Search results

1 – 10 of 807
Article
Publication date: 5 April 2024

Xiaohong Shi, Ziyan Wang, Runlu Zhong, Liangliang Ma, Xiangping Chen and Peng Yang

Smart contracts are written in high-level programming languages, compiled into Ethereum Virtual Machine (EVM) bytecode, deployed onto blockchain systems and called with the…

Abstract

Purpose

Smart contracts are written in high-level programming languages, compiled into Ethereum Virtual Machine (EVM) bytecode, deployed onto blockchain systems and called with the corresponding address by transactions. The deployed smart contracts are immutable, even if there are bugs or vulnerabilities. Therefore, it is critical to verify smart contracts before deployment. This paper aims to help developers effectively and efficiently locate potential defects in smart contracts.

Design/methodology/approach

GethReplayer, a smart contract testing method based on transaction replay, is proposed. It constructs a parallel transaction execution environment with two virtual machines to compare the execution results. It uses the real existing transaction data on Ethereum and the source code of the tested smart contacts as inputs, conditionally substitutes the bytecode of the tested smart contract input into the testing EVM, and then monitors the environmental information to check the correctness of the contract.

Findings

Experiments verified that the proposed method is effective in smart contract testing. Virtual environmental information has a significant effect on the success of transaction replay, which is the basis for the performance of the method. The efficiency of error locating was approximately 14 times faster with the proposed method than without. In addition, the proposed method supports gas consumption analysis.

Originality/value

This paper addresses the difficulty that developers encounter in testing smart contracts before deployment and focuses on helping develop smart contracts with as few defects as possible. GethReplayer is expected to be an alternative solution for smart contract testing and provide inspiration for further research.

Details

International Journal of Web Information Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 8 April 2024

Adrian Fernandez-Perez, Marta Gómez-Puig and Simon Sosvilla-Rivero

The purpose of this study is to examine the propagation of consumer and business confidence in the euro area with a particular focus on the global financial crisis (GFC), the…

Abstract

Purpose

The purpose of this study is to examine the propagation of consumer and business confidence in the euro area with a particular focus on the global financial crisis (GFC), the European sovereign debt crisis (ESDC) and the COVID-19-induced Great Lockdown.

Design/methodology/approach

The authors apply Diebold and Yilmaz’s connectedness framework and the improved method based on the time-varying parameter vector autoregressive model.

Findings

The authors find that although the evolution of business confidence marked the GFC and the ESDC the role of consumer confidence (mainly in those countries with stricter containment and closure measures) increased in the COVID-19-induced crisis.

Originality/value

The findings are related to the different origins of the examined crisis periods, and the analysis of their interrelationship is a very relevant topic for future research.

Details

Applied Economic Analysis, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2632-7627

Keywords

Article
Publication date: 5 April 2024

Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems…

19

Abstract

Purpose

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.

Design/methodology/approach

This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.

Findings

Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.

Originality/value

To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.

Details

Rapid Prototyping Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 22 May 2023

Neha Jain and Geetilaxmi Mohapatra

The present study aims to investigate the non-linear relationship between trade and income inequality to address goal 10 of sustainable development goals (SDGs) using the Kuznets…

Abstract

Purpose

The present study aims to investigate the non-linear relationship between trade and income inequality to address goal 10 of sustainable development goals (SDGs) using the Kuznets Curve (KC) framework for major emerging countries during 1991–2020.

Design/methodology/approach

For this purpose, recent econometric techniques, such as Common Correlated Effect (CCE) and Dynamic Common Correlated Effect (DCCE) estimators have been employed to deal with the cross-section dependence (CD) that arises in panel data, while the robustness of the study is checked through Driscoll–Kraay standard errors method.

Findings

The empirical results of the study confirm the existence of inverted “U-shaped” relationship between trade and income inequality suggesting evidence for the trade-led KC in the panel of emerging countries. Along with the non-linear model, the threshold value is estimated to be between 3.5 and 4% of gross domestic product (GDP).

