[go: up one dir, main page]

 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (494)

Search Parameters:
Keywords = Bitcoin

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 4554 KiB  
Article
On the Determinants of Bitcoin Returns and Volatility: What We Get from Gets?
by Adel Benhamed, Ahlem Selma Messai and Ghassen El Montasser
Sustainability 2023, 15(3), 1761; https://doi.org/10.3390/su15031761 - 17 Jan 2023
Cited by 3 | Viewed by 2906
Abstract
Since Bitcoin has frequently witnessed price fluctuations and high volatility, the factors influencing its returns and volatility is an important research subject. To accomplish this goal, we applied the Gets reduction method which has a good reputation compared to other competing approaches in [...] Read more.
Since Bitcoin has frequently witnessed price fluctuations and high volatility, the factors influencing its returns and volatility is an important research subject. To accomplish this goal, we applied the Gets reduction method which has a good reputation compared to other competing approaches in terms of the statistical apparatus available for a repeated search to determine the final set of determinants and the consideration of location shifts. We found that the reduced set of explanatory variables that affects Bitcoin returns is composed of Twitter-based economic uncertainty, gold return, the return of the Euro/USD exchange rate, the return of the US Nasdaq stock exchange index, market capitalization, and Bitcoin mining difficulty. In contrast, the volatility of Bitcoin is affected by only lagged terms of the ARCH effect and the volume of this cryptocurrency. Full article
(This article belongs to the Section Economic and Business Aspects of Sustainability)
Show Figures

Figure 1

Figure 1
<p>Bitcoin returns.</p>
Full article ">Figure 2
<p>Accumulated distance matrix and optimal path between 2020 and 2016 sequences. DTW distance between both series is equal to 0.2759.</p>
Full article ">Figure 3
<p>Accumulated distance matrix and optimal path between 2020 and 2017 sequences. DTW distance between both series is equal to 0.4716.</p>
Full article ">Figure 4
<p>Accumulated distance matrix and optimal path between 2020 and 2018 sequences. DTW distance between both series is equal to 0.4023.</p>
Full article ">Figure 5
<p>Accumulated distance matrix and optimal path between 2020 and 2019 sequences. DTW distance between both series is equal to 0.4010.</p>
Full article ">Figure 6
<p>Accumulated distance matrix and optimal path between 2020 and 2021 sequences. DTW distance between both series is equal to 0.4432.</p>
Full article ">Figure 7
<p>Accumulated distance matrix and optimal path between 2020 and 2022 sequences. DTW distance between both series is equal to 0.3357.</p>
Full article ">
16 pages, 2502 KiB  
Article
Improved PBFT Algorithm Based on Comprehensive Evaluation Model
by Wangxi Jiang, Xiaoxiong Wu, Mingyang Song, Jiwei Qin and Zhenhong Jia
Appl. Sci. 2023, 13(2), 1117; https://doi.org/10.3390/app13021117 - 13 Jan 2023
Cited by 5 | Viewed by 1979
Abstract
Blockchain technology is well known due to the advent of Bitcoin. With the development of recent years, blockchain technology has been widely used in medicine, digital currency, energy, etc. The practical Byzantine fault-tolerant (PBFT) algorithm is a consensus algorithm widely used in consortium [...] Read more.
Blockchain technology is well known due to the advent of Bitcoin. With the development of recent years, blockchain technology has been widely used in medicine, digital currency, energy, etc. The practical Byzantine fault-tolerant (PBFT) algorithm is a consensus algorithm widely used in consortium blockchains. Aiming to address the problems of the PBFT algorithm, low consensus efficiency due to high communication complexity, and malicious behavior of the primary node leading to consensus failure, an improved PBFT algorithm based on a comprehensive evaluation model (TB-PBFT) is proposed. First, nodes are divided into several groups based on the multi-formation control strategy of an unmanned aerial vehicle (UAV) cluster, which significantly reduces the communication complexity. Second, a comprehensive evaluation model combining the entropy method, TOPSIS method, and Borda count is proposed, which uses the behavior of nodes as an evaluation index, and the comprehensive score of nodes is obtained according to the preferences of other nodes. Finally, the highest ranking node is selected as the primary node through the comprehensive evaluation model to ensure the security and stability of the blockchain network. We analyze TB-PBFT algorithms and compare them with other Byzantine fault tolerance algorithms. Theoretical analysis and simulation results show that the TB-PBFT algorithm can improve node scalability and fault tolerance and reduce communication complexity and view switching probability. We also prove that the comprehensive evaluation model can improve the consensus success rate of the algorithm, and the feasibility and effectiveness of the improved consensus algorithm are verified. Hence, it can be applied to the consortium blockchain system effectively and efficiently. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>The consensus process of PBFT algorithm.</p>
Full article ">Figure 2
<p>TB-PBFT Algorithm Framework.</p>
Full article ">Figure 3
<p>Grouping strategy based on UAV cluster.</p>
Full article ">Figure 4
<p>Primary node selection.</p>
Full article ">Figure 5
<p>The consensus process of TB-PBFT algorithm.</p>
Full article ">Figure 6
<p>Ratio of the communication complexity of the TB-PBFT to the PBFT.</p>
Full article ">Figure 7
<p>The maximum number of Byzantine fault tolerances of TB-PBFT and PBFT.</p>
Full article ">Figure 8
<p>The influence of comprehensive evaluation model on TB-PBFT algorithm, (<b>a</b>) m = 4, n = 16, (<b>b</b>) m = 10, n = 40.</p>
Full article ">
22 pages, 1964 KiB  
Article
Contagion Spillover from Bitcoin to Carbon Futures Pricing: Perspective from Investor Attention
by Qingjie Zhou, Panpan Zhu and Yinpeng Zhang
Energies 2023, 16(2), 929; https://doi.org/10.3390/en16020929 - 13 Jan 2023
Cited by 4 | Viewed by 1400
Abstract
The uniqueness of this investigation lies in empirically testing and proving the contagion spillover of Bitcoin attention to carbon futures. Specifically, several models are adopted to investigate the explanatory and predictive abilities of Bitcoin attention to carbon futures. The results can be generalized [...] Read more.
The uniqueness of this investigation lies in empirically testing and proving the contagion spillover of Bitcoin attention to carbon futures. Specifically, several models are adopted to investigate the explanatory and predictive abilities of Bitcoin attention to carbon futures. The results can be generalized as follows. First, Bitcoin attention Granger causes the variation of carbon futures. Second, Bitcoin attention shows a negative impact on carbon futures and an addition, an invert U-shaped connection exists. Third, the Bitcoin attention-based models can beat the commonly used historical average benchmark during out-of-sample forecasting both in statistical and economic levels. Fourth, we complete robustness checks to certify that the contagion spillover from Bitcoin attention to the pricing of carbon futures does exist. Finally, we prove the linear and non-linear impacts from Bitcoin attention to realized volatility of carbon futures. All the results prove that Bitcoin attention is an important pricing factor for carbon futures market. Full article
(This article belongs to the Section C: Energy Economics and Policy)
Show Figures

