• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Analyzing the Impact of Blockchain Models for Securing Intelligent Logistics through Unified Computational Techniques

    2024-01-12 03:48:24MohammedAlsaqerMajidAlsulamiRamiAlkhawajiandAbdulellahAlaboudi
    Computers Materials&Continua 2023年12期

    Mohammed S.Alsaqer ,Majid H.Alsulami ,Rami N.Alkhawaji and Abdulellah A.Alaboudi

    1College of Computer Science,King Khalid University,Abha,62529,Saudi Arabia

    2Applied College,Shaqra University,Shaqra,11961,Saudi Arabia

    3University College of Umluj,University of Tabuk,Umluj,48335,Saudi Arabia

    ABSTRACT Blockchain technology has revolutionized conventional trade.The success of blockchain can be attributed to its distributed ledger characteristic,which secures every record inside the ledger using cryptography rules,making it more reliable,secure,and tamper-proof.This is evident by the significant impact that the use of this technology has had on people connected to digital spaces in the present-day context.Furthermore,it has been proven that blockchain technology is evolving from new perspectives and that it provides an effective mechanism for the intelligent transportation system infrastructure.To realize the full potential of the accurate and efficacious use of blockchain in the transportation sector,it is essential to understand the most effective mechanisms of this technology and identify the most useful one.As a result,the present work offers a priority-based methodology that would be a useful reference for security experts in managing blockchain technology and its models.The study uses the hesitant fuzzy analytical hierarchy process for prioritizing the different blockchain models.Based on the findings of actual performance,alternative solution A1 which is Private Blockchain model has an extremely high level of security satisfaction.The accuracy of the results has been tested using the hesitant fuzzy technique for order of preference by similarity to the ideal solution procedure.The study also uses guidelines from security researchers working in this domain.

    KEYWORDS Intelligent transportation system;security engineering;smart systems;decision making

    1 Introduction

    Digital solutions play a critical role in changing the world in several industries.They can improve efficiency and productivity by providing services to be available at any time and from anywhere.The revolution of technology has come up with emerging technologies such as blockchain,cloud computing,the Internet of Things,Artificial Intelligence,etc.These emerging technologies can play a significant impact on different sectors[1].

    Blockchain technology uses a decentralized mechanism that allows data to be secured while ensuring that their integrity is not breached[2].Every data transaction operated through blockchain technology has a verified copy and history within the blocks,making it a more secure and wellmanaged technology [3,4].With the help of blockchain technology,a transaction can be conducted in a decentralized manner.According to many experts,blockchain has the potential to significantly lower costs while also improving the performance of transactions[5–7].Various industries[8–10]have adopted blockchain technology as their major information technology-related assignments.The use of blockchain technology in transportation can resolve a variety of problems,such as management strategies and data security.The transportation sector creates fresh information each day,such as facts about the user,test information,accounting systems,scientific investigations,and tending systems,as well as other records that are often pushed into several divided,inconsistent databases[11–13].Further,blockchain may possibly control the flow of data to enhance their value for various public services through modernizing transportation records,safeguarding classified information from attackers,and offering users better control over their data.

    Most industries now rely on blockchain technology because of its advancements in security[14,15].The reliance on blockchain technology is likely to grow even more in the near future.Gartner,a prominent systematic work and business consulting firm,has predicted that blockchain technology will generate a business value of USD 3.1 trillion by 2030 [16].The four categories that make up the Blockchain Spectrum are decomposed by the traits and components they have,several of which will only partially appear for a while.Through these stages,each present opportunities and threats.Gartner’s real blockchain representation is shown in Fig.1.

    Figure 1:Real blockchain representation by Gartner

    Enterprises have quickly recognized the disruptive potential of blockchain technology.The increasing use of this technology makes it a trending technology in the transportation industry.A good deal of research on blockchain technology exists due to the industry’s expanding adoption of blockchain techniques.One study reported more than 500 data breaches in the transportation sector from 2009 to 2019[17–20].In the transportation industry,these breaches led to the disclosure,theft,destruction,or illegal release of 230,954,151 records[21–23].This number compares to approximately 69.78 percent of the population of the United States.Thus,the gravity of the matter cannot be negated,and it calls for the prompt implementation of safeguards and countermeasures.In 2019,data breaches in transportation occurred at a rate of 1.4 per day [24,25].The transportation sector has,however,finally started to prioritize blockchain design and implementation [26–28].Blockchain technology aids businesses in keeping track of transportation systems.Transportation industries use blockchain technologies to minimize fraudulent activities,enabling all activities to be traced [29].Blockchain assists in determining the source of the fraudulent activity [30–32].More relevantly,the market size for blockchain technology in the transportation and logistics industries is increasing.Fig.2 illustrates the market scope[33–35].

    Figure 2:Future of blockchain technology in transportation and logistics industries

    Blockchain systems are gaining a lot of attention as a tool to increase financial transactions,commerce,and transparency while streamlining supply chains.A significant portion of this interest was sparked by the speculative craze surrounding Bitcoin,which is built on outdated blockchain architecture with issues with speed and energy usage.In order to get beyond these restrictions and provide useful value for various commercial purposes and applications,advanced blockchain systems have been built.The transportation industry has suffered from security breaches for a decade.Therefore,security management is the biggest challenge for the current digital transportation domain[36–40].Managing transportation data with less investment and higher production can produce a practical framework [41–43].The transportation industry has undergone a digital transformation using blockchain technology,which creates a single dataset by gathering transportation data from various databases[44,45].Evaluation and selection of an efficient blockchain model is always a challenging task.Therefore,this study uses the hesitant fuzzy AHP to prioritize the different blockchain models.The authors have used the hesitant fuzzy TOPSIS process to test the accuracy of the results.Well-classified data facilitate quick and accurate decision-making,especially in terms of data that are cost related.Therefore,it is important to categorize the various blockchain models in a manner that allows the easy recognition of which model is preferable and which is not.To facilitate secure transportation policies,it is essential to categorize various blockchain models and their impact in a systematic,pre-validated manner.As such,the writers have utilized multi-criteria decision-making(MCDM)to calculate the effects of various blockchain technologies examined in this study.Several MCDM approaches can be used to solve this type of problem [42,43,46,47].However,this study implements a practical MCDM approach called the hesitant fuzzy analytical hierarchy process(AHP)technique for order preference by similarity to the ideal solution (TOPSIS) approach has also been used in our work to obtain a hierarchical structure that is based on prioritizing the different blockchain tools models in the descending order of“highest”to“l(fā)owest”[41,42,48].Although extensive research has been done on the use of blockchain technology in the area of transportation[43,44,49],very few studies have focused on the role of different blockchain model and what it can offer for managing big data in transport.

