Challenges of blockchain in new generation energy systems and future outlooks
Recently, the blockchain technology has attracted widespread attention due to its
advantageous features, eg, decentralization, transparency, traceability, and immutability. To …
advantageous features, eg, decentralization, transparency, traceability, and immutability. To …
[PDF][PDF] Convergence between Blockchain and the Internet of Things
A Cruz - International Journal of Technology, Innovation and …, 2021 - journals.gaftim.com
The objective of this study was to determine the effectiveness of a particular
convergencemodel for IoT and blockchain. Multiple regression model was selected to …
convergencemodel for IoT and blockchain. Multiple regression model was selected to …
Regulatory paradigm and challenge for blockchain integration of decentralized systems: Example—renewable energy grids
E Barceló, K Dimić-Mišić, M Imani, V Spasojević Brkić… - Sustainability, 2023 - mdpi.com
Nowadays, fossil fuels are used in a clearly unsustainable way that can bring potentially
catastrophic consequences. Electricity is currently delivered to end users by generation and …
catastrophic consequences. Electricity is currently delivered to end users by generation and …
User authentication using Blockchain based smart contract in role-based access control
Since the last few decades, information security has become a significant challenge for
organizations' system administrators. However, the Role-Based Access Control (RBAC) …
organizations' system administrators. However, the Role-Based Access Control (RBAC) …
Smart auto mining (SAM) for industrial IoT blockchain network
IS Igboanusi, A Allwinnaldo, RN Alief… - IET …, 2022 - Wiley Online Library
This work proposes smart auto mining (SAM) for resource‐efficient mining in a blockchain
network. The SAM algorithm stops the miners when there is zero pending transaction and …
network. The SAM algorithm stops the miners when there is zero pending transaction and …
Reliability analysis for 5G industrial network with application and dynamic coupling
K Chen, N Huang, Y Wang, J Zhu, J Yu - Measurement, 2024 - Elsevier
The analysis of reliability is vital in ensuring the operation of 5G industrial networks (5GIN).
With 5GIN are no longer merely chains of physical components, they consist of different …
With 5GIN are no longer merely chains of physical components, they consist of different …
Sustainable Optimizing Performance and Energy Efficiency in Proof of Work Blockchain: A Multilinear Regression Approach
M Rukhiran, S Boonsong, P Netinant - Sustainability, 2024 - mdpi.com
The energy-intensive characteristics of the computations performed by graphics processing
units (GPUs) in proof-of-work (PoW) blockchain technology are readily apparent. The …
units (GPUs) in proof-of-work (PoW) blockchain technology are readily apparent. The …
Distance‐based congestion control mechanism for CoAP in IoT
S Bansal, D Kumar - IET Communications, 2020 - Wiley Online Library
Designing a scalable and efficient application layer protocols for the Internet of Things (IoT)
environment is an ongoing problem. The constrained application protocol (CoAP) offering …
environment is an ongoing problem. The constrained application protocol (CoAP) offering …
Transparency with blockchain and physical tracking technologies: Enabling traceability in raw material supply chains
AB Bacchetta, V Krümpel, E Cullen - Materials Proceedings, 2021 - mdpi.com
By combining blockchain with physical tracking technologies, raw materials can potentially
be traced throughout their global supply chains. Physical tracking technologies enable …
be traced throughout their global supply chains. Physical tracking technologies enable …
Blockchain-based multi-hop permission delegation scheme with controllable delegation depth for electronic health record sharing
Y Gao, A Zhang, S Wu, J Chen - High-Confidence Computing, 2022 - Elsevier
Permission delegation has become a new way for data sharing by delegating the authorized
permission to other users. A flexible authorization model with strict access control policies is …
permission to other users. A flexible authorization model with strict access control policies is …