期刊文献+
共找到183篇文章
< 1 2 10 >
每页显示 20 50 100
A Review of Blockchain Layered Architecture and Technology Application Research 被引量:2
1
作者 WANG Changjing JIANG Huiwen +3 位作者 ZENG Jingshan YU Min HUANG Qing ZUO Zhengkang 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2021年第5期415-428,共14页
The development of blockchain is at a nascent stage.Current research on blockchain mainly focuses on a single technology,failing to reflect the correlation between the integrated technologies due to a lack of applicat... The development of blockchain is at a nascent stage.Current research on blockchain mainly focuses on a single technology,failing to reflect the correlation between the integrated technologies due to a lack of application in the real world.In this paper,according to the function classification,we divide blockchain technology into five layers:the data layer,the network layer,the consensus layer,the contract layer,and the application layer.For each layer,we elaborate on its technical principles and the latest research status.We also provide empirical cases of blockchain application.This paper summarizes the general functional modules of the blockchain to support the rapid implementation of blockchain applications.In the end,we investigate the challenges faced by blockchain technology and present the research prospects. 展开更多
关键词 blockchain architecture consensus algorithm smart contract cross-chain service blockchain application
原文传递
Deep reinforcement learning based multi-level dynamic reconfiguration for urban distribution network:a cloud-edge collaboration architecture 被引量:2
2
作者 Siyuan Jiang Hongjun Gao +2 位作者 Xiaohui Wang Junyong Liu Kunyu Zuo 《Global Energy Interconnection》 EI CAS CSCD 2023年第1期1-14,共14页
With the construction of the power Internet of Things(IoT),communication between smart devices in urban distribution networks has been gradually moving towards high speed,high compatibility,and low latency,which provi... With the construction of the power Internet of Things(IoT),communication between smart devices in urban distribution networks has been gradually moving towards high speed,high compatibility,and low latency,which provides reliable support for reconfiguration optimization in urban distribution networks.Thus,this study proposed a deep reinforcement learning based multi-level dynamic reconfiguration method for urban distribution networks in a cloud-edge collaboration architecture to obtain a real-time optimal multi-level dynamic reconfiguration solution.First,the multi-level dynamic reconfiguration method was discussed,which included feeder-,transformer-,and substation-levels.Subsequently,the multi-agent system was combined with the cloud-edge collaboration architecture to build a deep reinforcement learning model for multi-level dynamic reconfiguration in an urban distribution network.The cloud-edge collaboration architecture can effectively support the multi-agent system to conduct“centralized training and decentralized execution”operation modes and improve the learning efficiency of the model.Thereafter,for a multi-agent system,this study adopted a combination of offline and online learning to endow the model with the ability to realize automatic optimization and updation of the strategy.In the offline learning phase,a Q-learning-based multi-agent conservative Q-learning(MACQL)algorithm was proposed to stabilize the learning results and reduce the risk of the next online learning phase.In the online learning phase,a multi-agent deep deterministic policy gradient(MADDPG)algorithm based on policy gradients was proposed to explore the action space and update the experience pool.Finally,the effectiveness of the proposed method was verified through a simulation analysis of a real-world 445-node system. 