首页 > 最新文献

信息工程最新文献

英文 中文
IF:
Dynamic exponent market maker: personalized portfolio manager and one pool to trade them all 动态指数做市商:个性化的投资组合经理和一个交易池
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-01 Epub Date: 2025-01-23 DOI: 10.1016/j.bcra.2025.100274
Wittawat Kositwattanarerk
Decentralized exchange (DEX) platforms such as Uniswap and Balancer operate on several pools where each pool contains two or more cryptocurrencies and constitutes direct trading pairs. The drawbacks here are that liquidity provision requires the contribution of tokens in a specific proportion, and trading may require hopping between pools, hence increasing the transaction fee and gas fee. We propose an automated market maker (AMM) protocol where liquidity providers (LPs) can deposit any amount of tokens into the pool. The protocol preserves the proportion of tokens by total value at the time of deposit and can be seen as a personalized self-balancing portfolio manager. In addition, since the invariant function is dynamic, all exchange pairs are executed from a single composite pool. Nevertheless, the scheme is vulnerable to flash loan attacks and must be used in conjunction with preventive measures.
去中心化交易所(DEX)平台,如Uniswap和Balancer,在多个池上运行,每个池包含两个或多个加密货币,并构成直接交易对。这里的缺点是,流动性提供需要以特定比例贡献代币,并且交易可能需要在池之间跳转,从而增加交易费用和gas费。我们提出了一个自动做市商(AMM)协议,流动性提供者(lp)可以将任何数量的代币存入池中。该协议保留了代币在存入时总价值的比例,可以被视为个性化的自平衡投资组合管理器。此外,由于不变函数是动态的,因此所有交换对都从单个组合池执行。然而,该方案很容易受到闪贷攻击,必须与预防措施结合使用。
{"title":"Dynamic exponent market maker: personalized portfolio manager and one pool to trade them all","authors":"Wittawat Kositwattanarerk","doi":"10.1016/j.bcra.2025.100274","DOIUrl":"10.1016/j.bcra.2025.100274","url":null,"abstract":"<div><div>Decentralized exchange (DEX) platforms such as Uniswap and Balancer operate on several pools where each pool contains two or more cryptocurrencies and constitutes direct trading pairs. The drawbacks here are that liquidity provision requires the contribution of tokens in a specific proportion, and trading may require hopping between pools, hence increasing the transaction fee and gas fee. We propose an automated market maker (AMM) protocol where liquidity providers (LPs) can deposit any amount of tokens into the pool. The protocol preserves the proportion of tokens by total value at the time of deposit and can be seen as a personalized self-balancing portfolio manager. In addition, since the invariant function is dynamic, all exchange pairs are executed from a single composite pool. Nevertheless, the scheme is vulnerable to flash loan attacks and must be used in conjunction with preventive measures.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 3","pages":"Article 100274"},"PeriodicalIF":5.6,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144721014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated mechanism to support trade transactions in smart contracts with upgrade and repair 支持智能合约中贸易交易的自动机制,包括升级和修复
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-01 Epub Date: 2025-03-28 DOI: 10.1016/j.bcra.2025.100285
Christian Gang Liu , Peter Bodorik , Dawn Jutla
In our previous research, we addressed the problem of automated transformation of models, represented using the business process model and notation (BPMN) standard, into the methods of a smart contract. The transformation supports BPMN models that contain complex multi-step activities that are supported using our concept of multi-step nested trade transactions, wherein the transactional properties are enforced by a mechanism generated automatically by the transformation process from a BPMN model to a smart contract. In this paper, we present a methodology for repairing a smart contract that cannot be completed due to events that were not anticipated by the developer and thus prevent the completion of the smart contract. The repair process starts with the original BPMN model fragment causing the issue, providing the modeler with the innermost transaction fragment containing the failed activity. The modeler amends the BPMN pattern on the basis of the successful completion of previous activities. If repairs exceed the inner transaction’s scope, they are addressed using the parent transaction’s BPMN model. The amended BPMN model is then transformed into a new smart contract, ensuring consistent data and logic transitions. We previously developed a tool, called TABS+, as a proof of concept (PoC) to transform BPMN models into smart contracts for nested transactions. This paper describes the tool TABS+R, developed by extending the TABS+ tool, to allow the repair of smart contracts.
