期刊文献+
共找到168篇文章
< 1 2 9 >
每页显示 20 50 100
EGSNet:An Efficient Glass Segmentation Network Based on Multi-Level Heterogeneous Architecture and Boundary Awareness
1
作者 Guojun Chen Tao Cui +1 位作者 Yongjie Hou Huihui Li 《Computers, Materials & Continua》 SCIE EI 2024年第12期3969-3987,共19页
Existing glass segmentation networks have high computational complexity and large memory occupation,leading to high hardware requirements and time overheads for model inference,which is not conducive to efficiency-see... Existing glass segmentation networks have high computational complexity and large memory occupation,leading to high hardware requirements and time overheads for model inference,which is not conducive to efficiency-seeking real-time tasks such as autonomous driving.The inefficiency of the models is mainly due to employing homogeneous modules to process features of different layers.These modules require computationally intensive convolutions and weight calculation branches with numerous parameters to accommodate the differences in information across layers.We propose an efficient glass segmentation network(EGSNet)based on multi-level heterogeneous architecture and boundary awareness to balance the model performance and efficiency.EGSNet divides the feature layers from different stages into low-level understanding,semantic-level understanding,and global understanding with boundary guidance.Based on the information differences among the different layers,we further propose the multi-angle collaborative enhancement(MCE)module,which extracts the detailed information from shallow features,and the large-scale contextual feature extraction(LCFE)module to understand semantic logic through deep features.The models are trained and evaluated on the glass segmentation datasets HSO(Home-Scene-Oriented)and Trans10k-stuff,respectively,and EGSNet achieves the best efficiency and performance compared to advanced methods.In the HSO test set results,the IoU,Fβ,MAE(Mean Absolute Error),and BER(Balance Error Rate)of EGSNet are 0.804,0.847,0.084,and 0.085,and the GFLOPs(Giga Floating Point Operations Per Second)are only 27.15.Experimental results show that EGSNet significantly improves the efficiency of the glass segmentation task with better performance. 展开更多
关键词 Image segmentation multi-level heterogeneous architecture feature differences
在线阅读 下载PDF
A Review of Blockchain Layered Architecture and Technology Application Research 被引量:2
2
作者 WANG Changjing JIANG Huiwen +3 位作者 ZENG Jingshan YU Min HUANG Qing ZUO Zhengkang 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2021年第5期415-428,共14页
The development of blockchain is at a nascent stage.Current research on blockchain mainly focuses on a single technology,failing to reflect the correlation between the integrated technologies due to a lack of applicat... The development of blockchain is at a nascent stage.Current research on blockchain mainly focuses on a single technology,failing to reflect the correlation between the integrated technologies due to a lack of application in the real world.In this paper,according to the function classification,we divide blockchain technology into five layers:the data layer,the network layer,the consensus layer,the contract layer,and the application layer.For each layer,we elaborate on its technical principles and the latest research status.We also provide empirical cases of blockchain application.This paper summarizes the general functional modules of the blockchain to support the rapid implementation of blockchain applications.In the end,we investigate the challenges faced by blockchain technology and present the research prospects. 展开更多
