Research on logistics supply chain of iron and steel enterprises based on block chain technology (Englisch)
- Neue Suche nach: Yang, Aimin
- Neue Suche nach: Li, Yifan
- Neue Suche nach: Liu, Chenshuai
- Neue Suche nach: Li, Jie
- Neue Suche nach: Zhang, Yuzhu
- Neue Suche nach: Wang, Jiahao
- Neue Suche nach: Yang, Aimin
- Neue Suche nach: Li, Yifan
- Neue Suche nach: Liu, Chenshuai
- Neue Suche nach: Li, Jie
- Neue Suche nach: Zhang, Yuzhu
- Neue Suche nach: Wang, Jiahao
In:
Future Generation Computer Systems
;
101
;
635-645
;
2019
-
ISSN:
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:Research on logistics supply chain of iron and steel enterprises based on block chain technology
-
Beteiligte:Yang, Aimin ( Autor:in ) / Li, Yifan ( Autor:in ) / Liu, Chenshuai ( Autor:in ) / Li, Jie ( Autor:in ) / Zhang, Yuzhu ( Autor:in ) / Wang, Jiahao ( Autor:in )
-
Erschienen in:Future Generation Computer Systems ; 101 ; 635-645
-
Verlag:
- Neue Suche nach: Elsevier B.V.
-
Erscheinungsdatum:04.07.2019
-
Format / Umfang:11 pages
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis – Band 101
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Mapping heterogeneous research infrastructure metadata into a unified catalogue for use in a generic virtual research environmentMartin, Paul / Remy, Laurent / Theodoridou, Maria / Jeffery, Keith / Zhao, Zhiming et al. | 2019
- 14
-
Modified deep residual network architecture deployed on serverless framework of IoT platform based on human activity recognition applicationKeshavarzian, Alireza / Sharifian, Saeed / Seyedin, Sanaz et al. | 2019
- 29
-
An efficient linkable group signature for payer tracing in anonymous cryptocurrenciesZhang, Lingyue / Li, Huilin / Li, Yannan / Yu, Yong / Au, Man Ho / Wang, Baocang et al. | 2019
- 39
-
Energy and cost aware scheduling with batch processing for instance-intensive IoT workflows in cloudsWen, Yiping / Wang, Zhibin / Zhang, Yu / Liu, Jianxun / Cao, Buqing / Chen, Jinjun et al. | 2019
- 51
-
A Relevance-based approach for Big Data ExplorationBagozi, Ada / Bianchini, Devis / De Antonellis, Valeria / Garda, Massimiliano / Marini, Alessandro et al. | 2019
- 70
-
GTSIM-POP: Game theory based secure incentive mechanism and patient-optimized privacy-preserving packet forwarding scheme in m-healthcare social networksZhou, Jun / Cao, Zhenfu / Dong, Xiaolei / Vasilakos, Thanos et al. | 2019
- 83
-
Evaluating impacts of traffic migration and virtual network functions consolidation on power aware resource allocation algorithmsHejja, Khaled / Hesselbach, Xavier et al. | 2019
- 99
-
A cloud-agnostic queuing system to support the implementation of deadline-based application execution policiesKiss, Tamas / DesLauriers, James / Gesmier, Gregoire / Terstyanszky, Gabor / Pierantoni, Gabriele / Oun, Osama Abu / Taylor, Simon J.E. / Anagnostou, Anastasia / Kovacs, Jozsef et al. | 2019
- 112
-
Dynamic digest based authentication for client–server systems using biometric verificationBabamir, Faezeh Sadat / Kirci, Murvet et al. | 2019
- 127
-
A secure privacy preserving deduplication scheme for cloud computingFan, Yongkai / Lin, Xiaodong / Liang, Wei / Tan, Gang / Nanda, Priyadarsi et al. | 2019
- 136
-
Smart healthcare framework for ambient assisted living using IoMT and big data analytics techniquesSyed, Liyakathunisa / Jabeen, Saima / S., Manimala / Alsaeedi, Abdullah et al. | 2019
- 152
-
Deep convolutional tree networksAmory, Abduljawad A. / Muhammad, Ghulam / Mathkour, Hassan et al. | 2019
- 169
-
Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic modelJie, Yingmo / Choo, Kim-Kwang Raymond / Li, Mingchu / Chen, Ling / Guo, Cheng et al. | 2019
- 180
-
A novel two-dimensional ECG feature extraction and classification algorithm based on convolution neural network for human authenticationHammad, Mohamed / Zhang, Shanzhuo / Wang, Kuanquan et al. | 2019
- 197
-
Data-driven ontology generation and evolution towards intelligent service in manufacturing systemsHuang, Chengxi / Cai, Hongming / Xu, Lida / Xu, Boyi / Gu, Yizhi / Jiang, Lihong et al. | 2019
- 208
-
Measuring the impact of burst buffers on data-intensive scientific workflowsFerreira da Silva, Rafael / Callaghan, Scott / Do, Tu Mai Anh / Papadimitriou, George / Deelman, Ewa et al. | 2019
- 221
-
Multilayer overlapping community detection using multi-objective optimizationShahmoradi, M.R. / Ebrahimi, M. / Heshmati, Z. / Salehi, M. et al. | 2019
- 236
-
Cross-platform rating prediction method based on review topicZhang, Huibing / Zhong, Hao / Bai, Weihua / Pan, Fang et al. | 2019
- 246
-
A PUF-based mutual authentication scheme for Cloud-Edges IoT systemsBarbareschi, Mario / De Benedictis, Alessandra / La Montagna, Erasmo / Mazzeo, Antonino / Mazzocca, Nicola et al. | 2019
- 262
-
Meteor: Optimizing spark-on-yarn for short applicationsZhang, Hong / Huang, Hai / Wang, Liqiang et al. | 2019
- 272
-
Iris: Secure reliable live-streaming with opportunistic mobile edge cloud offloadingMartins, Rolando / Correia, Manuel E. / Antunes, Luís / Silva, Fernando et al. | 2019
- 293
-
Mono and multi-modal biometric systems assessment by a common black box testing frameworkCabana, Antoine / Charrier, Christophe / Louis, Alain et al. | 2019
- 304
-
Socio-spatial influence maximization in location-based social networksHosseinpour, Mohammad / Malek, Mohammad Reza / Claramunt, Christophe et al. | 2019
- 315
-
MOBT: A kleptographically-secure hierarchical-deterministic wallet for multiple offline Bitcoin transactionsWang, Haiyu / Li, Xuelian / Gao, Juntao / Li, Wei et al. | 2019
- 327
-
Edge cloud resource expansion and shrinkage based on workload for minimizing the costLi, Chunlin / Sun, Hezhi / Chen, Yi / Luo, Youlong et al. | 2019
- 341
-
A comparative analysis of machine learning models for quality pillar assessment of SaaS services by multi-class text classification of users’ reviewsRaza, Muhammad / Hussain, Farookh Khadeer / Hussain, Omar Khadeer / Zhao, Ming / Rehman, Zia ur et al. | 2019
- 372
-
REMEDI central — expanding and sustaining a medical device communityStirm, Claire / Zink, Rich / Gesing, Sandra / Zentner, Michael / Junk, Damion et al. | 2019
- 381
-
Developing an ontology schema for enriching and linking digital media assetsGutiérrez, Yoan / Tomás, David / Moreno, Isabel et al. | 2019
- 398
-
SciSpace: A scientific collaboration workspace for geo-distributed HPC data centersKhan, Awais / Kim, Taeuk / Byun, Hyunki / Kim, Youngjae et al. | 2019
- 410
-
Verifiable ranked search over encrypted data with forward and backward privacyNajafi, Aniseh / Javadi, Hamid Haj Seyyed / Bayat, Majid et al. | 2019
- 420
-
Privacy aware decentralized access control systemShafeeq, Sehrish / Alam, Masoom / Khan, Abid et al. | 2019
- 434
-
Performance analysis and optimization for coverage enhancement strategy of Narrow-band Internet of ThingsWang, Xiangming / Yang, Dong / Jian, Xin / Chen, Min / Guna, Jože et al. | 2019
- 444
-
A short-term energy prediction system based on edge computing for smart cityLuo, Haidong / Cai, Hongming / Yu, Han / Sun, Yan / Bi, Zhuming / Jiang, Lihong et al. | 2019