    This study compares the estimated impacts of the current research and those of earlier methods to show how valuable the current contributions are.Therefore,the goal of this paper is to(1)conduct an in-depth study of the security of information software systems,i.e.,from the standpoint of blockchain technology,security influences are analyzed in terms of weakness as well as strength;(2) run implementations through hesitant fuzzy AHP to figure out which features of blockchain technology models are most important;and (3) use hesitant fuzzy TOPSIS to estimate how well the blockchain technology models work in different transportation systems.The rest of this work is organized as follows: materials and methods are described in Section 2.In Section 3,the results are discussed.The data were compared,and a sensitivity analysis was performed in Section 4 of this research.Finally,conclusions and future recommendations are given in Section 5.

    2 Materials and Methods

    2.1 Model Classification

    The types of blockchain models are public,hybrid,private,and permissioned blockchain,and decentralized application and consortium blockchain.We categorize and associate these models with our study in the following sections.

    2.1.1 Private Blockchain

    This is an encrypted data repository that works as a personal blockchain.This model operates exclusively within a closed hierarchy and has no constraints or permissions.With this type of model,the end-users are private employees that have access to the blocks.Read permissions can be public or constrained,and the access to modify the originality of blocks is controlled by a centralized system[40,41].It simply allows approved users or groups to enter,view,and display data in the ledger.Further,the type of blockchain model works in an environment opposite to its actual nature,where every entity in the blockchain model can see the data over blocks.However,it can restrict the users[16].

    2.1.2 Public Blockchain

    A public blockchain is open to anyone who wishes to connect with it.It is an open-source distributed ledger with no permissions.With this type of model,any compatible entity on the web can perform a partner role in blockchain technology and enact operations over it.Public blockchain technology allows all of the participants in a transaction to communicate with one another.It has a record of transactions that cannot be changed.Anyone who follows a set of established rules and participates in the hierarchy can report a transaction.Any type of transaction that is applied over blocks is anonymous,and no mutual shareholders know about each other until the transaction has been completed[17].

    2.1.3 Hybrid Blockchain

    A hybrid blockchain mixes private and public models.This combines the features of both types of blockchains,allowing for both private and public consent hierarchies.With this type of model,the owner of the block can control the access management of the approaches,as well as restrict the information flow as needed.Hybrid blockchain has the potential to benefit both highly regulated corporations and governments.It offers consistency and flexibility,including the ability to keep or disseminate information on a public ledger.In the current world,there are numerous hybrid blockchain implementations.There are various models of blockchain available that are widely used across industries[18].This model confers high security with fast data management speed[42–44].

    2.1.4 Permissioned Blockchain

    This model facilitates an advanced mechanism where every block verifier needs standard access permission before implementing any operation.This is useful for enterprises,financial institutions,and organizations that are confident in their ability to comply with most of the constraints while also being aware of the importance of maintaining complete record monitoring[45–47].This type of layered security mechanism provides an advanced benefit to the model.Permissioned blockchains operate in a very different way from private and public blockchains.They are designed to take advantage of blockchains without risking the authority of a centrally regulated system.

    2.1.5 Consortium Blockchain

    This is a perfect example of a semi-decentralized blockchain model with which many businesses operate.It is different from a private ledger managed by a single entity,as more than one organization can operate on the network under this kind of blockchain.A consortium blockchain combines aspects of both private and public chains.The most significant departure from either system is that rather than being open where anyone can authenticate blocks or a locked stage where only one individual can designate block providers,a consortium sequence has a collection of similar companies acting as validators[47–49].

    2.1.6 Decentralized Blockchain

    This is a model that operates over a non-singular framework model in which there are various node-to-node entities available with permissions and access controls.Popcorn Time,BitTorrent,and Tor are some names of tools and software that work on this type of model where the standard authorities are not centralized,and access permission distribution is allocated throughout the whole peer-to-peer network.There are many pieces of software and cryptocurrencies that are not part of any centralized control authority and work freely in the public domain [12–17].Fig.3 shows the hierarchical structure for the assessment of different blockchain models.

    The research examines several blockchain models and their impact on logisticss.The hesitant fuzzy analytical hierarchy process(AHP)is used in the research report to prioritize the various blockchain models.AHP is a decision-making technique that aids in the systematic evaluation and comparison of alternatives based on a variety of criteria.The evaluation criteria used to analyze the effectiveness and applicability of blockchain technology in logistics are presented in Table 1 of the report.Based on these characteristics,the table presents a framework for assessing and contrasting the various blockchain models.

    Table 1:Evaluation criteria

    Table 2 concentrates on the sub-criteria used to determine the impact of each blockchain model at tier 2.These sub-criteria go deeper into the precise components that determine each model’s overall assessment.These sub-criteria aid in further breaking down and analysing each blockchain model’s prospective effect on intelligent logistics.

    Table 2:Different sub-criteria for estimating the influence at tier 2

    MCDM is considered an effective method for resolving a variety of real-world problems and making the best decisions.AHP is a well-organized strategy for MCDM operations.To answer the problem of picking the best assessment approach,this study proposes an effective strategy that uses AHP to analyze decision criteria and TOPSIS to identify the most relevant functions [7–10].This study also uses the hesitant fuzzy approach to generate highly accurate results.MCDM offers some complicated algorithms,but TOPSIS is useful because of its straightforward computation.To decide the value of the specified sub-techniques or strategies,the following measures are summarized:

    Step 1:Create a tree structure for the numerous layers of the problem.

    Step 2:Manage the linguistic technologies using pair comparison matrixes[16].