关键词 blockchain architecture consensus algorithm smart contract cross-chain service blockchain application
原文传递
Deep reinforcement learning based multi-level dynamic reconfiguration for urban distribution network:a cloud-edge collaboration architecture 被引量:1
3
作者 Siyuan Jiang Hongjun Gao +2 位作者 Xiaohui Wang Junyong Liu Kunyu Zuo 《Global Energy Interconnection》 EI CAS CSCD 2023年第1期1-14,共14页
With the construction of the power Internet of Things(IoT),communication between smart devices in urban distribution networks has been gradually moving towards high speed,high compatibility,and low latency,which provi... With the construction of the power Internet of Things(IoT),communication between smart devices in urban distribution networks has been gradually moving towards high speed,high compatibility,and low latency,which provides reliable support for reconfiguration optimization in urban distribution networks.Thus,this study proposed a deep reinforcement learning based multi-level dynamic reconfiguration method for urban distribution networks in a cloud-edge collaboration architecture to obtain a real-time optimal multi-level dynamic reconfiguration solution.First,the multi-level dynamic reconfiguration method was discussed,which included feeder-,transformer-,and substation-levels.Subsequently,the multi-agent system was combined with the cloud-edge collaboration architecture to build a deep reinforcement learning model for multi-level dynamic reconfiguration in an urban distribution network.The cloud-edge collaboration architecture can effectively support the multi-agent system to conduct“centralized training and decentralized execution”operation modes and improve the learning efficiency of the model.Thereafter,for a multi-agent system,this study adopted a combination of offline and online learning to endow the model with the ability to realize automatic optimization and updation of the strategy.In the offline learning phase,a Q-learning-based multi-agent conservative Q-learning(MACQL)algorithm was proposed to stabilize the learning results and reduce the risk of the next online learning phase.In the online learning phase,a multi-agent deep deterministic policy gradient(MADDPG)algorithm based on policy gradients was proposed to explore the action space and update the experience pool.Finally,the effectiveness of the proposed method was verified through a simulation analysis of a real-world 445-node system. 展开更多
关键词 Cloud-edge collaboration architecture Multi-agent deep reinforcement learning multi-level dynamic reconfiguration Offline learning Online learning
在线阅读 下载PDF
Navigating the Blockchain Trilemma:A Review of Recent Advances and Emerging Solutions in Decentralization,Security,and Scalability Optimization
4
作者 Saha Reno Koushik Roy 《Computers, Materials & Continua》 2025年第8期2061-2119,共59页