Figure 1

Figure 1
<p>Cross market transmission mechanism.</p>
Full article ">Figure 2
<p>Price trend of Bitcoin. Note: The X-axis refers to the time while the Y-axis represents the price of Bitcoin per unit.</p>
Full article ">Figure 3
<p>Variation trend of the two selected time series. The X-axis refers to the time while the Y-axis represents the values of return for the reported time series.</p>
Full article ">Figure 4
<p>Reaction of carbon futures market to Bitcoin attention. The X-axis refers to the time for response while the Y-axis represents the magnitude of response. The blue line refers to the value while the red line refers to the confidence interval.</p>
Full article ">Figure 5
<p>Dynamic correlation between Bitcoin attention and carbon futures returns. The X-axis refers to the time while the Y-axis represents the values for the reported time series.</p>
Full article ">Figure 6
<p>Response of realized volatility to Bitcoin attention. The X-axis refers to the time for response while the Y-axis represents the magnitude of response. The blue line refers to the value while the red line refers to the confidence interval.</p>
Full article ">
25 pages, 6964 KiB  
Article
Analysis of Bitcoin Price Prediction Using Machine Learning
by Junwei Chen
J. Risk Financial Manag. 2023, 16(1), 51; https://doi.org/10.3390/jrfm16010051 - 13 Jan 2023
Cited by 30 | Viewed by 47798
Abstract
The research purpose of this paper is to obtain an algorithm model with high prediction accuracy for the price of Bitcoin on the next day through random forest regression and LSTM, and to explain which variables have influence on the price of Bitcoin. [...] Read more.
The research purpose of this paper is to obtain an algorithm model with high prediction accuracy for the price of Bitcoin on the next day through random forest regression and LSTM, and to explain which variables have influence on the price of Bitcoin. There is much prior literature on Bitcoin price prediction research, and the research methods mainly revolve around the ARMA model of time series and the LSTM algorithm of deep learning. Although it cannot be proved by the Diebold–Mariano test that the prediction accuracy of random forest regression is significantly better than that of LSTM, the prediction errors RMSE and MAPE of random forest regression are better than those of LSTM. The changes in the variables that determine the price of Bitcoin in each period are also obtained through random forest regression. From 2015 to 2018, three US stock market indexes, NASDAQ, DJI, and S&P500 and oil price, and ETH price have impact on Bitcoin prices. Since 2018, the important variables have become ETH price and Japanese stock market index JP225. The relationship between accuracy and the number of periods of explanatory variables brought into the model shows that for predicting the price of Bitcoin for the next day, the model with only one lag of the explanatory variables has the best prediction accuracy. Full article
(This article belongs to the Special Issue Commodity Market Finance)
Show Figures

Figure 1

Figure 1
<p>Parameters and framework of random forest regression.</p>
Full article ">Figure 2
<p>Parameters and framework of LSTM.</p>
Full article ">Figure 3
<p>Training and validation loss of LSTM.</p>
Full article ">Figure 4
<p>Correlation heatmap of explanatory variables.</p>
Full article ">Figure 5
<p>Google Trend, daily Tweets, and Bitcoin price chart.</p>
Full article ">Figure 6
<p>Interval division of training samples and test samples.</p>
Full article ">Figure 7
<p>Model employed in this study.</p>
Full article ">Figure 8
<p>Predicted price based on random forest regression and actual price comparison.</p>
Full article ">Figure 9
<p>Explanatory variable importance ranks using random forest regression.</p>
Full article ">Figure 9 Cont.
<p>Explanatory variable importance ranks using random forest regression.</p>
Full article ">Figure 10
<p>RMSE after removing the most important variable.</p>
Full article ">Figure 11
<p>RFR results by all variables and only important variables.</p>
Full article ">Figure 12
<p>Comparison of the true price of Bitcoin and predicted price based on different models. (LSTM).</p>
Full article ">Figure 12 Cont.
<p>Comparison of the true price of Bitcoin and predicted price based on different models. (LSTM).</p>
Full article ">Figure 13
<p>Relationship between MAPE and the number of lags (random forest regression).</p>
Full article ">Figure 14
<p>Relationship between accuracy and the number of lags (LSTM).</p>
Full article ">
20 pages, 4465 KiB  
Article
COVID-19 Pandemic & Financial Market Volatility; Evidence from GARCH Models
by Maaz Khan, Umar Nawaz Kayani, Mrestyal Khan, Khurrum Shahzad Mughal and Mohammad Haseeb
J. Risk Financial Manag. 2023, 16(1), 50; https://doi.org/10.3390/jrfm16010050 - 13 Jan 2023
Cited by 28 | Viewed by 7073
Abstract
Across the globe, COVID-19 has disrupted the financial markets, making them more volatile. Thus, this paper examines the market volatility and asymmetric behavior of Bitcoin, EUR, S&P 500 index, Gold, Crude Oil, and Sugar during the COVID-19 pandemic. We applied the GARCH (1, [...] Read more.
Across the globe, COVID-19 has disrupted the financial markets, making them more volatile. Thus, this paper examines the market volatility and asymmetric behavior of Bitcoin, EUR, S&P 500 index, Gold, Crude Oil, and Sugar during the COVID-19 pandemic. We applied the GARCH (1, 1), GJR-GARCH (1, 1), and EGARCH (1, 1) econometric models on the daily time series returns data ranging from 27 November 2018 to 15 June 2021. The empirical findings show a high level of volatility persistence in all the financial markets during the COVID-19 pandemic. Moreover, the Crude Oil and S&P 500 index shows significant positive asymmetric behavior during the pandemic. Apart from this, the results also reveal that EGARCH is the most appropriate model to capture the volatilities of the financial markets before the COVID-19 pandemic, whereas during the COVID-19 period and for the whole period, each GARCH family evenly models the volatile behavior of the six financial markets. This study provides financial investors and policymakers with useful insight into adopting effective strategies for constructing portfolios during crises in the future. Full article
Show Figures