    Step 3:Convert assessments with hesitant fuzzy wrappers[16]using Eq.(1):

    Figure 3:Hierarchical structure for the assessment of different blockchain models

    W=(w1,w2,wn)S is used here.Which is the corresponding balance vector that follows theW=1rule,and Bj has the same importance as the goal of A1,A2,and An.The hesitant fuzzy restrictions of the trapezoidal figures C=(A,B,C,D),for instance,in Eq.(2),is calculated after this calculation(5).

    After that,by using Eqs.(6)and(7)separately,the authors need to find priority and secondary weights for attributes.

    Step 4:Use Eqs.(8)and(9)to complete the pairwise comparison matrix.

    Step 5:Use Eq.(10)in the process of defuzzification.

    Estimate the consistency ratio(CR)using Eqs.(11)and(12)[16,19].

    Step 6:Use Eq.(13)to calculate the geometric mean(GM).

    Step 7:Evaluate the assumed weights by using Eq.(14).

    Step 8:Use Eq.(15)to further clarify the defuzzification of hesitant fuzzy figures.

    Step 9:Normalize the weights using Eq.(16).

    The next stage uses(hesitant fuzzy)HF-TOPSIS to discover the optimal choice.As a frequently used MADM(Multiple attribute decision-making)strategy,TOPSIS supports specialists in selecting the most favorable solution for real-world problems[16].Sahu et al.[22]made use of TOPSIS.TOPSIS is the principle that selected alternatives must have the farthest distance from the negative ideal solution and the shortest to the positive ideal solution.In this proposed work,the HF-TOPSIS approach is used to prioritize characteristics used to define the mechanism[31–33].The technique is centered on the customization of wrappers to determine distances in the middle of envelopes G1s and G2s.The distance is specified as envelop(G1s)=[Lp,Lq]and envelop(G2s)=[L p?,L q?]when the envelopes are given.

    The technique can be described as follows:

    Step 10:Adopt the following at the preliminary stage:

    Select the below concern taking Q alternatives(C={C1,C2,...,CE})and n criteria or characteristics(C={C1,C2,...,Cn})

    The specialists are stated usingex,and the number of practitioners is K.

    The HF-TOPSIS process scale is as follows:

    Let Scale=Nothing,Very Bad,Bad,Medium,Good,Very Good,Perfect be a demonstrated or textual term set,and CH be the context-free syntax used to generate its comparative linguistic variables.Accordingly,now consider two experts,e1 and e2,who will provide their priority for two attributes,R1 and R2.

    The following is the hesitant fuzzy wrapper for the corresponding comparative linguistic statement[19]:

    Step 11:Combine the specific calculations of practitionersin the following phase and construct a combined assessment matrix X=[xij],where xij represents the calculations of Ci in contradiction of aj and accurately presented as xij=[Lpij,Lqij],for instance,in Eq.(18),

    Step 13:Use Eqs.(22)and(23)to make the positive and negative ideal difference matrixes(V+,V-),respectively.

    Step 14:Use Eq.(24)to compute the comparative closeness score for the options under deliberation.

    Step 15:Order the possibilities according to their relative proximity ratings.

    The next section uses HF-AHP-TOPSIS to analyze data and produce outcomes.

    3 Findings

    Securing intelligent logistics is a significant concern in today’s quickly changing corporate market.Because supply chains are becoming more complicated and reliant on technology,strong and efficient security measures are required.Blockchain technology has emerged as a possible answer to logistics security concerns.We defined the assessment attributes in this research based on a thorough literature survey that included analyzing various existing studies on blockchain models,intelligent logistics,as well as unified computational methodologies.We found significant parameters that are critical in determining the influence of blockchain models on intelligent logistics.We used a mixed-method strategy to acquire pertinent data during the data gathering procedure.To begin,we interviewed industry experts,logistics specialists,and blockchain specialists to gain qualitative understanding and expert viewpoints on the matter.These interviews provided us with a better grasp of the real-world implications and potential problems of implementing blockchain in intelligent logistics.Furthermore,we acquired quantitative data through questionnaires sent to logistics firms and organisations who have used blockchain in their operations.The survey questionnaire was created with the goal of gathering precise metrics and quantitative data connected to the influence of blockchain models on multiple facets of logistics safety and effectiveness.

    Several measures were used to assure the reliability and authenticity of our data.To begin,we built our survey questionnaire using established measuring scales and industry-recognized metrics,that helped ensure the data’s dependability and consistency.Furthermore,we ran a pilot study with a small sample size to polish the questionnaire and tackle any potential survey challenges.Further,we made every effort during the interviews to make sure that the queries were clear,unbiased,and concentrated on relevant areas of the study in order to minimise any potential researcher bias.In order to determine convergent validity,we cross-referenced the qualitative insights received from the interviews using the quantitative data collected by the questionnaires.In this section,the authors classify these models with some of their attributes in order to evaluate the priority for the selected blockchain models.To evaluate the priority of the models,the authors select them as T1 to T6 at the first tier (T) of the hierarchy.They also perform the AHP approach steps on them one by one.The hierarchy discussed in the previous section of this paper portrays the arrangements of selected technologies and their respective inherited sub-layered attributes for clear understanding.The authors of this research intended to examine the influence of blockchain-based models on transportation information records and their security by using a hierarchical structure created from current literature and the AHP technique.The hierarchical structure enabled the organization and prioritisation of evaluation criteria and sub-criteria.The AHP approach allowed for a systematic investigation of the blockchain-based models,allowing for a comparison of their usefulness in improving the security of transportation data records.Decision-makers allocated weights to each criterion and sub-criterion using pairwise comparisons,indicating their relative importance in the context of transportation data security.The AHP method enabled the weights to be aggregated in order to estimate the overall impact of every model on the security of transportation data records.

