自主智能系统(英文)Pub Date : 2025-03-05DOI: 10.1007/s43684-025-00089-x
Kezhou Chen, Tao Wang, Huimin Zhuo, Lianglun Cheng
{"title":"WGO: a similarly encoded whale-goshawk optimization algorithm for uncertain cloud manufacturing service composition","authors":"Kezhou Chen, Tao Wang, Huimin Zhuo, Lianglun Cheng","doi":"10.1007/s43684-025-00089-x","DOIUrl":"10.1007/s43684-025-00089-x","url":null,"abstract":"<div><p>Service Composition and Optimization Selection (SCOS) is crucial in Cloud Manufacturing (CMfg), but the uncertainties in service states and working environments pose challenges for existing QoS-based methods. Recently, digital twins have gained prominence in CMfg due to their predictive capabilities, enhancing the reliability of service composition. Heuristic algorithms are widely used in this field for their flexibility and compatibility with uncertain environments. This paper proposes the Whale-Goshawk Optimization Algorithm (WGO), which combines the Whale Optimization Algorithm (WOA) and Northern Goshawk Optimization Algorithm (NGO). A novel similar integer coding method, incorporating spatial feature information, addresses the limitations of traditional integer coding, while a whale-optimized prey generation strategy improves NGO’s global optimization efficiency. Additionally, a local search method based on similar integer coding enhances WGO’s local search ability. Experimental results demonstrate the effectiveness of the proposed approach.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-025-00089-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
自主智能系统(英文)Pub Date : 2025-03-03DOI: 10.1007/s43684-025-00092-2
Binchuan Qi, Wei Gong, Li Li
{"title":"Explanation framework for industrial recommendation systems based on the generative adversarial network with embedding constraints","authors":"Binchuan Qi, Wei Gong, Li Li","doi":"10.1007/s43684-025-00092-2","DOIUrl":"10.1007/s43684-025-00092-2","url":null,"abstract":"<div><p>The explainability of recommendation systems refers to the ability to explain the logic that guides the system’s decision to endorse or exclude an item. In industrial-grade recommendation systems, the high complexity of features, the presence of embedding layers, the existence of adversarial samples and the requirements for explanation accuracy and efficiency pose significant challenges to current explanation methods. This paper proposes a novel framework AdvLIME (Adversarial Local Interpretable Model-agnostic Explanation) that leverages Generative Adversarial Networks (GANs) with Embedding Constraints to enhance explainability. This method utilizes adversarial samples as references to explain recommendation decisions, generating these samples in accordance with realistic distributions and ensuring they meet the structural constraints of the embedding module. AdvLIME requires no modifications to the existing model architecture and needs only a single training session for global explanation, making it ideal for industrial applications. This work contributes two significant advancements. First, it develops a model-independent global explanation method via adversarial generation. Second, it introduces a model discrimination method to guarantee that the generated samples adhere to the embedding constraints. We evaluate the AdvLIME framework on the Behavior Sequence Transformer (BST) model using the MovieLens 20 M dataset. The experimental results show that AdvLIME outperforms traditional methods such as LIME and DLIME, reducing the approximation error of real samples by 50% and demonstrating improved stability and accuracy.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-025-00092-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143529968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The individual readiness and risk-related concerns of IT professionals for blockchain adoption","authors":"Cigdem Turhan , Ibrahim Akman","doi":"10.1016/j.bcra.2024.100254","DOIUrl":"10.1016/j.bcra.2024.100254","url":null,"abstract":"<div><div>Blockchain has gained remarkable momentum since its introduction in 2008, drawing the attention of industries, individuals, and governments on a global scale. This technology has been studied in the literature, with a focus on technical aspects, application areas, and emerging research challenges. However, few studies address individuals’ perceptions of and concerns with respect to blockchain adoption. This study aims to investigate the attributes affecting blockchain adoption intention. A sample of IT professionals was used for this purpose since they are expected to have earlier and greater awareness of new digital technologies. The perceptions of this group of users regarding attributes such as innovativeness, self-efficacy, social pressure, and awareness, as well as their perceptions of privacy, security, and complexity, were examined through a survey of 208 responses. The results indicate that among the individual attributes, personal innovativeness, awareness, and social pressure positively affect blockchain acceptance, whereas security and privacy concerns fuel the reluctance to adopt blockchain. The findings hopefully provide insight for developers and management of enterprises to ensure a smooth transition into blockchain and present evidence to forecast its future.