Figure 1

Figure 1
<p>Price trends in the financial markets over the period of 27 November 2018 to 15 June 2021.</p>
Full article ">Figure 2
<p>Returns fluctuations in the financial markets over the period of 27 November 2018 to 15 June 2021.</p>
Full article ">Figure A1
<p>Volatility in Bitcoin Time Series.</p>
Full article ">Figure A2
<p>Volatility in EUR time series.</p>
Full article ">Figure A3
<p>Volatility in S&amp;P 500 time series.</p>
Full article ">Figure A4
<p>Volatility in Gold time series.</p>
Full article ">Figure A5
<p>Volatility in Crude Oil time series.</p>
Full article ">Figure A6
<p>Volatility in Sugar time series.</p>
Full article ">
15 pages, 2880 KiB  
Article
On the Risk Spillover from Bitcoin to Altcoins: The Fear of Missing Out and Pump-and-Dump Scheme Effects
by Mehmet Balcilar and Huseyin Ozdemir
J. Risk Financial Manag. 2023, 16(1), 41; https://doi.org/10.3390/jrfm16010041 - 9 Jan 2023
Cited by 6 | Viewed by 3661
Abstract
This article examines the asymmetric volatility spillover effects between Bitcoin and alternative coin markets at the disaggregate level. We apply a frequency connectedness approach to the daily data of 11 major cryptocurrencies for the period from 1 September 2017 to 2 March 2022. [...] Read more.
This article examines the asymmetric volatility spillover effects between Bitcoin and alternative coin markets at the disaggregate level. We apply a frequency connectedness approach to the daily data of 11 major cryptocurrencies for the period from 1 September 2017 to 2 March 2022. We try to uncover the existence of the “fear of missing out” psychological effect and “pump-and-dump schemes” in the crypto markets. To do that, we estimate the volatility spillovers from Bitcoin to altcoin and the cryptos’ own risk spillovers during bull and bear markets. The spillover results from Bitcoin to altcoin provide mixed results regarding the presence of this theory for major cryptocurrencies. However, the empirical findings carried out by the cryptos’ own spillover effects fully confirm the existence of a fear-of-missing-out effect and pump-and-dump schemes in all cryptocurrencies except for USDT. Full article
(This article belongs to the Special Issue Commodity Market Finance)
Show Figures

Figure 1

Figure 1
<p>The plot of cryptocurrency volatility series.</p>
Full article ">Figure 2
<p>Correlation heat map.</p>
Full article ">Figure 3
<p>Short- and long-term volatility spillover from Bitcoin to altcoins during bear and bull market conditions. Note: The horizontal axis denotes the frequency in days, while the vertical axis denotes cumulative spillover index. The <named-content content-type="color:red">red</named-content> and <named-content content-type="color:#4472C4">blue</named-content> line shows the volatility spillover from Bitcoin to altcoins when bitcoin returns are <named-content content-type="color:red">negative</named-content> (bear market condition) and <named-content content-type="color:#4472C4">positive</named-content> (bull market condition), respectively.</p>
Full article ">Figure A1
<p>Short- and long-term volatility spillover from altcoins to themselves. Note: See note to <xref ref-type="fig" rid="jrfm-16-00041-f003">Figure 3</xref>.</p>
Full article ">Figure A2
<p>Short- and long-term volatility spillover from Bitcoin to altcoins during pre- and post-COVID-19 period. Note: The horizontal axis denotes the frequency in days, while the vertical axis denotes cumulative spillover index. The <named-content content-type="color:red">red</named-content> and <named-content content-type="color:#4472C4">blue</named-content> line shows the volatility spillover from Bitcoin to altcoins during <named-content content-type="color:red">pre-COVID-19</named-content> and <named-content content-type="color:#4472C4">post-COVID-19</named-content> period, respectively.</p>
Full article ">
122 pages, 1505 KiB  
Systematic Review
Sybil in the Haystack: A Comprehensive Review of Blockchain Consensus Mechanisms in Search of Strong Sybil Attack Resistance
by Moritz Platt and Peter McBurney
Algorithms 2023, 16(1), 34; https://doi.org/10.3390/a16010034 - 6 Jan 2023
Cited by 17 | Viewed by 13080
Abstract
Consensus algorithms are applied in the context of distributed computer systems to improve their fault tolerance. The explosive development of distributed ledger technology following the proposal of ‘Bitcoin’ led to a sharp increase in research activity in this area. Specifically, public and permissionless [...] Read more.
Consensus algorithms are applied in the context of distributed computer systems to improve their fault tolerance. The explosive development of distributed ledger technology following the proposal of ‘Bitcoin’ led to a sharp increase in research activity in this area. Specifically, public and permissionless networks require robust leader selection strategies resistant to Sybil attacks in which malicious attackers present bogus identities to induce byzantine faults. Our goal is to analyse the entire breadth of works in this area systematically, thereby uncovering trends and research directions regarding Sybil attack resistance in today’s blockchain systems to benefit the designs of the future. Through a systematic literature review, we condense an immense set of research records (N = 21,799) to a relevant subset (N = 483). We categorise these mechanisms by their Sybil attack resistance characteristics, leader selection methodology, and incentive scheme. Mechanisms with strong Sybil attack resistance commonly adopt the principles underlying ‘Proof-of-Work’ or ‘Proof-of-Stake’ while mechanisms with limited resistance often use reputation systems or physical world linking. We find that only a few fundamental paradigms exist that can resist Sybil attacks in a permissionless setting but discover numerous innovative mechanisms that can deliver weaker protection in system scenarios with smaller attack surfaces. Full article
(This article belongs to the Section Analysis of Algorithms and Complexity Theory)
Show Figures