    The comparative matrix interpretation is represented by a haphazard index of less than 0.1 in some similarity measures.The combined hesitant fuzzy pairwise comparison matrix (FPCM)at tier 1 is shown in Table 3 of the research paper.This matrix is utilised at the highest level of the analytical hierarchy process to contrast and assess the various criteria.The FPCM includes decision-makers’viewpoints and preferences to establish the relative significance of each criterion in the setting of ensuring intelligent logistics.Table 4 includes the aggregated hesitant FPCM from tier 1 to tier 6,including the criteria and their corresponding sub-criteria.This thorough matrix offers a full view of the review process,taking into consideration all levels and aspects of the evaluation.The table,which employs the hesitant fuzzy technique,aids in systematically reviewing and prioritising blockchain models according to their performance across many criteria and sub-criteria.The total weights determined from the analysis are presented in Table 5 of the research publication.These weights represent the relative significance or value allocated to each criterion as well as subcriterion in the assessment process.The table gives a quantitative representation of the impact of each factor on the selection of the most acceptable blockchain model for securing intelligent logistics by aggregating decision-makers’opinions and preferences.A4,A5,and A6 were chosen as six distinct blockchain technologies[34,35].As these six technologies represent diverse segments,the evaluation and assessment effects can be seen in distinct ways.

    Table 3:At tier 1,combined hesitant fuzzy pairwise comparison matrix(FPCM)

    Table 4:At tier 1 to tier 6,combined hesitant FPCM with the criteria

    We converted language concepts into quantitative values using the standardized Satya scale[12]and Eqs.(1)–(9),and then aggregated triangular fuzzy numeric(TFN)values.We then used Eqs.(10)and(11)to calculate the consistency and random indices.

    The researchers determined the impacts of blockchain methods on various aspects after calculating the final or reliance weights of security mechanisms.As indicated in Table 6,Eqs.(1)–(5)and Step 10 have been used to gather feedback from the procedural data of the three tasks.

    Table 6:Subjective cognition outcomes

    Table 7:The normalized hesitant fuzzy-assessment matrix

    Table 8:The subjective normalized hesitant fuzzy-assessment matrix

    The contributors calculated the standardized hesitant fuzzy-based judgment matrix and weighted the standardized and weighted normalized hesitant fuzzy judgment matrix using Eqs.(16)–(18),as illustrated in Tables 7 and 8.

    The closeness coefficients for different alternatives are shown in Table 9.Closeness coefficients are generated as a component of the decision-making process to determine how close each alternative is to the ideal solution.These coefficients reflect the degree to which each alternative meets the study’s evaluation criteria and sub-criteria.The proximity coefficients are calculated mathematically by comparing the effectiveness of each alternative to the defined criteria and sub-criteria.The higher an alternative’s proximity coefficient,the closer it is to the ideal answer and the more appropriate it is deemed in the context of securing intelligent logistics.The authors premeditated the relative proximity using Eqs.(19)–(26),as shown in Table 9 and Fig.4.

    Table 9:Closeness coefficients of numerous alternatives

    3.1 Sensitivity Analysis

    The responsiveness of the procured weights(different factors)was evaluated throughout this data processing[31].At the completion of the second phase,15 relevant factors were taken from the investigative process to ensure that the sensitivities could be evaluated using 14 experimentations.Through both the hesitant fuzzy AHP-TOPSIS technique and the hesitant fuzzy AHP-TOPSIS method,the degree of satisfaction tier (CC-i) was premeditated in every test by adjusting the alternatives,while the values of the different elements continued to be unaffected.The estimated effects are shown in Table 10 and Fig.5.Based on the actual performance,alternative solution one(A1)has an extremely high level of satisfaction (CC-i).A total of 15 experiments were carried out.The results reveal that alternative one(A1)continues to provide a high level of satisfaction(CC-i)in all of the experiments.A3 is the lowest-weighted option in 13 experiments,and A6 is the lowest-weighted alternative in 2 of them.When the scores of the alternatives are compared to each other,the results show that the options’ratings are weighted.

    Table 10:Sensitivity examination

    Figure 4:Schematic illustration of the tier of satisfaction

    3.2 Comparative Analysis of the Findings

    During this investigation,the researchers employed a variety of symmetrical methods to assess the accuracy of the research’s results.To assess the accuracy of the study’s findings,the researchers employed a hesitant fuzzy AHP-TOPSIS tactic.In hesitant fuzzy AHP-TOPSIS,the information gathering and computation methods are closely related to those used in conventional AHP-TOPSIS.Fuzzification and defuzzification are permitted in hesitant fuzzy AHP-TOPSIS.Information is compiled in its earliest mathematical terms for hesitant fuzzy AHP-TOPSIS and afterward changed into hesitant fuzzy figures.Fig.6 depicts the discrepancies between the hesitant fuzzy and traditional AHP-TOPSIS findings.

    Figure 5:Schematic illustration of sensitivity examination

    Figure 6:Schematic illustration of different outcomes

    The findings of this study are unique,yet they are essentially the same.The Pearson correlation technique was used to evaluate the relationship between the outcomes in this empirical study.The effect of the two-value relationship is demonstrated by the coefficient correlation[32].The scale spans from–1 to 1.A value close to–1 suggests a weaker relationship between values,whereas a value close to 1 indicates a stronger connection.The Pearson correlation for the hesitant fuzzy AHP results and the classical AHP conclusions is 0.89176,which shows that the outcomes are very similar.As shown in Table 11,studies on the same dataset using different criteria for blockchain technology have previously been created,and all of the findings indicate that the outcomes of hesitant fuzzy AHP and classical AHP are significantly connected.

    Table 11:Comparative analysis

    Our research results also demonstrate that the identified different factors and their correlation to efficient security capabilities are highly relevant to security arrangements.Khan et al.[37] used the hesitant fuzzy AHP-TOPSIS technique in their research.This is because the AHP methodology differs as it uses a hierarchy structure rather than a tree structure.As a result,in the current study,the researchers included design techniques in the hierarchy’s initial stage,which effectively improved the outcomes.There is no synchronous method of evaluating system security in the specific scenario of design policy initiatives using the hesitant fuzzy AHP-TOPSIS procedure.

    4 Discussion

    The primary goal of this research is to compute the influence of blockchain technology frameworks on the security of electronic records in the context of a security policy that could aid professionals in identifying and choosing the most effective blockchain model to improve security in the transportation sector.To examine the influence of blockchain technology models,the authors used an MCDM hybrid approach with hesitant fuzzy AHP-TOPSIS.Key characteristics of blockchain technology,such as immutability,decentralization,and security,combine to address several major difficulties now affecting the transportation industry.In this research,the private blockchain model obtained higher weighted choices compared to other blockchain models,which indicates that private blockchain models are more effective than a hybrid,public,consortium,and permissioned blockchains,as well as decentralized systems,in executing secure electronic records transactions in transportation organizations.Zarour et al.[42] created observation networks using a private blockchain framework to encourage and strengthen the distribution of e-transportation information across various European nations and concluded it was the safest method imaginable.The basis of quality transportation is electronic records.As a result,providing consumers with ideal secure transportation structures via a private blockchain model would be highly beneficial to the transportation industry.