展开更多
关键词 Cloud-edge collaboration architecture Multi-agent deep reinforcement learning multi-level dynamic reconfiguration Offline learning Online learning
在线阅读 下载PDF
EGSNet:An Efficient Glass Segmentation Network Based on Multi-Level Heterogeneous Architecture and Boundary Awareness
3
作者 Guojun Chen Tao Cui +1 位作者 Yongjie Hou Huihui Li 《Computers, Materials & Continua》 SCIE EI 2024年第12期3969-3987,共19页
Existing glass segmentation networks have high computational complexity and large memory occupation,leading to high hardware requirements and time overheads for model inference,which is not conducive to efficiency-see... Existing glass segmentation networks have high computational complexity and large memory occupation,leading to high hardware requirements and time overheads for model inference,which is not conducive to efficiency-seeking real-time tasks such as autonomous driving.The inefficiency of the models is mainly due to employing homogeneous modules to process features of different layers.These modules require computationally intensive convolutions and weight calculation branches with numerous parameters to accommodate the differences in information across layers.We propose an efficient glass segmentation network(EGSNet)based on multi-level heterogeneous architecture and boundary awareness to balance the model performance and efficiency.EGSNet divides the feature layers from different stages into low-level understanding,semantic-level understanding,and global understanding with boundary guidance.Based on the information differences among the different layers,we further propose the multi-angle collaborative enhancement(MCE)module,which extracts the detailed information from shallow features,and the large-scale contextual feature extraction(LCFE)module to understand semantic logic through deep features.The models are trained and evaluated on the glass segmentation datasets HSO(Home-Scene-Oriented)and Trans10k-stuff,respectively,and EGSNet achieves the best efficiency and performance compared to advanced methods.In the HSO test set results,the IoU,Fβ,MAE(Mean Absolute Error),and BER(Balance Error Rate)of EGSNet are 0.804,0.847,0.084,and 0.085,and the GFLOPs(Giga Floating Point Operations Per Second)are only 27.15.Experimental results show that EGSNet significantly improves the efficiency of the glass segmentation task with better performance. 展开更多
关键词 Image segmentation multi-level heterogeneous architecture feature differences
在线阅读 下载PDF
Securing Stock Transactions Using Blockchain Technology: Architecture for Identifying and Reducing Vulnerabilities Linked to the Web Applications Used (MAHV-BC)
4
作者 Kpinna Tiekoura Coulibaly Abdou Maïga +1 位作者 Jerome Diako Moustapha Diaby 《Open Journal of Applied Sciences》 2023年第11期2080-2093,共14页