Figure 1

Figure 1
<p>A total of 21,799 records—many of which were duplicates—were obtained from scientific search engines. During the manuscript screening process, 12,790 scientific manuscripts were initially analysed. After de-duplication and analysis of the abstracts and manuscript contents, 483 were found relevant for this study.</p>
Full article ">
14 pages, 772 KiB  
Review
A Systematic Literature Review of Empirical Research on Stablecoins
by Lennart Ante, Ingo Fiedler, Jan Marius Willruth and Fred Steinmetz
FinTech 2023, 2(1), 34-47; https://doi.org/10.3390/fintech2010003 - 5 Jan 2023
Cited by 11 | Viewed by 6906
Abstract
This study reviews the current state of empirical literature on stablecoins. Based on a sample of 22 peer-reviewed articles, we analyze statistical approaches, data sources, variables, and metrics, as well as stablecoin types investigated and future research avenues. The analysis reveals three major [...] Read more.
This study reviews the current state of empirical literature on stablecoins. Based on a sample of 22 peer-reviewed articles, we analyze statistical approaches, data sources, variables, and metrics, as well as stablecoin types investigated and future research avenues. The analysis reveals three major clusters: (1) studies on the stability or volatility of different stablecoins, their designs, and safe-haven-properties, (2) the interrelations of stablecoins with other crypto assets and markets, specifically Bitcoin, and (3) the relationship of stablecoins with (non-crypto) macroeconomic factors. Based on our analysis, we note future research should explore diverse methodological approaches, data sources, different stablecoins, or more granular datasets and identify five topics we consider most significant and promising: (1) the use of stablecoins in emerging markets, (2) the effect of stablecoins on the stability of currencies, (3) analyses of stablecoin users, (4) adoption and use cases of stablecoins outside of crypto markets, and (5) algorithmic stablecoins. Full article
Show Figures

Figure 1

Figure 1
<p>Sample identification process.</p>
Full article ">Figure 2
<p>Monthly time frames analyzed by the empirical literature on stablecoins by cluster.</p>
Full article ">
11 pages, 612 KiB  
Hypothesis
Lackluster Adoption of Cryptocurrencies as a Consumer Payment Method in the United States—Hypothesis: Is This Independent Technology in Need of a Brand, and What Kind?
by Luke Kowalski, William Green, Simon Lilley and Nikiforos Panourgias
J. Risk Financial Manag. 2023, 16(1), 23; https://doi.org/10.3390/jrfm16010023 - 30 Dec 2022
Cited by 4 | Viewed by 3184
Abstract
Cryptocurrencies were supposed to replace traditional payment methods when they were invented over 13 years ago, but adoption by the general consumer is still lacking, at least in the United States. Instead, crypto is often used as a speculative investment, by illicit actors, [...] Read more.
Cryptocurrencies were supposed to replace traditional payment methods when they were invented over 13 years ago, but adoption by the general consumer is still lacking, at least in the United States. Instead, crypto is often used as a speculative investment, by illicit actors, or for use cases unrelated to everyday purchases. A literature review on general adoption barriers and interviews with experts has only unearthed factors like usability, performance, and political drivers, among other barriers. Brand as an adoption barrier is mostly missing from literature, at least for cryptocurrencies. This led to the formation of a hypothesis related to crypto’s lack of adoption as a payment method. A framework is being designed based on the technology adoption model to find out if “brand” has an impact on cryptocurrency adoption, which was paradoxically designed to be brandless and not needing any institutional trust. The intent is to focus on what “Bitcoin 2.0” might look like, and to also delve further and gauge perceptions about various types of brands getting involved in the next generation of cryptocurrencies, including traditional banks, governments, technology companies, and also some of the decentralized and hybrid consortia currently vying to get consumers to use stablecoins, nation-issued cryptocurrencies, and other forms of digital instruments. While other studies had focused on trust, early adopter usability, or performance of blockchain networks, this work intends to focus on the general consumer’s perceptions about digital money, and the types of brands and evolution of this instrument liable to increase uptake. Full article
(This article belongs to the Special Issue Blockchain Technologies and Cryptocurrencies​)
Show Figures