    The study’s findings have important implications for the area of intelligent logistics and the use of blockchain technology.This study effectively analysed different blockchain models by using a static analysis with an integrated hesitant fuzzy AHP-TOPSIS approach.The researchers were able to completely examine and compare the various models of blockchain technology and establish their impact on intelligent logistics by using this MCDM methodology.According to the findings of this research,the private blockchain model is the most significant solution for the transportation business.Implementing a private blockchain approach might potentially revolutionise how logistical operations are carried out.This architecture is well-known for its improved safety capabilities,making it an appealing alternative for businesses looking to protect sensitive information as well as transactions within their logistical networks.When it comes to precious goods,time-critical deliveries,and sensitive information in the transportation business,the safe environment provided by the private blockchain model can be extremely beneficial in preserving data integrity and preventing unauthorised access.Additionally,the study’s beneficial implications extend beyond the transportation business.The use of the hesitant fuzzy AHP-TOPSIS methodology proves the relevance and efficacy of such decisionmaking strategies in evaluating and choosing optimal blockchain models for diverse applications within intelligent logistics.This technique offers decision-makers with a dependable tool for evaluating and prioritising various technology possibilities based on a variety of factors,allowing them to make educated and efficient decisions.

    Measuring the impact of blockchain technology frameworks on electronic records security is a technique that can assist developers in determining the performance of blockchain technology.The present study would assist blockchain designers in prioritizing and selecting elements of blockchain technology for building reliable and secure transportation blockchain applications.Currently,electronic record security is a major challenge for both designers and users.While establishing a security feature for electronic records,the current research would provide specialists with plenty of consideration for various techniques rather than using informal and traditional approaches.In addition,as the security of electronic records is both a diverse and complex task in the blockchain technology context,this research may be useful for transportation providers,which limits the applicability of the overall system.Every day,customers and engineers are presented with new issues.Although the combined hesitant fuzzy AHP-TOPSIS method for evaluating the impact of blockchain technology on safeguarding electronic records is effective and relevant,there may be a more viable MCDM symmetrical technology for this challenge.

    5 Conclusion

    In the era of digital transformation,it is vital to understand concepts that are beneficial to the industry.This study uses static analysis to evaluate the various blockchain models by utilizing an integrated hesitant fuzzy AHP-TOPSIS methodology,which provides an effective outcome.By adopting this MCDM approach,the authors evaluated various models of blockchain technology and applied the adopted integrated mechanism to them to calculate the most impactful approach.The results discussed in this article suggest that the private model of blockchain would have the greatest impact on the transportation industry,and it also provides the most secure environment.As a future direction,this study provides guidelines for developers by simulating the results and expanding on different models and their impact.Furthermore,to make the results more effective and accurate,the authors performed both sensitivity and comparison analyses on the results.

    Acknowledgement:The authors would like to thank the Deanship of Scientific Research at Shaqra University for supporting this work.

    Funding Statement:The authors received no specific funding for this study.

