程认证实现密钥传输和数据安全存储,实现了智能合约安全调用来保障用户隐私和数据安全;最后,通过可信计算机制和系统设计思想,实现了数据交易结果的可靠交付.为验证系统的安全性和实用性,采用某电商公司提供的35万条真实数据进行性能测试,测试结果表明系统能够同时保证安全和性能需求,其额外开销主要来自远程认证模块且在可接受范围内. 展开更多
关键词 区块链 数据交易 电商联盟 可信执行环境 共识机制
在线阅读 下载PDF
虚拟货币洗钱犯罪的治理方案——基于风险视角的分析 被引量:8
16
作者 卢建平 刘嘉 《北京社会科学》 北大核心 2025年第2期105-116,共12页
虚拟货币因其匿名性、跨国性、去中心化的特征而具有较高的固有洗钱风险,实践中利用虚拟货币洗钱的案件数量不断攀升。中国当前的禁止政策不仅未能充分应对其固有风险,反而加剧了虚拟货币交易的地下化与跨境化趋势,形成了独特的剩余风... 虚拟货币因其匿名性、跨国性、去中心化的特征而具有较高的固有洗钱风险,实践中利用虚拟货币洗钱的案件数量不断攀升。中国当前的禁止政策不仅未能充分应对其固有风险,反而加剧了虚拟货币交易的地下化与跨境化趋势,形成了独特的剩余风险状况。受此影响,虚拟货币洗钱犯罪案件在犯罪发现、犯罪侦查、追赃处置等一系列环节均面临着不同程度的治理困境。在此情形下,应当调整当前禁止型治理模式,加快制定《数字财产法》,明确虚拟货币非金融化商品属性,将虚拟货币交易作为个人境外投资行为纳入场景化多重监管,从而构建畅通的虚拟货币合法交易通路;以此为基础,应完善《反洗钱法》相关规定和涉虚拟货币程序法规则,为虚拟货币洗钱犯罪的预防与惩治提供充足的制度供给;与此同时,应统筹链上治理与链外治理、制度治理与技术治理、域内治理与域外治理,以保障虚拟货币反洗钱治理体系的有效运转。 展开更多
关键词 虚拟货币 反洗钱 货币交易 区块链 跨境流动性
在线阅读 下载PDF
城乡融合背景下的农村金融高质量发展——基于“产权-市场-交易”分析框架 被引量:2
17
作者 贾晋 廖思雁 张翔 《农村金融研究》 北大核心 2025年第5期15-28,共14页
农村金融高质量发展是城乡融合要素投入的关键环节。论文以农村金融领域的三次历史争论为起点,以制度经济学相关理论为基础,提出“产权-市场-交易”分析框架,分别讨论了城乡融合背景下农村金融需求侧和供给侧的重要转变。产权结构方面,... 农村金融高质量发展是城乡融合要素投入的关键环节。论文以农村金融领域的三次历史争论为起点,以制度经济学相关理论为基础,提出“产权-市场-交易”分析框架,分别讨论了城乡融合背景下农村金融需求侧和供给侧的重要转变。产权结构方面,边界清晰的土地产权和监督制衡的机构产权是改革方向;市场结构方面,农民分化流动和专业化金融组织是转型趋势;交易结构方面,组织化、链条式的农业交易结构和多元功能的金融交易设计是升级重点。论文指出,农村金融供给尚未很好地匹配这些变革方向,突出表现在农村中小金融机构产权治理缺陷、农村金融供给协同不足、多元金融交易需求未得到较好满足。建议从深化农村金融机构产权改革、协同完善农村金融市场、丰富农村金融交易体系、加快数字化转型四个方面重点着力。 展开更多
关键词 城乡融合 农村金融 产权结构 市场结构 交易结构
在线阅读 下载PDF
新质生产力、技术交易市场活跃度与体育产业高质量发展--来自中国省级层面的经验证据 被引量:5
18
作者 程名望 慈芳慧 王志远 《上海体育大学学报》 北大核心 2025年第1期65-75,共11页