- 458
-
Seal imprint verification via feature analysis and classificationsChung, Wei-Ho / Wu, Mu-En / Ueng, Yeong-Luh / Su, Yu-Hsuan et al. | 2019
- 467
-
Two-in-one oblivious signaturesTso, Raylin et al. | 2019
- 476
-
Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selectionAl-rimy, Bander Ali Saleh / Maarof, Mohd Aizaini / Shaid, Syed Zainudeen Mohd et al. | 2019
- 492
-
Analysis and modeling of wireless channel characteristics for Internet of Things scene based on geometric featuresShi, Guolong / He, Yigang / Li, Bing / Zuo, Lei / Yin, Baiqiang / Zeng, Wenbo / Ali, Farhan et al. | 2019
- 502
-
Value-based cloud price modeling for segmented business to business marketWu, Caesar / Buyya, Rajkumar / Ramamohanarao, Kotagiri et al. | 2019
- 524
-
A blockchain-based clock synchronization Scheme in IoTFan, Kai / Sun, Shili / Yan, Zheng / Pan, Qiang / Li, Hui / Yang, Yintang et al. | 2019
- 534
-
Biometric data on the edge for secure, smart and user tailored access to cloud servicesBarra, Silvio / Castiglione, Aniello / Narducci, Fabio / De Marsico, Maria / Nappi, Michele et al. | 2019
- 542
-
Deep Learning for EEG motor imagery classification based on multi-layer CNNs feature fusionAmin, Syed Umar / Alsulaiman, Mansour / Muhammad, Ghulam / Mekhtiche, Mohamed Amine / Shamim Hossain, M. et al. | 2019
- 555
-
Enacting open science by D4ScienceAssante, M. / Candela, L. / Castelli, D. / Cirillo, R. / Coro, G. / Frosini, L. / Lelii, L. / Mangiacrapa, F. / Pagano, P. / Panichi, G. et al. | 2019
- 564
-
uBaaS: A unified blockchain as a service platformLu, Qinghua / Xu, Xiwei / Liu, Yue / Weber, Ingo / Zhu, Liming / Zhang, Weishan et al. | 2019
- 576
-
MPI jobs within MPI jobs: A practical way of enabling task-level fault-tolerance in HPC workflowsWozniak, Justin M. / Dorier, Matthieu / Ross, Robert / Shu, Tong / Kurc, Tahsin / Tang, Li / Podhorszki, Norbert / Wolf, Matthew et al. | 2019
- 590
-
Scalable and dynamic replica consistency maintenance for edge-cloud systemLi, Chunlin / Wang, Chengyi / Tang, Hengliang / Luo, Youlong et al. | 2019
- 605
-
Adaptive interface ecosystems in smart cities control systemsSánchez, Antonio J. / Rodríguez, Sara / de la Prieta, Fernando / González, Alfonso et al. | 2019
- 621
-
SecLAP: Secure and lightweight RFID authentication protocol for Medical IoTAghili, Seyed Farhad / Mala, Hamid / Kaliyar, Pallavi / Conti, Mauro et al. | 2019
- 635
-
Research on logistics supply chain of iron and steel enterprises based on block chain technologyYang, Aimin / Li, Yifan / Liu, Chenshuai / Li, Jie / Zhang, Yuzhu / Wang, Jiahao et al. | 2019
- 646
-
Henry gas solubility optimization: A novel physics-based algorithmHashim, Fatma A. / Houssein, Essam H. / Mabrouk, Mai S. / Al-Atabany, Walid / Mirjalili, Seyedali et al. | 2019
- 668
-
Breast mass detection from the digitized X-ray mammograms based on the combination of deep active learning and self-paced learningShen, Rongbo / Yan, Kezhou / Tian, Kuan / Jiang, Cheng / Zhou, Ke et al. | 2019
- 680
-
A scalable method of parallel tasks after the extension of machine systems based on equal change rateZeng, Guosun / Xiong, Huanliang / Wu, Canghai et al. | 2019
- 694
-
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new constructionLi, Wenting / Wang, Ping et al. | 2019
- 709
-
Sensor-based activity recognition: One picture is worth a thousand wordsRiboni, Daniele / Murtas, Marta et al. | 2019
- 723
-