Figure 1

Figure 1
<p>Anna Morgan-Thomas and Cleopatra Veloursou’s integrative model of the online brand experience, where the emotive aspects supplement the traditional drivers of technology acceptance.</p>
Full article ">Figure 2
<p>Model of Hypotheses.</p>
Full article ">
24 pages, 1669 KiB  
Article
Are COVID-19-Related Economic Supports One of the Drivers of Surge in Bitcoin Market? Evidence from Linear and Non-Linear Causality Tests
by Mustafa Özer, Serap Kamisli, Fatih Temizel and Melik Kamisli
Mathematics 2023, 11(1), 196; https://doi.org/10.3390/math11010196 - 30 Dec 2022
Viewed by 2195
Abstract
The aim of this study was to investigate the causal relations between COVID-19 economic supports and Bitcoin markets. For this purpose, we first determined the degree of the integration of variables by implementing Fourier Augmented Dickey–Fuller unit root tests. Then, we carried out [...] Read more.
The aim of this study was to investigate the causal relations between COVID-19 economic supports and Bitcoin markets. For this purpose, we first determined the degree of the integration of variables by implementing Fourier Augmented Dickey–Fuller unit root tests. Then, we carried out both linear (Bootstrap Toda–Yamamoto) and non-linear (Fractional Frequency Flexible Fourier form Toda–Yamamoto) causality tests to consider the nonlinearities in variables, to determine if the effects of multiple structural breaks were temporary or permanent, and to evaluate the unidirectional causality running from COVID-19-related economic supports and the price, volatility, and trading volume of Bitcoin. Our study included 158 countries, and we used daily data over the period from 1 January 2020 and 10 March 2022. The findings of this study provide evidence of unidirectional causalities running from COVID-19-related economic supports to the price, volatility, and trading volume of Bitcoin in most of the countries in the sample. The application of non-linear causality tests helped us obtain more evidence about these causalities. Some of these causalities were found to be permanent, and some of them were found to be temporary. The results of the study indicate that COVID-19-related economic supports can be considered a major driver of the surge in the Bitcoin market during the pandemic. Full article
(This article belongs to the Special Issue Complex Network Analysis of Nonlinear Time Series)
Show Figures

Figure 1

Figure 1
<p>The ratio of COVID-19-related economic supports to GDP (%). Source: Authors’ calculations based on IMF Database of Fiscal Policy Responses To COVID-19. <a href="https://www.imf.org/en/Topics/imf-and-covid19/Fiscal-Policies-Database-in-Response-to-COVID-19" target="_blank">https://www.imf.org/en/Topics/imf-and-covid19/Fiscal-Policies-Database-in-Response-to-COVID-19</a> (accessed on 1 October 2022).</p>
Full article ">Figure 2
<p>Income support during the COVID-19 pandemic. Source: Authors’ calculations based on the OxCGRT. <a href="https://ourworldindata.org/covid-income-support-debt-relief" target="_blank">https://ourworldindata.org/covid-income-support-debt-relief</a> (accessed on 15 April 2022).</p>
Full article ">Figure 3
<p>Debt or contract relief during the COVID-19 pandemic. Source: Authors’ calculations based on the OxCGRT. <a href="https://ourworldindata.org/covid-income-support-debt-relief" target="_blank">https://ourworldindata.org/covid-income-support-debt-relief</a> (accessed on 15 April 2022).</p>
Full article ">Figure 4
<p>Total cryptocurrency market capitalization and 24th Volume. Source: <a href="https://coinmarketcap.com/charts/" target="_blank">https://coinmarketcap.com/charts/</a> (accessed on 20 April 2022).</p>
Full article ">
11 pages, 1983 KiB  
Communication
Effective Selfish Mining Defense Strategies to Improve Bitcoin Dependability
by Chencheng Zhou, Liudong Xing, Qisi Liu and Honggang Wang
Appl. Sci. 2023, 13(1), 422; https://doi.org/10.3390/app13010422 - 29 Dec 2022
Cited by 6 | Viewed by 2503
Abstract
Selfish mining is a typical malicious attack targeting the blockchain-based bitcoin system, an emerging crypto asset. Because of the non-incentive compatibility of the bitcoin mining protocol, the attackers are able to collect unfair mining rewards by intentionally withholding blocks. The existing works on [...] Read more.
Selfish mining is a typical malicious attack targeting the blockchain-based bitcoin system, an emerging crypto asset. Because of the non-incentive compatibility of the bitcoin mining protocol, the attackers are able to collect unfair mining rewards by intentionally withholding blocks. The existing works on selfish mining mostly focused on cryptography design, and malicious behavior detection based on different approaches, such as machine learning or timestamp. Most defense strategies show their effectiveness in the perspective of reward reduced. No work has been performed to design a defense strategy that aims to improve bitcoin dependability and provide a framework for quantitively evaluating the improvement. In this paper, we contribute by proposing two network-wide defensive strategies: the dynamic difficulty adjustment algorithm (DDAA) and the acceptance limitation policy (ALP). The DDAA increases the mining difficulty dynamically once a selfish mining behavior is detected, while the ALP incorporates a limitation to the acceptance rate when multiple blocks are broadcast at the same time. Both strategies are designed to disincentivize dishonest selfish miners and increase the system’s resilience to the selfish mining attack. A continuous-time Markov chain model is used to quantify the improvement in bitcoin dependability made by the proposed defense strategies. Statistical analysis is applied to evaluate the feasibility of the proposed strategies. The proposed DDAA and ALP methods are also compared to an existing timestamp-based defense strategy, revealing that the DDAA is the most effective in improving bitcoin’s dependability. Full article
Show Figures