在我们之前的研究中,我们解决了使用业务流程模型和符号(BPMN)标准将模型自动转换为智能合约方法的问题。转换支持包含复杂的多步骤活动的BPMN模型,这些活动使用我们的多步骤嵌套交易事务概念来支持,其中事务属性由从BPMN模型到智能合约的转换过程自动生成的机制强制执行。在本文中,我们提出了一种修复智能合约的方法,该智能合约由于开发人员没有预料到的事件而无法完成,从而阻止了智能合约的完成。修复过程从导致问题的原始BPMN模型片段开始,向建模者提供包含失败活动的最内层事务片段。建模者在成功完成先前活动的基础上修改BPMN模式。如果修复超出了内部事务的范围,则使用父事务的BPMN模型对其进行处理。然后将修改后的BPMN模型转换为新的智能合约,确保数据和逻辑转换的一致性。我们之前开发了一个名为TABS+的工具,作为概念验证(PoC),将BPMN模型转换为嵌套事务的智能合约。本文描述了通过扩展TABS+工具开发的工具TABS+R,以允许智能合约的修复。
{"title":"Automated mechanism to support trade transactions in smart contracts with upgrade and repair","authors":"Christian Gang Liu ,&nbsp;Peter Bodorik ,&nbsp;Dawn Jutla","doi":"10.1016/j.bcra.2025.100285","DOIUrl":"10.1016/j.bcra.2025.100285","url":null,"abstract":"<div><div>In our previous research, we addressed the problem of automated transformation of models, represented using the business process model and notation (BPMN) standard, into the methods of a smart contract. The transformation supports BPMN models that contain complex multi-step activities that are supported using our concept of multi-step nested trade transactions, wherein the transactional properties are enforced by a mechanism generated automatically by the transformation process from a BPMN model to a smart contract. In this paper, we present a methodology for repairing a smart contract that cannot be completed due to events that were not anticipated by the developer and thus prevent the completion of the smart contract. The repair process starts with the original BPMN model fragment causing the issue, providing the modeler with the innermost transaction fragment containing the failed activity. The modeler amends the BPMN pattern on the basis of the successful completion of previous activities. If repairs exceed the inner transaction’s scope, they are addressed using the parent transaction’s BPMN model. The amended BPMN model is then transformed into a new smart contract, ensuring consistent data and logic transitions. We previously developed a tool, called TABS+, as a proof of concept (PoC) to transform BPMN models into smart contracts for nested transactions. This paper describes the tool TABS+<em>R</em>, developed by extending the TABS+ tool, to allow the repair of smart contracts.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 3","pages":"Article 100285"},"PeriodicalIF":6.9,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144611703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The association between TMPRSS2 gene rs2070788 and rs12329760 variants and COVID-19 susceptibility and severity: A study from Jordan 来自约旦的TMPRSS2基因rs2070788和rs12329760变异与COVID-19易感性和严重程度的关系
Q1 Social Sciences Pub Date : 2025-09-01 Epub Date: 2025-08-23 DOI: 10.1016/j.jobb.2025.08.003
Sara S.H. Abu Zaid , Omar F. Khabour , Sawsan Abuhammad
Symptoms of coronavirus disease of 2019 (COVID-19), caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), range from asymptomatic to life-threatening, affecting the respiratory system and many other organs, and involved in SARS-CoV-2 pathogenesis, particularly its viral entry, is the enzyme transmembrane protease serine 2 (TMPRSS2). In response, in this study, polymorphisms in the TMPRSS2 gene (rs2070788 and rs12329760) were examined for their association with COVID-19 susceptibility and severity in Jordanians. The study participants (n = 861) included 427 individuals who had never contracted COVID-19 (control group) and 434 who had experienced the disease (case group). The case group was subsequently divided into two subgroups: severe (n = 166) and non-severe (n = 268) COVID-19. The results show that rs2070788 is associated with disease susceptibility in all inheritance models (P < 0.05), as well as an association between rs12329760 and COVID-19 disease severity in both the dominant and over-dominant models (P < 0.05). Further, a higher body mass index (BMI) and older age were associated with disease severity (p < 0.05), though females were less likely to develop severe COVID-19 and to be hospitalized. In conclusion, polymorphisms in the TMPRSS2 gene may be considered a potential predictor of COVID-19 outcomes in the Jordanian population. The study findings could be used to manage similar viral infections in Jordan in the future.
由严重急性呼吸综合征冠状病毒2 (SARS-CoV-2)引起的2019年冠状病毒病(COVID-19)的症状从无症状到危及生命不等,影响呼吸系统和许多其他器官,并且参与SARS-CoV-2的发病机制,特别是其病毒进入酶是跨膜蛋白酶丝氨酸2 (TMPRSS2)。为此,本研究检测了约旦人TMPRSS2基因(rs2070788和rs12329760)多态性与COVID-19易感性和严重程度的关系。研究参与者(n = 861)包括427名从未感染过COVID-19的人(对照组)和434名经历过这种疾病的人(病例组)。病例组随后被分为两个亚组:重症(n = 166)和非重症(n = 268) COVID-19。结果显示,rs2070788在所有遗传模型中均与疾病易感性相关(P < 0.05), rs12329760在显性和过显性模型中均与COVID-19疾病严重程度相关(P < 0.05)。此外,较高的身体质量指数(BMI)和年龄与疾病严重程度相关(p < 0.05),尽管女性发展为严重的COVID-19和住院的可能性较低。总之,TMPRSS2基因的多态性可能被认为是约旦人群中COVID-19结局的潜在预测因子。研究结果可以用于未来在约旦管理类似的病毒感染。
{"title":"The association between TMPRSS2 gene rs2070788 and rs12329760 variants and COVID-19 susceptibility and severity: A study from Jordan","authors":"Sara S.H. Abu Zaid ,&nbsp;Omar F. Khabour ,&nbsp;Sawsan Abuhammad","doi":"10.1016/j.jobb.2025.08.003","DOIUrl":"10.1016/j.jobb.2025.08.003","url":null,"abstract":"<div><div>Symptoms of coronavirus disease of 2019 (COVID-19), caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), range from asymptomatic to life-threatening, affecting the respiratory system and many other organs, and involved in SARS-CoV-2 pathogenesis, particularly its viral entry, is the enzyme transmembrane protease serine 2 (TMPRSS2). In response, in this study, polymorphisms in the <em>TMPRSS2</em> gene (rs2070788 and rs12329760) were examined for their association with COVID-19 susceptibility and severity in Jordanians. The study participants (n = 861) included 427 individuals who had never contracted COVID-19 (control group) and 434 who had experienced the disease (case group). The case group was subsequently divided into two subgroups: severe (n = 166) and non-severe (n = 268) COVID-19. The results show that rs2070788 is associated with disease susceptibility in all inheritance models (P &lt; 0.05), as well as an association between rs12329760 and COVID-19 disease severity in both the dominant and over-dominant models (P &lt; 0.05). Further, a higher body mass index (BMI) and older age were associated with disease severity (p &lt; 0.05), though females were less likely to develop severe COVID-19 and to be hospitalized. In conclusion, polymorphisms in the <em>TMPRSS2</em> gene may be considered a potential predictor of COVID-19 outcomes in the Jordanian population. The study findings could be used to manage similar viral infections in Jordan in the future.</div></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":"7 3","pages":"Pages 107-113"},"PeriodicalIF":0.0,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144933736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards blockchain interoperability: a comprehensive survey on cross-chain solutions 迈向区块链互操作性:跨链解决方案的综合调查
