ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Blockchain Technology for Emerging Applications: A Comprehensive Approach

دانلود کتاب فناوری بلاک چین برای کاربردهای در حال ظهور: رویکردی جامع

Blockchain Technology for Emerging Applications: A Comprehensive Approach

مشخصات کتاب

Blockchain Technology for Emerging Applications: A Comprehensive Approach

دسته بندی: الگوریتم ها و ساختارهای داده
ویرایش:  
نویسندگان: , , ,   
سری: Hybrid Computational Intelligence for Pattern Analysis and Understanding 
ISBN (شابک) : 032390193X, 9780323901932 
ناشر: Academic Press 
سال نشر: 2022 
تعداد صفحات: 339 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 15 مگابایت 

قیمت کتاب (تومان) : 52,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 7


در صورت تبدیل فایل کتاب Blockchain Technology for Emerging Applications: A Comprehensive Approach به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب فناوری بلاک چین برای کاربردهای در حال ظهور: رویکردی جامع نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب فناوری بلاک چین برای کاربردهای در حال ظهور: رویکردی جامع



فناوری بلاک چین برای کاربردهای نوظهور: رویکردی جامع تئوری ها و کاربردهای اخیر اجرای فناوری بلاک چین را بررسی می کند. فصل‌ها به طیف گسترده‌ای از حوزه‌های کاربردی، از جمله مراقبت‌های بهداشتی، چارچوب‌های فیزیکی دیجیتال، وب‌اشیاء، چارچوب‌های حمل‌ونقل هوشمند، چارچوب‌های شناسایی وقفه، رأی‌دهی، معماری، جوامع شهری هوشمند، و مدیریت حقوق دیجیتال نگاه می‌کنند. این کتاب به مهندسی، اهداف برنامه، مشکلات، محدودیت‌ها و پاسخ‌های بالقوه برای چارچوب‌های مبتنی بر بلاک چین می‌پردازد.

همچنین به دیدگاه‌های طراحی مبتنی بر بلاک چین این معماری‌های هوشمند می‌پردازد. ارزیابی و تفسیر روندهای دنیای واقعی فصل‌ها بر روی مدل‌های مختلفی گسترش می‌یابند که موفقیت قابل‌توجهی در برخورد با طیف گسترده‌ای از برنامه‌ها از جمله توانایی آن‌ها در استخراج ویژگی‌های پنهان پیچیده و یادگیری نمایش کارآمد در محیط‌های بدون نظارت برای تحلیل الگوی امنیت بلاک چین نشان داده‌اند.


توضیحاتی درمورد کتاب به خارجی

Blockchain Technology for Emerging Applications: A Comprehensive Approach explores recent theories and applications of the execution of blockchain technology. Chapters look at a wide range of application areas, including healthcare, digital physical frameworks, web of-things, smart transportation frameworks, interruption identification frameworks, ballot-casting, architecture, smart urban communities, and digital rights administration. The book addresses the engineering, plan objectives, difficulties, constraints, and potential answers for blockchain-based frameworks.

It also looks at blockchain-based design perspectives of these intelligent architectures for evaluating and interpreting real-world trends. Chapters expand on different models which have shown considerable success in dealing with an extensive range of applications, including their ability to extract complex hidden features and learn efficient representation in unsupervised environments for blockchain security pattern analysis.