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 1","pages":"Article 100254"},"PeriodicalIF":6.9,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143683328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-platform wallet for privacy protection and key recovery in decentralized applications","authors":"Cristòfol Daudén-Esmel, Jordi Castellà-Roca, Alexandre Viejo, Ignacio Miguel-Rodríguez","doi":"10.1016/j.bcra.2024.100243","DOIUrl":"10.1016/j.bcra.2024.100243","url":null,"abstract":"<div><div>In recent years, the rise of blockchain technology and its applications has led the software development industry to consider blockchain-powered Decentralized Applications (dApps) as serverless REST APIs. However, to engage with dApps, users require a blockchain wallet. This tool facilitates the generation and secure storage of a user's private key and verifies their identity, among other functionalities. Despite their utility, blockchain wallets present significant challenges, such as reliance on trusted third parties, vulnerability to adversaries observing and potentially linking user interactions, key recovery issues, and synchronization of cryptographic keys across multiple devices. This paper addresses these challenges by introducing a fully decentralized multi-platform wallet that leverages blockchain and InterPlanetary File System (IPFS) technologies for managing asymmetric keys and enabling key recovery. This novel approach empowers users to interact with dApps built on blockchain smart contracts while preserving their privacy and ensuring seamless key recovery in the case of device theft or damage. The proposed system is economically viable, with in-depth cost analysis, and demonstrates resilience against security and privacy attacks. A comparative analysis highlights the advantages of the new scheme over existing mainstream and state-of-the-art solutions. Finally, a preliminary prototype implementation is presented to validate the system's feasibility.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 1","pages":"Article 100243"},"PeriodicalIF":6.9,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143580550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adel A. Nasser , Abed Saif Ahmed Alghawli , S. Saleh , Amani A.K. Elsayed
{"title":"Health security disparities in the Eastern Mediterranean Region: A comparative analysis using an integrated MCDM and clustering approach","authors":"Adel A. Nasser , Abed Saif Ahmed Alghawli , S. Saleh , Amani A.K. Elsayed","doi":"10.1016/j.jobb.2025.01.001","DOIUrl":"10.1016/j.jobb.2025.01.001","url":null,"abstract":"<div><h3>Objectives</h3><div>This study aimed to analyze and compare health security performance (HSP) between Gulf Cooperation Council and non-Gulf Cooperation Council countries within the Eastern Mediterranean Region (EMR) for 2019 and 2021, recognizing the critical role of health security in managing global health threats.</div></div><div><h3>Methods</h3><div>The study utilized data from the Global Health Security Index (GHSI) for 2019 and 2021. Key health security priorities were identified using the entropy objective weighting method. The VIKOR (VIseKriterijumska Optimizacija I Kompromisno Resenje) method was employed to rank countries based on overall performance. K-means clustering was applied to group countries with similar health security profiles. Pearson’s and Spearman’s rank correlation coefficients were used to assess relationships between independent HSP indicators and overall performance scores.</div></div><div><h3>Results</h3><div>A significant shift in health security priorities within the EMR was observed between 2019 and 2021, with prevention gaining prominence. Gulf Cooperation Council countries emphasized detection and reporting, while non-Gulf Cooperation Council countries prioritized health systems and prevention. Gulf Cooperation Council countries, particularly Qatar and Saudi Arabia, consistently demonstrated strong HSP. Conversely, non-Gulf Cooperation Council countries facing conflict and instability, such as Yemen, Somalia, and Syria, exhibited weaker performance. Health system capacity, prevention, detection and reporting, and risk environment showed robust correlations with overall HSP.</div></div><div><h3>Conclusion</h3><div>This study underscores the necessity for tailored, adaptive policies to address HSP disparities across regions, highlighting investment in prevention, detection, and reporting. It stresses international collaboration, improved policy implementation, and ongoing research to enhance global health security systems across diverse contexts.</div></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":"7 1","pages":"Pages 38-51"},"PeriodicalIF":0.0,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143519743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TRADE-5G: A blockchain-based transparent and secure resource exchange for 5G network slicing","authors":"El-hacen Diallo, Khaldoun Al Agha, Steven Martin","doi":"10.1016/j.bcra.2024.100246","DOIUrl":"10.1016/j.bcra.2024.100246","url":null,"abstract":"<div><div>The advent of 5G technology has revolutionized network communication by introducing network slicing (NS) and virtualization to allow multiple network service providers (NSPs) to share infrastructure, thereby reducing deployment costs and accelerating 5G adoption. While this new open marketplace enables NSPs to trade resources dynamically, it also exposes the system to security concerns, such as front-running and selfish-validation attacks, which can lead to market manipulation and strategy leakage. This paper presents TRADE-5G, a secure blockchain-based marketplace for 5G resource trading that mitigates these attacks and ensures fair, transparent resource allocation while preserving the confidentiality of NSP strategies. Through extensive simulations, TRADE-5G demonstrates a substantial 18% improvement in user satisfaction and a 36% reduction in wasted resources compared to traditional models. Additionally, it opens new profit opportunities for NSPs through unused resources, establishing a more competitive, secure, and transparent 5G trading environment that exceeds the capabilities of traditional mobile networks.