    Author Contributions:Study conception and design:M.S.Alsaqer,M.H.Alsulami;data collection:M.H.Alsulami,R.N.Alkhawaji,A.A.Alaboudi;analysis and interpretation of results:M.S.Alsaqer,M.H.Alsulami,A.A.Alaboudi;draft manuscript preparation: M.S.Alsaqer,M.H.Alsulami,R.N.Alkhawaji,A.A.Alaboudi.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The authors confirm that the data supporting the findings of this study are available within the article.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    乱系列少妇在线播放| 在线 av 中文字幕| 午夜福利视频精品| 日韩免费高清中文字幕av| 国产精品嫩草影院av在线观看| 春色校园在线视频观看| 51国产日韩欧美| 免费在线观看成人毛片| 国产91av在线免费观看| 日本欧美视频一区| 小蜜桃在线观看免费完整版高清| 伦理电影大哥的女人| 肉色欧美久久久久久久蜜桃| 亚洲av中文av极速乱| 视频区图区小说| 色哟哟·www| 国产精品一及| 国产欧美另类精品又又久久亚洲欧美| 五月玫瑰六月丁香| 日本av手机在线免费观看| 91精品国产国语对白视频| 久久国内精品自在自线图片| 少妇熟女欧美另类| 老熟女久久久| 国产又色又爽无遮挡免| 欧美最新免费一区二区三区| 中文字幕av成人在线电影| 黄片wwwwww| 亚州av有码| 一级毛片久久久久久久久女| 在线观看免费高清a一片| 毛片女人毛片| 51国产日韩欧美| 直男gayav资源| 国产欧美日韩精品一区二区| 黄色配什么色好看| 欧美xxⅹ黑人| 欧美日韩在线观看h| 美女国产视频在线观看| 成人影院久久| 好男人视频免费观看在线| 精品人妻熟女av久视频| 18禁动态无遮挡网站| 免费少妇av软件| 亚洲在久久综合| 你懂的网址亚洲精品在线观看| 男人舔奶头视频| 久久精品久久久久久噜噜老黄| 黑人猛操日本美女一级片| 欧美成人a在线观看| 亚洲人与动物交配视频| 一级毛片 在线播放| 日日撸夜夜添| 亚洲精品国产成人久久av| 国产免费一区二区三区四区乱码| 少妇 在线观看| 老女人水多毛片| 中国美白少妇内射xxxbb| 肉色欧美久久久久久久蜜桃| 亚洲美女黄色视频免费看| 亚洲av福利一区| 91久久精品国产一区二区成人| 国产片特级美女逼逼视频| 国产91av在线免费观看| 亚洲精品一二三| 亚洲第一区二区三区不卡| 看非洲黑人一级黄片| 国产精品欧美亚洲77777| 大片免费播放器 马上看| 51国产日韩欧美| 在线观看人妻少妇| 亚洲,欧美,日韩| 午夜福利网站1000一区二区三区| 亚洲av成人精品一二三区| 夫妻午夜视频| 国模一区二区三区四区视频| 国产精品一二三区在线看| 乱码一卡2卡4卡精品| 国产成人freesex在线| 边亲边吃奶的免费视频| 搡女人真爽免费视频火全软件| 九色成人免费人妻av| 毛片一级片免费看久久久久| 高清黄色对白视频在线免费看 | 免费看光身美女| 国产女主播在线喷水免费视频网站| 亚洲av成人精品一二三区| 国产精品精品国产色婷婷| 国产亚洲精品久久久com| 在线亚洲精品国产二区图片欧美 | 2021少妇久久久久久久久久久| 免费看日本二区| 午夜免费男女啪啪视频观看| 欧美日韩综合久久久久久| av在线观看视频网站免费| 大码成人一级视频| 中文字幕亚洲精品专区| 亚洲国产精品国产精品| 久久毛片免费看一区二区三区| 熟女电影av网| 久久精品久久久久久噜噜老黄| 国产精品精品国产色婷婷| 女性被躁到高潮视频| 新久久久久国产一级毛片| 99国产精品免费福利视频| 亚洲激情五月婷婷啪啪| 日韩中文字幕视频在线看片 | 国产白丝娇喘喷水9色精品| 日韩av不卡免费在线播放| 黑人高潮一二区| 大片免费播放器 马上看| 亚洲av综合色区一区| 国产在线男女| 日本-黄色视频高清免费观看| 亚洲成人中文字幕在线播放| 日韩三级伦理在线观看| 国产精品精品国产色婷婷| av国产久精品久网站免费入址| 国产精品成人在线| 一区二区三区精品91| 一区在线观看完整版| 久久久久视频综合| 观看美女的网站| 免费观看无遮挡的男女| 乱系列少妇在线播放| 内地一区二区视频在线| 国产成人午夜福利电影在线观看| 国产探花极品一区二区| 欧美日韩综合久久久久久| 亚洲欧美日韩无卡精品| 亚洲精品乱久久久久久| 青青草视频在线视频观看| 一区二区三区乱码不卡18| 三级国产精品片| videos熟女内射| 亚洲欧美日韩东京热| 精品人妻偷拍中文字幕| 男女下面进入的视频免费午夜| 国产精品精品国产色婷婷| 国内精品宾馆在线| 亚洲精品中文字幕在线视频 | 免费观看无遮挡的男女| 下体分泌物呈黄色| 国产v大片淫在线免费观看| 日韩欧美一区视频在线观看 | 欧美高清成人免费视频www| 最近中文字幕2019免费版| 亚洲精品,欧美精品| 国产精品一及| 91在线精品国自产拍蜜月| 男人爽女人下面视频在线观看| 国产爽快片一区二区三区| 久久久精品免费免费高清| 久久国产精品大桥未久av | 国产精品国产三级专区第一集| 久久久久视频综合| 亚洲成人手机| 狂野欧美激情性bbbbbb| av黄色大香蕉| 伦理电影大哥的女人| 亚洲美女黄色视频免费看| 成人漫画全彩无遮挡| 久久99热6这里只有精品| 国产精品人妻久久久久久| 天天躁夜夜躁狠狠久久av| 在线观看三级黄色| 国产在视频线精品| 新久久久久国产一级毛片| 免费av不卡在线播放| 日本wwww免费看| 亚洲色图综合在线观看| 如何舔出高潮| 日本黄色日本黄色录像| 蜜臀久久99精品久久宅男| 国产精品爽爽va在线观看网站| 熟女人妻精品中文字幕| 免费人成在线观看视频色| 日韩欧美 国产精品| 亚洲av福利一区| 