فهرست مطالب

BLOCKCHAIN TECHNOLOGY FOR EMERGING APPLICATIONS: A Comprehensive Approach
Copyright
Contributors
Dedication
Preface
1 . Blockchain architecture, taxonomy, challenges, and applications
	1. Introduction to blockchain
		1.1 Motivation
		1.2 Blockchain analogy
		1.3 Characteristics of blockchain
		1.4 Summarizing blockchain
		1.5 Bitcoin and blockchain
		1.6 Wallets, digital signatures, and protocols
		1.7 Main contributions of this chapter
		1.8 Organization of the chapter
	2. History of blockchain
		2.1 Use of blockchain in Bitcoin
		2.2 Ethereum and smart contracts
	3. Benefits over traditional technologies
		3.1 Decentralized control
		3.2 Integrity and transparency
		3.3 Confidentiality
		3.4 Faster processing
		3.5 Enhanced security
	4. Blockchain architecture
		4.1 Understanding architecture
		4.2 Consensus mechanisms
		4.3 Various consensus mechanisms
			4.3.1 Proof of work
			4.3.2 Proof of stake
			4.3.3 Delegated proof of stake
			4.3.4 Proof of authority
			4.3.5 Proof of weight
		4.4 Types of blockchain
			4.4.1 Public blockchain
			4.4.2 Private blockchain
			4.4.3 Consortium blockchain
		4.5 Blockchain technology stack
			4.5.1 Overlay networks
			4.5.2 User interface
			4.5.3 Decentralized protocols
			4.5.4 Support system
		4.6 Blockchain ecosystem
			4.6.1 Blockchain miners
			4.6.2 Blockchain developers
			4.6.3 Blockchain users
			4.6.4 Blockchain exchanges
		4.7 Various top blockchains in the contemporary world
			4.7.1 Bitcoin
			4.7.2 Ethereum
			4.7.3 Hyperledger
			4.7.4 Multichain
			4.7.5 EOS
			4.7.6 Corda
			4.7.7 NEO
			4.7.8 Quorum
	5. Evolution of blockchain in fields other than cryptocurrency
	6. Challenges of blockchain
		6.1 Industry challenges with blockchain
			6.1.1 Energy consumption
			6.1.2 Scalability
			6.1.3 Public perception
			6.1.4 Blockchain standards and regulations
		6.2 Attacks against blockchain
			6.2.1 Sybil attack
			6.2.2 Eclipse attack
			6.2.3 Time-jacking attack
			6.2.4 Fifty-one percent attack
	7. Applications of blockchain
		7.1 Mortgages and loans using blockchain
		7.2 Cross-border payments using blockchain
		7.3 Stock trading using blockchain
		7.4 Online identity management using blockchain
		7.5 Public health security using blockchain
		7.6 Tracing of medicine using blockchain
		7.7 Rental property using blockchain
		7.8 Property records using blockchain
		7.9 Real estate regulations using blockchain
		7.10 Liquidating real estate assets using blockchain
	8. Conclusion and future scope
	References
2 . Blockchain: a new perspective in cyber technology
	1. Introduction
		1.1 Blockchain technology and its history
	2. Blockchain architecture
		2.1 Block header
		2.2 Block body
	3. Blockchain concepts
		3.1 Hash functions
		3.2 Timestamp
	4. Consensus algorithms
		4.1 What is the consensus?
		4.2 Consensus algorithm: Proof of Work (PoW)
		4.3 Consensus algorithm: proof of stake (PoS)
		4.4 Consensus algorithm: delegated proof of stake (DPoS)
		4.5 Consensus algorithm: Practical Byzantine Fault Tolerance (PBFT)
	5. Blockchain validity
	6. Blockchain attacks
	7. Merkle trees
	8. How secure is blockchain?
	9. Challenges and recent advances
		9.1 Scalability
		9.2 Selfish mining
		9.3 Privacy leakage
	10. Emerging applications of blockchain
		10.1 Blockchain and Internet-of-Things (IoT)
		10.2 Smart contracts
		10.3 Blockchain in education
		10.4 Blockchain in healthcare
		10.5 Blockchain in supply chains, transportation, and logistics
		10.6 Blockchain in the agri-food sector
		10.7 Blockchain in technology and cybersecurity
		10.8 Blockchain in identity management
	11. Conclusion and future scope
		11.1 Big data analytics
		11.2 Decentralization
		11.3 Blockchain testing