基于2011—2022年中国28个省级行政区的面板数据,运用双向固定效应模型,实证分析新质生产力对体育产业高质量发展的影响及其作用机制。发现:①新质生产力对体育产业高质量发展具有显著的正向促进作用,这一结论在考虑内生变量和稳健性检... 基于2011—2022年中国28个省级行政区的面板数据,运用双向固定效应模型,实证分析新质生产力对体育产业高质量发展的影响及其作用机制。发现:①新质生产力对体育产业高质量发展具有显著的正向促进作用,这一结论在考虑内生变量和稳健性检验后依然成立;②在作用机制方面,培育和发展新质生产力可以有效提升技术交易市场活跃度,有助于体育领域科技成果转化,从而促进体育产业全要素生产率提升;③针对异质性分析,新质生产力在产业结构升级程度较低、经营环境较好的区域对体育产业高质量发展的推动效应更加显著。探讨新质生产力与体育产业的关系对于塑造体育产业发展新动能,促进体育产业高质量发展具有重要价值。 展开更多
关键词 新质生产力 体育产业 高质量发展 技术交易市场活跃度
在线阅读 下载PDF
风光不确定条件下考虑双边交易的配微电网协同规划 被引量:2
19
作者 王书征 吴守豪 +1 位作者 吴志 孙玉柱 《电力工程技术》 北大核心 2025年第3期97-107,227,共12页
在新兴电力市场中,配电网运营商和微电网运营商之间可以进行双边交易。风光发电设备大量接入带来的不确定条件下,配电网与微电网处于在规划层面考虑多主体双边能源交易影响的合作博弈状态。为了解决传统配微电网协同规划问题的多重非凸... 在新兴电力市场中,配电网运营商和微电网运营商之间可以进行双边交易。风光发电设备大量接入带来的不确定条件下,配电网与微电网处于在规划层面考虑多主体双边能源交易影响的合作博弈状态。为了解决传统配微电网协同规划问题的多重非凸性,文中提出一种基于交替优化方法的配微电网协同规划策略。通过交替优化将非连续协同规划问题转变为双层迭代求解过程,上层利用纳什议价在下层生成的凸子集中解得交易电量和支付策略,下层利用从上层获得的交易变量局部确定个体规划问题,将上层双边市场交易出清问题分解为交易电量求解与交易电费求解2个子问题,运用交替方向乘子法先后对2个子问题进行求解。最后,在IEEE 33节点系统中进行算例仿真,结果表明该模型可以有效提升交易双方的运营效益。 展开更多
关键词 双边交易 协同规划 合作博弈 纳什议价 交替优化 双层求解
在线阅读 下载PDF
面向需求侧市场化响应交易细则的高耗能负荷需求响应控制策略 被引量:3
20
作者 廖思阳 谢濠聪 +3 位作者 徐箭 孙元章 柯德平 蒋一博 《中国电机工程学报》 北大核心 2025年第5期1645-1657,I0001,共14页
建设含高比例新能源的新型电力系统对电力系统的调节灵活性提出新的要求。为充分挖掘需求侧灵活负荷资源,部分省份发布需求响应方案以引导电力用户参与削峰需求。需求侧中,高耗能工业负荷具备负荷单体容量大,功率可控性强等优点,但其参... 建设含高比例新能源的新型电力系统对电力系统的调节灵活性提出新的要求。为充分挖掘需求侧灵活负荷资源,部分省份发布需求响应方案以引导电力用户参与削峰需求。需求侧中,高耗能工业负荷具备负荷单体容量大,功率可控性强等优点,但其参与需求响应受限于负荷正常生产需求与缺乏最大化响应收益控制策略。由此,该文以电解铜工业负荷为例,提出面向需求侧市场化响应交易细则的高耗能负荷功率控制策略。首先,分析电解铜负荷工艺流程环节功率调节可行性并建立对应功率控制模型;建立电解铜工艺流程资源任务网络(resourcetask network,RTN)模型以描述负荷生产周期内生产状态,通过物料数量明确负荷功率调控边界。基于四川省需求响应实施方案交易细则,明确负荷响应收益结算机制及有效响应约束;考虑功率调控产生的额外成本,提出满足负荷生产安全与有效响应约束的最大化负荷响应收益的功率控制策略;最后,在不同情景下进行仿真,相较于仅满足中标响应需求,该文功率控制策略能够提升响应收益16%以上,并且在较长时间尺度响应中能够最大程度满足响应需求,验证该文功率控制策略的有效性,为工业负荷参与需求响应提供一种可行方案。 展开更多
关键词 高耗能负荷 需求侧响应 资源任务网络模型 调节成本 市场化响应交易细则
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部