久久久久精品性色| 久久国产精品男人的天堂亚洲 | 日本猛色少妇xxxxx猛交久久| 色婷婷久久久亚洲欧美| 在线观看人妻少妇| 欧美日韩综合久久久久久| 一级毛片 在线播放| 一区二区三区乱码不卡18| 中文在线观看免费www的网站| 国产高清不卡午夜福利| 亚洲怡红院男人天堂| 卡戴珊不雅视频在线播放| 中文字幕亚洲精品专区| 精品酒店卫生间| 99热国产这里只有精品6| 一区二区三区四区激情视频| 美女视频免费永久观看网站| 不卡视频在线观看欧美| 国产一区二区三区av在线| 日韩成人av中文字幕在线观看| 亚洲成人一二三区av| 亚洲在久久综合| 欧美日韩精品成人综合77777| 最近中文字幕高清免费大全6| 欧美 日韩 精品 国产| 久久精品国产亚洲av涩爱| 91aial.com中文字幕在线观看| 精品少妇久久久久久888优播| 妹子高潮喷水视频| 久久久久国产网址| 久久99热这里只频精品6学生| 国产成人免费无遮挡视频| 中文字幕制服av| 少妇高潮的动态图| 欧美日韩精品成人综合77777| 啦啦啦中文免费视频观看日本| 极品教师在线视频| 欧美+日韩+精品| 国产一区二区三区av在线| 久久久国产一区二区| 狂野欧美白嫩少妇大欣赏| 男男h啪啪无遮挡| 水蜜桃什么品种好| 人妻 亚洲 视频| 亚洲精品乱码久久久久久按摩| 精品久久久久久久久av| 熟女人妻精品中文字幕| kizo精华| 欧美精品一区二区免费开放| 久久99热这里只有精品18| 久久国内精品自在自线图片| 日本欧美视频一区| 波野结衣二区三区在线| 边亲边吃奶的免费视频| 九色成人免费人妻av| 亚洲,一卡二卡三卡| 青春草国产在线视频| 亚洲,欧美,日韩| 少妇人妻 视频| 插阴视频在线观看视频| 久久国产精品男人的天堂亚洲 | 久久影院123| 三级国产精品片| 亚洲国产日韩一区二区| 国内揄拍国产精品人妻在线| av国产久精品久网站免费入址| av在线老鸭窝| 高清午夜精品一区二区三区| 亚洲内射少妇av| 99热6这里只有精品| 国产毛片在线视频| 精品久久久久久久久亚洲| 欧美成人一区二区免费高清观看| 国产高清三级在线| 国内少妇人妻偷人精品xxx网站| 国产精品精品国产色婷婷| 中文字幕制服av| 永久网站在线| 国产男女内射视频| 国产视频内射| 亚洲色图av天堂| 国产成人免费观看mmmm| 亚洲四区av| 欧美高清成人免费视频www| 日本色播在线视频| videossex国产| av专区在线播放| 欧美日韩在线观看h| 欧美日韩国产mv在线观看视频 | 中国三级夫妇交换| 简卡轻食公司| 国产成人一区二区在线| 五月伊人婷婷丁香| 一区二区三区乱码不卡18| 成人一区二区视频在线观看| 国产乱人视频| 一级二级三级毛片免费看| 特大巨黑吊av在线直播| 99视频精品全部免费 在线| 有码 亚洲区| 妹子高潮喷水视频| 欧美最新免费一区二区三区| 国产亚洲91精品色在线| 三级国产精品片| 免费av不卡在线播放| 五月玫瑰六月丁香| 麻豆乱淫一区二区| 伊人久久精品亚洲午夜| 爱豆传媒免费全集在线观看| 久久久久国产精品人妻一区二区| 亚洲欧美成人精品一区二区| 久久精品久久久久久噜噜老黄| 日韩亚洲欧美综合| 日日摸夜夜添夜夜添av毛片| 亚洲欧美成人综合另类久久久| 在现免费观看毛片| 尾随美女入室| 日韩不卡一区二区三区视频在线| 男人和女人高潮做爰伦理| 国产又色又爽无遮挡免| 搡女人真爽免费视频火全软件| 麻豆成人午夜福利视频| 久久久久久久久久成人| 日本vs欧美在线观看视频 | 亚洲成人一二三区av| 老司机影院毛片| 黑人猛操日本美女一级片| 亚洲国产成人一精品久久久| 国产熟女欧美一区二区| 精品一区在线观看国产| 欧美 日韩 精品 国产| 日本-黄色视频高清免费观看| 中国国产av一级| 九九爱精品视频在线观看| 亚洲av欧美aⅴ国产| 啦啦啦中文免费视频观看日本| 久久久a久久爽久久v久久| 亚洲精品久久久久久婷婷小说| 久久国产亚洲av麻豆专区| 国产成人a区在线观看| 汤姆久久久久久久影院中文字幕| 啦啦啦视频在线资源免费观看| 成人美女网站在线观看视频| 日本与韩国留学比较| 丰满少妇做爰视频| 亚洲精华国产精华液的使用体验| 成人国产麻豆网| 欧美xxxx性猛交bbbb| 亚洲经典国产精华液单| 亚洲国产欧美人成| 中文字幕免费在线视频6| av在线蜜桃| 亚洲色图综合在线观看| 夜夜爽夜夜爽视频| 五月伊人婷婷丁香| av女优亚洲男人天堂| 岛国毛片在线播放| 色哟哟·www| 欧美成人午夜免费资源| 亚洲av国产av综合av卡| 亚洲高清免费不卡视频| 另类亚洲欧美激情| 99久久精品热视频| 免费黄色在线免费观看| 亚洲经典国产精华液单| 久久久精品94久久精品| 亚洲图色成人| 亚洲欧美精品专区久久| 国产片特级美女逼逼视频| 成人高潮视频无遮挡免费网站| 2018国产大陆天天弄谢| 免费看日本二区| 中文天堂在线官网| 少妇猛男粗大的猛烈进出视频| 久久婷婷青草| 在线观看一区二区三区| 国产人妻一区二区三区在| 性高湖久久久久久久久免费观看| 国产精品欧美亚洲77777| 久久精品国产a三级三级三级| 男女啪啪激烈高潮av片| 好男人视频免费观看在线| 97超碰精品成人国产| 国产精品国产三级国产av玫瑰| 国产无遮挡羞羞视频在线观看| 免费观看av网站的网址| 校园人妻丝袜中文字幕| 成人一区二区视频在线观看| 少妇丰满av| 一级黄片播放器| 欧美区成人在线视频| 国产高清国产精品国产三级 | 中国三级夫妇交换| 美女视频免费永久观看网站| 欧美精品一区二区大全| 久久 成人 亚洲| 午夜视频国产福利| 久久久成人免费电影| 美女视频免费永久观看网站| 国产爱豆传媒在线观看| 大片免费播放器 马上看| 在线播放无遮挡| 日韩av免费高清视频| 97在线人人人人妻| 国产一区二区三区av在线| 国产淫片久久久久久久久| 亚洲色图av天堂| 久久久久人妻精品一区果冻| 亚洲人成网站高清观看| 日本午夜av视频| 51国产日韩欧美| 国产成人精品久久久久久| 啦啦啦视频在线资源免费观看| 久久毛片免费看一区二区三区| 99热网站在线观看| 国产精品蜜桃在线观看| 22中文网久久字幕| 春色校园在线视频观看| 亚洲最大成人中文| 一级a做视频免费观看| 