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-01 Epub Date: 2025-04-07 DOI: 10.1016/j.bcra.2025.100286
Wenqing Li , Zhenguang Liu , Jianhai Chen , Zhe Liu , Qinming He
The rapid expansion of decentralized finance (DeFi) applications has catalyzed the emergence of new blockchain systems at an unprecedented pace. However, these systems are largely evolving in isolation, hindering the development of a cohesive ecosystem where value and data can flow seamlessly across networks. Blockchain interoperability technologies are introduced to break down these communication barriers and facilitate effective interactions between different blockchain systems. In recent years, numerous approaches and solutions to blockchain interoperability have been proposed. While some reviews have attempted to categorize cross-chain solutions based on blockchain standards and architectures, a more in-depth analysis is warranted. In this work, we investigate mainstream cross-chain solutions from the perspective of their principles, applications, protocols, and performance. To clarify the concept of blockchain interoperability, we propose a conceptual model that characterizes both asset interoperability and data interoperability. Furthermore, we introduce a hierarchical architecture to categorize and analyze representative cross-chain solutions, covering both academic research and industrial implementations. To maximize the utility of this review for a wide audience, we also highlight open challenges and identify future directions in the field of blockchain interoperability, expecting to provide a comprehensive overview of cross-chain solutions.
去中心化金融(DeFi)应用的迅速扩张,催化了新的区块链系统以前所未有的速度出现。然而,这些系统在很大程度上是孤立发展的,阻碍了价值和数据可以在网络上无缝流动的凝聚力生态系统的发展。区块链互操作性技术的引入打破了这些通信障碍,促进了不同区块链系统之间的有效交互。近年来,已经提出了许多实现区块链互操作性的方法和解决方案。虽然一些评论试图根据区块链标准和体系结构对跨链解决方案进行分类,但有必要进行更深入的分析。在这项工作中,我们从其原理、应用、协议和性能的角度研究了主流的跨链解决方案。为了阐明区块链互操作性的概念,我们提出了一个概念模型,该模型同时描述了资产互操作性和数据互操作性。此外,我们引入了一个层次结构来分类和分析具有代表性的跨链解决方案,涵盖了学术研究和工业实现。为了最大限度地为广大受众提供本综述的效用,我们还强调了区块链互操作性领域的开放挑战并确定了未来的方向,期望提供跨链解决方案的全面概述。
{"title":"Towards blockchain interoperability: a comprehensive survey on cross-chain solutions","authors":"Wenqing Li ,&nbsp;Zhenguang Liu ,&nbsp;Jianhai Chen ,&nbsp;Zhe Liu ,&nbsp;Qinming He","doi":"10.1016/j.bcra.2025.100286","DOIUrl":"10.1016/j.bcra.2025.100286","url":null,"abstract":"<div><div>The rapid expansion of decentralized finance (DeFi) applications has catalyzed the emergence of new blockchain systems at an unprecedented pace. However, these systems are largely evolving in isolation, hindering the development of a cohesive ecosystem where value and data can flow seamlessly across networks. Blockchain interoperability technologies are introduced to break down these communication barriers and facilitate effective interactions between different blockchain systems. In recent years, numerous approaches and solutions to blockchain interoperability have been proposed. While some reviews have attempted to categorize cross-chain solutions based on blockchain standards and architectures, a more in-depth analysis is warranted. In this work, we investigate mainstream cross-chain solutions from the perspective of their principles, applications, protocols, and performance. To clarify the concept of blockchain interoperability, we propose a conceptual model that characterizes both asset interoperability and data interoperability. Furthermore, we introduce a hierarchical architecture to categorize and analyze representative cross-chain solutions, covering both academic research and industrial implementations. To maximize the utility of this review for a wide audience, we also highlight open challenges and identify future directions in the field of blockchain interoperability, expecting to provide a comprehensive overview of cross-chain solutions.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 3","pages":"Article 100286"},"PeriodicalIF":5.6,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145104886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving and automated intellectual property license agreements over heterogeneous blockchain networks 异构区块链网络上的隐私保护和自动知识产权许可协议
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-01 Epub Date: 2025-04-10 DOI: 10.1016/j.bcra.2025.100288
Damiano Di Francesco Maesa , Matteo Loporchio , Frank Tietze
This paper considers the application scenario of Intellectual Property (IP) management, a business process yet to fully embrace digitisation and the advantages it brings. We propose to leverage Distributed Ledger Technology (DLT) to digitise license agreements management by providing automated and trustworthy royalty computation, transaction execution, and payment distribution. This can be achieved by employing smart licenses, i.e., bundles of smart contracts implementing the royalty logic of license agreements. To provide scalability, flexibility, and resilience, we propose to deploy smart licenses on a network of networks model, i.e., a set of heterogeneous networks potentially running different DLT protocols and connected by cross-chain information exchange protocols. A novel advantage of the network of networks approach is that it allows for the use of private values for royalty computation, which is impossible in the traditional model. Of course, supporting private DLT networks requires privacy-preserving cross-chain schemes, a still open problem in the literature. This is why we present two alternative privacy-preserving cross-chain schemes for our considered application scenario of license agreements management, one based on Homomorphic Encryption (HE) and the other on Zero-Knowledge (ZK) proofs. Besides discussing their theoretical advantages and drawbacks, we present an experimental evaluation of a prototype implementation of smart licenses based on both schemes.
