首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
    
This study proposes a comprehensive user acceptance model for Bitcoin transaction services, while also statistically presenting how four user-oriented theories (innovation diffusion theory, the benefit-risk concept, the theory of planned behavior, and transaction cost theory) contribute to the understanding of user intent regarding the use of these services. Results from more than 1300 samples suggest that both perceived benefits and service compatibility play notable roles in determining behavioral intent, while perceived risk, cost, and complexity were found to have no significant impact on user adoption. Moreover, both the potential trialability and observability of the services were investigated as weak antecedents of user adoption. On the basis of these results, the resulting managerial and theoretical implications are examined, albeit with notable limitations.  相似文献   

2.
This paper aims to identify the likely determinants for cryptocurrency value formation, including for that of bitcoin. Due to Bitcoin’s growing popular appeal and merchant acceptance, it has become increasingly important to try to understand the factors that influence its value formation. Presently, the value of all bitcoins in existence represent approximately $7 billion, and more than $60 million of notional value changes hands each day. Having grown rapidly over the past few years, there is now a developing but vibrant marketplace for bitcoin, and a recognition of digital currencies as an emerging asset class. Not only is there a listed and over-the-counter market for bitcoin and other digital currencies, but also an emergent derivatives market. As such, the ability to value bitcoin and related cryptocurrencies is becoming critical to its establishment as a legitimate financial asset.Using cross-sectional empirical data examining 66 of the most widely used cryptocurrencies, a regression model was estimated that points to three main drivers of cryptocurrency value: the level of competition in the network of producers, the rate of unit production, and the difficulty of algorithm used to “mine” for the cryptocurrency. These amount to relative differences in the cost of production of one digital currency over another at the margin, pointing to differences in relative cost of production – electricity goes in, cryptocurrency comes out. Using that as a starting point, a no-arbitrage situation is established for Bitcoin-like cryptocurrencies followed by the formalization of a cost of production model to determine the fair value of a bitcoin.  相似文献   

3.
With the advent of blockchain, smart contracts have become one of the most sought-after technologies because of the high customisability they add to transactions. This has given rise to many smart contract applications in areas ranging from financial services, life sciences and healthcare to energy resources and voting. However, due to their infancy, smart contracts still pose many challenges that encumber the stakeholders who interact with them: users, developers and the organisations that are built on top of smart contracts. This study aims to contribute to the body of knowledge of smart contracts within blockchain technology. Based on a systematic mapping study, we offer a broad perspective on their problems and corresponding solutions, present the research trends within the area and compile the 64 papers identified, grouped by top publication sources, channels, methods and approaches. We conclude that, since 2016, there has been an increasing trend towards the publication of blockchain-based smart contract articles at conferences and journals, mainly reflecting experiments and presenting methods, tools and models. According to the results, the most commonly discussed problems and solutions in the literature are related to the security, privacy and scalability of blockchain and the programmability of smart contracts.  相似文献   

4.
基于Petri网的入侵检测技术研究   总被引:1,自引:0,他引:1  
Petri网是一种非常广泛的建模工具.文中研究了Petri网在入侵检测技术中的应用,分析了基于Petri网的入侵检测系统的主要优势以及随着网络的发展给入侵检测系统带来的问题.基于这些问题,提出了基于Petri网的入侵检测系统的改进方法,设计了一个入侵检测系统的原型并进行了实例分析.  相似文献   

5.
基于Petri网的入侵检测模型研究   总被引:1,自引:0,他引:1  
王燕  李晓华 《现代电子技术》2007,30(12):130-132
随着计算机网络的广泛应用,非法的入侵与攻击行为不断发生,严重威胁着网络信息的安全,对入侵和攻击进行检测与防范已经成为刻不容缓的重要课题。讲述了Petri网(PN)和有色Petri网(CPN),通过将入侵分为“存在”,“顺序”,“偏序”三种类型,描述入侵检测系统(IDS)中的攻击模式用Petri网实现,并且给出了使用有色Petri网描述攻击模式。  相似文献   

