首页 > 最新文献

信息工程最新文献

英文 中文
IF:
Price Mechanism, Government Constraints and Carbon Trading Pilot Policy for Emission Reduction 价格机制、政府约束与碳交易减排试点政策
Pub Date : 2024-03-11 DOI: 10.1162/dint_a_00247
Huang Wei, Xue Haili, Zhang Qin, Lan Xiao, Haoguang Liang
Based on the data of 247 cities at the prefecture level in China from 2007 to 2019, this paper analyzes the impact of the carbon emissions trading CET pilot policy on carbon emission reduction from the perspective of the price mechanism and government constraints. The results show that the carbon emissions and carbon intensity in the pilot areas are significantly reduced by adjusting the industrial structure and promoting green technology innovation. In terms of regions, the emission reduction effect of the pilot policy in regions with a high proportion of industry is obviously weaker than that in other regions. The aim of the carbon emission trading policy in China that achieve carbon emission reduction is by coordinating the carbon emission trading price that fail to fulfill this aim independently and the degree of government punishment for enterprises.
本文基于2007-2019年中国247个地级市的数据,从价格机制和政府约束的角度分析了碳排放交易CET试点政策对碳减排的影响。结果表明,通过调整产业结构和推动绿色技术创新,试点地区的碳排放量和碳强度显著降低。从地区来看,工业比重高的地区试点政策的减排效果明显弱于其他地区。我国碳排放权交易政策实现碳减排的目的是通过协调碳排放权交易价格和政府对企业的惩罚力度来实现的,而不能独立实现这一目的。
{"title":"Price Mechanism, Government Constraints and Carbon Trading Pilot Policy for Emission Reduction","authors":"Huang Wei, Xue Haili, Zhang Qin, Lan Xiao, Haoguang Liang","doi":"10.1162/dint_a_00247","DOIUrl":"https://doi.org/10.1162/dint_a_00247","url":null,"abstract":"\u0000 Based on the data of 247 cities at the prefecture level in China from 2007 to 2019, this paper analyzes the impact of the carbon emissions trading CET pilot policy on carbon emission reduction from the perspective of the price mechanism and government constraints. The results show that the carbon emissions and carbon intensity in the pilot areas are significantly reduced by adjusting the industrial structure and promoting green technology innovation. In terms of regions, the emission reduction effect of the pilot policy in regions with a high proportion of industry is obviously weaker than that in other regions. The aim of the carbon emission trading policy in China that achieve carbon emission reduction is by coordinating the carbon emission trading price that fail to fulfill this aim independently and the degree of government punishment for enterprises.","PeriodicalId":57117,"journal":{"name":"Data Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140254337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure smart contract-based digital twins for the Internet of Things 基于智能合约的安全物联网数字双胞胎
IF 5.6 3区 计算机科学 Pub Date : 2024-03-01 DOI: 10.1016/j.bcra.2023.100168
Iakovos Pittaras , Nikos Fotiou , Christos Karapapas , Vasilios A. Siris , George C. Polyzos

The proliferation of Internet of Things (IoT) devices that operate unattended providing a multitude of important and often sensitive services highlights the need for seamless interoperability and increased security. We argue that digital twins of IoT devices, with the right design, can enhance the security, reliability, auditability, and interoperability of IoT systems. The salient features of digital twins have made them key elements for the IoT and Industry 4.0. In this paper, we leverage advances in W3C's Web of Things (WoT) standards and distributed ledger technologies (DLTs) to present a novel design of the smart contract-based digital twins with enhanced security, transparency, interoperability, and reliability. We provide two different variations of that general design using two different blockchains (one public and one private, permissioned blockchain), and we present design trade-offs. Furthermore, we introduce an architecture for accessing and controlling IoT devices securely and reliably, providing full auditability, while at the same time using the proposed digital twins as an indirection mechanism (proxy). The proposed architecture leverages the blockchain to offer notable properties, namely,decentralization, immutability, auditability, non-repudiation, availability, and reliability. Moreover, it introduces mass actuation, easier management of IoT devices, and enhanced security to the IoT gateways, enables new business models, and makes consumer devices (vendor-)agnostic.