This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data ... This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data in the stock market being crucial, the implementation of robust systems which guarantee trust between the different actors is essential. We therefore proposed, after analyzing the limits of several security approaches in the literature, an architecture based on blockchain technology making it possible to both identify and reduce the vulnerabilities linked to the design, implementation work or the use of web applications used for transactions. Our proposal makes it possible, thanks to two-factor authentication via the Blockchain, to strengthen the security of investors’ accounts and the automated recording of transactions in the Blockchain while guaranteeing the integrity of stock market operations. It also provides an application vulnerability report. To validate our approach, we compared our results to those of three other security tools, at the level of different metrics. Our approach achieved the best performance in each case. 展开更多
关键词 Stock Market Transactions Action Smart Contracts architecture Security Vulnerability Web Applications blockchain and Finance Cryptography Authentication Data Integrity Transaction Confidentiality Trust Economy
在线阅读 下载PDF
A Continuous Authentication Protocol Without Trust Authority for Zero Trust Architecture 被引量:5
5
作者 Lei Meng Daochao Huang +2 位作者 Jiahang An Xianwei Zhou Fuhong Lin 《China Communications》 SCIE CSCD 2022年第8期198-213,共16页
Zero-trust security is a novel concept to cope with intricate access,which can not be handled by the conventional perimeter-based architecture anymore.The device-to-device continuous authentication protocol is one of ... Zero-trust security is a novel concept to cope with intricate access,which can not be handled by the conventional perimeter-based architecture anymore.The device-to-device continuous authentication protocol is one of the most crucial cornerstones,especially in the IoT scenario.In the zero-trust architecture,trust does not rely on any position,person or device.However,to the best of our knowledge,almost all existing device-to-device continuous authentication relies on a trust authority or a node to generate secret keys or secret values.This is betrayed by the principle of zero-trust architecture.In this paper,we employ the blockchain to eliminate the trusted node.One node is chosen to produce the public parameter and secret keys for two entities through the practical Byzantine fault tolerance consensus mechanism.Additionally,the devices are categorized into three folds:trusted device,suspected device and untrusted device.Only the first two can participate in authentication,and they have different lengths of security parameters and intervals to reach a better balance between security and efficiency.Then we prove the security of the initial authentication part in the eCK model and give an informal analysis of the continuous authentication part.Finally,we implement the proposed protocol on simulated devices.The result illustrates that our scheme is highly efficient,and the continuous authentication only costs around 0.1ms. 展开更多
关键词 continuous authentication zero-trust architecture device-to-device blockchain IoT
在线阅读 下载PDF
