Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Research and implementation of large-scale unmanned aerial vehicle swarm simulation engine based on container
Hengxian TANG, Yuan YAO, Haoxiang KANG
Journal of Computer Applications    2025, 45 (8): 2704-2711.   DOI: 10.11772/j.issn.1001-9081.2024081090
Abstract31)   HTML0)    PDF (3780KB)(2)       Save

Simulation engine is critical to the operation of simulation platform. Aiming at the problems of low parallelism, insufficient computing resources and difficulty in expanding of the existing Unmanned Aerial Vehicle (UAV) simulation platforms, a UAV Swarm Containerized Parallel Simulation Engine (USCPSE) with distributed framework and container mechanism was designed and implemented. In the proposed simulation engine, containers were used as the running carriers of UAV virtual entities, and the containers were deployed to multiple parallel simulation nodes to realize large-scale UAV swarm simulation. Besides, based on container live migration technology, a container scheduling strategy integrating communication and computing load was proposed, which was able to migrate containers dynamically according to communication relationships between swarms and computational load changes of simulation nodes, thereby improving comprehensive performance of large-scale UAV swarm simulation. Experimental results show that under clusters with 100, 150 and 200 nodes, compared with Message Passing Interface (MPI)-based parallel simulation architecture, USCPSE increases the speed-up ratio by 22.4%, 59.8% and 101.9%, respectively, and decreases the communication traffic by 51.8% on average.

Table and Figures | Reference | Related Articles | Metrics
Review of blockchain lightweight technology applied to internet of things
Ziqian CHEN, Kedi NIU, Zhongyuan YAO, Xueming SI
Journal of Computer Applications    2024, 44 (12): 3688-3698.   DOI: 10.11772/j.issn.1001-9081.2023121817
Abstract227)   HTML6)    PDF (1709KB)(111)       Save

Blockchain technology is used in Internet of Things (IoT) due to its characteristics of decentralization and encryption. However, the traditional blockchain has problems such as poor scalability, high latency, high consumption of cryptographic components, complex consensus computing and large data storage scale in IoT environment. In view of the poor performance of traditional blockchain in IoT devices, the lightweight technology of blockchain was reviewed. Firstly, the blockchain architectures were divided into single-chain structure and Directed Acyclic Graph (DAG) structure, and the lightweight operations in the two types of blockchain architectures were compared. Secondly, the lightweight hash function was analyzed from the perspectives of iterative structure, compression function and hardware implementation. Thirdly, the consensus algorithms and the lightweight schemes in storage were introduced. Finally, the design ideas of blockchain lightweight technology were summarized based on the literature research results, and the future research directions were prospected.

Table and Figures | Reference | Related Articles | Metrics
Review of blockchain consensus algorithms for internet of things
Kedi NIU, Min LI, Zhongyuan YAO, Xueming SI
Journal of Computer Applications    2024, 44 (12): 3678-3687.   DOI: 10.11772/j.issn.1001-9081.2023121820
Abstract274)   HTML7)    PDF (1915KB)(145)       Save

Most of the current consensus algorithms require high computing power or specific communication environment and are not suitable for resource-constrained Internet of Things (IoT). In view of the limitations of the traditional consensus algorithms in blockchain applied to IoT, blockchain consensus algorithms for IoT were reviewed. Firstly, the consensus algorithms for IoT were introduced and summarized from three categories: improved consensus algorithms based on Practical Byzantine Fault Tolerance (PBFT), improved algorithms based on other consensus algorithms, and new blockchain consensus algorithms suitable for IoT. Secondly, a basic evaluation index system of consensus algorithms was established to compare consensus algorithms from five aspects: decentralization, scalability, security, latency, and energy consumption. Finally, the challenges and future research directions of consensus algorithms for IoT were analyzed. Analysis of the basic evaluation index system shows that the new blockchain consensus algorithms are more suitable for IoT than the improved consensus algorithms based on the traditional consensus algorithms, providing a reference for research on blockchain consensus algorithms for IoT.

Table and Figures | Reference | Related Articles | Metrics
Progress and prospect of zero-knowledge proof enabling blockchain
Miao JIA, Zhongyuan YAO, Weihua ZHU, Tingting GAO, Xueming SI, Xiang DENG
Journal of Computer Applications    2024, 44 (12): 3669-3677.   DOI: 10.11772/j.issn.1001-9081.2023121819
Abstract269)   HTML10)    PDF (3019KB)(154)       Save

With decentralized and immutable characteristics, blockchain technology has been widely applied in the fields such as social governance, education, and healthcare. However, as the applications deepen and the demands increase, a number of challenges such as security issues, insufficient storage, and silo of value are faced by blockchain systems. Consequently, the needs for blockchain in terms of privacy protection, expansion, and cross-chain interoperability are becoming prominent increasingly. Enabling blockchain with Zero-Knowledge Proof (ZKP) technology can enable advanced anonymity and transaction privacy protection. At the same time, KPZ-based effectiveness proof can replace complete data submitted by side-chain or off-chain roles to the main chain, and KPZ-based consensus proof can improve the performance of blockchain cross-chain protocols significantly. Aiming at the urgent need for comprehensive comparative analysis of the current situation of ZKP enabling blockchain, a research on the progress and prospect of ZKP enabling blockchain was carried out, and based on the related progress of ZKP technology enabling blockchain, representative solutions in recent years were summarized systematically. Firstly, the development context of zero-knowledge technology was introduced. Then, representative applications of blockchain based on ZKP technology were categorized and summed up, and the realization ideas and innovation points of these applications were introduced emphatically. At the same time, based on typical cases, these applications were analyzed in the performance under indicators such as block size, proof size and transaction cost. Finally, the applications of ZKP technology in the development of blockchain privacy protection, expansion and cross-chain development opportunities were prospected.

