Focused on the issue that Elman neural network has slow convergence speed and low prediction accuracy in the closing price prediction based on the network public opinion of the stock market, a prediction model combining Improved Whale Optimization Algorithm (IWOA) and Elman neural network was proposed, which is based on Complete Ensemble Empirical Mode Decomposition with Adaptive Noise (CEEMDAN)algorithm. Firstly, text mining technology was used to mine and quantify the network public opinions of Shanghai Stock Exchange (SSE) 180 shares, and in order to reduce the complexity of attribute set, Boruta algorithm was used to select the important attributes. Then, CEEMDAN algorithm was used to add a certain number of white noises with specific variances in order to realize the decomposition and noise reduction of the attribute sequence. At the same time, in order to enhance the global search and local mining capabilities, adaptive weight was used to improve Whale Optimization Algorithm (WOA). Finally, the initial weights and thresholds of Elman neural network were optimized by WOA in the iterative process. The results show that, compared to Elman neural network, the proposed model has the Mean Absolute Error (MAE) reduced from 358.812 0 to 113.055 3; compared to the original dataset without CEEMDAN algorithm, the proposed model has the Mean Absolute Percentage Error (MAPE) reduced from 4.942 3% to 1.445 31%, demonstrating that the model effectively improves the prediction accuracy and provides an effective experimental method for predicting the network public opinion of stock market.
The second generation of blockchain represented by smart contract has experienced an explosive growth of its platforms and applications in recent years. However, frequent smart contract vulnerability incidents pose a serious risk to blockchain ecosystem security. Since code auditing based on expert experience is inefficient in smart contracts vulnerability mining, the significance of developing universal automated tools to mining smart contracts vulnerability was proposed. Firstly, the security threats faced by smart contracts were investigated and analyzed. Top 10 vulnerabilities, including code reentrancy, access control and integer overflow, as well as corresponding attack modes were summarized. Secondly, mainstream detection methods of smart contract vulnerabilities and related works were discussed. Thirdly, the performance of three existing tools based on symbolic execution were verified through experiments. For a single type of vulnerability, the highest false negative rate was 0.48 and the highest false positive rate was 0.38. The experimental results indicate that existing studies only support incomplete types of vulnerability with many false negatives and positives and depend on manual review. Finally, future research directions were forecasted aiming at these limitations, and a symbolic-execution-based fuzzy test framework was proposed. The framework can alleviate the problems of insufficient code coverage in fuzzy test and path explosion in symbolic execution, thus improving vulnerability mining efficiency for large and medium-sized smart contracts.