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 1","pages":"Article 100246"},"PeriodicalIF":6.9,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143683322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lingfeng Bao , Ruidong Zhang , Xiaohu Yang , Chunming Rong
{"title":"Editorials of BCRA 2024","authors":"Lingfeng Bao , Ruidong Zhang , Xiaohu Yang , Chunming Rong","doi":"10.1016/j.bcra.2024.100270","DOIUrl":"10.1016/j.bcra.2024.100270","url":null,"abstract":"","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 1","pages":"Article 100270"},"PeriodicalIF":6.9,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143683327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Ethereum-based distributed PKI with a reward-and-punishment mechanism","authors":"Chong-Gee Koa , Swee-Huay Heng , Ji-Jian Chin","doi":"10.1016/j.bcra.2024.100239","DOIUrl":"10.1016/j.bcra.2024.100239","url":null,"abstract":"<div><div>This paper explores the critical role of Public Key Infrastructure (PKI) in ensuring the security of electronic transactions, particularly in validating the authenticity of websites in online environments. Traditional Centralised PKIs (CPKIs) relying on Certificate Authorities (CAs) face a significant drawback due to their susceptibility to a single point of failure. To address this concern, Decentralised PKIs (DPKIs) have emerged as an alternative. However, both centralised and decentralised approaches encounter specific challenges.</div><div>Researchers have made several attempts using blockchain-based PKI, which implements a reward and punishment mechanism to enhance the security of traditional PKI. Most of the attempts are focused on CA-based PKI, which still suffers from the risk of a single point of failure. Inspired by ETHERST, which is a blockchain-based PKI that implements Web of Trust (WoT) with reward and punishment, we introduce ETHERST version 3.0, with improvements in its secure level algorithm that enhances trustworthiness measurement. Comparative simulations between ETHERST version 2.0 and ETHERST version 3.0 reveal the superior performance of the latter in trustworthiness measurement and ensure the higher security of a virtual community. The new simulation algorithm with different node type definitions and assumptions presents results through tables and graphs, showing that ETHERST version 3.0 outperforms ETHERST version 2.0. This research contributes to advancing the field by introducing an innovative PKI solution with enhanced trustworthiness and security features.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 1","pages":"Article 100239"},"PeriodicalIF":6.9,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143552974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ramandeep Kaur Sandhu , Manoj A Thomas , Kweku Muata Osei-Bryson
{"title":"Supporting secure and efficient collaborative health information exchange: A hybrid blockchain and ontology based approach","authors":"Ramandeep Kaur Sandhu , Manoj A Thomas , Kweku Muata Osei-Bryson","doi":"10.1016/j.bcra.2024.100248","DOIUrl":"10.1016/j.bcra.2024.100248","url":null,"abstract":"<div><div>Patients visit different healthcare institutions during their lifetime, and as a result, their personal health records are stored across different healthcare information systems. Cross-institutional patient data sharing is essential to provide caregivers with a comprehensive view of patients’ health profiles and improving the quality of care. However, security, semantic interoperability, and trust are major barriers that limit seamless exchange of healthcare data. To address these concerns, we apply the Design Science Research (DSR) methodology to propose and develop a functional blockchain-based healthcare information exchange system. At its core, the DSR artifact, called Blockchain-based Healthcare Information Exchange System (B-HIES), integrates private permissioned blockchain technology and interactive ontology mapping techniques. The efficacy and complementarity of the solution are evaluated based on a combination of scenario-based simulation and logically informed arguments. The integration of permissioned blockchain technology and interactive ontology mapping techniques in our proposed solution provides secure, reliable, and trustworthy data exchange among healthcare institutions. This paper discusses how the solution streamlines patent data exchange in heterogeneous healthcare networks. We note that developing such a system is a complex process and requires the involvement of experts with specialized knowledge in a variety of disciplines, such as blockchain, ontologies, healthcare, and medicine.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 1","pages":"Article 100248"},"PeriodicalIF":6.9,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143628383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}