本文考虑了知识产权(IP)管理的应用场景,这是一个尚未完全拥抱数字化的业务流程及其带来的优势。我们建议利用分布式账本技术(DLT),通过提供自动化和可信的版税计算、交易执行和支付分发,将许可协议管理数字化。这可以通过使用智能许可来实现,即,实现许可协议的版税逻辑的智能合约束。为了提供可扩展性、灵活性和弹性,我们建议在网络模型的网络上部署智能许可,即一组可能运行不同DLT协议并通过跨链信息交换协议连接的异构网络。网络的网络方法的一个新优点是它允许使用私有值进行版税计算,这在传统模型中是不可能的。当然,支持私有DLT网络需要保护隐私的跨链方案,这在文献中仍然是一个开放的问题。这就是为什么我们为许可协议管理的应用场景提出了两种可选的保护隐私的跨链方案,一种基于同态加密(HE),另一种基于零知识(ZK)证明。除了讨论它们的理论优缺点外,我们还对基于这两种方案的智能许可原型实现进行了实验评估。
{"title":"Privacy-preserving and automated intellectual property license agreements over heterogeneous blockchain networks","authors":"Damiano Di Francesco Maesa ,&nbsp;Matteo Loporchio ,&nbsp;Frank Tietze","doi":"10.1016/j.bcra.2025.100288","DOIUrl":"10.1016/j.bcra.2025.100288","url":null,"abstract":"<div><div>This paper considers the application scenario of Intellectual Property (IP) management, a business process yet to fully embrace digitisation and the advantages it brings. We propose to leverage Distributed Ledger Technology (DLT) to digitise license agreements management by providing automated and trustworthy royalty computation, transaction execution, and payment distribution. This can be achieved by employing smart licenses, i.e., bundles of smart contracts implementing the royalty logic of license agreements. To provide scalability, flexibility, and resilience, we propose to deploy smart licenses on a network of networks model, i.e., a set of heterogeneous networks potentially running different DLT protocols and connected by cross-chain information exchange protocols. A novel advantage of the network of networks approach is that it allows for the use of private values for royalty computation, which is impossible in the traditional model. Of course, supporting private DLT networks requires privacy-preserving cross-chain schemes, a still open problem in the literature. This is why we present two alternative privacy-preserving cross-chain schemes for our considered application scenario of license agreements management, one based on Homomorphic Encryption (HE) and the other on Zero-Knowledge (ZK) proofs. Besides discussing their theoretical advantages and drawbacks, we present an experimental evaluation of a prototype implementation of smart licenses based on both schemes.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 3","pages":"Article 100288"},"PeriodicalIF":5.6,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145104885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Large Domain Model System 联邦大型领域模型系统
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-01 Epub Date: 2025-03-21 DOI: 10.1016/j.bcra.2025.100277
Chunming Rong , Jungwon Seo , Zihan Zhao , Ferhat Ozgur Catak , Jiahui Geng , Martin Gilje Jaatun
As organizations increasingly seek to build Foundation Models (FMs) using their own proprietary data, many are adopting private and in-house cloud infrastructures (often in addition to public clouds) to address concerns over cost, data privacy, and data sovereignty. However, these isolated private clouds frequently lack interoperability, creating barriers to cross-institutional collaboration, which is vital for training robust Domain-Specific Foundation Models (DSFMs) that rely on large and diverse datasets. Additionally, underutilized resources in private clouds lead to significant global energy inefficiencies. In this paper, we propose the Federated Large Domain Model System (FLDMS), a conceptual framework designed to facilitate collaborative foundation model development across multiple private cloud environments. We review the necessary enabling technologies, including decentralized protocols for data privacy and Large Language Models (LLMs) for automated orchestration, and present a high-level system design demonstrating how these components can be integrated. By enabling secure and efficient cross-organization cooperation, FLDMS provides a blueprint for building DSFMs while addressing the inefficiencies inherent in siloed private cloud systems.