BC-BLPM:A Multi-Level Security Access Control Model Based on Blockchain Technology 被引量:4
6
作者 Xiang Yu Zhangxiang Shu +1 位作者 Qiang Li Jun Huang 《China Communications》 SCIE CSCD 2021年第2期110-135,共26页
Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchai... Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchain is widely used in the field of access control with its decentralization,traceability and non-defective modification.Combining the blockchain technology and the Bell-LaPadula model,we propose a new access control model,named BCBLPM,for MLS environment.The“multi-chain”blockchain architecture is used for dividing resources into isolated access domains,providing a fine-grained data protection mechanism.The access control policies are implemented by smart contracts deployed in each access domain,so that the side chains of different access domains storage access records from outside and maintain the integrity of the records.Finally,we implement the BC-BLPM prototype system using the Hyperledger Fabric.The experimental and analytical results show that the model can adapt well to the needs of multi-level security environment,and it has the feasibility of application in actual scenarios. 展开更多
关键词 multi-level security(MLS) access control blockchain multi-chain smart contract
在线阅读 下载PDF
ACR-MLM:a privacy-preserving framework for anonymous and confidential rewarding in blockchain-based multi-level marketing
7
作者 Saeed Banaeian Far Azadeh Imani Rad Maryam Rajabzadeh Asaar 《Data Science and Management》 2022年第4期219-231,共13页
Network marketing is a trading technique that provides companies with the opportunity to increase sales.With the increasing number of Internet-based purchases,several threats are increasingly observed in this field,su... Network marketing is a trading technique that provides companies with the opportunity to increase sales.With the increasing number of Internet-based purchases,several threats are increasingly observed in this field,such as user privacy violations,company owner(CO)fraud,the changing of sold products’information,and the scalability of selling networks.This study presents the concept of a blockchain-based market called ACR-MLM that functions based on the multi-level marketing(MLM)model,through which registered users receive anonymous and confidential rewards for their own and their subgroups’sales.Applying a public blockchain as the ACR-MLM framework’s infrastructure solves existing problems in MLM-based markets,such as CO fraud(against the government or its users),user privacy violations(obtaining their real names or subgroup users),and scalability(when vast numbers of users have been registered).To provide confidentiality and scalability to the ACR-MLM framework,hierarchical identity-based encryption(HIBE)was applied with a functional encryption(FE)scheme.Finally,the security of ACR-MLM is analyzed using the random oracle(RO)model and then evaluated. 展开更多
关键词 Anonymous rewarding blockchain Functional encryption multi-level marketing PRIVACY
在线阅读 下载PDF
Navigating the Blockchain Trilemma:A Review of Recent Advances and Emerging Solutions in Decentralization,Security,and Scalability Optimization
8
作者 Saha Reno Koushik Roy 《Computers, Materials & Continua》 2025年第8期2061-2119,共59页