	References
3 . Characteristics, advances, and challenges in blockchain-enabled cyber-physical systems
	1. Introduction
	2. Background of CPS
		2.1 Healthcare systems
		2.2 Transportation and vehicular ad-hoc networks
		2.3 Urban infrastructure
		2.4 Defense systems
	3. Background of blockchain
		3.1 Types of consensus algorithms
		3.2 Essential features of blockchain technology
	4. Blockchain-enabled cyber-physical systems
		4.1 Supply chain management
		4.2 Healthcare sector
		4.3 Emerging industrial control systems
		4.4 Smart cities
	5. Characteristics of blockchain-enabled CPS systems
	6. Challenges in blockchain-enabled CPS systems
		6.1 The nontechnical challenges
		6.2 The technical challenges
		6.3 Security attacks and their likelihood on blockchain-enabled CPS systems
	7. Conclusion and future scope
	References
4 . A novel secured ledger platform for real-time transactions
	1. Introduction
	2. Proposed work
		2.1 Communication between generator and server
		2.2 Communication between validator and server
		2.3 Communication with nontrusted module
		2.4 Functional units of generator module
		2.5 Functional units of validator module
		2.6 Functional units of server module
	3. Result and discussion
	4. Use cases
	5. Conclusion
	References
5 . Blockchain for intrusion detection systems
	1. Introduction
		1.1 Signature-based IDS
		1.2 Anomaly-based IDS
		1.3 Organization of the paper
	2. Intrusion detection system
		2.1 Information gathering
		2.2 Generating the alert
		2.3 Network intrusion detection system
		2.4 Host intrusion detection system
		2.5 Protocol-based intrusion detection system
		2.6 Application protocol-based intrusion detection system
		2.7 Hybrid intrusion detection system
	3. About blockchain
		3.1 Public blockchain
		3.2 Private blockchain
		3.3 Consortium blockchain
		3.4 Hybrid blockchain
		3.5 Blockchain in security
			3.5.1 Block
			3.5.2 Miners
			3.5.3 Nodes
		3.6 Consensus algorithms
			3.6.1 Proof of work (PoW)
			3.6.2 Proof of stake (PoS)
			3.6.3 Practical Byzantine Fault Tolerance (PBFT)
			3.6.4 Proof of burn (PoB)
			3.6.5 Proof of capacity (PoC)
			3.6.6 Proof of elapsed time (PoET)
		3.7 Blockchain in IDS
	4. Host-based intrusion detection system
		4.1 Working of an IDS in an HIDS
	5. Blockchain-based intrusion detection
		5.1 Challenges in distributed intrusion detection systems
			5.1.1 Integrity
			5.1.2 Consensus
			5.1.3 Scalability
			5.1.4 Privacy
		5.2 Blockchain-based solution
		5.3 Why a cloud-based centralized server?
	6. Collaborative intrusion detection system
		6.1 Working model of CIDS
		6.2 Collaborative intrusion detection challenges
			6.2.1 Sharing of data
			6.2.2 Management of trust
		6.3 Solution for CIDs using blockchain
			6.3.1 Sharing of data
			6.3.2 Trust computation
	7. Applications of IDS: Snort
		7.1 Sniffer mode
		7.2 Packet logger mode
		7.3 NIDS mode
		7.4 Designing a Snort-based CID with blockchain
		7.5 Evaluation of this design
			7.5.1 Attack modeling
			7.5.2 Evaluation with poisonous and permitted traffic in a CIDN
			7.5.3 Analysis of a CIDN with permitted traffic
	8. Limitations
		8.1 IDS limitations
			8.1.1 Traffic overhead with handling capability limited
			8.1.2 Signature coverage in limited range
			8.1.3 Incorrect profile establishment
			8.1.4 Major false warnings
		8.2 Blockchain limitations
			8.2.1 Cost and energy
			8.2.2 Security and privacy
			8.2.3 Complexity and latency
			8.2.4 Awareness and adoption
			8.2.5 Size and organization
			8.2.6 Management and regulations
		8.3 General IDS limitations
	9. Comparison with firewalls
	10. Conclusion and future scope
	References
6 . Blockchain for IoT-based medical delivery drones: state of the art, issues, and future prospects