物联网(IoT)设备在无人值守的情况下大量涌现,提供了大量重要且往往敏感的服务,这凸显了无缝互操作性和更高安全性的需求。我们认为,如果设计得当,物联网设备的数字孪生可以增强物联网系统的安全性、可靠性、可审计性和互操作性。数字孪生的突出特点使其成为物联网和工业 4.0 的关键要素。在本文中,我们利用万维网联盟(W3C)物联网(WoT)标准和分布式账本技术(DLT)的进步,提出了一种基于智能合约的数字双胞胎新设计,具有更高的安全性、透明度、互操作性和可靠性。我们使用两个不同的区块链(一个公有区块链和一个私有许可区块链)提供了该总体设计的两种不同变体,并介绍了设计权衡。此外,我们还介绍了一种用于安全可靠地访问和控制物联网设备的架构,该架构可提供全面的可审计性,同时将所提出的数字双胞胎用作间接机制(代理)。所提出的架构利用区块链提供了显著的特性,即去中心化、不变性、可审计性、不可抵赖性、可用性和可靠性。此外,它还为物联网网关引入了大规模启动、更简便的物联网设备管理和更强的安全性,实现了新的商业模式,并使消费设备(供应商)变得不可知论。
{"title":"Secure smart contract-based digital twins for the Internet of Things","authors":"Iakovos Pittaras ,&nbsp;Nikos Fotiou ,&nbsp;Christos Karapapas ,&nbsp;Vasilios A. Siris ,&nbsp;George C. Polyzos","doi":"10.1016/j.bcra.2023.100168","DOIUrl":"10.1016/j.bcra.2023.100168","url":null,"abstract":"<div><p>The proliferation of Internet of Things (IoT) devices that operate unattended providing a multitude of important and often sensitive services highlights the need for seamless interoperability and increased security. We argue that digital twins of IoT devices, with the right design, can enhance the security, reliability, auditability, and interoperability of IoT systems. The salient features of digital twins have made them key elements for the IoT and Industry 4.0. In this paper, we leverage advances in W3C's Web of Things (WoT) standards and distributed ledger technologies (DLTs) to present a novel design of the smart contract-based digital twins with enhanced security, transparency, interoperability, and reliability. We provide two different variations of that general design using two different blockchains (one public and one private, permissioned blockchain), and we present design trade-offs. Furthermore, we introduce an architecture for accessing and controlling IoT devices securely and reliably, providing full auditability, while at the same time using the proposed digital twins as an indirection mechanism (proxy). The proposed architecture leverages the blockchain to offer notable properties, namely,decentralization, immutability, auditability, non-repudiation, availability, and reliability. Moreover, it introduces mass actuation, easier management of IoT devices, and enhanced security to the IoT gateways, enables new business models, and makes consumer devices (vendor-)agnostic.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S209672092300043X/pdfft?md5=0376a47ce6ca0b86a9111441dca241b3&pid=1-s2.0-S209672092300043X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139291335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effectiveness of chemical inactivation of infectious liquid biological waste: A randomized sample study of research laboratories in Switzerland 化学灭活传染性液体生物废物的效果:瑞士研究实验室随机抽样研究
Q1 Social Sciences Pub Date : 2024-03-01 DOI: 10.1016/j.jobb.2024.02.001
Alina C. Teuscher , Charlotte Ruhnau , Nicole Stöcklin , Fabienne Wichmann , Evelyn Ilg Hampe , Claudia Bagutti

Laboratory wastewater has been suggested as an important escape route for microorganisms from research environments. Likely reasons for the unintentional release of laboratory organisms are shortcomings in the handling of infectious liquid biological waste (LBW) and inadequate inactivation procedures. We developed an analytical approach to investigate the use of chemical inactivation (CI) procedures in Swiss research laboratories by on-site random sampling of presumably inactivated infectious LBW and testing it for the presence of infectious lentiviruses (HIV-1) and adenoviruses (AdV). In addition, standard operating procedures (SOPs) for CI were collected and evaluated, and laboratory-staff knowledge of CI processes was assessed using a questionnaire. Although we found several deficiencies in the technical knowledge and training of laboratory staff on the CI of LBW, as documented by 27 returned questionnaires, no infectious viruses were detected in the eight LBW samples collected. Whilst we acknowledge that the number of LBW samples and SOPs is small, we conclude that CI of LBW containing infectious lentiviruses and adenoviruses does not result in the systematic release of considerable amounts of infectious viruses into the environment from research laboratories in Switzerland.

实验室废水被认为是微生物从研究环境中逃逸的重要途径。造成实验室生物无意释放的原因可能是在处理传染性液体生物废物(LBW)方面存在缺陷以及灭活程序不当。我们开发了一种分析方法来调查瑞士研究实验室中化学灭活(CI)程序的使用情况,具体做法是现场随机取样,检测可能已灭活的传染性液态生物废料中是否存在传染性慢病毒(HIV-1)和腺病毒(AdV)。此外,我们还收集并评估了 CI 的标准操作程序 (SOP),并通过问卷调查评估了实验室工作人员对 CI 流程的了解程度。虽然我们发现实验室工作人员在枸杞子的 CI 技术知识和培训方面存在一些不足(27 份收回的调查问卷记录了这些不足),但在收集到的 8 份枸杞子样本中没有检测到传染性病毒。虽然我们承认枸杞样品和标准操作程序的数量较少,但我们得出结论认为,对含有传染性慢病毒和腺病毒的枸杞进行CI不会导致瑞士研究实验室向环境中系统性地释放大量传染性病毒。
{"title":"Effectiveness of chemical inactivation of infectious liquid biological waste: A randomized sample study of research laboratories in Switzerland","authors":"Alina C. Teuscher ,&nbsp;Charlotte Ruhnau ,&nbsp;Nicole Stöcklin ,&nbsp;Fabienne Wichmann ,&nbsp;Evelyn Ilg Hampe ,&nbsp;Claudia Bagutti","doi":"10.1016/j.jobb.2024.02.001","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.02.001","url":null,"abstract":"<div><p>Laboratory wastewater has been suggested as an important escape route for microorganisms from research environments. Likely reasons for the unintentional release of laboratory organisms are shortcomings in the handling of infectious liquid biological waste (LBW) and inadequate inactivation procedures. We developed an analytical approach to investigate the use of chemical inactivation (CI) procedures in Swiss research laboratories by on-site random sampling of presumably inactivated infectious LBW and testing it for the presence of infectious lentiviruses (HIV-1) and adenoviruses (AdV). In addition, standard operating procedures (SOPs) for CI were collected and evaluated, and laboratory-staff knowledge of CI processes was assessed using a questionnaire. Although we found several deficiencies in the technical knowledge and training of laboratory staff on the CI of LBW, as documented by 27 returned questionnaires, no infectious viruses were detected in the eight LBW samples collected. Whilst we acknowledge that the number of LBW samples and SOPs is small, we conclude that CI of LBW containing infectious lentiviruses and adenoviruses does not result in the systematic release of considerable amounts of infectious viruses into the environment from research laboratories in Switzerland.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000049/pdfft?md5=3b90d552352992df0ce804399f533c54&pid=1-s2.0-S2588933824000049-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140069441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a lightweight security framework using blockchain and machine learning 利用区块链和机器学习建立轻量级安全框架
IF 5.6 3区 计算机科学 Pub Date : 2024-03-01 DOI: 10.1016/j.bcra.2023.100174
Shereen Ismail , Muhammad Nouman , Diana W. Dawoud , Hassan Reza