6.
杜玉越  朱鸿儒  王路  刘伟 《电子学报》2016,44(11):2742-2751
逻辑Petri网是抑制弧Petri网和高级Petri网的抽象和扩展,可在过程挖掘中简洁准确的表示活动之间复杂的业务逻辑关系.本文在传统Petri网挖掘方法的基础上,为了进一步提高复杂系统挖掘模型的简洁度和拟合度,尤其是对并行活动间存在复杂与或关系的系统,提出了一种基于逻辑Petri网的过程挖掘方法,并给出了逻辑Petri网中逻辑变迁的挖掘算法.它可以充分挖掘活动之间的业务逻辑,并且业务逻辑可用逻辑表达式表示.通过与相应Petri网模型的实例比较分析,例证了本文方法的正确性和有效性,且逻辑Petri网模型更加适合日志行为.  相似文献   

7.
    
Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer through decentralized, trustless, peer-to-peer systems. This research identifies peer-reviewed literature that seeks to utilize blockchain for cyber security purposes and presents a systematic analysis of the most frequently adopted blockchain security applications. Our findings show that the Internet of Things (IoT) lends itself well to novel blockchain applications, as do networks and machine visualization, public-key cryptography, web applications, certification schemes and the secure storage of Personally Identifiable Information (PII). This timely systematic review also sheds light on future directions of research, education and practices in the blockchain and cyber security space, such as security of blockchain in IoT, security of blockchain for AI data, and sidechain security.  相似文献   

8.
为了提高ECA规则集可终止性分析的准确性,建立了一种可描述ECA规则集的扩展Petri网(EPN, extended Petri net)模型,在此基础上研究并提出了一种ECA规则集终止性判定算法。该算法充分利用EPN网所包含ECA规则特性的丰富信息,综合分析了ECA规则特性对规则集可终止性的影响。理论分析和实验结果表明,所提出的算法具有更高的准确性和更低的时间复杂度。  相似文献   

9.
生产者-消费者系统的建模与行为分析方法研究   总被引:1,自引:1,他引:1  
生产者一消费者系统是系统工程中的一个典型系统。讨论了基于Petri网的生产者一消费者系统建模.借助基于库所指标的Petri网分解方法来分析生产者一消费者的系统行为,利用Petri网语言的同步混排运算给出了生产者一消费者系统的行为描述,对基于Petri网的系统分析提供了有效的方法。  相似文献   

10.
基于Petri网的工作流过程建模和时间性能分析   总被引:1,自引:0,他引:1  
介绍了基于Petri网的工作流建模技术,并针对一个复杂的企业生产经营活动的流程构建了一个简化灵活的模型,利用随机Petri网的性能分析方法对建立的模型进行了时间性能分析。结果表明,文中的性能分析方法可对复杂的模型进行有效地简化分析。  相似文献   

11.
面向集成电路制造的基于Petri网的生产调度   总被引:9,自引:0,他引:9       下载免费PDF全文
薛雷  郝跃 《电子学报》2001,29(8):1064-1067
本文提出了一个新的面向集成电路(IC)制造的调度方法,核心内容包括两方面:首先,用本文提出的扩展定时Petri 网对IC生产工艺进行描述;其次,对所得Petri 网模型的状态空间进行搜索,得到以Transition序列表示的最优或近似最优调度.该方法可以很好地描述IC制造系统中存在的多制造路径、资源共享、可变晶片组及并发等特性,通过引入测试弧增强Petri 网的建模能力,进而在调度模型上对设备维护、设备优先级以及操作优先级进行描述,而且支持多目标的评价函数,使得到的调度结果更具实用价值.文中给出试验结果表明了算法的有效性.  相似文献   

12.
并发表达式与安全标号Petri网   总被引:5,自引:0,他引:5  
蒋昌俊  阎春钢 《电子学报》1998,26(8):83-85,91
本文定义了并发表达式,指出其表达能力与安全标号Petri网是等价的。  相似文献   