Figure 1

Figure 1
<p>State transition diagram (0: initial state, 0′: double branches, 1: one-block lead, 2: two-block lead, 3: three-block lead, and 4: attack success).</p>
Full article ">Figure 2
<p>Bitcoin dependability before and after the application of the DDAA under sets <span class="html-italic">a</span> and <span class="html-italic">a</span>′.</p>
Full article ">Figure 3
<p>Bitcoin dependability before and after application of the DDAA under sets <span class="html-italic">b</span> and <span class="html-italic">b</span>′.</p>
Full article ">Figure 4
<p>Bitcoin dependability before and after application of the DDAA under sets <span class="html-italic">c</span> and <span class="html-italic">c</span>′.</p>
Full article ">Figure 5
<p><span class="html-italic">p</span>-value results when <span class="html-italic">β</span> varies from 1.1 to 1.6 under the DDAA.</p>
Full article ">Figure 6
<p>Bitcoin dependability before and after the application of the ALP.</p>
Full article ">Figure 7
<p><span class="html-italic">p</span>-value results when <span class="html-italic">γ</span> varies from 0.6 to 0.9 under the ALP.</p>
Full article ">Figure 8
<p>Bitcoin dependability under the DDAA, ALP, and TM.</p>
Full article ">
32 pages, 6073 KiB  
Review
AI-Powered Blockchain Technology for Public Health: A Contemporary Review, Open Challenges, and Future Research Directions
by Ritik Kumar, Arjunaditya, Divyangi Singh, Kathiravan Srinivasan and Yuh-Chung Hu
Healthcare 2023, 11(1), 81; https://doi.org/10.3390/healthcare11010081 - 27 Dec 2022
Cited by 18 | Viewed by 7996
Abstract
Blockchain technology has been growing at a substantial growth rate over the last decade. Introduced as the backbone of cryptocurrencies such as Bitcoin, it soon found its application in other fields because of its security and privacy features. Blockchain has been used in [...] Read more.
Blockchain technology has been growing at a substantial growth rate over the last decade. Introduced as the backbone of cryptocurrencies such as Bitcoin, it soon found its application in other fields because of its security and privacy features. Blockchain has been used in the healthcare industry for several purposes including secure data logging, transactions, and maintenance using smart contracts. Great work has been carried out to make blockchain smart, with the integration of Artificial Intelligence (AI) to combine the best features of the two technologies. This review incorporates the conceptual and functional aspects of the individual technologies and innovations in the domains of blockchain and artificial intelligence and lays down a strong foundational understanding of the domains individually and also rigorously discusses the various ways AI has been used along with blockchain to power the healthcare industry including areas of great importance such as electronic health record (EHR) management, distant-patient monitoring and telemedicine, genomics, drug research, and testing, specialized imaging and outbreak prediction. It compiles various algorithms from supervised and unsupervised machine learning problems along with deep learning algorithms such as convolutional/recurrent neural networks and numerous platforms currently being used in AI-powered blockchain systems and discusses their applications. The review also presents the challenges still faced by these systems which they inherit from the AI and blockchain algorithms used at the core of them and the scope of future work. Full article
(This article belongs to the Section Healthcare Quality and Patient Safety)
Show Figures

Figure 1

Figure 1
<p>Artificial Intelligence—Nomenclature.</p>
Full article ">Figure 2
<p>AI and blockchain relationship.</p>
Full article ">Figure 3
<p>PRISMA flow diagram for the selection process of the research articles used in this review.</p>
Full article ">Figure 4
<p>Time graph—number and year of publications studied in this review.</p>
Full article ">Figure 5
<p>Block diagram representing the structure of this review.</p>
Full article ">Figure 6
<p>Blockchain layered structure.</p>
Full article ">Figure 7
<p>Blocks are linked together in a blockchain using a cryptographic hash. x is an arbitary block, x + 1 is a suceeding block and so on.</p>
Full article ">Figure 8
<p>Utilities of AI in public health.</p>
Full article ">Figure 9
<p>Concept of an artificial neural network for healthcare.</p>
Full article ">Figure 10
<p>Algorithm implementing coupled K-means Clustering and Naive Bayes Algorithm.</p>
Full article ">Figure 11
<p>Theoretical representation of a Deep Recurrent Neural Network.</p>
Full article ">Figure 12
<p>Theoretical representation of a Deep Belief Network.</p>
Full article ">Figure 13
<p>Basic structure of a Deep Convolutional Neural Network.</p>
Full article ">Figure 14
<p>Illustration of a system where a provider adds an EHR for new patients using blockchain.</p>
Full article ">Figure 15
<p>Data processing model of EHRs for remote monitoring.</p>
Full article ">Figure 16
<p>The basic structure of MIStore. Arrows represent the flow of data while the numbers represent the sequence of the processes.</p>
Full article ">Figure 17
<p>Open challenges in using AI-powered Blockchain for public health.</p>
Full article ">Figure 18
<p>Future research directions for AI-powered Blockchain in public health.</p>
Full article ">
30 pages, 2945 KiB  
Review
Blockchain-Based Internet of Things: Review, Current Trends, Applications, and Future Challenges
by Tanweer Alam
Computers 2023, 12(1), 6; https://doi.org/10.3390/computers12010006 - 26 Dec 2022
Cited by 16 | Viewed by 11251
Abstract
Advances in technology always had an impact on our lives. Several emerging technologies, most notably the Internet of Things (IoT) and blockchain, present transformative opportunities. The blockchain is a decentralized, transparent ledger for storing transaction data. By effectively establishing trust between nodes, it [...] Read more.
Advances in technology always had an impact on our lives. Several emerging technologies, most notably the Internet of Things (IoT) and blockchain, present transformative opportunities. The blockchain is a decentralized, transparent ledger for storing transaction data. By effectively establishing trust between nodes, it has the remarkable potential to design unique architectures for most enterprise applications. When it first appeared as a platform for anonymous cryptocurrency trading, such as Bitcoin, on a public network platform, blockchain piqued the interest of researchers. The chain is completed when each block connects to the previous block. The Internet of Things (IoT) is a network of networked devices that can exchange data and be managed and controlled via unique identifiers. Automation, wireless sensor networks, embedded systems, and control systems are just a few of the well-known technologies that power the IoT. Converging advancements in real-time analytics, machine learning, commodity sensors, and embedded systems demonstrate the rapid expansion of the IoT paradigm. The Internet of Things refers to the global networking of millions of networked smart gadgets that gather and exchange data. Integrating the IoT and blockchain technology would be a significant step toward developing a reliable, secure, and comprehensive method of storing data collected by smart devices. Internet-enabled devices in the IoT can send data to private blockchain networks, creating immutable records of all transaction history. As a result, these networks produce unchangeable logs of all transactions. This research looks at how blockchain technology and the Internet of Things interact to understand better how devices can communicate with one another. The blockchain-enabled Internet of Things architecture proposed in this article is a useful framework for integrating blockchain technology and the Internet of Things using the most cutting-edge tools and methods currently available. This article discusses the principles of blockchain-based IoT, consensus methods, reviews, difficulties, prospects, applications, trends, and communication between IoT nodes in an integrated framework. Full article
Show Figures