The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneousl... The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneously continues to elude most blockchain systems,often forcing trade-offs that limit their real-world applicability.This review paper synthesizes current research efforts aimed at resolving the trilemma,focusing on innovative consensus mechanisms,sharding techniques,layer-2 protocols,and hybrid architectural models.We critically analyze recent breakthroughs,including Directed Acyclic Graph(DAG)-based structures,cross-chain interoperability frameworks,and zero-knowledge proof(ZKP)enhancements,which aimto reconcile scalability with robust security and decentralization.Furthermore,we evaluate the trade-offs inherent in these approaches,highlighting their practical implications for enterprise adoption,decentralized finance(DeFi),and Web3 ecosystems.By mapping the evolving landscape of solutions,this review identifies gaps in currentmethodologies and proposes future research directions,such as adaptive consensus algorithms and artificial intelligence-driven(AI-driven)governance models.Our analysis underscores that while no universal solution exists,interdisciplinary innovations are progressively narrowing the trilemma’s constraints,paving the way for next-generation blockchain infrastructures. 展开更多
关键词 blockchain trilemma SCALABILITY DECENTRALIZATION SECURITY consensus algorithms sharding layer-2 solutions DAG-based architectures cross-chain interoperability blockchain optimization
在线阅读 下载PDF
单片机与区块链技术结合的智能家居数据安全管理系统研究
9
作者 马巍 《科技资讯》 2026年第5期33-35,共3页
在智能家居系统日益普及的背景下,数据安全问题愈加受到关注。为解决这一问题,本文提出了基于单片机与区块链融合的智能家居数据安全管理系统架构。构建“主链—侧链”协同存储模型与双因子认证机制,通过STM32F4系列单片机实现数据加密... 在智能家居系统日益普及的背景下,数据安全问题愈加受到关注。为解决这一问题,本文提出了基于单片机与区块链融合的智能家居数据安全管理系统架构。构建“主链—侧链”协同存储模型与双因子认证机制,通过STM32F4系列单片机实现数据加密采集,结合改进串表压缩算法,将传输负载降低至原始数据的65%;部署Hyperledger Fabric联盟链网络,设计并行验证机制,使实用拜占庭容错算法共识延迟从1.8 s优化至0.9 s。实验表明,系统在抗分布式拒绝服务攻击(Distributed Denial of Service,DDoS)测试中维持420 s的核心服务存活,数据篡改检测响应时间达到实时告警级别,查询响应速度提升至120 ms。研究证明,该系统能够有效解决设备协同信任缺失与隐私泄露问题,为智能家居安全提供新范式。 展开更多
关键词 单片机 区块链 智能家居 数据安全 双链架构
在线阅读 下载PDF
基于区块链技术的天地一体化信息网络架构设计
10
作者 安中文 陈拓 +2 位作者 唐小华 邓啸 张华健 《航天器工程》 北大核心 2026年第1期37-44,共8页
针对天地一体化信息网络架构中存在网络间的信息传输时延大、网络资源分配效率和可靠性不高的问题,文章设计了一种基于区块链技术的天地一体去中心化网络架构。采用将区块链去中心化、分布式及智能合约技术相结合的方法,提出了一种新的... 针对天地一体化信息网络架构中存在网络间的信息传输时延大、网络资源分配效率和可靠性不高的问题,文章设计了一种基于区块链技术的天地一体去中心化网络架构。采用将区块链去中心化、分布式及智能合约技术相结合的方法,提出了一种新的去中心化网络架构,并通过将边缘节点部署于区块链的私有链及联盟链,构建了该架构下的网络信息系统模型和信息处理机制。经网络性能分析,此设计架构相比传统架构可以降低网络时延,实现更高的网络资源分配效率和系统可靠性。 展开更多
关键词 区块链技术 天地一体化网络 去中心化架构 卫星通信
在线阅读 下载PDF
基于双链结构与HMB+树索引的食品溯源查询方案
11
作者 刘嘉艳 邓小鸿 +1 位作者 朱蕴真 刘秋平 《计算机应用研究》 北大核心 2026年第3期898-907,共10页
针对基于区块链的食品供应链溯源系统中数据存储压力大与查询效率低的问题,提出了一种基于双链存储结构与HMB+树索引机制的溯源查询方案。首先,构建联盟链+私有链的双链架构,以实现对产品各阶段信息分开上链,并减轻主链的存储负担;同时... 针对基于区块链的食品供应链溯源系统中数据存储压力大与查询效率低的问题,提出了一种基于双链存储结构与HMB+树索引机制的溯源查询方案。首先,构建联盟链+私有链的双链架构,以实现对产品各阶段信息分开上链,并减轻主链的存储负担;同时,引入以监管机构为核心的公证人组,通过采用批量签名与异步验证机制提升跨链事务的处理并发度与协同效率。其次,提出一种基于哈希表与MerkleB+树的混合索引结构HMB+树,在区块头中引入最大/最小键以缩小查询范围,借助哈希表实现对多字段的快速索引映射,并利用MerkleB+树高效的范围查询与多条件查询操作,提升数据定位能力。最后,在私有链中设置基于指数平滑的冷热跳表索引重构机制,动态划分冷热区块并自适应调整索引层级,进一步优化高频查询路径并提高检索效率。实验结果表明,此方案相较于现有方法在查询效率方面提升了49.5%,并有效缓解了链上存储压力,为区块链在食品安全与溯源查询领域的深入应用提供了有力的技术支撑。 展开更多
关键词 区块链 食品溯源 双链架构 MERKLE树 混合索引
在线阅读 下载PDF
基于区块链的新能源数据平台架构技术研究
12
作者 孟亮东 董亮 +2 位作者 李惟一 张永锋 韦将 《粘接》 2026年第3期822-825,共4页
