Resource Type

Journal Article 81

Year

2023 12

2022 19

2021 13

2020 4

2019 4

2018 3

2017 4

2016 2

2015 2

2012 3

2011 4

2009 2

2008 2

2006 1

2005 3

2004 1

2003 1

2002 1

open ︾

Keywords

Blockchain 8

high-quality development 3

industrial chain 3

Internet of Things (IoT) 2

Smart manufacturing 2

agricultural whole industry chain 2

supply chain 2

supply chain management 2

N-glycans 1

N-glycosylation 1

Streptomyces sp. 1647 1

ABC-F family proteins 1

Access control 1

Acetogen 1

Anonymity 1

Anti-coronavirus 1

Anti-influenza A virus 1

Antibiotic resistance 1

Architecturally significant requirement (ASR) 1

open ︾

Search scope:

排序: Display mode:

Technology Development and Application of Blockchain: Current Status and Challenges

Sun Yi,Fan Lingjun and Hong Xuehai

Strategic Study of CAE 2018, Volume 20, Issue 2,   Pages 27-32 doi: 10.15302/J-SSCAE-2018.02.005

Abstract:

Blockchain, as the backbone of the future "Internet of Value" model, is considered to have the potential to significantly alter the current state of the economy and society. This paper explains the state-of-the-art development in blockchain technologies (e.g. blockchain architecture, consensus algorithm, privacy preserving, smart contract, and chain interoperability) and its applications, especially considering the technological challenges encountered when blockchain is widely applied in different domains. Furthermore, respectively from the perspective of technology, talent and supervision, we propose suggestions that could facilitate the further development of blockchain in China.

Keywords: high-throughput blockchain     consensus protocol     smart contract     cross-chain communication    

Cloud-based vs. blockchain-based IoT: a comparative survey and way forward Review

Raheel Ahmed MEMON, Jian Ping LI, Junaid AHMED, Muhammad Irshad NAZEER, Muhammad ISMAIL, Khursheed ALI

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 4,   Pages 563-586 doi: 10.1631/FITEE.1800343

Abstract: 物联网已发展十多年,技术进步使其应用更加广泛,但随着连接设备增多,引发的担忧及带来的风险也在显著增加。2013年,一种新的基于加密技术的基础设施——区块链——应运而生,通过去中心化,基于区块链的物联网有可能取代现有基于云的物联网。本文对当前物联网基础设施面临的挑战进行分类,并对采用区块链作为基础设施后物联网可能遇到的问题作文献调查,比较了两种体系结构的优缺点。简要介绍了正在进行的有关区块链的关键研究,这些研究将对克服区块链在物联网应用中遇到的挑战产生显著影响。最后,考虑到这两种体系各自面临的挑战和问题以及最新研究进展,提出一种高水平的混合方案,该方案综合利用云、边缘/雾计算和区块链,以避免这两种体系的局限性。

Keywords: Internet of Things (IoT)     Cloud     Blockchain     Data center     Taxonomy    

Incentive-Aware Blockchain-Assisted Intelligent Edge Caching and Computation Offloading for IoT Article

Qian Wang, Siguang Chen, Meng Wu

Engineering 2023, Volume 31, Issue 12,   Pages 127-138 doi: 10.1016/j.eng.2022.10.014

Abstract:

The rapid development of artificial intelligence has pushed the Internet of Things (IoT) into a new stage. Facing with the explosive growth of data and the higher quality of service required by users, edge computing and caching are regarded as promising solutions. However, the resources in edge nodes (ENs) are not inexhaustible. In this paper, we propose an incentive-aware blockchain-assisted intelligent edge caching and computation offloading scheme for IoT, which is dedicated to providing a secure and intelligent solution for collaborative ENs in resource optimization and controls. Specifically, we jointly optimize offloading and caching decisions as well as computing and communication resources allocation to minimize the total cost for tasks completion in the EN. Furthermore, a blockchain incentive and contribution co-aware federated deep reinforcement learning algorithm is designed to solve this optimization problem. In this algorithm, we construct an incentive-aware blockchain-assisted collaboration mechanism which operates during local training, with the aim to strengthen the willingness of ENs to participate in collaboration with security guarantee. Meanwhile, a contribution-based federated aggregation method is developed, in which the aggregation weights of EN gradients are based on their contributions, thereby improving the training effect. Finally, compared with other baseline schemes, the numerical results prove that our scheme has an efficient optimization utility of resources with significant advantages in total cost reduction and caching performance.