The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneousl... The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneously continues to elude most blockchain systems,often forcing trade-offs that limit their real-world applicability.This review paper synthesizes current research efforts aimed at resolving the trilemma,focusing on innovative consensus mechanisms,sharding techniques,layer-2 protocols,and hybrid architectural models.We critically analyze recent breakthroughs,including Directed Acyclic Graph(DAG)-based structures,cross-chain interoperability frameworks,and zero-knowledge proof(ZKP)enhancements,which aimto reconcile scalability with robust security and decentralization.Furthermore,we evaluate the trade-offs inherent in these approaches,highlighting their practical implications for enterprise adoption,decentralized finance(DeFi),and Web3 ecosystems.By mapping the evolving landscape of solutions,this review identifies gaps in currentmethodologies and proposes future research directions,such as adaptive consensus algorithms and artificial intelligence-driven(AI-driven)governance models.Our analysis underscores that while no universal solution exists,interdisciplinary innovations are progressively narrowing the trilemma’s constraints,paving the way for next-generation blockchain infrastructures. 展开更多
关键词 blockchain trilemma SCALABILITY DECENTRALIZATION SECURITY consensus algorithms sharding layer-2 solutions DAG-based architectures cross-chain interoperability blockchain optimization
在线阅读 下载PDF
Securing Stock Transactions Using Blockchain Technology: Architecture for Identifying and Reducing Vulnerabilities Linked to the Web Applications Used (MAHV-BC)
5
作者 Kpinna Tiekoura Coulibaly Abdou Maïga +1 位作者 Jerome Diako Moustapha Diaby 《Open Journal of Applied Sciences》 2023年第11期2080-2093,共14页
This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data ... This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data in the stock market being crucial, the implementation of robust systems which guarantee trust between the different actors is essential. We therefore proposed, after analyzing the limits of several security approaches in the literature, an architecture based on blockchain technology making it possible to both identify and reduce the vulnerabilities linked to the design, implementation work or the use of web applications used for transactions. Our proposal makes it possible, thanks to two-factor authentication via the Blockchain, to strengthen the security of investors’ accounts and the automated recording of transactions in the Blockchain while guaranteeing the integrity of stock market operations. It also provides an application vulnerability report. To validate our approach, we compared our results to those of three other security tools, at the level of different metrics. Our approach achieved the best performance in each case. 展开更多
关键词 Stock Market Transactions Action Smart Contracts architecture Security Vulnerability Web Applications blockchain and Finance Cryptography Authentication Data Integrity Transaction Confidentiality Trust Economy
在线阅读 下载PDF
BC-BLPM:A Multi-Level Security Access Control Model Based on Blockchain Technology 被引量:4
6
作者 Xiang Yu Zhangxiang Shu +1 位作者 Qiang Li Jun Huang 《China Communications》 SCIE CSCD 2021年第2期110-135,共26页
Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchai... Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchain is widely used in the field of access control with its decentralization,traceability and non-defective modification.Combining the blockchain technology and the Bell-LaPadula model,we propose a new access control model,named BCBLPM,for MLS environment.The“multi-chain”blockchain architecture is used for dividing resources into isolated access domains,providing a fine-grained data protection mechanism.The access control policies are implemented by smart contracts deployed in each access domain,so that the side chains of different access domains storage access records from outside and maintain the integrity of the records.Finally,we implement the BC-BLPM prototype system using the Hyperledger Fabric.The experimental and analytical results show that the model can adapt well to the needs of multi-level security environment,and it has the feasibility of application in actual scenarios. 展开更多