Cyber-attacks pose a significant challenge to the security of Internet of Things (IoT) sensor networks, necessitating the development of robust countermeasures tailored to their unique characteristics and limitations. Various prevention and detection techniques have been proposed to mitigate these attacks. In this paper, we propose an integrated security framework using blockchain and Machine Learning (ML) to protect IoT sensor networks. The framework consists of two modules: a blockchain prevention module and an ML detection module. The blockchain prevention module has two lightweight mechanisms: identity management and trust management. Identity management employs a lightweight Smart Contract (SC) to manage node registration and authentication, ensuring that unauthorized entities are prohibited from engaging in any tasks, while trust management uses a lightweight SC that is responsible for maintaining trust and credibility between sensor nodes throughout the network's lifetime and tracking historical node behaviors. Consensus and transaction validation are achieved through a Verifiable Byzantine Fault Tolerance (VBFT) mechanism to ensure network reliability and integrity. The ML detection module utilizes the Light Gradient Boosting Machine (LightGBM) algorithm to classify malicious nodes and notify the blockchain network if it must make decisions to mitigate their impacts. We investigate the performance of several off-the-shelf ML algorithms, including Logistic Regression, Complement Naive Bayes, Nearest Centroid, and Stacking, using the WSN-DS dataset. LightGBM is selected following a detailed comparative analysis conducted using accuracy, precision, recall, F1-score, processing time, training time, prediction time, computational complexity, and Matthews Correlation Coefficient (MCC) evaluation metrics.

网络攻击对物联网(IoT)传感器网络的安全构成了重大挑战,因此有必要针对其独特的特点和局限性制定强有力的应对措施。为缓解这些攻击,人们提出了各种预防和检测技术。在本文中,我们提出了一个使用区块链和机器学习(ML)来保护物联网传感器网络的集成安全框架。该框架由两个模块组成:区块链预防模块和 ML 检测模块。区块链预防模块有两个轻量级机制:身份管理和信任管理。身份管理采用轻量级智能合约(Smart Contract,SC)来管理节点注册和身份验证,确保禁止未经授权的实体参与任何任务;而信任管理采用轻量级 SC,负责在整个网络生命周期内维护传感器节点之间的信任和信誉,并跟踪节点的历史行为。共识和事务验证通过可验证拜占庭容错(VBFT)机制实现,以确保网络的可靠性和完整性。ML 检测模块利用光梯度提升机(LightGBM)算法对恶意节点进行分类,并在区块链网络必须做出决策以减轻其影响时通知区块链网络。我们使用 WSN-DS 数据集研究了几种现成的 ML 算法的性能,包括逻辑回归(Logistic Regression)、直觉贝叶斯补全(Complement Naive Bayes)、最近中心点(Nearest Centroid)和堆叠(Stacking)。在使用准确度、精确度、召回率、F1 分数、处理时间、训练时间、预测时间、计算复杂度和马修斯相关系数 (MCC) 评估指标进行详细比较分析后,我们选择了 LightGBM。
{"title":"Towards a lightweight security framework using blockchain and machine learning","authors":"Shereen Ismail ,&nbsp;Muhammad Nouman ,&nbsp;Diana W. Dawoud ,&nbsp;Hassan Reza","doi":"10.1016/j.bcra.2023.100174","DOIUrl":"10.1016/j.bcra.2023.100174","url":null,"abstract":"<div><p>Cyber-attacks pose a significant challenge to the security of Internet of Things (IoT) sensor networks, necessitating the development of robust countermeasures tailored to their unique characteristics and limitations. Various prevention and detection techniques have been proposed to mitigate these attacks. In this paper, we propose an integrated security framework using blockchain and Machine Learning (ML) to protect IoT sensor networks. The framework consists of two modules: a blockchain prevention module and an ML detection module. The blockchain prevention module has two lightweight mechanisms: identity management and trust management. Identity management employs a lightweight Smart Contract (SC) to manage node registration and authentication, ensuring that unauthorized entities are prohibited from engaging in any tasks, while trust management uses a lightweight SC that is responsible for maintaining trust and credibility between sensor nodes throughout the network's lifetime and tracking historical node behaviors. Consensus and transaction validation are achieved through a Verifiable Byzantine Fault Tolerance (VBFT) mechanism to ensure network reliability and integrity. The ML detection module utilizes the Light Gradient Boosting Machine (LightGBM) algorithm to classify malicious nodes and notify the blockchain network if it must make decisions to mitigate their impacts. We investigate the performance of several off-the-shelf ML algorithms, including Logistic Regression, Complement Naive Bayes, Nearest Centroid, and Stacking, using the WSN-DS dataset. LightGBM is selected following a detailed comparative analysis conducted using accuracy, precision, recall, F1-score, processing time, training time, prediction time, computational complexity, and Matthews Correlation Coefficient (MCC) evaluation metrics.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000490/pdfft?md5=d3e04ef409a1e66ba5a5635dc01318e7&pid=1-s2.0-S2096720923000490-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139295793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An overview of Web3 technology: Infrastructure, applications, and popularity Web3 技术概述:基础设施、应用和普及
IF 5.6 3区 计算机科学 Pub Date : 2024-03-01 DOI: 10.1016/j.bcra.2023.100173
Renke Huang , Jiachi Chen , Yanlin Wang , Tingting Bi , Liming Nie , Zibin Zheng