	1. Introduction
	2. Related works
		2.1 Research gap
		2.2 Lessons learned
	3. Drone suppliers for medical delivery
	4. Blockchain-IoT aware drone-based medical delivery
		4.1 Last mile delivery
		4.2 Collaborative and multiagent delivery
		4.3 Epidemic support delivery
		4.4 Forensic delivery
		4.5 Smart city delivery
		4.6 5G- and AI-assisted delivery
	5. Key issues and future direction
		5.1 Health record storage cost
		5.2 Energy management
		5.3 Ecologic condition
		5.4 Legal disputes
		5.5 Latency and throughput
		5.6 Resource utilization
		5.7 Vulnerability
		5.8 Standard architecture
		5.9 Incentive for participation
		5.10 Regulatory constraints
		5.11 Technology adoption
		5.12 Future direction
	6. Conclusion
	References
7 . Blockchain for digital rights management
	1. Introduction
	2. Illustrations
		2.1 Cryptocurrencies
		2.2 Content distribution and DRM
		2.3 Storing research data
	3. DRM requirement
		3.1 Content verifiability along with tamper proofness
		3.2 Privacy of identity for digital content provider
		3.3 Protecting the access of content
		3.4 Usage control of content
		3.5 Trademarking and licensing
		3.6 Detection of violation
	4. Parts of a traditional DRM
		4.1 Content recognizer
		4.2 Meta data
		4.3 Watermark
		4.4 Fingerprints
		4.5 Containers
		4.6 Security licenses
		4.7 EUP
	5. Compatibility of blockchain for DRM
		5.1 Immutability
		5.2 Decentralized
		5.3 Enhanced security
		5.4 Distributed ledger
		5.5 Consensus
		5.6 Faster responses
	6. Various cryptographic hash functions in blockchain
		6.1 MD5 algorithm
		6.2 SHA-0 algorithm
		6.3 SHA-1 algorithm
		6.4 SHA-2 algorithm
		6.5 SHA-256 algorithm
	7. Methodologies and technology in use
	8. Effects and applications of using blockchain in DRM
		8.1 Effects
			8.1.1 Discoverability of copyrights
			8.1.2 Privacy
			8.1.3 Efficient method
			8.1.4 Maintenance of security and fairness of copyright trading
			8.1.5 Protection from repetitive registrations
			8.1.6 Default in reception
		8.2 Applications
			8.2.1 Educational learning passports
			8.2.2 Multimedia community of educational resources
			8.2.3 Copyrighting multimedia works
			8.2.4 DRM in the music industry
			8.2.5 Blockchain and copyright law
	9. Methodologies for coupling DRM with blockchain
		9.1 Blockchain implementation in the design industry (Lu et al., 2019)
		9.2 Scalability in blockchains (Garba et al., 2020)
		9.3 Proof of stake consensus methodology (Watanabe et al., 2016)
		9.4 Master-slave blockchain architecture (Ma et al., 2018a,b) implementation for diversity in mining rigs
		9.5 DRM approach based on blockchain with automatic license assignment
	10. Advantages of integrating blockchain with digital content
		10.1 DRM approach based on blockchain with automatic license assignment
		10.2 Blockchain helps to bypass the middlemen present between the transactions
		10.3 Payments including royalty can be easily distributed
		10.4 Easing the peer-to-peer sharing of content
		10.5 Easy access to the paid content without any limitations involved
	11. Limitation of blockchain in DRM
	12. Conclusion and future research
	References
8 . Blockchain technology in biomanufacturing: Current perspective and future challenges
	Abbreviations
	1. Introduction
	2. Conception and functionality of blockchain
	3. Why blockchain is needed in biomanufacturing
	4. Key elements of blockchain that are required in biomanufacturing
		4.1 Data governance and management of records
		4.2 Disintermediation
		4.3 Internal process management
		4.4 Provenance
		4.5 Handling research and development data
	5. Various avenues of utility of blockchain technology in biomanufacturing
		5.1 Infrastructure development
