-
541
Blockchain-based computing and wireless communication resource joint management double auction model
Published 2022-11-01“…In wireless communication networks, the stock of spectrum, computing, storage and other resources at the edge was limited.The traditional decentralized and exclusive resource allocation resulted in weak resource reuse capability and low utilization rate.At the same time, it was difficult to ensure the fairness of resource sharing in the traditional resource scheduling process due to the lack of trust between the owners.First, a double auction model of computing and wireless communication resource joint management based on blockchain was proposed.In the model, a resource market was established, in which resource buyers and sellers allocated resources through double auctions.Secondly, blockchain was used to store the resource information of buyers and sellers to solve the mutual trust problem of all parties in the network.Finally, the experimental simulation was carried out to verify that the proposed model effectively improved the system performance and resource utilization efficiency.…”
Get full text
Article -
542
Autogobierno y modernización de Galicia durante las cuatro últimas décadas
Published 2024-06-01“…In this period, Spain became democratized, decentralized, entered the European Union and built a comparable welfare state. …”
Get full text
Article -
543
IT Governance Modes Choice: An Institutional Theory Perspective
Published 2021-04-01“…The results show that the three different IT Governance modes - centralized, decentralized, and federal - meet the requirements of process and property variables and can thus be considered legitimized institutions. …”
Get full text
Article -
544
Advancing diagnosis and treatment for human African trypanosomiasis in Nigeria: challenges and future directions
Published 2025-01-01“…The focus is on improving the current diagnostic framework, decentralizing the validation process, and streamlining drug distribution to effectively halt the transmission of HAT. …”
Get full text
Article -
545
A Blockchain Network Admission Control Mechanism Using Anonymous Identity-Based Cryptography
Published 2024-12-01“…This paper proposes a novel admission control mechanism based on identity-based cryptography, utilizing multi-level anonymous identifiers and decentralized private key generation to enhance user authentication and privacy. …”
Get full text
Article -
546
Optimizing power system trading processes using smart contract algorithms
Published 2024-12-01“…Three trading models are analyzed: centralized trading, blockchain-based decentralized trading, and smart contract-driven automated trading. …”
Get full text
Article -
547
The New Method of Sensor Data Privacy Protection for IoT
Published 2021-01-01“…On the basis of smart contracts, attribute-based data access control allows decentralized applications to finely control data access. …”
Get full text
Article -
548
A novel approach of Consensus-based Finite-time Distributed Sliding Mode Control for Stewart platform manipulators motion tracking
Published 2025-03-01“…Simulations are used to validate the efficacy of the proposed control scheme by comparing it to typical decentralized PD control methods. The results simulated based on the Quasi-Physical Model show that consensus-based control outperforms the counterpart control approaches in terms of accuracy and stability.…”
Get full text
Article -
549
Optimal Decisions for a Fuzzy Two-Echelon Supply Chain
Published 2014-01-01“…In order to maximize the α-optimistic value of the profits, based on different market structures, one centralized decision model and three decentralized decision models are developed, and the corresponding analytical equilibrium solutions are obtained using the game-theoretical approach. …”
Get full text
Article -
550
Increasing the cyber resilience of SMEs through open-source solutions and international collaboration
Published 2025-01-01“…Open-source solutions offer financial accessibility, flexibility, and increased security, supported by global communities that contribute to their continuous improvement. Moreover, decentralized sharing of threat information, combined with artificial intelligence, enables more efficient detection and prevention of cyberattacks. …”
Get full text
Article -
551
Le numérique au secours des monnaies locales et complémentaires
Published 2018-12-01“…However, these two types of alternative currencies are based on different society projects and radically different values. While Decentralized virtual currencies are speculative and rely on an anonymous community, Local and Complementary currencies which aim to enhance citizens community participation through transactions purposes take root in their territories. …”
Get full text
Article -
552
Causal estimation of FTX collapse on cryptocurrency: a counterfactual prediction analysis
Published 2025-01-01“…The industry is still mostly unregulated, and regulators must act quickly, highlighting the need for outstanding innovation and decentralized and trustless technology adoption.…”
Get full text
Article -
553
Research on a new network covert channel model in blockchain environment