Web3, the next generation of the Internet, represents a decentralized and democratized web. Although it has garnered significant public interest and found numerous real-world applications, there is a limited understanding of people's perceptions and experiences with Web3. In this study, we conducted an empirical study to investigate the categories of Web3 applications and their popularity, as well as the potential challenges and opportunities within this emerging landscape. Our research was carried out in two phases. In the first phase, we analyzed 200 popular Web3 projects associated with 10 leading Web3 venture capital firms. In the second phase, we collected and examined code-related data from GitHub and market-related data from blockchain browsers (e.g., Etherscan) for these projects. Our analysis revealed that the Web3 ecosystem can be categorized into two groups, i.e., Web3 infrastructure and Web3 applications, with each consisting of several subcategories or subdomains. We also gained insights into the popularity of these Web3 projects at both the code and market levels and pointed out the challenges in the Web3 ecosystem at the system, developer, and user levels, as well as the opportunities it presents. Our findings contribute to a better understanding of Web3 for researchers and developers, which in turn promotes further exploration and advancement in this innovative field.

Web3 是下一代互联网,代表了一种去中心化和民主化的网络。虽然 Web3 已经引起了公众的极大兴趣,并在现实世界中得到了广泛应用,但人们对 Web3 的看法和体验却了解有限。 在本研究中,我们开展了一项实证研究,以调查 Web3 应用程序的类别及其受欢迎程度,以及在这一新兴领域中的潜在挑战和机遇。我们的研究分两个阶段进行。在第一阶段,我们分析了与 10 家领先的 Web3 风险投资公司相关的 200 个流行 Web3 项目。在第二阶段,我们收集并检查了 GitHub 上与代码相关的数据,以及区块链浏览器(如 Etherscan)上与这些项目相关的市场数据。我们的分析表明,Web3 生态系统可分为两类,即 Web3 基础设施和 Web3 应用程序,每一类又包括若干子类或子域。我们还深入了解了这些 Web3 项目在代码和市场层面上的受欢迎程度,并指出了 Web3 生态系统在系统、开发人员和用户层面上面临的挑战及其带来的机遇。我们的研究结果有助于研究人员和开发人员更好地了解 Web3,从而促进这一创新领域的进一步探索和进步。
{"title":"An overview of Web3 technology: Infrastructure, applications, and popularity","authors":"Renke Huang ,&nbsp;Jiachi Chen ,&nbsp;Yanlin Wang ,&nbsp;Tingting Bi ,&nbsp;Liming Nie ,&nbsp;Zibin Zheng","doi":"10.1016/j.bcra.2023.100173","DOIUrl":"10.1016/j.bcra.2023.100173","url":null,"abstract":"<div><p>Web3, the next generation of the Internet, represents a decentralized and democratized web. Although it has garnered significant public interest and found numerous real-world applications, there is a limited understanding of people's perceptions and experiences with Web3. In this study, we conducted an empirical study to investigate the categories of Web3 applications and their popularity, as well as the potential challenges and opportunities within this emerging landscape. Our research was carried out in two phases. In the first phase, we analyzed 200 popular Web3 projects associated with 10 leading Web3 venture capital firms. In the second phase, we collected and examined code-related data from GitHub and market-related data from blockchain browsers (e.g., Etherscan) for these projects. Our analysis revealed that the Web3 ecosystem can be categorized into two groups, i.e., Web3 infrastructure and Web3 applications, with each consisting of several subcategories or subdomains. We also gained insights into the popularity of these Web3 projects at both the code and market levels and pointed out the challenges in the Web3 ecosystem at the system, developer, and user levels, as well as the opportunities it presents. Our findings contribute to a better understanding of Web3 for researchers and developers, which in turn promotes further exploration and advancement in this innovative field.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000489/pdfft?md5=9aa14a7904cbf749ffa73e8e3272e865&pid=1-s2.0-S2096720923000489-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139299917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The real estate time-stamping and registration system based on Ethereum blockchain 基于以太坊区块链的不动产时间戳和登记系统
IF 5.6 3区 计算机科学 Pub Date : 2024-03-01 DOI: 10.1016/j.bcra.2023.100175
Liyuan Zhang , Limian Ci , Yonghong Wu , Benchawan Wiwatanapataphee