关键词 multi-level security(MLS) access control blockchain multi-chain smart contract
在线阅读 下载PDF
A Continuous Authentication Protocol Without Trust Authority for Zero Trust Architecture 被引量:3
7
作者 Lei Meng Daochao Huang +2 位作者 Jiahang An Xianwei Zhou Fuhong Lin 《China Communications》 SCIE CSCD 2022年第8期198-213,共16页
Zero-trust security is a novel concept to cope with intricate access,which can not be handled by the conventional perimeter-based architecture anymore.The device-to-device continuous authentication protocol is one of ... Zero-trust security is a novel concept to cope with intricate access,which can not be handled by the conventional perimeter-based architecture anymore.The device-to-device continuous authentication protocol is one of the most crucial cornerstones,especially in the IoT scenario.In the zero-trust architecture,trust does not rely on any position,person or device.However,to the best of our knowledge,almost all existing device-to-device continuous authentication relies on a trust authority or a node to generate secret keys or secret values.This is betrayed by the principle of zero-trust architecture.In this paper,we employ the blockchain to eliminate the trusted node.One node is chosen to produce the public parameter and secret keys for two entities through the practical Byzantine fault tolerance consensus mechanism.Additionally,the devices are categorized into three folds:trusted device,suspected device and untrusted device.Only the first two can participate in authentication,and they have different lengths of security parameters and intervals to reach a better balance between security and efficiency.Then we prove the security of the initial authentication part in the eCK model and give an informal analysis of the continuous authentication part.Finally,we implement the proposed protocol on simulated devices.The result illustrates that our scheme is highly efficient,and the continuous authentication only costs around 0.1ms. 展开更多
关键词 continuous authentication zero-trust architecture device-to-device blockchain IoT
在线阅读 下载PDF
ACR-MLM:a privacy-preserving framework for anonymous and confidential rewarding in blockchain-based multi-level marketing
8
作者 Saeed Banaeian Far Azadeh Imani Rad Maryam Rajabzadeh Asaar 《Data Science and Management》 2022年第4期219-231,共13页
Network marketing is a trading technique that provides companies with the opportunity to increase sales.With the increasing number of Internet-based purchases,several threats are increasingly observed in this field,su... Network marketing is a trading technique that provides companies with the opportunity to increase sales.With the increasing number of Internet-based purchases,several threats are increasingly observed in this field,such as user privacy violations,company owner(CO)fraud,the changing of sold products’information,and the scalability of selling networks.This study presents the concept of a blockchain-based market called ACR-MLM