随着组织越来越多地寻求使用自己的专有数据构建基础模型(FMs),许多组织正在采用私有和内部云基础设施(通常除了公共云之外)来解决成本、数据隐私和数据主权方面的问题。然而,这些孤立的私有云经常缺乏互操作性,给跨机构协作造成障碍,而跨机构协作对于训练依赖于大型和多样化数据集的健壮的特定领域基础模型(DSFMs)至关重要。此外,私有云中未充分利用的资源导致全球能源效率低下。在本文中,我们提出了联邦大领域模型系统(FLDMS),这是一个概念框架,旨在促进跨多个私有云环境的协作基础模型开发。我们回顾了必要的启用技术,包括用于数据隐私的分散协议和用于自动编排的大型语言模型(llm),并展示了一个高级系统设计,演示了如何集成这些组件。通过实现安全和高效的跨组织合作,FLDMS为构建DSFMs提供了蓝图,同时解决了孤立私有云系统固有的低效率问题。
{"title":"Federated Large Domain Model System","authors":"Chunming Rong ,&nbsp;Jungwon Seo ,&nbsp;Zihan Zhao ,&nbsp;Ferhat Ozgur Catak ,&nbsp;Jiahui Geng ,&nbsp;Martin Gilje Jaatun","doi":"10.1016/j.bcra.2025.100277","DOIUrl":"10.1016/j.bcra.2025.100277","url":null,"abstract":"<div><div>As organizations increasingly seek to build Foundation Models (FMs) using their own proprietary data, many are adopting private and in-house cloud infrastructures (often in addition to public clouds) to address concerns over cost, data privacy, and data sovereignty. However, these isolated private clouds frequently lack interoperability, creating barriers to cross-institutional collaboration, which is vital for training robust Domain-Specific Foundation Models (DSFMs) that rely on large and diverse datasets. Additionally, underutilized resources in private clouds lead to significant global energy inefficiencies. In this paper, we propose the Federated Large Domain Model System (FLDMS), a conceptual framework designed to facilitate collaborative foundation model development across multiple private cloud environments. We review the necessary enabling technologies, including decentralized protocols for data privacy and Large Language Models (LLMs) for automated orchestration, and present a high-level system design demonstrating how these components can be integrated. By enabling secure and efficient cross-organization cooperation, FLDMS provides a blueprint for building DSFMs while addressing the inefficiencies inherent in siloed private cloud systems.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 3","pages":"Article 100277"},"PeriodicalIF":5.6,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144780043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WASIF: In-depth detection of vulnerabilities in Wasm smart contracts via information flows and function invocation sequences WASIF:通过信息流和函数调用序列深入检测Wasm智能合约中的漏洞
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-01 Epub Date: 2025-04-10 DOI: 10.1016/j.bcra.2025.100287
Chu Chen , Xuan Wang , Bin Yu , Yumo Tian , Xiaoyu Lu , Pinghong Ren , Jin Liu
With the widespread adoption of WebAssembly (Wasm) smart contracts in popular blockchain platforms such as EOSIO, vulnerability attacks on Wasm smart contracts have become a serious problem. To protect the legitimate interests of blockchain users, it is necessary to detect vulnerabilities in Wasm smart contracts. However, detection faces a great challenge in that the source code of Wasm smart contracts is rarely released publicly. Although many approaches have made great progress in vulnerability detection, they still suffer from inefficiently generating function invocation sequences to track inter-function dependencies, ineffectively tracking sensitive information flows, and a considerable number of False Positives (FPs). To address these issues, we present a new concolic fuzzing approach for detecting vulnerabilities in Wasm smart contracts via information flows and function invocation sequences, namely, WASIF. Also, we implement the open-source prototype of the WASIF and conduct extensive experiments to evaluate it. The experimental results show that WASIF effectively and efficiently detects vulnerabilities in Wasm smart contracts and outperforms the state-of-the-art concolic fuzzer WASAI on most metrics.
