-
2721
Defense scheme for the world state based attack in Ethereum
Published 2022-04-01“…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
Get full text
Article -
2722
Automated Docking System for LNG Loading Arm Based on Machine Vision and Multi-Sensor Fusion
Published 2025-02-01Get full text
Article -
2723
GC-MT: A Novel Vessel Trajectory Sequence Prediction Method for Marine Regions
Published 2025-04-01Get full text
Article -
2724
OVERVIEW OF METHODS FOR IMPROVING THE VISUAL QUALITY OF IMAGES AND VIDEOS IN ADVERSE WEATHER CONDITIONS
Published 2023-01-01Get full text
Article -
2725
Flexible Job Shop Scheduling Optimization Using Genetic Algorithm For Handling Dynamic Factors
Published 2025-06-01“… This research introduces the Genetic Adaptive Scheduling System (GASS), a novel framework designed to optimize scheduling in Flexible Job Shop Scheduling Problems (FJSP). Due to its complexity, FJSP presents significant challenges stemming from machine flexibility, dynamic routing, and operation precedence constraints. …”
Get full text
Article -
2726
Continual Learning With Neuromorphic Computing: Foundations, Methods, and Emerging Applications
Published 2025-01-01“…Then, we analyze these methods based on their achieved CL desiderata, computational and memory costs, as well as network complexity, hence emphasizing the need for energy-efficient CL. …”
Get full text
Article -
2727
Malicious software identification based on deep learning algorithms and API feature extraction
Published 2025-03-01“…Traditional malware detection methods face challenges in handling complex feature representations, especially in utilizing the semantic information and call order of application programming interface call sequences. …”
Get full text
Article -
2728
Real-Time Coordinate Estimation for SCARA Robots in PCB Repair Using Vision and Laser Triangulation
Published 2025-04-01“…The placement of Surface-Mount Device (SMD) components in PCB assembly is efficiently automated using robots and design software-generated coordinate files; however, the PCB repair process remains significantly more complex and challenging. …”
Get full text
Article -
2729
Perception-Based H.264/AVC Video Coding for Resource-Constrained and Low-Bit-Rate Applications
Published 2025-07-01“…To this end, macroblocks (MBs) containing human faces are detected using the Viola–Jones algorithm, which leverages AdaBoost for feature selection and a cascade of classifiers for fast and accurate detection. …”
Get full text
Article -
2730
Digitization of Medical Device Displays Using Deep Learning Models: A Comparative Study
Published 2025-05-01“…However, most home-based medical devices are closed systems that do not support straightforward automatic data export and often require complex connections to access or transmit patient information. …”
Get full text
Article -
2731
RLEAFS: Reinforcement Learning-Based Energy Aware Forwarding Strategy for NDN-Based IoT Networks
Published 2024-01-01“…Our Strategy integrates Q learning algorithm into path selection procedure, focusing on minimizing energy consumption and extending network lifetime while maintaining efficient data delivery. …”
Get full text
Article -
2732
Mechanical properties and energy absorption of CoCrNi functionally graded TPMS cellular structures
Published 2025-01-01“…CoCrNi medium-entropy alloy (MEA), combining both high strength and ductility, which can significantly enhance the energy absorption efficiency and resistance to failure deformation of complex energy-absorbing structures. …”
Get full text
Article -
2733
Comparative Assessment of Functional and Morphological Markers in Guinea Pig (<i>Cavia porcellus</i>) Oocytes Collected at Different Estrous Cycle Phases
Published 2025-07-01“…These findings indicate that both intrinsic (e.g., morphological quality) and extrinsic (e.g., estrous cycle stage) factors modulated oocyte competence. Selecting oocytes based on integrated morphological and physiological criteria may improve the efficiency of IVM protocols in this species.…”
Get full text
Article -
2734
Optimization of Flight Scheduling in Urban Air Mobility Considering Spatiotemporal Uncertainties
Published 2025-05-01“…The vigorous development of urban air mobility (UAM) is reshaping the urban travel landscape, but it also poses severe challenges to the safe and efficient operation of dense and complex airspace. …”
Get full text
Article -
2735
DNN-based Software Reliability Model for Fault Prediction and Optimal Release Time Determination
Published 2025-10-01“…This comparative analysis highlights the model's enhanced predictive accuracy, computational efficiency, and less time complexity. Additionally, the predicted faults are used to determine the optimal release time, based on the customer's reliability requirements and the minimum cost necessary to achieve that reliability. …”
Get full text
Article -
2736
Intelligent recognition algorithm and application of coal mine overhead passenger device based on multiscale feature fusion
Published 2024-12-01“…However, there are several challenges that need to be addressed, such as the limited number of samples in the cmopd dataset, poor lighting conditions in underground images, overlapping and occlusion between operating cmopd, varying sitting postures of miners, difficulty in detecting small cmopd targets, complex model deployment, and low efficiency of traditional recognition methods for cmopd with different passenger-carrying statuses.To overcome these challenges, a cmopd dataset was created from various coal mines in Guizhou province. …”
Get full text
Article -
2737
Discrete Phase Shift IRS-Assisted Energy Harvesting in Cognitive Radio Networks With Spectrum Sensing
Published 2025-01-01“…These results highlight the transformative potential of IRS with discrete phase shifts in enhancing EH-CRN efficiency, particularly in improving energy harvesting and SU throughput under practical constraints.…”
Get full text
Article -
2738
Enhancing Camera Source Identification: A Rapid Algorithm with Enhanced Discriminative Power
Published 2024-12-01“…The algorithm innovatively introduces a search priority queue (SPQ), which analyzes the global correlation between the query fingerprint and all reference fingerprints in the database to construct a comprehensive priority ranking, thereby achieving the efficient retrieval of matching fingerprints. Compared to the traditional brute-force search algorithm (BFSA), our method significantly reduces computational complexity in large-scale databases, optimizing from <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>O</mi><mo>(</mo><mi>n</mi><mi>N</mi><mo>)</mo></mrow></semantics></math></inline-formula> to <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>O</mi><mo>(</mo><mi>n</mi><mo form="prefix">log</mo><mi>N</mi><mo>)</mo></mrow></semantics></math></inline-formula>, where <i>n</i> is the length of the fingerprint, and <i>N</i> is the number of fingerprints in the database. …”
Get full text
Article -
2739
AERO: Adaptive Edge-Cloud Orchestration With a Sub-1K-Parameter Forecasting Model
Published 2025-01-01“…However, dynamic and fluctuating workloads pose significant challenges for accurate workload prediction and efficient resource allocation, particularly in resource-constrained edge environments. …”
Get full text
Article -
2740
A Simple Blind Sampling Frequency Offset Estimation Scheme for Short-Reach DD-OFDM Systems
Published 2020-01-01“…It can achieve high-precision SFO estimation while ensuring low computational complexity as well as high spectral efficiency. The experimental results show that the SFO estimation accuracy using the proposed scheme can be significantly reduced to as low as ±3 ppm when SFO ranges from −1000 ppm to +1000 ppm after 20-km standard single-mode fiber (SSMF) transmission. …”
Get full text
Article