Table and Figures | Reference | Related Articles | Metrics
Overview of on-chain and off-chain consistency protection technologies
Tingting GAO, Zhongyuan YAO, Miao JIA, Xueming SI
Journal of Computer Applications    2024, 44 (12): 3658-3668.   DOI: 10.11772/j.issn.1001-9081.2023121818
Abstract215)   HTML7)    PDF (1452KB)(91)       Save

The immutable characteristic of blockchain ensures the consistency of on-chain data, but off-chain data may be destroyed in the process of recording, storage, and transmission, causing inconsistency between on-chain and off-chain data, which greatly affects the implementation and development of blockchain. Therefore, it requires some mechanisms to ensure the consistency between on-chain and off-chain data. In view of the problem of inconsistency between on-chain and off-chain data, some current on-chain and off-chain consistency protection technologies were summarized. Firstly, the basic concept of on-chain and off-chain consistency was introduced, and the importance of consistency was pointed out. Secondly, the technologies of on-chain and off-chain consistency protection were summed up from three aspects: oracle mechanism, data integrity mechanism and on-chain and off-chain data collaboration mechanism, and some on-chain and off-chain consistency protection schemes were compared and analyzed. Finally, the technologies of on-chain and off-chain consistency protection were prospected from three aspects, providing a theoretical reference for blockchain practitioners and researchers to further discuss and study the on-chain and off-chain consistency protection methods, which could promote the implementation of blockchain applications.

Table and Figures | Reference | Related Articles | Metrics
Cross-chain privacy protection scheme of consortium blockchain based on improved notary mechanism
Xiaohan GUO, Zhongyuan YAO, Yong ZHANG, Shangkun GUO, Chao WANG, Xueming SI
Journal of Computer Applications    2023, 43 (10): 3028-3037.   DOI: 10.11772/j.issn.1001-9081.2022111641
Abstract358)   HTML28)    PDF (3640KB)(1103)       Save

Cross-chain interaction of consortium blockchain not only enhances the function of the application of consortium blockchain, but also expands the scope of usage of the application, so that it is of great significance to the application promotion and industrial development of consortium blockchain. However, the cross-chain interaction of consortium blockchain still has the privacy disclosure problems of user identity and asset transaction information at present, which has become a major factor hindering the wide application of the cross-chain interaction technology of consortium blockchain. In view of the above problems, a cross-chain privacy protection scheme for consortium blockchain assets based on improved notary mechanism was proposed. In the scheme, a hash locking mechanism was introduced at the contract layer to improve the traditional single-signature notary cross-chain method at first, so as to reduce the risk of the traditional notary mechanism centralizing and doing evil. Then, the characteristics of homomorphic encryption were used to realize the usability and invisibility of transaction assets under the premise of ensuring the legitimacy of transactions. At the same time, the identity-based cryptographic algorithm of multi-Key Generation Center (KGC) mode was used to protect the user identity privacy at the network layer. The theoretical analysis and experimental results show that the proposed scheme has a good privacy protection effect on the user identity information and asset information in the cross-chain interaction of consortium blockchain, and this scheme has lower overhead in signature and verification than other similar schemes.

Table and Figures | Reference | Related Articles | Metrics
Cross-chain review: mechanisms, protocols, applications and challenges
Longfei CHEN, Zhongyuan YAO, Heng PAN, Gaoyuan QUAN, Xueming SI
Journal of Computer Applications    2023, 43 (10): 3017-3027.   DOI: 10.11772/j.issn.1001-9081.2022111643
Abstract489)   HTML53)    PDF (1641KB)(960)       Save

With the continuous development of the blockchain technology and its applications, the demand for interoperability among blockchains is increasing. However, the isolation and closeness of blockchain as well as the heterogeneity among different blockchains cause the "island of value" effect of blockchain, which seriously hinder the widespread implementation and sound development of blockchain based integrated applications. Cross-chain technology of blockchain solves the problems of data circulation, value transfer and business collaboration among different blockchains, and is also an important approach to improve the scalability and interoperability of blockchains. According to the degrees of the implementation complexity and the function richness of cross-chain technology, the cross-chain technology of blockchain was summarized and then classified into three types: the basic cross-chain mechanisms, the cross-chain protocols based on these mechanisms, and the cross-chain applications with system architectures. Finally, the existing problems in cross-chain interoperations were summed up, thereby providing systematical and theoretical reference for the further research on cross-chain technology of blockchain.

Table and Figures | Reference | Related Articles | Metrics
Ontology-based knowledge modeling in network manufacturing
Quan ZHANG Yuan YAO Qingxi HU Fei You
Journal of Computer Applications   
Abstract1792)      PDF (638KB)(1065)       Save
The lacking of semantic expression is a bottleneck of current Web service based manufacturing solution. It is not easy to dynamically discover appropriate services from different service providers. A method of ontologybased knowledge modeling was put forward. It combines Web service with network manufacturing service and the servicedriven manufacturing ontology model is constructed by applying the method. The evaluation method of approximate service matchmaking was also developed, and a case was given to demonstrate the above mentioned. The study solves three problems during the manufacturing service process, which are communication between different roles,data exchange and reuse of knowledge resource. The share and the configuration optimization of distributed manufacturing resources were realized in the networked manufacturing environment. It lays the foundation for the construction of the semantic Webbased collaborative manufacturing service platform.
Related Articles | Metrics