随着WebAssembly (Wasm)智能合约在流行的区块链平台(如EOSIO)上的广泛采用,针对Wasm智能合约的漏洞攻击已经成为一个严重的问题。为了保护区块链用户的合法权益,有必要检测Wasm智能合约中的漏洞。然而,Wasm智能合约的源代码很少公开发布,这给检测带来了很大的挑战。尽管许多方法在漏洞检测方面取得了很大的进展,但它们仍然存在生成函数调用序列以跟踪功能间依赖关系的效率低下、跟踪敏感信息流的效率低下以及大量误报(FPs)的问题。为了解决这些问题,我们提出了一种新的concolic模糊方法,通过信息流和函数调用序列来检测Wasm智能合约中的漏洞,即WASIF。此外,我们实现了WASIF的开源原型,并进行了广泛的实验来评估它。实验结果表明,WASIF有效且高效地检测Wasm智能合约中的漏洞,并且在大多数指标上优于最先进的concolic fuzzer WASAI。
{"title":"WASIF: In-depth detection of vulnerabilities in Wasm smart contracts via information flows and function invocation sequences","authors":"Chu Chen ,&nbsp;Xuan Wang ,&nbsp;Bin Yu ,&nbsp;Yumo Tian ,&nbsp;Xiaoyu Lu ,&nbsp;Pinghong Ren ,&nbsp;Jin Liu","doi":"10.1016/j.bcra.2025.100287","DOIUrl":"10.1016/j.bcra.2025.100287","url":null,"abstract":"<div><div>With the widespread adoption of WebAssembly (Wasm) smart contracts in popular blockchain platforms such as EOSIO, vulnerability attacks on Wasm smart contracts have become a serious problem. To protect the legitimate interests of blockchain users, it is necessary to detect vulnerabilities in Wasm smart contracts. However, detection faces a great challenge in that the source code of Wasm smart contracts is rarely released publicly. Although many approaches have made great progress in vulnerability detection, they still suffer from inefficiently generating function invocation sequences to track inter-function dependencies, ineffectively tracking sensitive information flows, and a considerable number of False Positives (FPs). To address these issues, we present a new concolic fuzzing approach for detecting vulnerabilities in Wasm smart contracts via information flows and function invocation sequences, namely, WASIF. Also, we implement the open-source prototype of the WASIF and conduct extensive experiments to evaluate it. The experimental results show that WASIF effectively and efficiently detects vulnerabilities in Wasm smart contracts and outperforms the state-of-the-art concolic fuzzer WASAI on most metrics.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 3","pages":"Article 100287"},"PeriodicalIF":5.6,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144925056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Layer-2 expansion shared sequencer model for blockchain scalability 区块链可扩展性的第二层扩展共享序列器模型
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-01 Epub Date: 2025-04-17 DOI: 10.1016/j.bcra.2025.100292
Huijian Han , Mingwei Wang , Feng Yang , Linpeng Jia , Yi Sun , Rui Zhang
Rollup stands out as one of the most effective techniques for blockchain Layer-2 scaling. By processing transactions off-chain, it significantly enhances the throughput. However, the most rollup implementations currently rely on centralized sequencers, exposing the system and users to censorship attacks and risking network paralysis. In contrast, fully decentralized sequencers encounter latency issues and reduced throughput during the consensus phase. We propose a multislot weighted leader election algorithm based on shared sequencers, apply the proposer–builder separation (PBS) model, and use the fuzzy cognitive map (FCM) to analyze and optimize the important influence parameters. With its low trust dependence and high functionality, the probability of selecting malicious nodes is reduced. The sequencing and consensus are separated, so that the transaction can quickly reach soft confirmation. We implement this algorithm in a shared sequencer prototype. The experimental results show that the proposed algorithm parameter settings are in line with the expectations, and the probability of electing malicious nodes is significantly reduced. The transactions per second (TPS) of the network can cope with the throughput requirements of the Layer-2.
Rollup是区块链第2层扩展最有效的技术之一。通过处理链下交易,它显著提高了吞吐量。然而,大多数rollup实现目前依赖于集中式测序器,这将系统和用户暴露于审查攻击之下,并有网络瘫痪的风险。相比之下,完全分散的测序器在共识阶段遇到延迟问题和吞吐量降低。提出了一种基于共享序列的多时隙加权领袖选举算法,采用提议者-构建者分离(PBS)模型,并利用模糊认知图(FCM)对重要影响参数进行分析和优化。该算法具有较低的信任依赖性和较高的功能性,降低了选择恶意节点的概率。排序和共识分离,使交易能够快速达到软确认。我们在一个共享的音序器原型中实现了这个算法。实验结果表明,提出的算法参数设置符合预期,显著降低了恶意节点的当选概率。网络的TPS (transactions per second)可以满足第二层的吞吐量要求。
{"title":"A Layer-2 expansion shared sequencer model for blockchain scalability","authors":"Huijian Han ,&nbsp;Mingwei Wang ,&nbsp;Feng Yang ,&nbsp;Linpeng Jia ,&nbsp;Yi Sun ,&nbsp;Rui Zhang","doi":"10.1016/j.bcra.2025.100292","DOIUrl":"10.1016/j.bcra.2025.100292","url":null,"abstract":"<div><div>Rollup stands out as one of the most effective techniques for blockchain Layer-2 scaling. By processing transactions off-chain, it significantly enhances the throughput. However, the most rollup implementations currently rely on centralized sequencers, exposing the system and users to censorship attacks and risking network paralysis. In contrast, fully decentralized sequencers encounter latency issues and reduced throughput during the consensus phase. We propose a multislot weighted leader election algorithm based on shared sequencers, apply the proposer–builder separation (PBS) model, and use the fuzzy cognitive map (FCM) to analyze and optimize the important influence parameters. With its low trust dependence and high functionality, the probability of selecting malicious nodes is reduced. The sequencing and consensus are separated, so that the transaction can quickly reach soft confirmation. We implement this algorithm in a shared sequencer prototype. The experimental results show that the proposed algorithm parameter settings are in line with the expectations, and the probability of electing malicious nodes is significantly reduced. The transactions per second (TPS) of the network can cope with the throughput requirements of the Layer-2.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 3","pages":"Article 100292"},"PeriodicalIF":5.6,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145120932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Large language models for PHM: a review of optimization techniques and applications PHM的大型语言模型:优化技术和应用综述
Pub Date : 2025-08-19 DOI: 10.1007/s43684-025-00100-5
Tingyi Yu, Junya Tang, Qingyun Yu, Li Li, Ying Liu, Raul Poler

The rapid advancement of Large Language Models (LLMs) has created unprecedented opportunities for industrial automation, process optimization, and decision support systems. As industries seek to leverage LLMs for industrial tasks, understanding their architecture, deployment strategies, and fine-tuning methods becomes critical. In this review, we aim to summarize the challenges, key technologies, current status, and future directions of LLM in Prognostics and Health Management(PHM). First, this review introduces deep learning for PHM. We begin by analyzing the architectural considerations and deployment strategies for industrial environments, including acceleration techniques and quantization methods that enable efficient operation on resource-constrained industrial hardware. Second, we investigate Parameter Efficient Fine-Tuning (PEFT) techniques that allow industry-specific adaptation without prohibitive computational costs. Multi-modal capabilities extending LLMs beyond text to process sensor data, images, and time-series information are also discussed. Finally, we explore emerging PHM including anomaly detection systems that identify equipment malfunctions, fault diagnosis frameworks that determine root causes, and specialized question-answering systems that empower workers with instant domain expertise. We conclude by identifying key challenges and future research directions for LLM deployment in PHM. This review provides a timely resource for researchers, engineers, and decision-makers navigating the transformative potential of language models in industry 4.0 environments.