that functions based on the multi-level marketing(MLM)model,through which registered users receive anonymous and confidential rewards for their own and their subgroups’sales.Applying a public blockchain as the ACR-MLM framework’s infrastructure solves existing problems in MLM-based markets,such as CO fraud(against the government or its users),user privacy violations(obtaining their real names or subgroup users),and scalability(when vast numbers of users have been registered).To provide confidentiality and scalability to the ACR-MLM framework,hierarchical identity-based encryption(HIBE)was applied with a functional encryption(FE)scheme.Finally,the security of ACR-MLM is analyzed using the random oracle(RO)model and then evaluated. 展开更多
关键词 Anonymous rewarding blockchain Functional encryption multi-level marketing PRIVACY
在线阅读 下载PDF
A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems
9
作者 Jingyu Zhang Pian Zhou +3 位作者 Jin Wang Osama Alfarraj Saurabh Singh Min Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1613-1633,共21页
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems... Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems. 展开更多
关键词 blockchain architecture transaction verification information security heterogeneous Merkle tree distributed systems
在线阅读 下载PDF
融合区块链技术的高校机构知识库架构体系
10
作者 曾云华 杨顺 郭韫丽 《河北科技图苑》 2025年第4期91-96,36,共7页
鉴于国内高校机构知识库建设现状及存在的现实阻力,文章通过区块链技术应用于高校机构知识库的契合性分析,提出融合区块链技术的高校机构知识库架构体系,并从网络和系统角度进行构建,其中系统包含系统数据、知识管理、知识服务、学者服... 鉴于国内高校机构知识库建设现状及存在的现实阻力,文章通过区块链技术应用于高校机构知识库的契合性分析,提出融合区块链技术的高校机构知识库架构体系,并从网络和系统角度进行构建,其中系统包含系统数据、知识管理、知识服务、学者服务四个模块。 展开更多
关键词 区块链 高校 机构知识库 架构体系
在线阅读 下载PDF
面向多层级区块链架构的轻量级高效验证资产跨链转移方法
11
作者 牛翔宇 孔兰菊 +3 位作者 蒋亚丽 钱进 崔立真 李庆忠 《计算机研究与发展》 北大核心 2025年第11期2870-2887,共18页
多层级区块链架构是一种将多个区块链组织成树形的架构,其中每层的区块链可以通过跨链技术控制和管理与其连接的下一层区块链的部分功能和链上数据.然而,这种架构下的资产跨链转移是一个多跳跨链问题,证明跨链交易成功执行的证据需要沿... 多层级区块链架构是一种将多个区块链组织成树形的架构,其中每层的区块链可以通过跨链技术控制和管理与其连接的下一层区块链的部分功能和链上数据.然而,这种架构下的资产跨链转移是一个多跳跨链问题,证明跨链交易成功执行的证据需要沿源链到目标链路径进行多跳的传递与验证,导致跨链事务的执行时延较长以及证据传输开销与验证开销较大的问题.为此,提出一种面向多层级区块链架构的轻量级高效验证资产跨链转移方法,该方法引入顶层见证链连接各多层级架构,并在各链上部署见证合约,使跨链事务中的源链和目标链的父链作为见证链驱动跨链事务的完成.此外,还提出一种基于Verkle树的跨链事务验证证据,将区块内需要处理的跨链事务信息组织在采用KZG(Kate-Zaverucha-Goldberg)多项式承诺的Verkle树中,并将KZG承诺和证明数据加入证据中,通过验证证据证明跨链事务的执行状态,从而优化证据的传输和验证.理论分析和对方法原型的实验证明,所提方法降低了跨链事务的执行时延,并且相比采用简单支付验证的方案在不增加证据传输开销的基础上降低了证据验证开销,具有轻量级和高效验证的特点. 展开更多
关键词 多层级区块链架构 跨链 见证链 Verkle树 KZG承诺
在线阅读 下载PDF
基于区块链的物流信息监管模型 被引量:1
12
作者 金梦 蒋文保 《物流科技》 2025年第3期31-34,43,共5页
随着科技与经济的快速发展,人工智能、大数据、物联网及区块链等新型技术不断涌现,各行业均面临着前所未有的发展机遇,其中区块链技术对物流行业的影响尤为巨大。如何采用区块链技术推动物流行业的进步和发展成为了一个重要的课题。鉴于... 随着科技与经济的快速发展,人工智能、大数据、物联网及区块链等新型技术不断涌现,各行业均面临着前所未有的发展机遇,其中区块链技术对物流行业的影响尤为巨大。如何采用区块链技术推动物流行业的进步和发展成为了一个重要的课题。鉴于此,文章对基于区块链的物流信息监管模型的研究是十分有必要的。首先,文章分析了传统物流信息监管模型存在的问题,接着对区块链技术进行了概述及应用分析。然后对基于区块链的物流信息监管模型进行了设计及展望,并总结了文章的研究成果和意义。 展开更多
关键词 区块链技术 物流信息监管 架构设计
在线阅读 下载PDF
基于双链架构与BBF-Merkle树的高速公路事故救援数据共享方法
13
作者 王光辉 关道伟 +2 位作者 申凌峰 丁爽 翟中豪 《计算机应用研究》 北大核心 2025年第4期987-994,共8页
针对现有区块链数据共享方法在高速公路事故救援场景下面临的效率瓶颈和安全性不足的问题,提出一种高效、安全的数据共享方法,旨在提高数据查询性能,保证链下数据的防窜改能力。提出的数据共享方法结合公有链与联盟链的优势,采用双链架... 针对现有区块链数据共享方法在高速公路事故救援场景下面临的效率瓶颈和安全性不足的问题,提出一种高效、安全的数据共享方法,旨在提高数据查询性能,保证链下数据的防窜改能力。提出的数据共享方法结合公有链与联盟链的优势,采用双链架构提升数据共享的安全性与效率。通过将公有链链上共享数据的摘要信息同步至外部数据库,设计了基于BBF-Merkle树的数据库索引结构来优化查询性能,同时保证链下数据的防窜改能力。设计了缓存-链下数据库-公有链的分层查询方案,降低整体查询耗时。实验结果表明,基于BBF-Merkle树的外联数据库查询耗时相较于其他方案表现最优,采用基于BBF-Merkle树的缓存-数据库-公有链分层查询方案,相较于公有链智能合约查询速度提高了七倍。所提出的数据共享方法在提升数据共享效率、降低查询延迟的同时,确保了数据的安全性与防窜改能力,为高速公路事故救援数据共享提供了技术支撑。 展开更多
关键词 区块链 数据共享 区块链查询优化 双链架构