Research limitations/implications

The authors' findings support that trade contributes significantly toward reducing income inequality and helps in achieving goal 10 of SDGs. Hence, trade policies appear to be more egalitarian. The results widen the scope for further research and provide insights for regulators and policymakers in modeling trade policies and changing the status quo trade policy framework accordingly.

Originality/value

The present study is a pioneering attempt to examine the non-linear relationship between trade and income inequality under the KC framework in light of the Agenda 2030 for sustainable development. The study also considers other explanatory factors that have an impact on income inequality. Furthermore, the study considers other explanatory factors that have an impact on income inequality, and the attempt to estimate the threshold value for the trade-led KC is novel and interesting.

Details

International Journal of Emerging Markets, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1746-8809

Keywords

Article
Publication date: 7 November 2022

T. Sree Lakshmi, M. Govindarajan and Asadi Srinivasulu

A proper understanding of malware characteristics is necessary to protect massive data generated because of the advances in Internet of Things (IoT), big data and the cloud…

Abstract

Purpose

A proper understanding of malware characteristics is necessary to protect massive data generated because of the advances in Internet of Things (IoT), big data and the cloud. Because of the encryption techniques used by the attackers, network security experts struggle to develop an efficient malware detection technique. Though few machine learning-based techniques are used by researchers for malware detection, large amounts of data must be processed and detection accuracy needs to be improved for efficient malware detection. Deep learning-based methods have gained significant momentum in recent years for the accurate detection of malware. The purpose of this paper is to create an efficient malware detection system for the IoT using Siamese deep neural networks.

Design/methodology/approach

In this work, a novel Siamese deep neural network system with an embedding vector is proposed. Siamese systems have generated significant interest because of their capacity to pick up a significant portion of the input. The proposed method is efficient in malware detection in the IoT because it learns from a few records to improve forecasts. The goal is to determine the evolution of malware similarity in emerging domains of technology.

Findings

The cloud platform is used to perform experiments on the Malimg data set. ResNet50 was pretrained as a component of the subsystem that established embedding. Each system reviews a set of input documents to determine whether they belong to the same family. The results of the experiments show that the proposed method outperforms existing techniques in terms of accuracy and efficiency.

Originality/value

The proposed work generates an embedding for each input. Each system examined a collection of data files to determine whether they belonged to the same family. Cosine proximity is also used to estimate the vector similarity in a high-dimensional area.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 24 April 2024

Bahman Arasteh and Ali Ghaffari

Reducing the number of generated mutants by clustering redundant mutants, reducing the execution time by decreasing the number of generated mutants and reducing the cost of…

Abstract

Purpose

Reducing the number of generated mutants by clustering redundant mutants, reducing the execution time by decreasing the number of generated mutants and reducing the cost of mutation testing are the main goals of this study.

Design/methodology/approach

In this study, a method is suggested to identify and prone the redundant mutants. In the method, first, the program source code is analyzed by the developed parser to filter out the effectless instructions; then the remaining instructions are mutated by the standard mutation operators. The single-line mutants are partially executed by the developed instruction evaluator. Next, a clustering method is used to group the single-line mutants with the same results. There is only one complete run per cluster.

Findings

The results of experiments on the Java benchmarks indicate that the proposed method causes a 53.51 per cent reduction in the number of mutants and a 57.64 per cent time reduction compared to similar experiments in the MuJava and MuClipse tools.

Originality/value

Developing a classifier that takes the source code of the program and classifies the programs' instructions into effective and effectless classes using a dependency graph; filtering out the effectless instructions reduces the total number of mutants generated; Developing and implementing an instruction parser and instruction-level mutant generator for Java programs; the mutant generator takes instruction in the original program as a string and generates its single-line mutants based on the standard mutation operators in MuJava; Developing a stack-based evaluator that takes an instruction (original or mutant) and the test data and evaluates its result without executing the whole program.

