With the development of blockchain, various blockchain-based applications emerged. Of which Bitcoin and Ethereum are the most representative and popular blockchain applications. Therefore, it is important to compare B...
详细信息
ISBN:
(纸本)9781665412971
With the development of blockchain, various blockchain-based applications emerged. Of which Bitcoin and Ethereum are the most representative and popular blockchain applications. Therefore, it is important to compare Bitcoin with Ethereum and infer their developing trends. In the paper, we compare Bitcoin and Ethereum from different perspectives, including consensus algorithm, transaction cost, extension, and security. Comparative results demonstrate that Ethereum is better than Bitcoin on extension and transaction mechanism. Also, based on the results, we discuss about the essential development trend about blockchain applications. In the future, blockchain applications will be a platform which can provide more functions than digital currencies.
Although historical opinion has held that the red-black tree is faster than the AVL tree, benchmarks reveal that the AVL tree is faster than the red-black tree for deletion, often faster for insertion, and as fast or ...
详细信息
Following the hierarchical control architecture, this paper investigates the diffusion algorithm based distributed secondary control in islanded AC microgrids. The principle of diffusion algorithm is introduced first ...
详细信息
ISBN:
(数字)9781728158266
ISBN:
(纸本)9781728158273
Following the hierarchical control architecture, this paper investigates the diffusion algorithm based distributed secondary control in islanded AC microgrids. The principle of diffusion algorithm is introduced first and then diffusion algorithm-based distributed secondary control strategies are analyzed in details. Compared to the conventional consensus algorithm employed in the secondary control, it is shown that diffusion algorithm shows a faster convergence and a smaller deviation from the nominal value. A three-node islanded AC MG is simulated and the results confirm that the proposed diffusion-based secondary control outperforms consensus-based approach in terms of voltage/frequency restoration.
blockchain technology is one of the strategic emerging information technologies. It integrates a variety of technologies such as cryptography, peer-to-peer network, consensus algorithm and smart contract, and has been...
详细信息
ISBN:
(纸本)9781665426480
blockchain technology is one of the strategic emerging information technologies. It integrates a variety of technologies such as cryptography, peer-to-peer network, consensus algorithm and smart contract, and has been gradually applied in various fields. The contradiction between the rapid development of blockchain industry and the incompleteness of evaluation system and technical means has become increasingly prominent. The vulnerability of blockchain system is an important part of blockchain evaluation system. It is of great significance for the development of blockchain technology and large-scale application to fully study the vulnerability of blockchain system and conduct quantitative evaluation or real-time monitoring. This paper systematically analyzes the vulnerability of blockchain, and puts forward the technical indicators to evaluate the vulnerability of blockchain. Based on the vulnerability technical index of blockchain consensus algorithm and industrial blockchain consensus algorithm PBFT, a consensus algorithm confrontation deduction model is designed, and the vulnerability index of blockchain system using PBFT is experimentally simulated and evaluated.
Enterprises are no doubt interested in reaching data collected from billions of Internet of Things (IoT) devices which opens a huge potential business. The main concern remains the security challenges from the distrib...
详细信息
Enterprises are no doubt interested in reaching data collected from billions of Internet of Things (IoT) devices which opens a huge potential business. The main concern remains the security challenges from the distribution of key while using public key cryptography. To ensure that IOT connected devices can be trusted to be what they are supposed to be, robust IoT device authentication is mandated. Each IoT device therefore requires a unique identity which can be verified when the device tries to link to an intermediate device. One of the early solutions used to secure data transmission among parties in public networks is the Public Key Infrastructure (PKI) which is used to distribute and manage public keys (digital certificates) among different parties and these certificates are generated upon request by Certificate Authorities (CA). Nevertheless, for billions of devices connected to IoT and mobile phones, the distribution management of certificates for each client proved to be inefficient. In this research, we propose a decentralized authentication platform based on PKI and Ethereum Blockchain. The public key certificates are stored in a decentralized fashion and the private keys are stored inside the devices themselves. It also includes a protocol for Pre-Shared Keys (PSK) distribution. PSK keys are then used by PSK-based security protocols for securing the communication channel between two devices. This platform includes a client-side module, a server-side Wallet Management Function, and a smart contract deployed on the Ethereum Blockchain network. This platform can be used by applications for end devices and/or intermediate devices authentication and a secure Machine-to-Machine (M2M) communication. The proposed platform is validated by the implementation of a Secure Session Establishment between IoT devices. Results show that the solution implementation has minimal impact on the existing networks, and the secure session setup time between two devices is negligib
In the age of rapidly progressing technology, the healthcare sector is embracing the revolution of digital transformation through the widespread adoption of Electronic Health Records (EHRs). Nevertheless, the digital ...
详细信息
ISBN:
(数字)9798350394412
ISBN:
(纸本)9798350394429
In the age of rapidly progressing technology, the healthcare sector is embracing the revolution of digital transformation through the widespread adoption of Electronic Health Records (EHRs). Nevertheless, the digital realm also presents notable challenges, particularly pertaining to the security and confidentiality of patients' delicate health data. This document introduces the innovative Smart GuardianChain, a blockchain-based distributed system crafted to tackle these pivotal concerns by establishing an infallible, decentralized, and impervious platform for the management and sharing of *** GuardianChain capitalizes on a robust consensus algorithm to ensure the integrity of EHRs, thus safeguarding the genuineness of medical records in an increasingly interconnected healthcare ecosystem. To guarantee that solely authorized entities have access to patient information, the system integrates an intricate mechanism for access control. Patients are bestowed with complete authority over their EHRs, enabling them to manage access permissions as they deem appropriate. Through extensive experimentation, our results demonstrate the scalability, efficiency, and effectiveness of the proposed system, which not only enhances security but also preserves patient privacy. By addressing the pressing privacy challenges that EHR systems face today, Smart GuardianChain stands poised to revolutionize the quality of healthcare services, fostering trust and confidence in the digital healthcare landscape.
This paper introduces a method called Sequential and Simultaneous Distance-based Dimension Reduction (S2D2R) that performs simultaneous dimension reduction for a pair of random vectors based on distance covariance (dC...
详细信息
Given two matroidsM1 andM2 over the same n-element ground set, the matroid intersection problem is to find a largest common independent set, whose size we denote by r. We present a simple and generic auction algorithm...
详细信息
When a robotic arm is in motion, it typically cannot intelligently perform complex tasks in response to changes in the surrounding environment. Introducing a vision-based spatial target recognition method enables the ...
详细信息
ISBN:
(数字)9798350387780
ISBN:
(纸本)9798350387797
When a robotic arm is in motion, it typically cannot intelligently perform complex tasks in response to changes in the surrounding environment. Introducing a vision-based spatial target recognition method enables the robotic arm to accurately acquire spatial information about the environment, laying the foundation for autonomous execution of intricate tasks by the robotic arm. Therefore, this paper investigates vision-based spatial target recognition methods. The approach employed utilizes template matching based on descriptors. The feature point extraction is accomplished through the application of the Improved ORB (Oriented FAST and Rotated BRIEF) image feature extraction algorithm. Furthermore, an improved GMS (Grid-based motion statistics) fusion MLESAC (Maximum Likelihood Estimator Sample consensus) algorithm is used to accomplish the matching between the captured image and the template image. The research results demonstrate that the proposed method can achieve accurate, rapid, and stable target recognition.
In this work, we study online submodular maximization, and how the requirement of maintaining a stable solution impacts the approximation. In particular, we seek bounds on the best-possible approximation ratio that is...
详细信息
暂无评论