Figure 1

Figure 1
<p>Blockchain process to send data between devices.</p>
Full article ">Figure 2
<p>Blocks in blockchain.</p>
Full article ">Figure 3
<p>Blockchain structure.</p>
Full article ">Figure 4
<p>Digital signature process.</p>
Full article ">Figure 5
<p>Smart contract.</p>
Full article ">Figure 6
<p>Blockchain layered architecture.</p>
Full article ">Figure 7
<p>Blockchain–IoT opportunities.</p>
Full article ">Figure 8
<p>Blockchain–IoT challenges.</p>
Full article ">
25 pages, 3347 KiB  
Systematic Review
Portfolio Diversification, Hedge and Safe-Haven Properties in Cryptocurrency Investments and Financial Economics: A Systematic Literature Review
by José Almeida and Tiago Cruz Gonçalves
J. Risk Financial Manag. 2023, 16(1), 3; https://doi.org/10.3390/jrfm16010003 - 21 Dec 2022
Cited by 26 | Viewed by 6778
Abstract
Our study collected and synthetized the existing knowledge on portfolio diversification, hedge, and safe-haven properties in cryptocurrency investments. We sampled 146 studies published in journals ranked in the Association of Business Schools 2021 journals list, considering all fields of knowledge, and elaborated a [...] Read more.
Our study collected and synthetized the existing knowledge on portfolio diversification, hedge, and safe-haven properties in cryptocurrency investments. We sampled 146 studies published in journals ranked in the Association of Business Schools 2021 journals list, considering all fields of knowledge, and elaborated a systematic literature review along with a bibliometric analysis. Our results indicate a fast-growing literature evidencing cryptocurrencies’ ability to hedge against stocks, fiat currencies, geopolitical risks, and Economic Policy Uncertainty (EPU) risk; also, that cryptocurrencies present diversification and safe-haven properties; that stablecoins reveal unstable peg with the US dollar; that uncertainty is a determinant for cryptocurrency returns. Additionally, we show that investors should consider Gold, along with the European carbon market, CBOE Bitcoin futures, and crude oil to hedge against unexpected movements in the cryptocurrency market. Full article
Show Figures

Figure 1

Figure 1
<p>Citations and publications over time.</p>
Full article ">Figure 2
<p>Normalized citations of authors by year.</p>
Full article ">Figure 3
<p>Normalized citations of institutions by year.</p>
Full article ">Figure 4
<p>Most productive research areas.</p>
Full article ">Figure 5
<p>Normalized citations of journals by year.</p>
Full article ">Figure 6
<p>Publications by country world map.</p>
Full article ">Figure 7
<p>Normalized citations of countries by year.</p>
Full article ">
33 pages, 1202 KiB  
Article
Toward Trusted IoT by General Proof-of-Work
by Chih-Wen Hsueh and Chi-Ting Chin
Sensors 2023, 23(1), 15; https://doi.org/10.3390/s23010015 - 20 Dec 2022
Cited by 1 | Viewed by 1703
Abstract
Internet of Things (IoT) is used to describe devices with sensors that connect and exchange data with other devices or systems on the Internet or other communication networks. Actually, the data not only represent the concrete things connected but also describe the abstract [...] Read more.
Internet of Things (IoT) is used to describe devices with sensors that connect and exchange data with other devices or systems on the Internet or other communication networks. Actually, the data not only represent the concrete things connected but also describe the abstract matters related. Therefore, it is expected to support trust on IoT since blockchain was invented so that trusted IoT could be possible or, recently, even metaverse could be imaginable. However, IoT systems are usually composed of a lot of device nodes with limited computing power. The built-in unsolved performance and energy-consumption problems in blockchain become more critical in IoT. The other problems such as finality, privacy, or scalability introduce even more complexity so that trusted IoT is still far from realization, let alone the metaverse. With general Proof of Work (GPoW), the energy consumption of Bitcoin can be reduced to less than 1 billionth and proof of PowerTimestamp (PoPT) can be constructed so that a global even ordering can be reached to conduct synchronization on distributed systems in real-time. Therefore, trusted IoT is possible. We reintroduce GPoW with more mathematic proofs so that PoPT can be optimal and describe how PoPT can be realized with simulation results, mining examples and synchronization scenario toward trusted IoT. Full article
(This article belongs to the Special Issue Blockchain for IoT Security, Privacy and Intelligence)
Show Figures