为进一步提高新能源数据平台安全,加强数据平台完整性的验证,以确定数据是否被篡改或损坏。基于此,提出区块链的数据完整性检测技术,以保护新能源数据平台中的数据完整性。首先架构区块链算法,设定数据平台指示数据块,其次将新能源数据... 为进一步提高新能源数据平台安全,加强数据平台完整性的验证,以确定数据是否被篡改或损坏。基于此,提出区块链的数据完整性检测技术,以保护新能源数据平台中的数据完整性。首先架构区块链算法,设定数据平台指示数据块,其次将新能源数据块的索引嵌入到其数据完整性验证标记的计算中。实验结果表明,当数据块的数量为600时,区块链时间开销约为6.3 ms,区块链算法可以在极短时间内检测新能源数据平台中的数据完整性,且时间开销较随机森林算法平均提高24.5%。同时基于所架构的区块链算法,最大不完整性数据检测率为99.6%,可满足实际新能源平台数据完整性检测要求。且区块链数据块较大时,所需的时间较短,因此建议区块链数据块大于1024 kB。 展开更多
关键词 区块链 新能源数据 架构技术 数据块
在线阅读 下载PDF
虚拟电厂边缘云协同控制系统的设计与应用
13
作者 李安多 《信息与电脑》 2026年第2期172-174,共3页
虚拟电厂控制系统在边缘设备实时调度、全局调度策略优化、数据传输链路安全等方面存在协调统一问题。为此,文章设计了边缘云协同控制系统,利用轻量级区块链技术,从“软、硬、知”三个维度构建了低延时、高效率、高安全的系统模型。实... 虚拟电厂控制系统在边缘设备实时调度、全局调度策略优化、数据传输链路安全等方面存在协调统一问题。为此,文章设计了边缘云协同控制系统,利用轻量级区块链技术,从“软、硬、知”三个维度构建了低延时、高效率、高安全的系统模型。实验表明,系统的协同调度响应时间为44.32 ms,负荷跟踪精度达88.93%,为虚拟电厂智能化管控提供了技术支撑。 展开更多
关键词 边缘云协同架构 虚拟电厂 轻量级区块链技术
在线阅读 下载PDF
管道光缆施工损伤智能化防护与协同机制构建
14
作者 田振兴 周亚单 周建 《管道保护》 2026年第2期83-88,共6页
管道光缆作为油气管道生产网络的核心通信载体,承担着生产数据传输、系统监控与调度等关键功能,其可靠运行直接决定管道安全保障水平。随着城镇化进程加快,第三方施工导致的管道光缆损坏事件频发,这不仅造成经济损失,更可能引发管道调... 管道光缆作为油气管道生产网络的核心通信载体,承担着生产数据传输、系统监控与调度等关键功能,其可靠运行直接决定管道安全保障水平。随着城镇化进程加快,第三方施工导致的管道光缆损坏事件频发,这不仅造成经济损失,更可能引发管道调度中断等重大安全事故。现有防护机制存在监测覆盖不全、预警滞后、协同不畅等短板,且对管道光缆的特殊性适配不足。本文聚焦管道光缆第三方施工损伤预防问题,在系统梳理国内外研究现状的基础上,深入剖析管道光缆损伤风险及影响因素,构建“感知—决策—响应—防护”四级联动智能化防护系统架构。融合AI、5G、区块链等技术设计各层级核心模块,厘清模块间协同交互逻辑与数据流转机制,利用西气东输某支线试点工程数据验证了该体系的实际应用效果。研究旨在为管道光缆安全防护提供更具针对性、先进性的闭环解决方案,为油气管道生产通信网络的可靠运行提供技术支撑。 展开更多
关键词 第三方施工 管道光缆 智能化防护 区块链协同 系统架构 四级联动
在线阅读 下载PDF
Integration of Communication and Computing in Blockchain-Enabled Multi-Access Edge Computing Systems 被引量:2
15
作者 Zhonghua Zhang Jie Feng +2 位作者 Qingqi Pei Le Wang Lichuan Ma 《China Communications》 SCIE CSCD 2021年第12期297-314,共18页
Blockchain and multi-access edge com-puting(MEC)are two emerging promising tech-nologies that have received extensive attention from academia and industry.As a brand-new information storage,dissemination and managemen... Blockchain and multi-access edge com-puting(MEC)are two emerging promising tech-nologies that have received extensive attention from academia and industry.As a brand-new information storage,dissemination and management mechanism,blockchain technology achieves the reliable transmis-sion of data and value.While as a new computing paradigm,multi-access edge computing enables the high-frequency interaction and real-time transmission of data.The integration of communication and com-puting in blockchain-enabled multi-access edge com-puting networks has been studied without a systemat-ical view.In the survey,we focus on the integration of communication and computing,explores the mu-tual empowerment and mutual promotion effects be-tween the blockchain and MEC,and introduces the resource integration architecture of blockchain and multi-access edge computing.Then,the paper sum-marizes the applications of the resource integration ar-chitecture,resource management,data sharing,incen-tive mechanism,and consensus mechanism,and ana-lyzes corresponding applications in real-world scenar-ios.Finally,future challenges and potentially promis-ing research directions are discussed and present in de-tail. 展开更多
关键词 blockchain multi-access edge computing mutual empowerment network architecture
在线阅读 下载PDF
Capability-based IoT access control using blockchain 被引量:2
16