Keywords: Computation offloading     Caching     Incentive     Blockchain     Federated deep reinforcement learning    

Double-blockchain Assisted Secure and Anonymous Data Aggregation for Fog-enabled Smart Grid Article

Siguang Chen, Li Yang, Chuanxin Zhao, Vijayakumar Varadarajan, Kun Wang

Engineering 2022, Volume 8, Issue 1,   Pages 159-169 doi: 10.1016/j.eng.2020.06.018

Abstract:

As a future energy system, the smart grid is designed to improve the efficiency of traditional power systems while providing more stable and reliable services. However, this efficient and reliable service relies on collecting and analyzing users’ electricity consumption data frequently, which induces various security and privacy threats. To address these challenges, we propose a double-blockchain assisted secure and anonymous data aggregation scheme for fog-enabled smart grid named DA-SADA. Specifically, we design a three-tier architecture-based data aggregation framework by integrating fog computing and the blockchain, which provides strong support for achieving efficient and secure data collection in smart grids. Subsequently, we develop a secure and anonymous data aggregation mechanism with low computational overhead by jointly leveraging the Paillier encryption, batch aggregation signature and anonymous authentication. In particular, the system achieves fine-grained data aggregation and provides effective support for power dispatching and price adjustment by the designed double-blockchain and two-level data aggregation. Finally, the superiority of the proposed scheme is illustrated by a series of security and computation cost analyses.

Keywords: Blockchain     Fog computing     Homomorphic encryption     Smart grid     Anonymity    

RCDS: a right-confirmable data-sharing model based on symbol mapping coding and blockchain Research Article

Liang WANG, Shunjiu HUANG, Lina ZUO, Jun LI, Wenyuan LIU,wangl@hbu.edu.cn,sjhuang1120@stumail.hbu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 8,   Pages 1194-1213 doi: 10.1631/FITEE.2200659

Abstract: The problem of is a long-term bottleneck in . Existing methods for confirming data rights lack credibility owing to poor supervision, and work only with specific data types because of their technical limitations. The emergence of is followed by some new data-sharing models that may provide improved data security. However, few of these models perform well enough in confirming data rights because the data access could not be fully under the control of the facility. In view of this, we propose a right-confirmable data-sharing model named RCDS that features (SMC) and . With SMC, each party encodes its digital identity into the byte sequence of the shared data by generating a unique symbol mapping table, whereby declaration of data rights can be content-independent for any type and any volume of data. With , all data-sharing participants jointly supervise the delivery and the access to shared data, so that granting of data rights can be openly verified. The evaluation results show that RCDS is effective and practical in data-sharing applications that are conscientious about .

Keywords: Data right confirmation     Symbol mapping coding     Blockchain     Data sharing     Traitor tracing     Access control    

Blockchain for Transparent Data Management Toward 6G Article

Xuemin (Sherman) Shen, Dongxiao Liu, Cheng Huang, Liang Xue, Han Yin, Weihua Zhuang, Rob Sun, Bidi Ying

Engineering 2022, Volume 8, Issue 1,   Pages 74-85 doi: 10.1016/j.eng.2021.10.002

Abstract:

The wealth of user data acts as a fuel for network intelligence toward the sixth generation wireless networks (6G). Due to data heterogeneity and dynamics, decentralized data management (DM) is desirable for achieving transparent data operations across network domains, and blockchain can be a promising solution. However, the increasing data volume and stringent data privacy-preservation requirements in 6G bring significantly technical challenge to balance transparency, efficiency, and privacy requirements in decentralized blockchain-based DM. In this paper, we propose blockchain solutions to address the challenge. First, we explore the consensus protocols and scalability mechanisms in blockchains and discuss the roles of DM stakeholders in blockchain architectures. Second, we investigate the authentication and authorization requirements for DM stakeholders. Third, we categorize DM privacy requirements and study blockchain-based mechanisms for collaborative data processing. Subsequently, we present research issues and potential solutions for blockchain-based DM toward 6G from these three perspectives. Finally, we conclude this paper and discuss future research directions.