In recent years, there has been a growing interest in real estate investments that utilize blockchain technology. Traditional real estate investments usually involve third-party intermediaries for verifying and recording informal real estate transactions. This paper proposes a blockchain-based real estate investment model and presents a detailed description of the real estate register authentication aspect of the model. The model uses blockchain technology to create tamper-evident records of real estate transactions and provide secure authentication and verification for informal real estate transactions. Meanwhile, each real estate transaction is recorded in a block, and all transaction records are kept on the blockchain. This means that inventors can access these transaction records and verify their authenticity and validity. The system can also use smart contracts to automate the process of real estate transactions, which further improves transaction efficiency and reduces costs. Furthermore, the model's timestamp and authentication mechanism can eliminate third-party intermediaries and ensure the authenticity and validity of real estate transactions through distributed ledgers and verification mechanisms. Overall, blockchain-based real estate systems offer advantages of security, transparency, efficiency, and cost reduction. With ongoing blockchain advancements, these systems are expected to play a crucial role in future real estate investment transactions.

近年来,人们对利用区块链技术的房地产投资越来越感兴趣。传统的房地产投资通常涉及第三方中介机构,用于验证和记录非正式的房地产交易。本文提出了一种基于区块链的房地产投资模型,并详细介绍了该模型中的不动产登记认证环节。该模型利用区块链技术创建不可篡改的房地产交易记录,为非正式房地产交易提供安全的认证和验证。同时,每笔房地产交易都记录在一个区块中,所有交易记录都保存在区块链上。这意味着发明者可以访问这些交易记录,并验证其真实性和有效性。该系统还可以使用智能合约实现房地产交易过程的自动化,从而进一步提高交易效率,降低成本。此外,该模型的时间戳和认证机制可以消除第三方中介,通过分布式账本和验证机制确保房地产交易的真实性和有效性。总体而言,基于区块链的房地产系统具有安全、透明、高效和降低成本等优势。随着区块链技术的不断进步,这些系统有望在未来的房地产投资交易中发挥至关重要的作用。
{"title":"The real estate time-stamping and registration system based on Ethereum blockchain","authors":"Liyuan Zhang ,&nbsp;Limian Ci ,&nbsp;Yonghong Wu ,&nbsp;Benchawan Wiwatanapataphee","doi":"10.1016/j.bcra.2023.100175","DOIUrl":"10.1016/j.bcra.2023.100175","url":null,"abstract":"<div><p>In recent years, there has been a growing interest in real estate investments that utilize blockchain technology. Traditional real estate investments usually involve third-party intermediaries for verifying and recording informal real estate transactions. This paper proposes a blockchain-based real estate investment model and presents a detailed description of the real estate register authentication aspect of the model. The model uses blockchain technology to create tamper-evident records of real estate transactions and provide secure authentication and verification for informal real estate transactions. Meanwhile, each real estate transaction is recorded in a block, and all transaction records are kept on the blockchain. This means that inventors can access these transaction records and verify their authenticity and validity. The system can also use smart contracts to automate the process of real estate transactions, which further improves transaction efficiency and reduces costs. Furthermore, the model's timestamp and authentication mechanism can eliminate third-party intermediaries and ensure the authenticity and validity of real estate transactions through distributed ledgers and verification mechanisms. Overall, blockchain-based real estate systems offer advantages of security, transparency, efficiency, and cost reduction. With ongoing blockchain advancements, these systems are expected to play a crucial role in future real estate investment transactions.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000507/pdfft?md5=07595a3d1efac47aedba338504fed54e&pid=1-s2.0-S2096720923000507-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139190490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stability analysis of a fractional-order monkeypox epidemic model with quarantine and hospitalization 带检疫和住院的分数阶猴痘流行病模型的稳定性分析
Q1 Social Sciences Pub Date : 2024-03-01 DOI: 10.1016/j.jobb.2024.02.003
Raqqasyi R. Musafir, Agus Suryanto, Isnani Darti, Trisilowati