Figure 1

Figure 1
<p>Network architecture for blockchain-based IoT.</p>
Full article ">Figure 2
<p>Mining by proof-of-work.</p>
Full article ">Figure 3
<p>Mining flow of conservative GPoW model.</p>
Full article ">Figure 4
<p>Mining flow of aggressive GPoW model.</p>
Full article ">Figure 5
<p>CDF is the CDF of conservative GPoW, <math display="inline"><semantics> <mrow> <msubsup> <mo>∑</mo> <mrow> <mi>i</mi> <mo>=</mo> <mi>m</mi> </mrow> <mi>n</mi> </msubsup> <mfenced separators="" open="(" close=")"> <mfrac linethickness="0pt"> <mrow> <mi>i</mi> <mo>−</mo> <mn>1</mn> </mrow> <mrow> <mi>m</mi> <mo>−</mo> <mn>1</mn> </mrow> </mfrac> </mfenced> <msup> <mi>u</mi> <mi>m</mi> </msup> <msup> <mrow> <mo>(</mo> <mn>1</mn> <mo>−</mo> <mi>u</mi> <mo stretchy="false">)</mo> </mrow> <mrow> <mi>i</mi> <mo>−</mo> <mi>m</mi> </mrow> </msup> </mrow> </semantics></math>, and aggressive GPoW, <math display="inline"><semantics> <mrow> <msubsup> <mo>∑</mo> <mrow> <mi>i</mi> <mo>=</mo> <mi>m</mi> </mrow> <mi>n</mi> </msubsup> <mfenced separators="" open="(" close=")"> <mfrac linethickness="0pt"> <mi>n</mi> <mi>i</mi> </mfrac> </mfenced> <msup> <mi>u</mi> <mi>i</mi> </msup> <msup> <mrow> <mo>(</mo> <mn>1</mn> <mo>−</mo> <mi>u</mi> <mo stretchy="false">)</mo> </mrow> <mrow> <mi>n</mi> <mo>−</mo> <mi>i</mi> </mrow> </msup> </mrow> </semantics></math>, overlapped, <span class="html-italic">n</span> = 50, <span class="html-italic">m</span> = 2. Conservative = <math display="inline"><semantics> <mrow> <msubsup> <mo>∑</mo> <mrow> <mi>i</mi> <mo>=</mo> <mi>m</mi> </mrow> <mrow> <mi>m</mi> <mo>+</mo> <mn>3</mn> </mrow> </msubsup> <mfenced separators="" open="(" close=")"> <mfrac linethickness="0pt"> <mrow> <mi>i</mi> <mo>−</mo> <mn>1</mn> </mrow> <mrow> <mi>m</mi> <mo>−</mo> <mn>1</mn> </mrow> </mfrac> </mfenced> <msup> <mi>u</mi> <mi>m</mi> </msup> <msup> <mrow> <mo>(</mo> <mn>1</mn> <mo>−</mo> <mi>u</mi> <mo stretchy="false">)</mo> </mrow> <mrow> <mi>i</mi> <mo>−</mo> <mi>m</mi> </mrow> </msup> </mrow> </semantics></math> and Aggressive = <math display="inline"><semantics> <mrow> <msubsup> <mo>∑</mo> <mrow> <mi>i</mi> <mo>=</mo> <mi>m</mi> </mrow> <mrow> <mi>m</mi> <mo>+</mo> <mn>3</mn> </mrow> </msubsup> <mfenced separators="" open="(" close=")"> <mfrac linethickness="0pt"> <mi>n</mi> <mi>i</mi> </mfrac> </mfenced> <msup> <mrow> <mo>(</mo> <mi>x</mi> <mo stretchy="false">)</mo> </mrow> <mi>i</mi> </msup> <msup> <mrow> <mo>(</mo> <mn>1</mn> <mo>−</mo> <mi>x</mi> <mo stretchy="false">)</mo> </mrow> <mrow> <mi>n</mi> <mo>−</mo> <mi>i</mi> </mrow> </msup> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>Formula of trust.</p>
Full article ">Figure 7
<p>CDF is the CDF of conservative GPoW, <math display="inline"><semantics> <mrow> <msubsup> <mo>∑</mo> <mrow> <mi>i</mi> <mo>=</mo> <mi>m</mi> </mrow> <mi>n</mi> </msubsup> <mfenced separators="" open="(" close=")"> <mfrac linethickness="0pt"> <mrow> <mi>i</mi> <mo>−</mo> <mn>1</mn> </mrow> <mrow> <mi>m</mi> <mo>−</mo> <mn>1</mn> </mrow> </mfrac> </mfenced> <msup> <mi>u</mi> <mi>m</mi> </msup> <msup> <mrow> <mo>(</mo> <mn>1</mn> <mo>−</mo> <mi>u</mi> <mo stretchy="false">)</mo> </mrow> <mrow> <mi>i</mi> <mo>−</mo> <mi>m</mi> </mrow> </msup> </mrow> </semantics></math>, and aggressive GPoW, <math display="inline"><semantics> <mrow> <msubsup> <mo>∑</mo> <mrow> <mi>i</mi> <mo>=</mo> <mi>m</mi> </mrow> <mi>n</mi> </msubsup> <mfenced separators="" open="(" close=")"> <mfrac linethickness="0pt"> <mi>n</mi> <mi>i</mi> </mfrac> </mfenced> <msup> <mi>u</mi> <mi>i</mi> </msup> <msup> <mrow> <mo>(</mo> <mn>1</mn> <mo>−</mo> <mi>u</mi> <mo stretchy="false">)</mo> </mrow> <mrow> <mi>n</mi> <mo>−</mo> <mi>i</mi> </mrow> </msup> </mrow> </semantics></math>, overlapped, <span class="html-italic">n</span> = 50. Conservative = <math display="inline"><semantics> <mrow> <mfenced separators="" open="(" close=")"> <mfrac linethickness="0pt"> <mrow> <mi>i</mi> <mo>−</mo> <mn>1</mn> </mrow> <mrow> <mi>m</mi> <mo>−</mo> <mn>1</mn> </mrow> </mfrac> </mfenced> <msup> <mi>u</mi> <mi>m</mi> </msup> <msup> <mrow> <mo>(</mo> <mn>1</mn> <mo>−</mo> <mi>u</mi> <mo stretchy="false">)</mo> </mrow> <mrow> <mi>i</mi> <mo>−</mo> <mi>m</mi> </mrow> </msup> </mrow> </semantics></math> and Aggressive = <math display="inline"><semantics> <mrow> <mfenced separators="" open="(" close=")"> <mfrac linethickness="0pt"> <mi>n</mi> <mi>i</mi> </mfrac> </mfenced> <msup> <mrow> <mo>(</mo> <mi>x</mi> <mo stretchy="false">)</mo> </mrow> <mi>i</mi> </msup> <msup> <mrow> <mo>(</mo> <mn>1</mn> <mo>−</mo> <mi>x</mi> <mo stretchy="false">)</mo> </mrow> <mrow> <mi>n</mi> <mo>−</mo> <mi>i</mi> </mrow> </msup> </mrow> </semantics></math> are the components of CDF, respectively. X axis is target. Y axis is CDF.</p>
Full article ">Figure 8
<p>GPoW mining with partitions of the same parent.</p>
Full article ">Figure 9
<p>GPoW mining with all in one partition.</p>
Full article ">Figure 10
<p>GPoW mining with 2-block epoch.</p>
Full article ">Figure 11
<p>Liquidity saving transactions in blockchain.</p>
Full article ">
Back to TopTop