大型语言模型(llm)的快速发展为工业自动化、流程优化和决策支持系统创造了前所未有的机会。随着行业寻求利用llm来完成工业任务,了解llm的体系结构、部署策略和微调方法变得至关重要。本文综述了预后与健康管理(PHM)法学硕士面临的挑战、关键技术、现状和未来发展方向。首先,本文介绍了PHM的深度学习。我们首先分析工业环境的体系结构考虑因素和部署策略,包括加速技术和量化方法,它们可以在资源受限的工业硬件上实现高效操作。其次,我们研究了参数高效微调(PEFT)技术,该技术允许行业特定的适应,而不需要高昂的计算成本。还讨论了将llm扩展到文本之外的多模式功能,以处理传感器数据、图像和时间序列信息。最后,我们探讨了新兴的PHM,包括识别设备故障的异常检测系统,确定根本原因的故障诊断框架,以及赋予工人即时领域专业知识的专业问答系统。最后,我们确定了LLM在PHM中部署的主要挑战和未来的研究方向。这篇综述为研究人员、工程师和决策者在工业4.0环境中导航语言模型的变革潜力提供了及时的资源。
{"title":"Large language models for PHM: a review of optimization techniques and applications","authors":"Tingyi Yu,&nbsp;Junya Tang,&nbsp;Qingyun Yu,&nbsp;Li Li,&nbsp;Ying Liu,&nbsp;Raul Poler","doi":"10.1007/s43684-025-00100-5","DOIUrl":"10.1007/s43684-025-00100-5","url":null,"abstract":"<div><p>The rapid advancement of Large Language Models (LLMs) has created unprecedented opportunities for industrial automation, process optimization, and decision support systems. As industries seek to leverage LLMs for industrial tasks, understanding their architecture, deployment strategies, and fine-tuning methods becomes critical. In this review, we aim to summarize the challenges, key technologies, current status, and future directions of LLM in Prognostics and Health Management(PHM). First, this review introduces deep learning for PHM. We begin by analyzing the architectural considerations and deployment strategies for industrial environments, including acceleration techniques and quantization methods that enable efficient operation on resource-constrained industrial hardware. Second, we investigate Parameter Efficient Fine-Tuning (PEFT) techniques that allow industry-specific adaptation without prohibitive computational costs. Multi-modal capabilities extending LLMs beyond text to process sensor data, images, and time-series information are also discussed. Finally, we explore emerging PHM including anomaly detection systems that identify equipment malfunctions, fault diagnosis frameworks that determine root causes, and specialized question-answering systems that empower workers with instant domain expertise. We conclude by identifying key challenges and future research directions for LLM deployment in PHM. This review provides a timely resource for researchers, engineers, and decision-makers navigating the transformative potential of language models in industry 4.0 environments.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-025-00100-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144868630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing predictive maintenance and mission assignment to enhance fleet readiness under uncertainty 优化预测性维护和任务分配,增强不确定条件下的机队战备状态
Pub Date : 2025-08-15 DOI: 10.1007/s43684-025-00104-1
Ryan O’Neil, Abdelhakim Khatab, Claver Diallo

In many industrial settings, fleets of assets are required to operate through alternating missions and breaks. Fleet Selective Maintenance (FSM) is widely used in such contexts to improve the fleet performance. However, existing FSM models assume that upcoming missions are identical and require only a single system configuration for completion. Additionally, these models typically assume that all missions must be completed, overlooking resource constraints that may prevent readying all systems within the available break duration. This makes mission prioritization and assignment a necessary consideration for the decision-maker. This work proposes a novel FSM model that jointly optimizes system to mission assignment, component and maintenance level selection, and repair task allocation. The proposed framework integrates analytical models for standard components and Deep Neural Networks (DNNs) for sensor-monitored ones, enabling a hybrid reliability assessment approach that better reflects real-world multi-component systems. To account for uncertainties in maintenance and break durations, a chance-constrained optimization model is developed to ensure that maintenance is completed within the available break duration with a specified confidence level. The optimization model is reformulated using two well-known techniques: Sample Average Approximation (SAA) and Conditional Value-at-Risk (CVaR) approximation. A case study of military aircraft fleet maintenance is investigated to demonstrate the accuracy and added value of the proposed approach.