The monkeypox epidemic has become a global health issue due to its rapid transmission involving nonhuman-to-human transmission in nonendemic areas. Various actions, such as quarantine, vaccination, and hospitalization, have been implemented by worldwide governments. Given the relatively high cost and strict implementation of vaccination, our focus lies on quarantine and hospitalization. In this paper, we study the monkeypox epidemic involving quarantine and hospitalization through fractional-order mathematical modeling. The proposed model considers six classes of human populations (susceptible, exposed, infected, quarantined, hospitalized, and recovered) and three classes of nonhuman populations (susceptible, exposed, and infected). The basic properties of the model have been investigated, and its equilibrium points have been obtained, namely monkeypox-free, nonhuman-free endemic, and endemic. We have derived the basic reproduction numbers for human-to-human and nonhuman-to-nonhuman transmissions, denoted as R0h and R0n respectively. The existence and stability (both locally and globally) of each equilibrium point depend on R0h and R0n relative to unity. We performed calibration and forecasting of the model on the weekly monkeypox case data of the human population in the United States of America from June 1 to September 23, 2022. Research findings indicate that the fractional-order model shows better calibration and forecasting compared to the corresponding first-order model based on the root mean square error. Furthermore, the best-fitting model calibration indicates R0=max{R0h,R0n}>1, suggesting the potential for endemic conditions in humans. However, the best forecasting shows R0<1, possibly due to various policies such as vaccination. Given the relative cost and stringency of vaccination implementation for monkeypox control, we perform numerical simulations and sensitivity analyses on the basic reproduction number, particularly focusing on the impact of quarantine and hospitalization rates. Simulations and sensitivity analysis indicate that simultaneous increases in quarantine and hospitalization rates can reduce the basic reproduction number R0h

猴痘疫情已成为一个全球性的健康问题,因为它传播迅速,在非流行地区会出现非人传人的情况。世界各国政府采取了各种措施,如隔离、接种疫苗和住院治疗。鉴于疫苗接种的成本相对较高且执行严格,我们将重点放在检疫和住院治疗上。本文通过分数阶数学模型研究了涉及检疫和住院治疗的猴痘疫情。所提出的模型考虑了六类人类人群(易感人群、暴露人群、感染人群、隔离人群、住院人群和康复人群)和三类非人类人群(易感人群、暴露人群和感染人群)。我们研究了该模型的基本特性,并得出了其平衡点,即无猴痘、非人类无流行和流行。我们得出了人传人和非人传非人的基本繁殖数,分别记为 R0h 和 R0n。每个平衡点的存在性和稳定性(局部和全局)都取决于 R0h 和 R0n 相对于统一值的关系。我们利用美国 2022 年 6 月 1 日至 9 月 23 日的每周猴痘病例数据对模型进行了校准和预测。研究结果表明,与相应的一阶模型相比,基于均方根误差的分数阶模型显示出更好的校准和预测效果。此外,最佳拟合模型校准表明 R0=max{R0h,R0n}>1 ,这表明人类有可能出现地方病。然而,最佳预测显示 R0<1,这可能是由于疫苗接种等各种政策造成的。考虑到为控制猴痘而实施疫苗接种的相对成本和严格程度,我们对基本繁殖数进行了数值模拟和敏感性分析,尤其侧重于检疫和住院率的影响。模拟和敏感性分析表明,同时提高检疫率和住院率可使基本繁殖数 R0h 降至 1 以下。因此,猴痘疫情可以被根除。此外,分数阶导数在决定猴痘病例的峰值以及猴痘流行或消亡的速度方面起着至关重要的作用。记忆效应、检疫和住院等因素对猴痘建模研究有重要影响,尤其是在捕捉生物现象方面。
{"title":"Stability analysis of a fractional-order monkeypox epidemic model with quarantine and hospitalization","authors":"Raqqasyi R. Musafir,&nbsp;Agus Suryanto,&nbsp;Isnani Darti,&nbsp;Trisilowati","doi":"10.1016/j.jobb.2024.02.003","DOIUrl":"10.1016/j.jobb.2024.02.003","url":null,"abstract":"<div><p>The monkeypox epidemic has become a global health issue due to its rapid transmission involving nonhuman-to-human transmission in nonendemic areas. Various actions, such as quarantine, vaccination, and hospitalization, have been implemented by worldwide governments. Given the relatively high cost and strict implementation of vaccination, our focus lies on quarantine and hospitalization. In this paper, we study the monkeypox epidemic involving quarantine and hospitalization through fractional-order mathematical modeling. The proposed model considers six classes of human populations (susceptible, exposed, infected, quarantined, hospitalized, and recovered) and three classes of nonhuman populations (susceptible, exposed, and infected). The basic properties of the model have been investigated, and its equilibrium points have been obtained, namely monkeypox-free, nonhuman-free endemic, and endemic. We have derived the basic reproduction numbers for human-to-human and nonhuman-to-nonhuman transmissions, denoted as <span><math><mrow><msub><mi>R</mi><mrow><mn>0</mn><mi>h</mi></mrow></msub></mrow></math></span> and <span><math><mrow><msub><mi>R</mi><mrow><mn>0</mn><mi>n</mi></mrow></msub></mrow></math></span> respectively. The existence and stability (both locally and globally) of each equilibrium point depend on <span><math><mrow><msub><mi>R</mi><mrow><mn>0</mn><mi>h</mi></mrow></msub></mrow></math></span> and <span><math><mrow><msub><mi>R</mi><mrow><mn>0</mn><mi>n</mi></mrow></msub></mrow></math></span> relative to unity. We performed calibration and forecasting of the model on the weekly monkeypox case data of the human population in the United States of America from June 1 to September 23, 2022. Research findings indicate that the fractional-order model shows better calibration and forecasting compared to the corresponding first-order model based on the root mean square error. Furthermore, the best-fitting model calibration indicates <span><math><mrow><msub><mi>R</mi><mn>0</mn></msub><mo>=</mo><mi>max</mi><mrow><mo>{</mo><msub><mi>R</mi><mrow><mn>0</mn><mi>h</mi></mrow></msub><mo>,</mo><msub><mi>R</mi><mrow><mn>0</mn><mi>n</mi></mrow></msub><mo>}</mo></mrow><mo>&gt;</mo><mn>1</mn></mrow></math></span>, suggesting the potential for endemic conditions in humans. However, the best forecasting shows <span><math><mrow><msub><mi>R</mi><mn>0</mn></msub><mo>&lt;</mo><mn>1</mn></mrow></math></span>, possibly due to various policies such as vaccination. Given the relative cost and stringency of vaccination implementation for monkeypox control, we perform numerical simulations and sensitivity analyses on the basic reproduction number, particularly focusing on the impact of quarantine and hospitalization rates. Simulations and sensitivity analysis indicate that simultaneous increases in quarantine and hospitalization rates can reduce the basic reproduction number <span><math><mrow><msub><mi>R</mi><mrow><mn>0</mn><mi>h</mi></mrow></msub></mrow></math></spa","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000062/pdfft?md5=f27d3468b5e20300f8c775eb07d682e9&pid=1-s2.0-S2588933824000062-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140281839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Legal framework for the sharing of pathogens: Issues and recommendations 病原体共享的法律框架:问题与建议
Q1 Social Sciences Pub Date : 2024-03-01 DOI: 10.1016/j.jobb.2023.12.004
Bobo Liu , Cui Huang , Jingcheng Wu , Tianchan Yi , Zhiming Yuan