Keywords: Blockchain     Data management     Decentralization     Transparency     Privacy    

A Blockchain-Based Life-Cycle Environmental Management Framework for Hospitals in the COVID-19 Context Article

Botao Zhong,Han Gao,Lieyun Ding,Yuhang Wang

Engineering 2023, Volume 20, Issue 1,   Pages 208-221 doi: 10.1016/j.eng.2022.06.024

Abstract:

During the coronavirus disease 2019 (COVID-19) emergency, many hospitals were built or renovated around the world to meet the challenges posed by the rising number of infected cases. Environmental management in the hospital life cycle is vital in preventing nosocomial infection and includes many infection control procedures. In certain urgent situations, a hospital must be completed quickly, and work process approval and supervision must therefore be accelerated. Thus, many works cannot be checked in detail. This results in a lack of work liability control and increases the difficulty of ensuring the fulfillment of key infection prevention measures. This study investigates how blockchain technology can transform the work quality inspection workflow to assist in nosocomial infection control under a fast delivery requirement. A blockchain-based life-cycle environmental management framework is proposed to track the fulfillment of crucial infection control measures in the design, construction, and operation stages of hospitals. The proposed framework allows for work quality checking after the work is completed, when some work cannot be checked on time. Illustrative use cases are selected to demonstrate the capabilities of the developed solution. This study provides new insights into applying blockchain technology to address the challenge of environmental management brought by rapid delivery requirements.

Keywords: Blockchain     Environmental management     Nosocomial infection control     Work quality management     Life-cycle traceability    

Blockchain-Based Emergency Information Sharing System for Public Health Security

Chen Xiaohong, Xu Xuesong, Shao Hongyan, Hu Dongbin, Su Yun,Mao Xingliang, Tang Xiangbo

Strategic Study of CAE 2021, Volume 23, Issue 5,   Pages 41-50 doi: 10.15302/J-SSCAE-2021.05.006

Abstract:

The coronavirus disease 2019 (COVID-19) pandemic has caused severe human casualties and economic losses. Strengthening research on the coordination of public health security emergency information and building a more efficient and credible emergency information sharing system have become the core issues to optimize the public health security information management in China. This study analyzes the structure and connotations of public health security emergency information and proposes a new structure for emergency information management of sudden epidemics in China. We create a hierarchical blockchain model for information sharing among emergency response departments based on the blockchain distributed trust mechanism and elaborate the emergency information consortium blockchain, block structure, and implementation of the side chain interaction mechanism. Moreover, the uploading, sharing, downloading, and backtracking processes of emergency information are presented. Using the COVID-19 epidemic control in Nanjing as an example, we verify the validity of this model through scenario simulation and propose policy recommendations for responding to the epidemic. This study is expected to provide a decision-making reference and feasible path for building a new public health information system in China that meets the needs of prevention and control of major epidemics.

Keywords: COVID-19 pandemic     public health security     emergency information     sharing     consortium blockchain    

State-of-the-Art Analysis and Perspectives for Peer-to-Peer Energy Trading Review

Yue Zhou, Jianzhong Wu, Chao Long, Wenlong Ming

Engineering 2020, Volume 6, Issue 7,   Pages 739-753 doi: 10.1016/j.eng.2020.06.002

Abstract:

As a promising solution to address the “energy trilemma” confronting human society, peer-to-peer (P2P) energy trading has emerged and rapidly developed in recent years. When carrying out P2P energy trading, customers with distributed energy resources (DERs) are able to directly trade and share energy with each other. This paper summarizes and analyzes the global development of P2P energy trading based on a comprehensive review of related academic papers, research projects, and industrial practice. Key aspects in P2P energy trading are identified and discussed, including market design, trading platforms, physical infrastructure and information and communication technology (ICT) infrastructure, social science perspectives, and policy. For each key aspect, existing research and practice are critically reviewed and insights for future development are presented. Comprehensive concluding remarks are provided at the end, summarizing the major findings and perspectives of this paper. P2P energy trading is a growing field with great potential and opportunities for both academia and industry across the world.