在许多工业环境中,资产车队需要通过交替的任务和休息来运行。在这种情况下,车队选择性维护(FSM)被广泛用于提高车队的性能。然而,现有的FSM模型假设即将到来的任务是相同的,并且只需要一个系统配置即可完成。此外,这些模型通常假设所有任务都必须完成,忽略了可能妨碍在可用的中断时间内准备所有系统的资源限制。这使得任务的优先级和分配成为决策者的必要考虑因素。本文提出了一种新的FSM模型,该模型对系统的任务分配、部件和维护级别的选择以及维修任务的分配进行了联合优化。提出的框架集成了标准组件的分析模型和传感器监测组件的深度神经网络(dnn),使混合可靠性评估方法能够更好地反映现实世界的多组件系统。为了考虑维护和中断持续时间的不确定性,开发了一个机会约束优化模型,以确保在指定的置信水平下,在可用的中断持续时间内完成维护。优化模型采用两种著名的技术:样本平均近似(SAA)和条件风险值(CVaR)近似。以军用飞机机队维修为例,验证了该方法的准确性和附加价值。
{"title":"Optimizing predictive maintenance and mission assignment to enhance fleet readiness under uncertainty","authors":"Ryan O’Neil,&nbsp;Abdelhakim Khatab,&nbsp;Claver Diallo","doi":"10.1007/s43684-025-00104-1","DOIUrl":"10.1007/s43684-025-00104-1","url":null,"abstract":"<div><p>In many industrial settings, fleets of assets are required to operate through alternating missions and breaks. Fleet Selective Maintenance (FSM) is widely used in such contexts to improve the fleet performance. However, existing FSM models assume that upcoming missions are identical and require only a single system configuration for completion. Additionally, these models typically assume that all missions must be completed, overlooking resource constraints that may prevent readying all systems within the available break duration. This makes mission prioritization and assignment a necessary consideration for the decision-maker. This work proposes a novel FSM model that jointly optimizes system to mission assignment, component and maintenance level selection, and repair task allocation. The proposed framework integrates analytical models for standard components and Deep Neural Networks (DNNs) for sensor-monitored ones, enabling a hybrid reliability assessment approach that better reflects real-world multi-component systems. To account for uncertainties in maintenance and break durations, a chance-constrained optimization model is developed to ensure that maintenance is completed within the available break duration with a specified confidence level. The optimization model is reformulated using two well-known techniques: Sample Average Approximation (SAA) and Conditional Value-at-Risk (CVaR) approximation. A case study of military aircraft fleet maintenance is investigated to demonstrate the accuracy and added value of the proposed approach.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-025-00104-1.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144843250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
全部 科技通报 计算机与应用化学 电子工业专用设备 河北工业科技 Journal of Applied Sciences 中国科学技术大学学报 印制电路信息 Wuhan University Journal of Natural Sciences Virtual Reality Intelligent Hardware 模式识别与人工智能 控制与决策 电机与控制学报 南京邮电大学学报(自然科学版) 计算机研究与发展 计算机学报 自动化学报 电子科技大学学报 华南理工大学学报(自然科学版) 中国图象图形学报 雷达学报 信息与控制 数据采集与处理 机器人 西北工业大学学报 High Technology Letters Journal of Cybersecurity 中国科学:信息科学 Big Data Mining and Analytics Visual Computing for Industry, Biomedicine, and Art 清华大学学报(自然科学版) 计算机辅助设计与图形学学报 电波科学学报 Journal of Biosafety and Biosecurity Blockchain-Research and Applications 建模与仿真(英文) 建模与仿真 Soc Netw 单片机与嵌入式系统应用 信息安全(英文) 数据挖掘 指挥信息系统与技术 通信世界 智能与融合网络(英文) 电磁分析与应用期刊(英文) 资源环境与信息工程(英文) 无线传感网络(英文) 高性能计算技术 中文信息学报 通信技术政策研究 Tsinghua Sci. Technol. 天线与传播(英文) 物联网技术 离散数学期刊(英文) 计算机应用 ZTE Communications 软件工程与应用(英文) 航空计算技术 智能控制与自动化(英文) 电路与系统(英文) 计算机工程 天线学报 仪表技术与传感器 海军航空工程学院学报 Comput Technol Appl 军事通信技术 计算机仿真 无线通信 现代电子技术(英文) Journal of Systems Science and Information 电脑和通信(英文) 无线工程与技术(英文) 无线互联科技 人工智能与机器人研究 计算机工程与设计 电路与系统学报 软件 通讯和计算机:中英文版 智能学习系统与应用(英文) 图像与信号处理 软件工程与应用 电力电子 现代非线性理论与应用(英文) 计算机科学 计算机科学与应用 物联网(英文) 数据与计算发展前沿 电信科学 自主智能(英文) 人工智能杂志(英文) 信号处理 人工智能技术学报(英文) 自主智能系统(英文) 信息通信技术 数据分析和信息处理(英文)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1