Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy *** it will cause the accumulation of data on the chain and resulting in the low efficiency of block...
详细信息
Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy *** it will cause the accumulation of data on the chain and resulting in the low efficiency of block verification,when the whole transaction on the chain is *** order to improve the efficiency and privacy protection of block data verification,this paper proposes an efficient block verification mechanism with privacy protection based on zeroknowledge proof(ZKP),which not only protects the privacy of users but also improves the speed of data block *** is no need to put the whole transaction on the chain when verifying block *** just needs to generate the ZKP and root hash with the transaction information,then save them to the smart contract for ***,the ZKP verification in smart contract is carried out to realize the privacy protection of the transaction and efficient verification of the *** the data is validated,the buffer accepts the complete transaction,updates the transaction status in the cloud database,and packages up the ***,the ZKP strengthens the privacy protection ability of blockchain,and the smart contracts save the time cost of block verification.
As Internet of Things (IoT) networks proliferate across consumer and industrial sectors, safeguarding these interconnected cyber-physical systems is imperative. IoT ecosystems present abundant targets for malicious in...
详细信息
Path planning for autonomous search and tracking of multiple objects is a critical problem in applications such as reconnaissance, surveillance, and data gathering. Due to the inherent competing objectives of searchin...
详细信息
Blockchain technologies have been used to facilitate Web 3.0 and FinTech ***,conventional blockchain technologies suffer from long transaction delays and low transaction success rates in some Web 3.0 and FinTech appli...
详细信息
Blockchain technologies have been used to facilitate Web 3.0 and FinTech ***,conventional blockchain technologies suffer from long transaction delays and low transaction success rates in some Web 3.0 and FinTech applications such as Supply Chain Finance(SCF).Blockchain sharding has been proposed to improve blockchain ***,the existing sharding methods either use a static sharding strategy,which lacks the adaptability for the dynamic SCF environment,or are designed for public chains,which are not applicable to consortium blockchain-based *** address these issues,we propose an adaptive consortium blockchain sharding framework named ACSarF,which is based on the deep reinforcement learning *** proposed framework can improve consortium blockchain sharding to effectively reduce transaction delay and adaptively adjust the sharding and blockout strategies to increase the transaction success rate in a dynamic SCF ***,we propose to use a consistent hash algorithm in the ACSarF framework to ensure transaction load balancing in the adaptive sharding system to further improve the performance of blockchain sharding in dynamic SCF *** evaluate the proposed framework,we conducted extensive experiments in a typical SCF *** obtained experimental results show that the ACSarF framework achieves a more than 60%improvement in user experience compared to other state-of-the-art blockchain systems.
Graph Neural Networks (GNNs) are widely employed to derive meaningful node representations from graphs. Despite their success, deep GNNs frequently grapple with the oversmoothing issue, where node representations beco...
详细信息
Visible-Infrared Person Re-identification (VI-ReID) is a challenging cross-modal retrieval task due to significant modality differences, primarily resulting from the absence of color information in the infrared modali...
This paper introduces a new one-dimensional chaotic system and a new image encryption algorithm. Firstly, the new chaotic system is analyzed. The bifurcation diagram and Lyapunov exponent show that the system has stro...
详细信息
Cloud computing eliminates the limitations of local hardware architecture while also enabling rapid data sharing between healthcare institutions. Encryption of electronic medical records (EMRs) before uploading to clo...
详细信息
Human action recognition (HAR) plays a vital role in various fields, including surveillance, healthcare, and human–computer interaction. Recognizing multi-actor actions in crowded scenarios poses a significant challe...
详细信息
Generator tripping scheme(GTS)is the most commonly used scheme to prevent power systems from losing safety and ***,GTS is composed of offline predetermination and real-time scenario ***,it is extremely time-consuming ...
详细信息
Generator tripping scheme(GTS)is the most commonly used scheme to prevent power systems from losing safety and ***,GTS is composed of offline predetermination and real-time scenario ***,it is extremely time-consuming and labor-intensive for manual predetermination for a large-scale modern power *** improve efficiency of predetermination,this paper proposes a framework of knowledge fusion-based deep reinforcement learning(KF-DRL)for intelligent predetermination of ***,the Markov Decision Process(MDP)for GTS problem is formulated based on transient instability ***,linear action space is developed to reduce dimensionality of action space for multiple controllable ***,KF-DRL leverages domain knowledge about GTS to mask invalid actions during the decision-making *** can enhance the efficiency and learning ***,the graph convolutional network(GCN)is introduced to the policy network for enhanced learning *** simulation results obtained on New England power system demonstrate superiority of the proposed KF-DRL framework for GTS over the purely data-driven DRL method.
暂无评论