Details

Data Technologies and Applications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 11 May 2023

Suresh Kumar Oad Rajput, Amjad Ali Memon, Tariq Aziz Siyal and Namarta Kumari Bajaj

This paper aims to test for volatility spillovers among Islamic stock markets with the exogenous impact of geopolitical risk (GPR) to check the risk transmission among Saudi…

Abstract

Purpose

This paper aims to test for volatility spillovers among Islamic stock markets with the exogenous impact of geopolitical risk (GPR) to check the risk transmission among Saudi Arabia, Malaysia, Indonesia and Turkey. Researchers test for both the symmetric and asymmetric risk transmission.

Design/methodology/approach

For the symmetric response of volatility, the study uses simple generalized autoregressive conditional heteroscedastic (GARCH) and for the asymmetric response of volatility with the exogenous impact of GPR, the exponential GARCH models have been adopted.

Findings

The results suggest spillover effects exist from Turkey to Saudi Arabia, Indonesia to Malaysia and Saudi Arabia and Malaysia to Indonesia. The findings of volatility spillover from GPR to sample countries suggest that only Malaysia and Indonesia experience volatility spillovers from GPR.

Research limitations/implications

The present study is limited to the context of four countries and Islamic equities; the study contributes to the literature on volatility spillover, Islamic finance, GPR and asset pricing.

Practical implications

This study contributes to individual, institutional investors’ policymakers’ knowledge in determining security prices, trading plans, investment hedging and policy regulation.

Social implications

The extant literature disregards the GPR index to examine the volatility spillover effects among Islamic stock markets, which allow researchers to justify the mechanism of risk transmission due to GPR across the Islamic stock market.

Originality/value

To the best of the authors’ knowledge, this is the first research of its type to look at volatility spillover and GPR transmission in Islamic stock markets.

Details

Journal of Islamic Accounting and Business Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1759-0817

Keywords

Article
Publication date: 8 April 2024

Yayun Ren, Zhongmin Ding and Junxia Liu

The research objective of this paper is to investigate the direct and indirect impacts of green finance on agricultural carbon total factor productivity (ACTFP) within the…

Abstract

Purpose

The research objective of this paper is to investigate the direct and indirect impacts of green finance on agricultural carbon total factor productivity (ACTFP) within the framework of the carbon peaking and carbon neutrality (dual carbon) goals, while also identifying the driving factors through an exponential decomposition of ACTFP, aiming to provide policy recommendations to enhance financial support for low-carbon agricultural development.

Design/methodology/approach

In this paper, the Global Malmquist Luenberger (GML) Index method was employed to analyze and decompose the ACTFP, while the direct and spillover effects of China’s green finance pilot policy (GFPP) on ACTFP were assessed using the difference-in-differences (DID) method and the spatial differences-in-differences (SDID) method, respectively.

Findings

After the implementation of the GFPP, the ACTFP in the pilot area has experienced significant improvement, with the enhancement of technical efficiency serving as the main driving force. In addition, the GFPP exhibits a positive low-carbon spatial spillover effect, indicating it benefits ACTFP in both the pilot and adjacent areas.

Originality/value

Within the framework of the dual carbon goals, the paper highlights agriculture as a significant carbon emitter. ACTFP is assessed by considering the agricultural carbon emission factor as the sole non-desired output, and the impact of the GFPP on ACTFP is investigated through the DID method, thereby providing substantial validation of the hypotheses inferred from the mathematical model. Subsequently, the spillover effects of GFPP on ACTFP are analyzed in conjunction with the spatial econometric model.

Details

China Agricultural Economic Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-137X

Keywords

Article
Publication date: 12 July 2023

Ji Kai, Ming Liu, Yue Wang and Ding Zhang

Nucleic acid testing is an effective method of accurate prevention and control and a key measure to block the spread of the epidemic. However, the fraud in nucleic acid testing…

Abstract

Purpose

Nucleic acid testing is an effective method of accurate prevention and control and a key measure to block the spread of the epidemic. However, the fraud in nucleic acid testing occurred frequently during epidemics. This paper aims to provide a viable scheme for the government to strengthen the supervision of nucleic acid testing and to provide a new condition for the punishment for the negative act of the government and the upper limit of the reward for nucleic acid testing institution of no data fraud.

