Visible to the public Biblio

Filters: Keyword is block chain technology  [Clear All Filters]
2022-09-09
Li, Zhihong.  2021.  Remolding of the Supply Chain Development Mode Based on the Block Chain Technology. 2021 International Conference on Computer, Blockchain and Financial Development (CBFD). :392—395.

The supply chain has been much developed with the internet technology being used in the business world. Some issues are becoming more and more evident than before in the course of the fast evolution of the supply chain. Among these issues, the remarkable problems include low efficiency of communication, insufficient operational outcomes and lack of the credit among the participants in the whole chain. The main reasons to cause these problems lie in the isolated information unable to be traced and in the unclear responsibility, etc. In recent years, the block chain technology has been growing fast. Being decentralized, traceable and unable to be distorted, the block chain technology is well suitable for solving the problems existing in the supply chain. Therefore, the paper first exposes the traditional supply chain mode and the actual situation of the supply chain management. Then it explains the block chain technology and explores the application & effects of the block chain technology in the traditional supply chain. Next, a supply chain style is designed on the base of the block chain technology. Finally the potential benefits of the remolded supply chain are foreseen if it is applied in the business field.

Zhang, Fan, Ding, Ye.  2021.  Research on the Application of Internet of Things and Block Chain Technology in Improving Supply Chain Financial Risk Management. 2021 International Conference on Computer, Blockchain and Financial Development (CBFD). :347—350.
This article analyzes the basic concepts of supply chain finance, participating institutions, business methods, and exposure to risks. The author combined the basic content of the Internet of Things and block chain technology to carry out research. This paper studies the specific applications of the Internet of Things and block chain technology in supply chain financial risk identification, supply chain financial risk assessment, full-process logistics supervision, smart contract transaction management, corporate financial statement sorting, and risk prevention measures. The author's purpose is to improve the financial risk management level of the enterprise supply chain and promote the stable development of the enterprise economy.
2022-01-31
Devi, P. Dharani, Ilakiya, S..  2021.  A Secure Employee Health Management System Using Werable Technology. 2021 International Conference on System, Computation, Automation and Networking (ICSCAN). :1—5.
An important demand of a wearable health observance system is to soundly exchange the Employees' health data and preventing improper use of black devices. In this project we tend to measure planning wearable sensors device sight abnormal and/or unforeseen things by observance physiological parameters alongside different symptoms. Therefore, necessary facilitate is provided in times of urgent would like. To minimize the health hazards and improving the well-being of employees is to be a major critical role in an organization. As per the report by the Indian Labour Organization, the organization spends an average of 3.94% for GDP on employee treatment. The same study revealed that almost 2.78% million deaths occurs every year and 3.74% million occur non-fatal injuries every year at work. So, the organizations are making towards mitigating the facilities to decimating various IoT technologies and the IoT technology are embedded with modern smart systems, it is easy to monitor every employee in an organization, and also it collects and gather the data and send any critical information by the employees.
2020-08-10
Qin, Hao, Li, Zhi, Hu, Peng, Zhang, Yulong, Dai, Yuwen.  2019.  Research on Point-To-Point Encryption Method of Power System Communication Data Based on Block Chain Technology. 2019 12th International Conference on Intelligent Computation Technology and Automation (ICICTA). :328–332.
Aiming at the poor stability of traditional communication data encryption methods, a point-to-point encryption method of power system communication data based on block chain technology is studied and designed. According to the principle of asymmetric key encryption, the design method makes use of the decentralization and consensus mechanism of block chain technology to develop the public key distribution scheme. After the public key distribution is completed, the sender and receiver of communication data generate the transfer key and pair the key with the public key to realize the pairing between data points. Xor and modular exponentiation are performed on the communication data content, and prime Numbers are used to fill the content data block. The receiver decrypts the data according to the encryption identifier of the data content, and completes the design of the encryption method of communication data point to ground. Through the comparison with the traditional encryption method, it is proved that the larger the amount of encrypted data is, the more secure the communication data can be, and the stability performance is better than the traditional encryption method.
2018-11-14
Zhang, J., Zheng, L., Gong, L., Gu, Z..  2018.  A Survey on Security of Cloud Environment: Threats, Solutions, and Innovation. 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC). :910–916.

With the extensive application of cloud computing technology developing, security is of paramount importance in Cloud Computing. In the cloud computing environment, surveys have been provided on several intrusion detection techniques for detecting intrusions. We will summarize some literature surveys of various attack taxonomy, which might cause various threats in cloud environment. Such as attacks in virtual machines, attacks on virtual machine monitor, and attacks in tenant network. Besides, we review massive existing solutions proposed in the literature, such as misuse detection techniques, behavior analysis of network traffic, behavior analysis of programs, virtual machine introspection (VMI) techniques, etc. In addition, we have summarized some innovations in the field of cloud security, such as CloudVMI, data mining techniques, artificial intelligence, and block chain technology, etc. At the same time, our team designed and implemented the prototype system of CloudI (Cloud Introspection). CloudI has characteristics of high security, high performance, high expandability and multiple functions.