The sharing of pathogens is of great significance for the continuous and comprehensive testing and monitoring of viral samples, vaccine and drug development, and the study of drug resistance and mutability of viral samples. This paper reviews the current legal framework in the field of pathogen sharing, analyzes existing issues, and proposes recommendations to improve the legal framework of pathogen sharing.

病原体共享对于病毒样本的持续和全面检测与监测、疫苗和药物开发以及病毒样本的耐药性和变异性研究具有重要意义。本文回顾了病原体共享领域的现行法律框架,分析了存在的问题,并提出了完善病原体共享法律框架的建议。
{"title":"Legal framework for the sharing of pathogens: Issues and recommendations","authors":"Bobo Liu ,&nbsp;Cui Huang ,&nbsp;Jingcheng Wu ,&nbsp;Tianchan Yi ,&nbsp;Zhiming Yuan","doi":"10.1016/j.jobb.2023.12.004","DOIUrl":"10.1016/j.jobb.2023.12.004","url":null,"abstract":"<div><p>The sharing of pathogens is of great significance for the continuous and comprehensive testing and monitoring of viral samples, vaccine and drug development, and the study of drug resistance and mutability of viral samples. This paper reviews the current legal framework in the field of pathogen sharing, analyzes existing issues, and proposes recommendations to improve the legal framework of pathogen sharing.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000025/pdfft?md5=8e4e2f6c2ef7232cfa548aad5fb982ef&pid=1-s2.0-S2588933824000025-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139813021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utilizing blockchains in opportunistic networks for integrity and confidentiality 在机会网络中利用区块链实现完整性和保密性
IF 5.6 3区 计算机科学 Pub Date : 2024-03-01 DOI: 10.1016/j.bcra.2023.100167
Samaneh Rashidibajgan, Thomas Hupperich

Opportunistic networks (OppNets) are usually a set of smart, wearable, and portable devices or entities with mobility that connect wirelessly without requiring infrastructure. Such a network is of great importance in data transmission, particularly in incidents and disasters, whether man-made or natural. However, message integrity and confidentiality are of concern when dealing with vital and physiological data transmission under strict privacy regulations. In this work, we propose a structure to classify messages based on their priority in different queues. Furthermore, due to the decentralized architecture of OppNets, we propose a blockchain-based structure for providing security for high-priority messages. It contains three sequences of functional blocks with a light and simplified implementation that make it suitable for battery-powered wearable devices that are limited in energy consumption and computational units. The simulation results show that by increasing the number of nodes in the network, the average of the changes in block sizes is neglectable, which addresses the computation bottleneck. Furthermore, we analyze the performance of the proposed structure in terms of message delivery and network overhead compared with the Epidemic and Prophet routing algorithms. These results indicate advancing the overall performance of the proposed algorithm.