Design/methodology/approach

This paper formulates an evolutionary game model between the government and nucleic acid testing institution under four different mechanisms of reward and punishment to solve the issue of nucleic acid testing supervision. The authors discuss the stability of equilibrium points under the four distinct strategies and conduct simulation experiments.

Findings

The authors find that the strategy of dynamic reward and static penalty outperforms the strategies of static reward and static penalty, dynamic reward and static penalty, static reward and dynamic penalty, dynamic reward and dynamic penalty. The results reveal the appropriate punishment for the negative act of the government can enhance the positivity of the government's supervision in the strategy of dynamic reward and static penalty, while the upper limit of the reward for nucleic acid testing institution of no data fraud cannot be too high. Otherwise, it will backfire. Another interesting and counterintuitive result is that in the strategy of dynamic reward and dynamic penalty, the upper limit of the penalty for data fraud of nucleic acid testing institution cannot be augmented recklessly. Otherwise, it will diminish the government's positivity for supervision.

Originality/value

Most of the existing evolutionary game researches related to the reward and punishment mechanism and data fraud merely highlight that increasing the intensity of reward and punishment can help improve the government's supervision initiative and can minimize data fraud of nucleic acid institution, but they fall short of the boundary conditions for the punishment and reward mechanism. Previous literature only study the supervision of nucleic acid testing qualitatively and lacks quantitative research. Moreover, they do not depict the problem scenario of testing data fraud of nucleic acid institution regulated by the government via the evolutionary game model. Thus, this study effectively bridges these gaps. This research is universal and can be extended to other industries.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 27 February 2023

Ruihan Zhang and Han Gao

There are two purposes in this paper. The first one is to explore the impact mechanisms and paths of service-oriented manufacturing (SOM) on the sustainability performance of…

Abstract

Purpose

There are two purposes in this paper. The first one is to explore the impact mechanisms and paths of service-oriented manufacturing (SOM) on the sustainability performance of green manufacturing firms and to pay particular attention to the mediating role of enterprise costs in the relationship between the two. The second one is to reveal the dynamic process and laws of SOM influencing on the sustainability performance of green manufacturing enterprises.

Design/methodology/approach

This paper employs a combination of dynamic and static research from two aspects. On the one hand, based on 495 green manufacturing firms in China, the authors verify the SEM of SOM, enterprise cost and sustainability performance of green manufacturing firms through empirical research, analyze the path relationship and mediation effect, and demonstrate its complex impact mechanism. On the other hand, the authors use agent-based modeling and simulation to reveal the dynamic influence of SOM on the sustainability performance of green manufacturing enterprises and explore its dynamic laws and future development trends.

Findings

The study results indicate that (1) SOM has a direct positive effect on firm sustainability performance. (2) Reducing firm costs has a positive effect on firm sustainability performance, and firm costs play a partial mediating role in the mechanism by which SOM influences firm sustainability performance. (3) The dynamic impact of SOM on sustainability performance increases significantly over time. (4) Significant firm heterogeneity exists in the process by which SOM improves sustainability performance. (5) There are differences in the promotion of SOM for economic performance, environmental performance and social performance.

Originality/value

This paper makes two main contributions. First, compared with previous research on sustainability performance focusing on a certain dimension, this paper organically integrates the three dimensions of sustainability performance, regards them as a whole and considers the paths to improve sustainability performance. Second, this paper focuses on the complex relationship among SOM, enterprise costs and sustainability performance and reveals different sustainability performance improvement paths and dynamic impact processes, thereby expanding and deepening previous research on sustainability on the subject. These contributions lead to a better understanding of the driving forces and realization path for green manufacturing firms' sustainability performance from an integrated static and dynamic perspective.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of 807