ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Blockchain Applications in the Smart Era

دانلود کتاب کاربردهای بلاک چین در عصر هوشمند

Blockchain Applications in the Smart Era

مشخصات کتاب

Blockchain Applications in the Smart Era

ویرایش:  
نویسندگان:   
سری: EAI/Springer Innovations in Communication and Computing 
ISBN (شابک) : 3030895459, 9783030895457 
ناشر: Springer 
سال نشر: 2022 
تعداد صفحات: 302
[303] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 8 Mb 

قیمت کتاب (تومان) : 38,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 2


در صورت تبدیل فایل کتاب Blockchain Applications in the Smart Era به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب کاربردهای بلاک چین در عصر هوشمند نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب کاربردهای بلاک چین در عصر هوشمند




توضیحاتی درمورد کتاب به خارجی

This book covers a variety of topics and trends related to blockchain technology for smart era applications. The applications span industries such as health, government, energy management, manufacturing, finance, information systems, all far beyond blockchain\'s original use in cryptocurrency. The authors present variants, new models, practical solutions, and technological advances related to blockchain in these fields and more. The applications within these fields include blockchain and cyber-security, IoT security and privacy using blockchain, and blockchain in industries and society . A variety of case studies are also included. The book is applicable to researchers, professionals, students, and professors in a variety of fields in communications engineering.