机会型网络(OppNets)通常是一组智能、可穿戴和便携式设备或实体,它们具有移动性,无需基础设施即可无线连接。这种网络在数据传输方面具有重要意义,尤其是在人为或自然灾害事件中。然而,在严格的隐私法规下处理生命和生理数据传输时,信息的完整性和保密性令人担忧。在这项工作中,我们提出了一种根据信息在不同队列中的优先级对信息进行分类的结构。此外,由于 OppNets 的去中心化架构,我们提出了一种基于区块链的结构,为高优先级信息提供安全性。它包含三个功能模块序列,具有轻便、简化的实现方式,适用于能耗和计算单元有限的电池供电可穿戴设备。仿真结果表明,通过增加网络中的节点数量,块大小变化的平均值可忽略不计,从而解决了计算瓶颈问题。此外,我们还分析了与流行路由算法和先知路由算法相比,拟议结构在信息传递和网络开销方面的性能。这些结果表明,拟议算法的整体性能有所提高。
{"title":"Utilizing blockchains in opportunistic networks for integrity and confidentiality","authors":"Samaneh Rashidibajgan,&nbsp;Thomas Hupperich","doi":"10.1016/j.bcra.2023.100167","DOIUrl":"10.1016/j.bcra.2023.100167","url":null,"abstract":"<div><p>Opportunistic networks (OppNets) are usually a set of smart, wearable, and portable devices or entities with mobility that connect wirelessly without requiring infrastructure. Such a network is of great importance in data transmission, particularly in incidents and disasters, whether man-made or natural. However, message integrity and confidentiality are of concern when dealing with vital and physiological data transmission under strict privacy regulations. In this work, we propose a structure to classify messages based on their priority in different queues. Furthermore, due to the decentralized architecture of OppNets, we propose a blockchain-based structure for providing security for high-priority messages. It contains three sequences of functional blocks with a light and simplified implementation that make it suitable for battery-powered wearable devices that are limited in energy consumption and computational units. The simulation results show that by increasing the number of nodes in the network, the average of the changes in block sizes is neglectable, which addresses the computation bottleneck. Furthermore, we analyze the performance of the proposed structure in terms of message delivery and network overhead compared with the Epidemic and Prophet routing algorithms. These results indicate advancing the overall performance of the proposed algorithm.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000428/pdfft?md5=a9274c10d6eeb9a8b8b681e8eddc5d3c&pid=1-s2.0-S2096720923000428-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139303453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
United Kingdom Health Security Agency announces 5-year Pathogen Genomics Strategy 英国卫生安全局宣布为期 5 年的病原体基因组学战略
Q1 Social Sciences Pub Date : 2024-03-01 DOI: 10.1016/j.jobb.2024.03.002
{"title":"United Kingdom Health Security Agency announces 5-year Pathogen Genomics Strategy","authors":"","doi":"10.1016/j.jobb.2024.03.002","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.03.002","url":null,"abstract":"","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000086/pdfft?md5=c7e403a943af3cb6f8c81f7d6040788b&pid=1-s2.0-S2588933824000086-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140341284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
全部 Bulletin of Science and Technology Computers and Applied Chemistry Equipment for Electronic Products Manufacturing Hebei Journal of Industrial Science and Technology Journal of Applied Sciences Journal of University of Science and Technology of China Printed Circuit Information Wuhan University Journal of Natural Sciences Virtual Reality Intelligent Hardware 模式识别与人工智能 控制与决策 电机与控制学报 Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing University of Posts and Telecommunications (Natural Science) 计算机研究与发展 计算机学报 自动化学报 电子科技大学学报 Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science) 中国图象图形学报 Journal of Radars 信息与控制 数据采集与处理 Jiqiren/Robot 西北工业大学学报 High Technology Letters Journal of Cybersecurity Scientia Sinica Informationis Big Data Mining and Analytics Visual Computing for Industry, Biomedicine, and Art Qinghua Daxue Xuebao/Journal of Tsinghua University 计算机辅助设计与图形学学报 电波科学学报 Journal of Biosafety and Biosecurity Blockchain-Research and Applications 建模与仿真(英文) 建模与仿真 Soc Netw 单片机与嵌入式系统应用 信息安全(英文) 数据挖掘 指挥信息系统与技术 通信世界 智能与融合网络(英文) 电磁分析与应用期刊(英文) 资源环境与信息工程(英文) 无线传感网络(英文) 高性能计算技术 中文信息学报 通信技术政策研究 Tsinghua Sci. Technol. 天线与传播(英文) 物联网技术 离散数学期刊(英文) 计算机应用 ZTE Communications 软件工程与应用(英文) 航空计算技术 智能控制与自动化(英文) 电路与系统(英文) 计算机工程 天线学报 仪表技术与传感器 海军航空工程学院学报 Comput Technol Appl 军事通信技术 计算机仿真 无线通信 现代电子技术(英文) Journal of Systems Science and Information 电脑和通信(英文) 无线工程与技术(英文) 无线互联科技 人工智能与机器人研究 计算机工程与设计 电路与系统学报 软件 通讯和计算机:中英文版 智能学习系统与应用(英文) 图像与信号处理 软件工程与应用 电力电子 现代非线性理论与应用(英文) 计算机科学 计算机科学与应用 物联网(英文) 数据与计算发展前沿 电信科学 自主智能(英文) 人工智能杂志(英文) 信号处理 人工智能技术学报(英文) 自主智能系统(英文) 信息通信技术 数据分析和信息处理(英文)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1