Published 2019-05-01“…Blockchain is a decentralized architecture emerging with cryptocurrencies,which is credible and robust.A network covert channel model in blockchain environment was proposed for the first time,which was anti-interference,anti-tamper modification,multi-line communication,receiver anonymity and line independence.The shortcomings of network covert channel in existing network environment could be tackled by the new type of network covert channel,such as characteristic defect.etc.Firstly,A network covert channel model in blockchain environment was presented by formal method,its anti-interference and anti-tamper modification was proved.Then,a blockchain network covert channel scenario using service operation interval time was presented.Finally,the undetectability,robustness and rate of the blockchain network covert channel evaluation vectors was proposed.A theoretical foundation was laid for the practicality of the new type of network covert channel in blockchain.…”
Get full text
Article -
554
Market-Based Approach to Mobile Surveillance Systems
Published 2012-01-01“…The realization of the potential of mobile surveillance requires the solution of different challenging problems such as task allocation, mobile sensor deployment, multisensor management, cooperative object detection and tracking, decentralized data fusion, and interoperability and accessibility of system nodes. …”
Get full text
Article -
555
MODELING A NEGOTIATION PROCESS BETWEEN AIRCRAFT USING PETRI NETS
Published 2023-12-01“…Many studies point out the delegation of the responsibility for ensuring separation from air traffic controllers to the aircraft crews, but it should be assumed that the transition from centralized to decentralized air traffic control will occur in stages. …”
Get full text
Article -
556
La crisis del modelo de Estado en España y la reforma federal
Published 2016-01-01“…First, he deals with some of the juridical vices of its decentralized system. Secondly, he comments on the problems generated by the passive attitude of Spanish governments to adapt the constitutional system to its conflictual context (multinational in public law and multi-level into the UE system), and he also explains why the federal logic is probably the answer to the internal and external factors of State crisis. …”
Get full text
Article -
557
Leveraging edge learning and game theory for intrusion detection in Internet of things
Published 2021-06-01“…With the commercialization of 5G and the development of 6G, more and more Internet of things (IoT) devices are linked to the novel cyber-physical system (CPS) to support intelligent decision making.However, the highly decentralized and heterogeneous IoT devices face potential threats that may mislead the CPS.Traditional intrusion detection solutions cannot protect the privacy of IoT devices, and they have to deal with the single point of failure, which prevents these solutions from being deploying in IoT scenarios.The edge learning and game theory based intrusion detection for IoT was proposed.Firstly, an edge learning based intrusion detection framework was proposed to detect potential threats in IoT.Moreover, a multi-leader multi-follower game was employed to motivate trusted parameter servers and edge devices to participate in the edge learning process.Experiments and evaluations show the security and effectiveness of the proposed intrusion detection framework.…”
Get full text
Article -
558
Application of blockchain technology in the demand response management of power grid
Published 2019-05-01“…The theory of decentralized blockchain mechanism was studied,and a method of applying distributed block chain technology to manage demand response planning in smart grid environment was proposed.This method was based on the blockchain distributed ledger accounting tamper-proof technology,which stored the energy consumption information collected from the intelligent metering devices of the IoT,and defined the self-executing intelligent contract at each consumer level in a programmatic way to ensure the flexibility of transactions.Blockchain distributed technologies provided incentives or penalties to balance energy demand with grid energy production rules.Consensus-based validation would be used to validate demand response plans and provide appropriate financial settlement for flexible suppliers.The results show that the power demand side management based on blockchain distributed technology can be used to match energy demand and production under the condition of smart grid,with high accuracy of demand response signal,but less flexibility required for convergence.…”
Get full text
Article -
559
Block-based fair payment scheme under delegation computation
Published 2020-03-01“…In the traditional delegation computation,due to the self-interested behavior of both participants,there were some problems such as the denial of the principal and the dishonest calculation by the computing party.In the payment phase,a third party was required to ensure the fairness of the payment,which led to extra costs and risks of disclosure of participants' privacy.Game theory was used to analyze the Nash equilibrium solution between the two parties in the payment process,and a fair payment protocol based on time commitment of bitcoin was proposed.Firstly,the bitcoin time commitment technology was used to ensure the fairness of payment.Secondly,the decentralized feature of block chain was used to replace the third-party service to protect the privacy of all parties and realize the source of responsibility.Finally,the scheme was analyzed from the perspective of security and correctness,which proved that the participants choose behavioral strategies honestly in the payment process.The scheme proposed in this paper not only solved the problem of fair payment in traditional delegation computation,but also protected the privacy of participants.…”
Get full text
Article -
560
Être ethnologue au Yunnan
Published 2023-06-01“…I also reflect on the “meaning” that emerges from observation in light of social changes: its understanding and the decentring it imposes.…”
Get full text
Article