Results 51 to 60 of about 1,656 (145)

量子区块链:融合量子信息技术的区块链能否抵御量子霸权?

open access: yes智能科学与技术学报, 2019
区块链的广泛应用使越来越多的学者聚焦到安全加密这一重大问题上。然而,随着电子计算机技术的飞速发展,远超传统计算速度和数据处理容量的量子计算机已经逐步从理论走向实践,它的极大算力将给区块链的链内安全带来巨大和根本性的挑战。介绍了量子信息的两大核心应用,分析了量子霸权对区块链现行的共识方式和加密算法的破解方式。同时,针对目前区块链的漏洞,提出量子区块链以防止量子计算带来的攻击威胁,并阐述了量子通信技术的原理与应用方法,举例说明了量子区块链的安全性与可行性。最后,对目前量子计算存在的几大技术挑战进行了分析。
张俊, 袁勇, 王晓, 王飞跃
doaj  

A study on the evaluation system of metropolitan village pension value based on niche theory(生态位视角下都市区村落养老价值评价体系研究)

open access: yesZhejiang Daxue xuebao. Lixue ban, 2019
从生态位相关理论应用出发,基于生态位宽度、重叠度和密度解析村落养老价值的影响源和影响机制。在建立都市区村落养老行业系统的基础上,结合需求度调查,归纳了行业生态链中的生态元功能组成。并以影响源推导评价子系统,以生态元功能衍生出评价模块,从村落养老的时间位、空间位、功能位上的优势目标出发,构建了一个与生态位关联,由评价维度、价值子系统、模块、指标变量4 个层级组成的都市区村落养老价值评价体系。此体系的研究立足于生态位对村落养老价值的影响机制和养老产业良性发展的适应性,为村落养老价值评价体系的构建提供了新视角,
LIUSheng(刘声)   +2 more
doaj   +1 more source

Evolutionary game analysis of data elements in a blockchain-based trusted data space [PDF]

open access: yes
The circulation of data elements serves as a key driver of data value and the digital economy, yet current mechanisms face challenges in ensuring data quality and trust due to information asymmetry, fraud, and illicit industrial chains, hindering their ...
CHEN Fu   +4 more
core   +1 more source

Research on Application of Blockchain in PKI Security [PDF]

open access: yes
The design idea of emphasizing application and neglecting defense leads to the lack of endogenous security attributes at the beginning of the design of transmission control protocol/Internet protocol (TCP/IP) architecture. Public key infrastructure (PKI),
XIA Lingling, WANG Qun, MA Zhuo, LIANG Guangjun
core   +1 more source

国境口岸截获象牙地理溯源分析初探

open access: yes野生动物学报, 2022
国境口岸截获象牙的地理溯源是识别非法象牙来源地,确定走私热点地区,描绘走私通道,有针对性地打击象牙非法贸易的重要前提。利用线粒体DNA单倍型溯源的方法,对我国的126份国境口岸截获象牙样本进行地理溯源。从126份样本中共得出22个地理单倍型,为2个支系和7个进化枝。通过Loxodonta Localizer 数据库比对分析,109份样本确定了地理来源,进而推断出3个来源地:中非刚果盆地的Tridom跨境生态保护区,东非的肯尼亚、坦桑尼亚和乌干达等国及非洲南部的KAZA跨境保护区 ...
苏 倡   +5 more
doaj  

STBM: secure and trustworthy blockchain-based model for cybersecurity service transactions [PDF]

open access: yes
To overcome the numerous challenges faced by traditional models of cybersecurity service transactions, adapt to the needs of industrial digitalization, and address the inconveniences and opacity of cybersecurity service transactions, a secure and ...
PIAO Guirong, ZHU Jianming
core   +1 more source

Design and Implementation of Blockchain-Based Anti-counterfeiting and Traceability System for Sesame Oil [PDF]

open access: yes
Sesame oil is one of the indispensable cooking oils in daily diets, and its quality and safety has aroused wide concern. However, the issue of sesame oil adulteration has become increasingly serious, making it urgent to guarantee the quality and safety ...
XU Jinsheng, ZHANG En
core   +1 more source

基于区块链和通证经济的跨国跨洲电力市场机制设计

open access: yes智能科学与技术学报, 2019
全球能源互联网旨在构建以电力消费为核心的能源模式,跨国跨洲电力交易是推动其发展的必要条件和有效途径。首先分析跨国跨洲电力交易面临的问题,提出了基于区块链和通证经济的跨国跨洲电力市场设计思路。然后,将跨国跨洲电力市场的组成分为5个部分,并分别对这5个部分进行了描述与建模。最后,利用等比例放大的IEEE 39节点系统,对本文所提市场进行了仿真与分析。仿真结果表明,基于区块链和通证经济的跨国跨洲电力市场可以保证跨区域、多主体电力交易的有效实施,同时有利于激励发电商使用清洁能源参与电力市场。
陈思远, 白昱阳, 张俊, 王飞跃
doaj  

Security model without managers for blockchain trading system [PDF]

open access: yes, 2020
In view of the abuse of power by managers in the traditional centralized trading system, a security model without managers for the blockchain-based trading system was proposed, which also solved the problems of unsafe endorsement, untimely trading, low ...
Gongxuan ZHANG   +2 more
core   +1 more source

基于多通道数据传输技术的无线视频监控系统

open access: yesGuangtongxin yanjiu, 2010
文章基于现代通信技术的发展现状,结合计算机网络技术,介绍了基于多通道多媒体数据传输技术的无线视频监控系统。该监控系统利用多个无线模块建立若干条通信链路,并根据各链路的通信质量动态调整数据传输模式,兼容多种传输协议,保障了多媒体数据传输的流畅度和清晰度,实现了对所有无线覆盖地区的网络远程监控。
熊茜, 胡鹏, 郑亚
doaj  

Home - About - Disclaimer - Privacy