作者 Yue Liu Qinghua Lu +4 位作者 Shiping Chen Qiang Qu Hugo’Connor Kim-Kwang Raymond Choo He Zhang 《Digital Communications and Networks》 SCIE CSCD 2021年第4期463-469,共7页
Internet of Things(IoT)devices facilitate intelligent service delivery in a broad range of settings,such as smart offices,homes and cities.However,the existing IoT access control solutions are mainly based on conventi... Internet of Things(IoT)devices facilitate intelligent service delivery in a broad range of settings,such as smart offices,homes and cities.However,the existing IoT access control solutions are mainly based on conventional identity management schemes and use centralized architectures.There are knowm security and privacy limitations with such schemes and architectures,such as the single-point failure or surveillance(e.g.,device tracking).Hence,in this paper,we present an architecture for capability-based IoT access control utilizing the blockchain and decentralized identifiers to manage the identity and access control for IoT devices.Then,we propose a protocol to provide a systematic view of system interactions,to improve security.We also implement a proof-of-concept prototype of the proposed approach and evaluate the prototype using a real-world use case.Our evaluation results show that the proposed solution is feasible,secure,and scalable. 展开更多
关键词 blockchain Internet of things Capability-based access control Identity management architecture design
在线阅读 下载PDF
A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems
17
作者 Jingyu Zhang Pian Zhou +3 位作者 Jin Wang Osama Alfarraj Saurabh Singh Min Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1613-1633,共21页
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems... Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems. 展开更多
关键词 blockchain architecture transaction verification information security heterogeneous Merkle tree distributed systems
在线阅读 下载PDF
基于区块链技术的电池供应链溯源与质量管控 被引量:1
18
作者 陈建鑫 刘利民 《电池》 北大核心 2025年第6期1383-1386,共4页
当前,电池供应链存在结构复杂、环节众多、全球化程度高等特点,传统溯源与质量管控方式面临信息不透明、数据易篡改、质量追溯困难及监管难度大等问题。区块链技术凭借去中心化、数据不可篡改、可追溯等特性,为解决这些问题提供了途径... 当前,电池供应链存在结构复杂、环节众多、全球化程度高等特点,传统溯源与质量管控方式面临信息不透明、数据易篡改、质量追溯困难及监管难度大等问题。区块链技术凭借去中心化、数据不可篡改、可追溯等特性,为解决这些问题提供了途径。探讨区块链技术在电池供应链中的应用,设计了溯源与质量管控模式,并分析了相关挑战与对策,旨在为电池供应链的优化与升级提供理论支持与实践参考。 展开更多
关键词 区块链技术 电池供应链 架构设计 溯源 质量管控
在线阅读 下载PDF
融合区块链技术的高校机构知识库架构体系 被引量:1
19
作者 曾云华 杨顺 郭韫丽 《河北科技图苑》 2025年第4期91-96,36,共7页
鉴于国内高校机构知识库建设现状及存在的现实阻力,文章通过区块链技术应用于高校机构知识库的契合性分析,提出融合区块链技术的高校机构知识库架构体系,并从网络和系统角度进行构建,其中系统包含系统数据、知识管理、知识服务、学者服... 鉴于国内高校机构知识库建设现状及存在的现实阻力,文章通过区块链技术应用于高校机构知识库的契合性分析,提出融合区块链技术的高校机构知识库架构体系,并从网络和系统角度进行构建,其中系统包含系统数据、知识管理、知识服务、学者服务四个模块。 展开更多
关键词 区块链 高校 机构知识库 架构体系
在线阅读 下载PDF
轻量级区块链架构在农产品供应链溯源中的应用研究——以香蕉供应链为例
20
作者 王仕勋 《黄冈职业技术学院学报》 2025年第6期77-83,共7页
为解决农产品溯源中数据可信、系统性能与扩展性难以兼顾的难题,本研究设计了一种轻量级分层区块链架构。该架构结合可验证随机函数(VRF)与多维动态权重机制,在保障安全性的同时,实现了处理性能与系统扩展性之间的平衡;并在改进的拜占... 为解决农产品溯源中数据可信、系统性能与扩展性难以兼顾的难题,本研究设计了一种轻量级分层区块链架构。该架构结合可验证随机函数(VRF)与多维动态权重机制,在保障安全性的同时,实现了处理性能与系统扩展性之间的平衡;并在改进的拜占庭容错(BFT)协议中引入基于VRF的领导者选举机制,并优化两阶段提交流程,有效降低了通信开销。以“热带金蕉”供应链为案例的仿真实验表明:与采用BFT共识的Fabric-IBFT相比,本架构的平均交易时延从620 ms降至295 ms,降幅达52.4%;系统饱和吞吐量提升至1105 tps,约为Fabric-IBFT(280 tps)的3.95倍;异常事件的链上响应与全局同步时间可控制在3分钟以内。研究表明,所提架构在保持BFT级别安全的前提下,其性能显著优于同类BFT共识方案,为农产品溯源提供了一种高效可行的技术路径。 展开更多
关键词 区块链 农产品溯源 轻量级架构 供应链 共识机制
在线阅读 下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部