免费黄频网站在线观看国产| 五月伊人婷婷丁香| 99热全是精品| 成年美女黄网站色视频大全免费 | 免费观看a级毛片全部| 最近的中文字幕免费完整| 亚洲国产高清在线一区二区三| 免费观看无遮挡的男女| 在线播放无遮挡| 九色成人免费人妻av| 精品亚洲成a人片在线观看 | 精品99又大又爽又粗少妇毛片| 国产精品国产三级专区第一集| 亚洲国产色片| 99视频精品全部免费 在线| 久久99热这里只频精品6学生| 国产又色又爽无遮挡免| 午夜激情久久久久久久| 尤物成人国产欧美一区二区三区| 国产真实伦视频高清在线观看| 狂野欧美白嫩少妇大欣赏| 在线看a的网站| 18禁裸乳无遮挡免费网站照片| 人妻制服诱惑在线中文字幕| 99九九线精品视频在线观看视频| av专区在线播放| 久久人人爽人人爽人人片va| 最近最新中文字幕大全电影3| 日韩伦理黄色片| 国产69精品久久久久777片| 永久网站在线| 性色avwww在线观看| 精品酒店卫生间| 欧美日韩视频高清一区二区三区二| 成人午夜精彩视频在线观看| 大片电影免费在线观看免费| 精品亚洲成a人片在线观看 | 熟妇人妻不卡中文字幕| 日本色播在线视频| 色视频www国产| 国产黄色免费在线视频| 人妻少妇偷人精品九色| 身体一侧抽搐| 高清欧美精品videossex| 欧美最新免费一区二区三区| 国产成人免费无遮挡视频| 亚洲欧美日韩东京热| 偷拍熟女少妇极品色| 80岁老熟妇乱子伦牲交| 国产精品人妻久久久影院| 中文在线观看免费www的网站| 精品久久久久久电影网| 晚上一个人看的免费电影| 国产精品无大码| 韩国av在线不卡| 久久久亚洲精品成人影院| 国产精品久久久久久精品电影小说 | 久久精品国产亚洲av天美| 在线观看一区二区三区| 亚洲精品456在线播放app| 自拍偷自拍亚洲精品老妇| 久久人人爽人人片av| 国产乱人视频| 久久久久网色| 日本免费在线观看一区| 亚洲综合精品二区| 久久国产精品大桥未久av | 亚洲欧美中文字幕日韩二区| 日本黄色片子视频| 亚洲性久久影院| 久久久久人妻精品一区果冻| 亚洲人成网站在线观看播放| 国产精品欧美亚洲77777| 精品视频人人做人人爽| xxx大片免费视频| 成人美女网站在线观看视频| 国产一区亚洲一区在线观看| 观看免费一级毛片| 成人国产av品久久久| 久久亚洲国产成人精品v| 日韩强制内射视频| 欧美变态另类bdsm刘玥| 97在线视频观看| 午夜视频国产福利| 国国产精品蜜臀av免费| 久久久精品免费免费高清| 亚洲欧洲日产国产| 日韩欧美一区视频在线观看 | 午夜福利视频精品| 成人免费观看视频高清| 国产免费视频播放在线视频| 成人免费观看视频高清| 六月丁香七月| 99精国产麻豆久久婷婷| 亚洲国产最新在线播放| 99视频精品全部免费 在线| 亚洲va在线va天堂va国产| 欧美日韩一区二区视频在线观看视频在线| 能在线免费看毛片的网站| 久久国产精品大桥未久av | 韩国高清视频一区二区三区| 国产精品成人在线| 干丝袜人妻中文字幕| av免费观看日本| 中文字幕免费在线视频6| 欧美+日韩+精品| 日韩强制内射视频| 亚洲无线观看免费| 天美传媒精品一区二区| 人妻制服诱惑在线中文字幕| 国产成人免费无遮挡视频| 一个人看的www免费观看视频| 美女内射精品一级片tv| 国产av精品麻豆| 我要看黄色一级片免费的| 国产免费福利视频在线观看| 在线免费十八禁| 日韩av在线免费看完整版不卡| 韩国av在线不卡| 欧美日韩视频精品一区| 久久久久久久大尺度免费视频| 欧美日韩精品成人综合77777| 内地一区二区视频在线| 国产精品一及| 欧美97在线视频| 激情五月婷婷亚洲| 国产成人一区二区在线| 91在线精品国自产拍蜜月| 网址你懂的国产日韩在线| 精品久久久久久久末码| 插逼视频在线观看| 国产精品熟女久久久久浪| 国产乱人视频| 免费看av在线观看网站| 99热国产这里只有精品6| 久久精品国产鲁丝片午夜精品| 日韩三级伦理在线观看| h视频一区二区三区| 青春草亚洲视频在线观看| 亚洲久久久国产精品| 亚洲aⅴ乱码一区二区在线播放| .国产精品久久| 一本一本综合久久| 中文字幕av成人在线电影| 热re99久久精品国产66热6| 99热国产这里只有精品6| 乱码一卡2卡4卡精品| 大片电影免费在线观看免费| 午夜免费男女啪啪视频观看| 综合色丁香网| 亚洲av二区三区四区| 日本一二三区视频观看| 精品人妻偷拍中文字幕| 国产69精品久久久久777片| 26uuu在线亚洲综合色| videos熟女内射| 一边亲一边摸免费视频| 国产午夜精品一二区理论片| 少妇裸体淫交视频免费看高清| 国产黄片美女视频| 99久久精品国产国产毛片| 国内少妇人妻偷人精品xxx网站| 久久精品久久久久久久性| 搡女人真爽免费视频火全软件| 亚洲av成人精品一区久久| 国产精品免费大片| 亚洲性久久影院| 亚洲高清免费不卡视频| 亚洲av日韩在线播放| 亚洲精品第二区| 欧美精品一区二区免费开放| 久久精品国产a三级三级三级| xxx大片免费视频| 亚洲精华国产精华液的使用体验| 国精品久久久久久国模美| 国产av精品麻豆| 国产美女午夜福利| 久久国产乱子免费精品| 中文字幕人妻熟人妻熟丝袜美| 日本猛色少妇xxxxx猛交久久| 亚洲久久久国产精品| 成人无遮挡网站| 午夜福利高清视频| 国产无遮挡羞羞视频在线观看| 日韩制服骚丝袜av| 夜夜爽夜夜爽视频| 亚洲av电影在线观看一区二区三区| 亚洲色图av天堂| 麻豆成人午夜福利视频| 欧美日韩视频精品一区| videos熟女内射| 一级毛片电影观看| 女人久久www免费人成看片| 日韩亚洲欧美综合| 亚洲美女黄色视频免费看| 又爽又黄a免费视频| 国产成人精品婷婷| 久久亚洲国产成人精品v| 大片免费播放器 马上看| 男的添女的下面高潮视频| 国产精品久久久久久精品古装| 99久久中文字幕三级久久日本| 久久久欧美国产精品| 嫩草影院入口| 精品人妻偷拍中文字幕| 18禁动态无遮挡网站| 欧美精品国产亚洲| 中国美白少妇内射xxxbb| 一区二区三区免费毛片| 中文字幕av成人在线电影| 亚洲国产成人一精品久久久| 国产欧美另类精品又又久久亚洲欧美| 免费看不卡的av| 好男人视频免费观看在线| 男女啪啪激烈高潮av片| 高清毛片免费看|