在线阅读 下载PDF
6G网络安全的架构与关键技术
14
作者 罗涵一 崔宝江 仝鑫 《中兴通讯技术》 北大核心 2025年第3期50-55,共6页
6G网络安全面临严峻挑战,尤其需应对5G固有的安全缺陷以及异构环境与量子计算带来的新型威胁。通过详细阐述6G网络安全需求及关键技术,系统性地梳理并分析了可信内生安全三层架构理念及其融合区块链、量子密钥分发与人工智能(AI)智能编... 6G网络安全面临严峻挑战,尤其需应对5G固有的安全缺陷以及异构环境与量子计算带来的新型威胁。通过详细阐述6G网络安全需求及关键技术,系统性地梳理并分析了可信内生安全三层架构理念及其融合区块链、量子密钥分发与人工智能(AI)智能编排等关键技术的应用,为构建面向未来的安全、可信的6G网络提供理论参考。 展开更多
关键词 6G网络 安全架构 量子通信 区块链
在线阅读 下载PDF
移动边缘计算环境下的信任评估技术综述
15
作者 朱雨润 任爽 《计算机应用研究》 北大核心 2025年第5期1281-1289,共9页
随着物联网设备规模的增长和5G网络的普及,移动边缘计算成为满足数据处理和计算需求的重要技术。为保障系统的安全性和可靠性,信任评估技术在该领域的应用日益受到关注。为此,系统梳理了移动边缘计算中的信任评估技术,主要任务包括总结... 随着物联网设备规模的增长和5G网络的普及,移动边缘计算成为满足数据处理和计算需求的重要技术。为保障系统的安全性和可靠性,信任评估技术在该领域的应用日益受到关注。为此,系统梳理了移动边缘计算中的信任评估技术,主要任务包括总结现有信任评估方法,回顾最新研究进展,重点探讨区块链技术和零信任架构在信任评估中的应用,主题范围涵盖信任评估技术的应用场景、当前挑战及未来发展方向等。 展开更多
关键词 移动边缘计算 信任评估 区块链 零信任架构
在线阅读 下载PDF
基于默克尔树结构的多链溯源技术
16
作者 周子愚 陈珊珊 《计算机工程与设计》 北大核心 2025年第5期1327-1334,共8页
针对供应链溯源中存储成本高、隐私易泄露、交易速度慢等问题,基于默克尔树搭建多链架构,设计智能合约实现数据查询、精准监管等功能,通过IPFS优化数据流;运用CBC-SM2算法保护企业隐私,将CBC模式与区块链结合降低密钥管理难度,减少上链... 针对供应链溯源中存储成本高、隐私易泄露、交易速度慢等问题,基于默克尔树搭建多链架构,设计智能合约实现数据查询、精准监管等功能,通过IPFS优化数据流;运用CBC-SM2算法保护企业隐私,将CBC模式与区块链结合降低密钥管理难度,减少上链成本;引入信誉机制改进Raft共识,根据信誉值设置L标志位减少无效竞选。实验结果表明,该方案降低约27%存储成本,查询效率提高,较其它方案仅单次查询即可完成溯源数据验伪;混合加密的效率提升40.4%,降低了通信开销;企业链共识效率提升6.57%,提高了供应链交易速率。 展开更多
关键词 区块链 智能合约 溯源 默克尔树 多链架构 隐私保护 Raft共识
在线阅读 下载PDF
区块链可扩展性研究综述:架构、数据与协议
17
作者 陈宝超 马立原 +5 位作者 徐昊 马俊成 胡登铖 刘秀龙 王建荣 李克秋 《网络空间安全科学学报》 2025年第2期12-27,共16页
区块链在各个行业得到了广泛应用,但随着用户数量和交易量的增长,区块链面临着显著的可扩展性挑战,这限制了其在高频率和数据密集型环境中的应用。系统地回顾了区块链可扩展性的最新研究,提出了一个新颖的双重分类框架,该框架从物理层... 区块链在各个行业得到了广泛应用,但随着用户数量和交易量的增长,区块链面临着显著的可扩展性挑战,这限制了其在高频率和数据密集型环境中的应用。系统地回顾了区块链可扩展性的最新研究,提出了一个新颖的双重分类框架,该框架从物理层和逻辑层以及三个维度(链内、链间和技术)来审视可扩展性。分析将领域特定的见解与更广泛的可扩展性趋势相结合,促进了对当前区块链发展现状更深入的理解。揭示了区块链架构、数据和协议中需要改进的关键点。通过开放讨论提供了对区块链可扩展性未来发展前景的见解。旨在帮助研究人员更好地理解架构、数据和协议,从而推动可扩展性研究的进展。 展开更多
关键词 区块链 扩展性 链内 链间 架构 数据 协议
在线阅读 下载PDF
基于区块链的船舶数据共享应用研究
18
作者 张煜 王文超 +4 位作者 商雷博 陈有芳 黄勇 黄景成 张伟 《科技创新与应用》 2025年第18期1-4,共4页
随着航运业的迅猛发展,船舶产生的海量数据在船舶运营、管理及安全等领域起到关键作用。然而,传统数据共享模式存在数据安全性欠佳、篡改风险高、所有权不明及共享效率低下等诸多问题。区块链技术的诞生为解决这些难题带来新的思路与方... 随着航运业的迅猛发展,船舶产生的海量数据在船舶运营、管理及安全等领域起到关键作用。然而,传统数据共享模式存在数据安全性欠佳、篡改风险高、所有权不明及共享效率低下等诸多问题。区块链技术的诞生为解决这些难题带来新的思路与方法。该文深入探究基于区块链的船舶数据共享应用,涵盖区块链技术的特性与优势、在船舶数据共享中的应用架构及关键技术,剖析其面临的挑战,并对未来发展趋势予以展望。 展开更多
关键词 区块链 船舶数据共享 分布式存储 智能合约 应用架构
在线阅读 下载PDF
基于区块链技术的药品供应保障系统:MedChain
19
作者 廖俊 曹术兰 +5 位作者 吕文轩 刘东平 蔡鸿斌 葛卫红 刘慧 梁红云 《药学与临床研究》 2025年第1期93-96,共4页
基于超级账本(HyperledgerFabric)区块链架构,采用Vue、Element以及Axios技术构建医疗保障供应系统(MedChain),借助江苏药品供应链数据对MedChain系统进行测试,并从安全性、效率和监管三个方面对系统性能进行了评估,结果显示MedChain系... 基于超级账本(HyperledgerFabric)区块链架构,采用Vue、Element以及Axios技术构建医疗保障供应系统(MedChain),借助江苏药品供应链数据对MedChain系统进行测试,并从安全性、效率和监管三个方面对系统性能进行了评估,结果显示MedChain系统能够在满足《药品经营质量管理规范》的前提下,提高药品从供应商到医疗机构以及医疗机构到医疗机构的流通效率,从而解决应急情况下的医疗机构药品短缺问题。 展开更多
关键词 药品供应 区块链 Hyperledger Fabric架构 药品可追溯 药品质量管理规范
暂未订购
工业区块链技术及其应用 被引量:1
20
作者 于明旭 陈栋梁 尚舵 《科技管理研究》 2025年第5期169-176,共8页
工业区块链是工业与区块链技术深度融合以重构工业运行体系的一种模式。工业企业利用工业区块链可以提高协同效率,优化业务流程,打造信任生态。目前中国工业区块链发展整体处于初期,技术的成熟和应用的落地还需要探索。为统一对工业区... 工业区块链是工业与区块链技术深度融合以重构工业运行体系的一种模式。工业企业利用工业区块链可以提高协同效率,优化业务流程,打造信任生态。目前中国工业区块链发展整体处于初期,技术的成熟和应用的落地还需要探索。为统一对工业区块链的认识,为工业区块链技术在工业领域的融合应用和创新发展提供参考,系统总结工业区块链内涵和特征,从产业、企业、产线/车间、设备/单元等4个实施层级以及关键技术、基础平台、融合模式3个层次构建工业区块链整体架构。基于行业研究现状和工业发展需求,提出工业区块链技术架构,对其关键技术、基础平台、融合模式、应用场景进行系统论述,其中通过对工业区块链在垂直行业应用的典型案例分析和研究,梳理出协同研发设计、精准质量管控、生产过程追溯、安全生产柔性监管、供应链金融、“双碳”数字化管理6种典型应用方式。在此基础上,提出未来工业区块链的发展需各方共同探索,并从技术、应用、产业层面向更广泛领域、更深场景渗透。 展开更多
关键词 工业区块链 关键技术 应用场景 融合模式 技术架构
在线阅读 下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部