Keywords: Peer-to-peer energy trading     Distributed energy resource     Local electricity market     Blockchain     Energy policy    

Cyber-Physical Production Systems for Data-Driven, Decentralized, and Secure Manufacturing—A Perspective Perspective

Manu Suvarna, Ken Shaun Yap, Wentao Yang, Jun Li, Yen Ting Ng, Xiaonan Wang

Engineering 2021, Volume 7, Issue 9,   Pages 1212-1223 doi: 10.1016/j.eng.2021.04.021

Abstract:

With the concepts of Industry 4.0 and smart manufacturing gaining popularity, there is a growing notion that conventional manufacturing will witness a transition toward a new paradigm, targeting innovation, automation, better response to customer needs, and intelligent systems. Within this context, this review focuses on the concept of cyber-physical production system (CPPS) and presents a holistic perspective on the role of the CPPS in three key and essential drivers of this transformation: data-driven manufacturing, decentralized manufacturing, and integrated blockchains for data security. The paper aims to connect these three aspects of smart manufacturing and proposes that through the application of data-driven modeling, CPPS will aid in transforming manufacturing to become more intuitive and automated. In turn, automated manufacturing will pave the way for the decentralization of manufacturing. Layering blockchain technologies on top of CPPS will ensure the reliability and security of data sharing and integration across decentralized systems. Each of these claims is supported by relevant case studies recently published in the literature and from the industry; a brief on existing challenges and the way forward is also
provided.

Keywords: Smart manufacturing     Cyber-physical production systems     Industrial Internet of Things     Data analytics     Decentralized system     Blockchain    

Low powered blockchain consensus protocols based on consistent hash Research Article

Lei Yu, Xiao-fang Zhao, Yan Jin, Heng-yi Cai, Bo Wei, Bin Hu,yulei@ncic.ac.cn

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 10,   Pages 1361-1377 doi: 10.1631/FITEE.1800119

Abstract: Current s have a triangle of contradictions in aspects of decentralization, security, and energy con-sumption, and cannot be synchronously optimized. We describe a design of two new s, called “CHB-consensus” and “CHBD-consensus,” based on a algorithm. Honest miners can fairly gain the opportunity to create blocks. They do not consume any extra computational power resources when creating new blocks, and such blocks can obtain the whole network to confirm consensus with fairness. However, malicious miners have to pay massive computational power resources for attacking the new block creation privilege or double-spending. networks formed by CHB-consensus and CHBD-consensus are based on the same security assumption as that in Bitcoin systems, so they save a huge amount of power without sacrificing decentralization or security. We analyze possible attacks and give a rigorous but adjustable validation strategy. CHB-consensus and CHBD-consensus introduce a certification authority (CA) system, which does not have special management or control rights over networks or data structures, but carries the risk of privacy breaches depending on credibility and reliability of the CA system. Here, we analyze the robustness and energy consumption of CHB-consensus and CHBD-consensus, and demonstrate their advantages through theoretical derivation.

Keywords: 区块链;共识协议;一致性哈希;低能耗;去中心化    

Research on Foreign ICT Supply Chain Security Management with Suggestions

Ni Guangnan,Chen Xiaohua and Shang Yanmin、Wang Hailong、Xu Kefu

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 104-109 doi: 10.15302/J-SSCAE-2016.06.021

Abstract:

Given the nation’s critical infrastructure and key resources (CIKR) reliance on information and communication technology (ICT), identifying and controlling the ICT supply chain risk has become an important factor when protecting national security. As the forerunner of ICT supply chain management, the US provides rich experience in enhancing the strategic position of the ICT supply chain, establishing the standards of ICT supply chain management, ensuring the security of software and hardware in the ICT supply chain, and supervising the procurement of ICT supply chains. In addition, the EU and Russia also specifically strengthen the security management of the ICT supply chain. Based on the above research, this paper provides some suggestions on the security management of the ICT supply chain in China.

Keywords: supply chain risk management     hardware supply chain     software supply chain     procurement security    

Agriculture High and New Technology and Agricultural Supply Chain’s Strategic Reengineering in the 21st Century

Zhang Shengyi

Strategic Study of CAE 2005, Volume 7, Issue 2,   Pages 9-14

Abstract:

In the 21st century the development of agriculture high and new technology will provide the chance for agricultural supply chain’s strategic reengineering. It can make agricultural supply chain highly stable, promote agricultural supply chain’s flexibility and time-based competitive ability, and notably improve integrated agricultural logistics and strongly support the basic competition strategy of agricultural supply chain and its high integration process.