13.
将模糊Petri与神经网络理论相结合,提出了一种关于武器装备效能评估的模糊神经Petri网模型.将模糊逻辑规则应用到专家评判中得到模糊Petri网,建立基于模糊Petri网的武器装备效能评估模型,并在此基础上将人工神经网络引入到模糊Petri中,在模糊Petri模型上,用迭代最速下降法对模型的参数进行学习和训练,经过学习和训练的模型具有很强的学习能力以及对外界环境的自适应能力.以某型雷达对抗装备为例进行仿真验证,仿真结果表明该模型是可行和有效的.  相似文献   

14.
文章提出了构件的Petri网模型-构件网,并给出了构件组装的运算;定义了构件组装表达式,给出了构件组装的形式化描述,讨论了构件组装运算的性质和特点,从而提供了对组装构件进行自动分析和验证的方法。  相似文献   

15.
    
To evaluate the performance of a large‐scale digital system, the system can be modeled by stochastic timed Petri nets (STPN) and a performance index can be estimated based on the number of iterations in a Petri net simulation. When the performance evaluation is carried out in a large distributed environment, parallel calculation with incidence matrices for the STPN can make the Petri net simulation more efficient. In this paper, we propose an ordering method for the incidence matrices to reduce the communication costs in the parallel calculation of matrix operations. For this purpose, we first propose a method of blocking the incidence matrices based on the structure of the system by taking into consideration synchronous and asynchronous buses as structural elements. We also propose a method for converting submatrices of the incidence matrices into band matrices. This method is based on breadth‐first search in the STPN as represented by the submatrices. Finally, we demonstrate the benefits of ordering on the time required for a performance evaluation by carrying out a performance evaluation using the incidence matrices generated under the proposed method. In addition, we show that the ordering method can reduce the communication costs in a large distributed environment by estimating the utilization rate of calculation nodes.  相似文献   

16.
Petri网语言是系统行为分析的一种重要工具,为了分析有界Petri网的行为等价,借助于有限自动机的等价性问题和算法,研究了有界Petri网的等价性问题和算法.定义了带标注Petri网语言等价性,证明了带标注的有界Petri网到有限自动机的等价转化,给出了判定有界Petri网的等价性算法,为模拟系统的性能比较提供了处理方法.  相似文献   

17.
基于Petri网的安全协议形式化分析   总被引:2,自引:1,他引:1  
刘道斌  郭莉  白硕 《电子学报》2004,32(11):1926-1929
本文提出了一种基于Petri网的安全协议形式化描述和安全性验证的方法.该方法的特点是,利用逆向状态分析判定协议运行过程中可能出现的不安全状态,利用Petri网的状态可达性分析判断这些不安全状态是否可达.通过实例,我们证明了这种方法的有效性.  相似文献   

18.
介绍了基于Petri网工作流的动态访问控制的概念。文中描述的方法可把访问控制矩阵从二维扩展到三维,并使之动态化,从而降低数据滥用的风险。  相似文献   

19.
CBR:一种支持工作流过程语义验证的组件级 化简方法   总被引:1,自引:0,他引:1  
周建涛  史美林  叶新铭 《电子学报》2005,33(6):1060-1065
目前的工作流过程验证方法多数侧重控制流特性验证,与数据或资源信息相结合的验证尚未得到很好发展.然而,业务过程的目标实现依赖于控制流、数据流和资源三维基本观点的协作.保证过程的目标实现需要验证这三维观点协作的正确性,称为语义验证.该文侧重讨论大型、灵活的过程语义验证问题.首先,形式化定义过程模型,综合体现三维基本观点,表达完整的过程语义,并使用基于组件的思想,具有一定可扩展性和灵活性.然后,通过探讨组件间的协作逻辑,提出基于组件的化简方法(Component Based Reduction,CBR)和化简规则,为过程语义验证提供有力支持.  相似文献   

20.
为了用一种类似Chomsky文法体系中的文法描述Petri网语言,研究了二元文法与Petri网语言之间的关系,给出了将二元文法等价转化为Petri网的方法和将Petri网等价转化为二元文法的方法,从而,证明了二元文法产生的语言等价于Petri网语言.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号