Securing Spatial Data Infrastructures for Distributed Smart City applications and servicesChaturvedi, Kanishk / Matheus, Andreas / Nguyen, Son H. / Kolbe, Thomas H. et al. | 2019
- 737
-
Value-based utility implementation in software-defined testbed for sensor data traffic managementAlipio, Melchizedek I. / Co, Alex Gyran A. / Hilario, Melinda Faye C. / Pama, Christian Miguel C. et al. | 2019
- 747
-
Trust management in a blockchain based fog computing platform with trustless smart oraclesKochovski, Petar / Gec, Sandi / Stankovski, Vlado / Bajec, Marko / Drobintsev, Pavel D. et al. | 2019
- 760
-
A novel cascaded deep neural network for analyzing smart phone data for indoor localizationHassan, Md Rafiul / Haque, Md Sarwar M. / Hossain, Muhammad Imtiaz / Hassan, Mohammad Mehedi / Alelaiwi, Abdulhameed et al. | 2019
- 770
-
CMSS: Sketching based reliable tracking of large network flowsCafaro, Massimo / Epicoco, Italo / Pulimeno, Marco et al. | 2019
- 785
-
A novel framework for data acquisition and ubiquitous communication provisioning in smart citiesAhuja, Kiran / Khosla, Arun et al. | 2019
- 804
-
TSH: Easy-to-be distributed partitioning for large-scale graphsWang, Ning / Wang, Zhigang / Gu, Yu / Bao, Yubin / Yu, Ge et al. | 2019
- 819
-
GREYC-Hashing: Combining biometrics and secret for enhancing the security of protected templatesAtighehchi, Kevin / Ghammam, Loubna / Barbier, Morgan / Rosenberger, Christophe et al. | 2019
- 831
-
Mitigating stragglers to avoid QoS violation for time-critical applications through dynamic server blacklistingOuyang, Xue / Wang, Changjian / Xu, Jie et al. | 2019
- 843
-
Integration of VANET and 5G Security: A review of design and implementation issuesHussain, Rasheed / Hussain, Fatima / Zeadally, Sherali et al. | 2019
- 865
-
Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networksLiu, Liang / Ma, Zuchao / Meng, Weizhi et al. | 2019
- 880
-
Deadline-constrained workflow scheduling in IaaS clouds with multi-resource packingZhu, Zhaomeng / Tang, Xueyan et al. | 2019
- 894
-
Tiered data management system: Accelerating data processing on HPC systemsCheng, Peng / Lu, Yutong / Du, Yunfei / Chen, Zhiguang et al. | 2019
- 909
-
Optimizing the performance of optimization in the cloud environment–An intelligent auto-scaling approachSimic, Visnja / Stojanovic, Boban / Ivanovic, Milos et al. | 2019
- 921
-
An improved differential evolution algorithm using Archimedean spiral and neighborhood search based mutation approach for cluster analysisTarkhaneh, Omid / Moser, Irene et al. | 2019
- 940
-
Composing WoT services with uncertain dataAwad, Samir / Malki, Abdelhamid / Malki, Mimoun / Barhamgi, Mahmoud / Benslimane, Djamal et al. | 2019
- 951
-
The Science Gateways Community Institute: Collaborations and efforts on international scaleGesing, Sandra / Dahan, Maytal / Zentner, Michael / Wilkins-Diehr, Nancy / Lawrence, Katherine et al. | 2019
- 959
-
SLA-aware optimal resource allocation for service-oriented networksBaktır, Ahmet Cihat / Ahat, Betül / Aras, Necati / Özgövde, Atay / Ersoy, Cem et al. | 2019
- 975
-
Support for full life cycle cloud-native application management: Dynamic TOSCA and SWITCH IDEŠtefanič, Polona / Cigale, Matej / Jones, Andrew C. / Knight, Louise / Taylor, Ian et al. | 2019
- 983
-
Understanding the composition and evolution of terrorist group networks: A rough set approachLoia, Vincenzo / Orciuoli, Francesco et al. | 2019
- 993
-
Predicting supply chain risks using machine learning: The trade-off between performance and interpretabilityBaryannis, George / Dani, Samir / Antoniou, Grigoris et al. | 2019