Keywords: agriculture high and new technology     agricultural supply chain     supply chain management     agricultural logistics     reengineering    

An evaluation method for link importance based on the characteristic of network communication

Jiang Yu,Hu Aiqun,He Ming

Strategic Study of CAE 2009, Volume 11, Issue 9,   Pages 64-67

Abstract:

A method for finding the most vital edge based on the characteristic of network communication is proposed. The link importance is determined by its using frequency in all-pairs shortest paths and the most vital edge results in the highest frequency. Without the commonly used edge-deletion and edge-contraction methods, the proposed algorithm directly reflects the edge's contribution to the network communication and the relative importance of the two edges in the network can be evaluated. The algorithm analyses and the experimental results show that this algorithm overcomes the currently existent problems and provides a more reasonable principle for ranking edges which is consistent with our intuitive judgments.

Keywords: communication networks     link importance     shortest paths     serial links    

The Application of Intellective Mathematics Models in Supply Chain Management

Bai Yuchao

Strategic Study of CAE 2006, Volume 8, Issue 1,   Pages 58-62

Abstract:

The purpose of this paper is to discuss the infection of supply chain management in the IT age , especially the functional disadvantage of supply chain management software named SCM. On the basis of intellective mathematics, the paper puts forward some concrete development countermeasures for modern logistics business, depending on the methods of intellective mathematics model. And an example is offered with the SWOT method.

Keywords: intellective mathematics model     supply chain management     SCM     SWOT    

Title Author Date Type Operation

Technology Development and Application of Blockchain: Current Status and Challenges

Sun Yi,Fan Lingjun and Hong Xuehai

Journal Article

Cloud-based vs. blockchain-based IoT: a comparative survey and way forward

Raheel Ahmed MEMON, Jian Ping LI, Junaid AHMED, Muhammad Irshad NAZEER, Muhammad ISMAIL, Khursheed ALI

Journal Article

Incentive-Aware Blockchain-Assisted Intelligent Edge Caching and Computation Offloading for IoT

Qian Wang, Siguang Chen, Meng Wu

Journal Article

Double-blockchain Assisted Secure and Anonymous Data Aggregation for Fog-enabled Smart Grid

Siguang Chen, Li Yang, Chuanxin Zhao, Vijayakumar Varadarajan, Kun Wang

Journal Article

RCDS: a right-confirmable data-sharing model based on symbol mapping coding and blockchain

Liang WANG, Shunjiu HUANG, Lina ZUO, Jun LI, Wenyuan LIU,wangl@hbu.edu.cn,sjhuang1120@stumail.hbu.edu.cn

Journal Article

Blockchain for Transparent Data Management Toward 6G

Xuemin (Sherman) Shen, Dongxiao Liu, Cheng Huang, Liang Xue, Han Yin, Weihua Zhuang, Rob Sun, Bidi Ying

Journal Article

A Blockchain-Based Life-Cycle Environmental Management Framework for Hospitals in the COVID-19 Context

Botao Zhong,Han Gao,Lieyun Ding,Yuhang Wang

Journal Article

Blockchain-Based Emergency Information Sharing System for Public Health Security

Chen Xiaohong, Xu Xuesong, Shao Hongyan, Hu Dongbin, Su Yun,Mao Xingliang, Tang Xiangbo

Journal Article

State-of-the-Art Analysis and Perspectives for Peer-to-Peer Energy Trading

Yue Zhou, Jianzhong Wu, Chao Long, Wenlong Ming

Journal Article

Cyber-Physical Production Systems for Data-Driven, Decentralized, and Secure Manufacturing—A Perspective

Manu Suvarna, Ken Shaun Yap, Wentao Yang, Jun Li, Yen Ting Ng, Xiaonan Wang

Journal Article

Low powered blockchain consensus protocols based on consistent hash

Lei Yu, Xiao-fang Zhao, Yan Jin, Heng-yi Cai, Bo Wei, Bin Hu,yulei@ncic.ac.cn

Journal Article

Research on Foreign ICT Supply Chain Security Management with Suggestions

Ni Guangnan,Chen Xiaohua and Shang Yanmin、Wang Hailong、Xu Kefu

Journal Article

Agriculture High and New Technology and Agricultural Supply Chain’s Strategic Reengineering in the 21st Century

Zhang Shengyi

Journal Article

An evaluation method for link importance based on the characteristic of network communication

Jiang Yu,Hu Aiqun,He Ming

Journal Article

The Application of Intellective Mathematics Models in Supply Chain Management

Bai Yuchao

Journal Article