		5.2 Advancing machines as a service
		5.3 Enabling machine-controlled maintenance
		5.4 IP and tech transfer
		5.5 Inventory management
		5.6 Simplifying and safeguarding quality checks
		5.7 Serialization of bioproducts
		5.8 Bioproducts expiration and bioproducts recall
	6. Applications of blockchain technology in biomanufacturing (case studies)
		6.1 Blockchain in alcohol biomanufacturing: a case study
		6.2 Blockchain in the development of COVID-19 vaccine: a case study
		6.3 MiPasa platform for preventing false infodemics in the public forum
		6.4 VIRI platform for preventing spread of COVID-19
		6.5 WIShelter platform for assurance of privacy of COVID-19 data
		6.6 Blockchain in the development of biofuels: a case study
	7. Blockchain technology as a prospective tool for bioeconomy
	8. Current progress
	9. Proposed model of biomanufacturing through ``FabRec'' platform
	10. Current challenges
	11. Future prospects
	12. Conclusion
	Acknowledgment
	References
9 . Blockchain-based e-voting protocols
	1. Introduction
	2. Electronic voting
		2.1 Security properties
		2.2 Performance properties
		2.3 Significant contributions in e-voting
		2.4 Issues in e-voting
	3. Distributed e-voting
		3.1 Significant contributions in blockchain-based e-voting
		3.2 Some issues in blockchain-based e-voting
	4. Conclusion
	References
10 . Influence of blockchain technology in pharmaceutical industries
	1. Introduction
		1.1 Background study of blockchain
		1.2 Blockchain in the pharmaceutical and healthcare industries
			1.2.1 Patient data management
			1.2.2 Payer data management
			1.2.3 Blockchain infrastructure
			1.2.4 Problems faced in the pharmaceutical industry
				1.2.4.1 Data disparity in pharmaceuticals
				1.2.4.2 Collection and data handling
				1.2.4.3 Ambiguity and data inaccuracy
				1.2.4.4 Supply chain
		1.3 System architecture of blockchain in the pharmaceutical industry
			1.3.1 Smart contract and blockchain tracking for handling drug counterfeiting
	2. Drug supply chain management in the smart pharmaceutical industry
		2.1 Smart contract in drug supply chain
		2.2 Transaction procedure in supply chain management
		2.3 Distributed ledger in supply chain management
	3. Blockchain technology to prevent counterfeit drugs
		3.1 The problem of counterfeit drugs
		3.2 Blockchain: the solution
		3.3 Drug supply chain
		3.4 Designing Drugledger
		3.5 Performance measures of Drugledger
	4. Blockchain use cases and its applications in the pharmaceutical industry
		4.1 Prevention of counterfeit drugs and medical products
		4.2 Compliance and governance in pharmaceutical supply chain
		4.3 Improving clinical trial management
	5. Open Challenges related to blockchain in the pharmaceutical industry
	6. Future direction
	7. Conclusion
	References
11 . A forefront insight into the integration of AI and blockchain technologies
	1. The rise of blockchain technology
		1.1 Why is blockchain so popular?
	2. Artificial intelligence
	3. The arrival of AI in blockchain
		3.1 Integration of artificial intelligence and the blockchain
		3.2 Merging AI and blockchain
		3.3 Why is there great potential for AI-integrated blockchain?
	4. The possibilities of AI integrated with blockchain
		4.1 Artificial intelligence for blockchain
		4.2 Blockchain for artificial intelligence
	5. Applications of AI and blockchain
	6. Challenges of merging AI and blockchain
	7. The integration of AI and blockchain for industry 4.0
	8. How the app development industry is using blockchain and AI integration to innovate
	9. Blockchain and AI building a powerful match
	10. Conclusion
	References
Index
	A
	B
	C
	D
	E
	F
	G
	H
	I
	L
	M
	N
	O
	P
	Q
	R
	S
	T
	U
	V
	W




نظرات کاربران