- 1005
-
Iterated two-phase local search for the Set-Union Knapsack ProblemWei, Zequn / Hao, Jin-Kao et al. | 2019
- 1018
-
Enhancing the security of FinTech applications with map-based graphical password authenticationMeng, Weizhi / Zhu, Liqiu / Li, Wenjuan / Han, Jinguang / Li, Yan et al. | 2019
- 1028
-
IoT information sharing security mechanism based on blockchain technologySi, Haiping / Sun, Changxia / Li, Yanling / Qiao, Hongbo / Shi, Lei et al. | 2019
- 1041
-
A conceptual model for quality of experience management to provide context-aware eHealth servicesda Silva, Madalena Pereira / Gonçalves, Alexandre Leopoldo / Dantas, Mário Antônio Ribeiro et al. | 2019
- 1062
-
A survey on quality-assurance approximate stream processing and applicationsWei, Xiaohui / Liu, Yuanyuan / Wang, Xingwang / Sun, Bingyi / Gao, Shang / Rokne, Jon et al. | 2019
- 1081
-
Latency-aware failover strategies for containerized web applications in distributed cloudsAldwyan, Yasser / Sinnott, Richard O. et al. | 2019
- 1096
-
Context-aware System for Dynamic Privacy Risk InferenceBou Chaaya, Karam / Barhamgi, Mahmoud / Chbeir, Richard / Arnould, Philippe / Benslimane, Djamal et al. | 2019
- 1112
-
Energy and performance aware fog computing: A case of DVFS and green renewable energyToor, Asfa / Islam, Saif ul / Sohail, Nimra / Akhunzada, Adnan / Boudjadar, Jalil / Khattak, Hasan Ali / Din, Ikram Ud / Rodrigues, Joel J.P.C. et al. | 2019
- 1122
-
Design of personnel big data management system based on blockchainChen, Jian / Lv, Zhihan / Song, Houbing et al. | 2019
- 1130
-
A framework for intelligent analysis of digital cardiotocographic signals from IoMT-based foetal monitoringLu, Yu / Qi, Yingjian / Fu, Xianghua et al. | 2019
- 1142
-
Adaptive energy-aware scheduling method in a meteorological cloudHao, Yongsheng / Cao, Jie / Ma, Tinghuai / Ji, Sai et al. | 2019
- 1158
-
A greedy-proof incentive-compatible mechanism for group recruitment in mobile crowd sensingSuliman, Ahmed / Otrok, Hadi / Mizouni, Rabeb / Singh, Shakti / Ouali, Anis et al. | 2019
- 1168
-
A new strategy based on approximate dynamic programming to maximize the net revenue of IaaS cloud providers with limited resourcesYue, Wenying / Du, Peng / Quan, Xiongwen / Chen, Ying et al. | 2019
- 1187
-
Placing big graph into cloud for parallel processing with a two-phase community-aware approachHu, Kekun / Zeng, Guosun et al. | 2019
- 1201
-
Online travel mode detection method using automated machine learning and feature engineeringF. de S. Soares, Elton / V. Campos, Carlos Alberto / C. de Lucena, Sidney et al. | 2019
- 1213
-
Congestion control vs. link failure: TCP behavior in mmWave connected vehicular networksNa, Woongsoo / Lakew, Demeke Shumeye / Lee, Jihoon / Cho, Sungrae et al. | 2019
- 1223
-
An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVDAraghi, Tanya Koohpayeh / Manaf, Azizah Abd et al. | 2019
- 1247
-
Automatic extraction and integration of behavioural indicators of malware for protection of cyber–physical networksHuda, Shamsul / Abawajy, Jemal / Al-Rubaie, Baker / Pan, Lei / Hassan, Mohammad Mehedi et al. | 2019
- 1259
-
An approach for iris contact lens detection and classification using ensemble of customized DenseNet and SVMChoudhary, Meenakshi / Tiwari, Vivek / U., Venkanna et al. | 2019
- 1271
-
Automated synthesis of mediators for middleware-layer protocol interoperability in the IoTBouloukakis, Georgios / Georgantas, Nikolaos / Ntumba, Patient / Issarny, Valérie et al. | 2019
- ii
-
Editorial Board| 2019