فهرست مطالب

Preface
Contents
About the Editors
Perspectives of Blockchain in Digital Health in Brazil
	1 Introduction
	2 Electronic Health Records
		2.1 Electronic Citizen Record Template in e-SUS AB
		2.2 Model POCR: Problem-Oriented Clinical Record
		2.3 Model ICPC: Classification of Primary Care
	3 Blockchain: Interoperability and Data Privacy
		3.1 Implementation and Functionality System
		3.2 Data Security and Privacy Encryption
	4 Ethereum and Hyperledger Fabric
		4.1 Ethereum
		4.2 Hyperledger Fabric
	5 Applicability of Blockchain in Health Sector
	6 Discussions
		6.1 Symmetric and Asymmetric Encryption
		6.2 EHR Domain Model with Blockchain
	7 Conclusion
	References
Blockchain Based Edge Information Systems Frameworks for Industrial IoT: A Novel Approach
	1 Introduction
	2 Related Works
	3 Novel Tier-Based EIS Framework of Blockchain for Industrial IoT
		3.1 Blockchain Architecture for Industrial IoT
		3.2 Operations in the Layered Blockchain IIoT Architecture
		3.3 System-Level Architecture Model
		3.4 Interaction Model for the Proposed Layered Architecture for Blockchain-Based IoT Framework
		3.5 Transaction Flow of BC Framework
		3.6 Improved Consensus Mechanism for Blockchain
	4 Experimental Simulation
	5 Conclusion
	References
A Secure Electronic Voting System Using Multifactor Authentication and Blockchain Technologies
	1 Introduction
	2 Review of Related Works
	3 Preliminaries
		3.1 Blockchain in E-Voting
		3.2 Multifactor Authentication
	4 System and Threat Model
		4.1 Threat Model
	5 Proposed E-Voting System
		5.1 System Hardware Design Consideration
		5.2 System Software Design Consideration
	6 Performance Evaluation
	7 Security Analysis
		7.1 Vote Consistency and Integrity
		7.2 Cast-as-Intended Transparency and Verifiability
		7.3 Vote Coercion Resistance
		7.4 Double Voting
	8 Conclusion
	References
Enhanced Security and Privacy Issue in Multi-Tenant Environment of Green Computing Using Blockchain Technology
	1 Introduction
	2 Literature Review
	3 Materials and Method
		3.1 The Need for Green Computing (GC)
		3.2 Multi-Tenancy in GC
		3.3 Security and Privacy Challenges in the Multi-Tenancy Environment of GC
		3.4 Application of BC Technology to Secure Multi-Tenancy in GC Environment
	4 Results and Discussion
		4.1 Implementation
		4.2 Discussion
	5 Conclusion
	References
Application of Crypto-Blockchain Technology for Securing Electronic Voting Systems
	1 Introduction
	2 Blockchain Technology
		2.1 The Consensus of Blockchain Algorithm and its Classification
			The Blockchain-Based Network Nodes for Certificate Verification
			Based on the Nature of the Blockchain Publicity
		2.2 The Cryptography Techniques for Securing Blockchain-Based Electronic Voting System
		2.3 Application of Blockchain Technology Survey
	3 The Proposed Crypto-Blockchain Scheme and Bi-factor Authentication for Securing E-Voting Systems
	4 Results and Discussions
	5 Conclusions
	References
Enhanced Hash Value and Public Key Infrastructure Generations for Blockchains Using Sooner Lightweight Cryptography
	1 Introduction
	2 Literature Review
		2.1 Overview of Blockchain Technology
		2.2 Types of Blockchain Technology
		2.3 Characteristics of Blockchains
		2.4 Applications of Blockchain Technology
		2.5 Limitations of Blockchain Technology
		2.6 Data Retrieval and Manipulation on Blockchains
	3 Research Methodology
		3.1 Description of the Proposed Sooner-C Lightweight Cryptography
		3.2 Mathematical Representation of the Sooner-C
		3.3 Experimental Setup
	4 Results and Discussion
	5 Conclusion
	References
A Prediction Model for Bitcoin Cryptocurrency Prices
	1 Background of the Study
	2 Review of Related Works
	3 Materials and Methods
		3.1 Blockchain, Cryptocurrency, and Bitcoin
		3.2 Dataset
		3.3 Machine Learning, Independent Component Analysis (ICA), Firefly Algorithm, and Support Vector Machine Classifier
			Machine Learning
			Independent Component Analysis (ICA) Algorithm
			Firefly Algorithm
			Support Vector Machine (SVM)
		3.4 Evaluation Metrics for the Model and the System Configuration
	4 Results and Discussions
	5 Conclusion
	References
Blockchain-Based Framework for Secure Medical Information in Internet of Things System
	1 Introduction
	2 Application of the Internet of Things in Healthcare System
	3 Applications of Blockchain in Internet of Things
	4 The Challenges of Using Blockchain in the Internet of Things in Healthcare Systems
	5 Blockchain-Based Framework for Secure Medical Information in Internet of Things System
	6 Results and Discussion
	7 Conclusion and Future Directions
	References
Blockchain Technology and Organizational Practices: The Case of Nigerian Academic Libraries
	1 Introduction
	2 Review of Related Literature
		2.1 Library Practices that Require Application of Blockchain Technology
		2.2 Challenges Associated with Adoption and Use of Blockchain in Libraries
	3 Research Method
		3.1 Presentation and Analysis of Data
	4 Discussion of Major Findings
	5 Conclusion
	References
A Comparative Study of Regression Analysis for Modelling and Prediction of Bitcoin Price
	1 Introduction
	2 Literature Review
	3 Materials and Methodology
		3.1 Data Preprocessing
		3.2 Z-Score Normalization
		3.3 CatBoost Regressor
		3.4 Gradient Boosting Regressor
		3.5 Extra Trees Regressor
		3.6 AdaBoost Regressor
		3.7 K-Neighbor Regressor
		3.8 Theil-Sen Regressor
		3.9 Performance Metrics Adopted for All the Models
			Mean Absolute Error
		3.10 Mean Squared Error
		3.11 Root Mean Squared Error
		3.12 Coefficient of Determination (R2)
		3.13 Root Mean Squared Logarithmic Error
		3.14 Mean Absolute Percentage Error
	4 Results and Discussion
		4.1 Correlation Analysis of the Bitcoin Dataset Features
		4.2 Performance of the Six Models Using the Bitcoin Daily Price
		4.3 Model Interpretation for the CatBoost Regressor
		4.4 Model Interpretation for the Gradient Boosting Regressor
		4.5 Model Interpretation for the Extra Tree Regressor
		4.6 Predictive Performance of the Six Models for the Bitcoin Price in the Next Five Days
		4.7 Comparison with Previous Work in the Literature
	5 Conclusion and Future Work
	References
Adoption of Blockchain Technology in the Indian Business Market: Obstacles and Opportunities
	1 Introduction
	2 Variants of Blockchain Technology
		2.1 Public Blockchains
		2.2 Private Blockchains vs. Consortium Blockchains
		2.3 Characteristics of Blockchain
	3 Current Blockchain Adoption in Varying Domains
		3.1 Healthcare Domain
		3.2 Government Sector
		3.3 Supply Chain Management
		3.4 Energy Domain
		3.5 Education Sector
		3.6 Insurance Sector
		3.7 Finance and Banking
	4 Research Methodology
		4.1 Research Approach
		4.2 Research Design
		4.3 Questionnaires
		4.4 Sampling Strategy and Survey Locations
	5 Statistical Methods Used in the Study
		5.1 Data Interpretations (Survey)
	6 Discussions
		6.1 Technological Challenges
		6.2 Adoption-Based Challenges
	7 Applying Technology Acceptance Model
	8 Limitations of Research
	9 Conclusions and Future Line
	References
Machine Learning, IoT, and Blockchain Integration for Improving Process Management Application Security
	Abbreviations
	1 Introduction
	2 Literature Review
	3 Materials and Method
		3.1 Dataset
		3.2 Proposed System
		3.3 Performance Evaluation
	4 Results and Discussion
		4.1 Discussion
	5 Conclusion
	References
A Blockchain-Powered Energy Monitoring System
	1 Introduction
		1.1 Blockchain Technology
		1.2 Ethereum
	2 Literature Review
	3 Proposed Structure
	4 Implementation
		4.1 Model of Blockchain Web Application
		4.2 Front End of Web Application
		4.3 Role of Admin
		4.4 Role of Consumer
		4.5 Creation of Blocks in Ganache
	5 Analysis
	6 Conclusion
	References
Multifactor IoT Authentication System for Smart Homes Using Visual Cryptography, Digital Memory, and Blockchain Technologies
	1 Introduction
		1.1 Challenges Associated with IoT
	2 Related Works
	3 The Visual Cryptography Scheme (VCS)
	4 The Proposed System
		4.1 Phases of the Proposed System
			The Registration Phase
			The Login Phase
		4.2 The Proposed System's Flowchart
	5 Results and Discussions
		5.1 Comparative Analysis of the Proposed System Versus Other Existing Works
	6 Conclusion and Future Work
	References
Index




نظرات کاربران