scholarly journals A Study on the Optimization of Blockchain Hashing Algorithm Based on PRCA

2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Jinhua Fu ◽  
Sihai Qiao ◽  
Yongzhong Huang ◽  
Xueming Si ◽  
Bin Li ◽  
...  

Blockchain is widely used in encrypted currency, Internet of Things (IoT), supply chain finance, data sharing, and other fields. However, there are security problems in blockchains to varying degrees. As an important component of blockchain, hash function has relatively low computational efficiency. Therefore, this paper proposes a new scheme to optimize the blockchain hashing algorithm based on PRCA (Proactive Reconfigurable Computing Architecture). In order to improve the calculation performance of hashing function, the paper realizes the pipeline hashing algorithm and optimizes the efficiency of communication facilities and network data transmission by combining blockchains with mimic computers. Meanwhile, to ensure the security of data information, this paper chooses lightweight hashing algorithm to do multiple hashing and transforms the hash algorithm structure as well. The experimental results show that the scheme given in the paper not only improves the security of blockchains but also improves the efficiency of data processing.

2019 ◽  
Vol 15 (9) ◽  
pp. 155014771987400 ◽  
Author(s):  
Waseem Ahmed Abbasi ◽  
Zongrun Wang ◽  
Yanju Zhou ◽  
Shahzad Hassan

This article first expounds the concept of supply chain finance and its credit risk, describes the hierarchical structure of the Internet of Things and its key technologies, and combines the unique functions of the Internet of Things technology and the business process of the inventory pledge financing model to design the supply chain financial model based on the Internet of Things. Then it studies the credit risk assessment under the supply chain financial model based on the Internet of Things, and uses the support vector machine algorithm and Logistic regression method to establish a credit risk measurement model considering the subject rating and debt rating. Finally, an example analysis shows that the credit risk measurement model has a high accuracy rate for determining whether small and medium-sized enterprises in the supply chain financial model based on the Internet of Things are trustworthy. This will facilitate the revision and improvement of the existing credit evaluation system and improve the accuracy of measuring the current financial risk of supply chain. This research adopts the Internet of Things to measure financial credit risk in supply chain and provides a reference for the following researches.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Yan Hong

The grain supply chain not only broadens the financing channels for small and medium-sized enterprises in the supply chain and strengthens the cohesion of the supply chain but also opens up new business models and sources of profit for commercial banks. This article aims to study the use of advanced information technologies such as mobile Internet, Internet of Things (IoT) transmission, BT, and other advanced information technologies to design intelligent grain depot integrated systems based on the IoT technology, in accordance with the principles of practicality and advancement, to realize the informatization of the daily management of the grain depot and provide construction experience for the informatization construction of the food industry. This article proposes a detailed summary of several models of agricultural supply chain finance from the perspective of supply chain management and analyzes the applicable conditions and basic processes of these models. It also analyzes the structure of the agricultural supply chain through typical cases, introduces the operation of supply chain finance, and evaluates and analyzes its effectiveness and problems. The experimental results in this paper show that, compared with other storage methods, this solution has obvious advantages in data query efficiency and data storage cost. Without a central server, the entire distributed system will have a certain degree of efficiency, reliability, and cost-effectiveness. When the amount of grain data reaches 100,000, 1 million, and 10 million, the system data integrity check time is 0.0263 seconds, 0.3251 seconds, and 1.5032 seconds, respectively. The program seems very useful.


2021 ◽  
Vol 2 (4) ◽  
pp. 227-234
Author(s):  
Dermawan Lumban Toruan

Document file is a means of transforming information from one person to another or from a group to another. The development of computerized technology has greatly increased. Document files are very vulnerable to fraud, eavesdropping or data theft by irresponsible parties. In order to maintain the security of document files, this can be done by using cryptographic techniques. Cryptography is the science of keeping data secure. Cryptography is one of the data security methods that can be used to maintain data authenticity, data confidentiality, and the authenticity of data transmission. SHA, which stands for Secure Hash Algorithm, is a standard hash function published by NIST (National Institute of Standards and Technology), (NIST, 1995a). This study will use the SHA-1 method to secure the authenticity of document files, document confidentiality, document integrity, and document authentication. This study describes the security process for detecting the authenticity of document files using the SHA-1 method in the form of detection so that confidential documents sent via public telecommunications cannot be changed or modified by unauthorized persons or unauthorized persons. This is done as an effort to minimize acts of fraud, hoaxes, or misuse of document files.


2020 ◽  
Vol 24 (1) ◽  
pp. 59-81 ◽  
Author(s):  
Ki-Moon Han ◽  
Sae-Woon Park ◽  
Sunhae Lee

Logistics ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 22
Author(s):  
Hisham Alidrisi

This paper presents a strategic roadmap to handle the issue of resource allocation among the green supply chain management (GSCM) practices. This complex issue for supply chain stakeholders highlights the need for the application of supply chain finance (SCF). This paper proposes the five Vs of big data (value, volume, velocity, variety, and veracity) as a platform for determining the role of GSCM practices in improving SCF implementation. The fuzzy analytic network process (ANP) was employed to prioritize the five Vs by their roles in SCF. The fuzzy technique for order preference by similarity to ideal solution (TOPSIS) was then applied to evaluate GSCM practices on the basis of the five Vs. In addition, interpretive structural modeling (ISM) was used to visualize the optimum implementation of the GSCM practices. The outcome is a hybrid self-assessment model that measures the environmental maturity of SCF by the coherent application of three multicriteria decision-making techniques. The development of the Basic Readiness Index (BRI), Relative Readiness Index (RRI), and Strategic Matrix Tool (SMT) creates the potential for further improvements through the integration of the RRI scores and ISM results. This hybrid model presents a practical tool for decision-makers.


2021 ◽  
Vol 187 ◽  
pp. 12-17
Author(s):  
TianLin Zhang ◽  
JinJiang Li ◽  
XINBO JIANG

Sign in / Sign up

Export Citation Format

Share Document