To see the other types of publications on this topic, follow the link: Cross-chain.

Journal articles on the topic 'Cross-chain'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cross-chain.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Masubuchi, Yuichi, Ankita Pandey, and Yoshifumi Amamoto. "Inter-Chain Cross-Correlation in Multi-Chain Slip-Link Simulations without Force Balance at Entanglements." Nihon Reoroji Gakkaishi 45, no. 4 (2017): 175–80. http://dx.doi.org/10.1678/rheology.45.175.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ledford, Dennis K. "Cephalosporin Side Chain Cross-reactivity." Journal of Allergy and Clinical Immunology: In Practice 3, no. 6 (2015): 1006–7. http://dx.doi.org/10.1016/j.jaip.2015.08.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Anvesh, Gunuganti. "Interoperability and Cross-Chain Security." Journal of Scientific and Engineering Research 8, no. 11 (2021): 179–85. https://doi.org/10.5281/zenodo.13348228.

Full text
Abstract:
The Blockchain protocol has become an essential technology capable of providing decentralization solutions for numerous industries. At the core of its progress, the idea of resembling Blockchains through a concept is known as integration. This review focuses on the underlying concept, technology development, and security issues in the interconnectivity of the Blockchain and cross-chain security. These cover the need for Blockchain integration to advance scalability and functionality, successful Blockchain integrations, and sharing insights on compliance. The study uses a systematic review approach whereby the PICOC model guides the research questions to enhance literature acquisition. Blockchain insists on innovations in standardization processes and procedures, high consensus algorithms, and security measures to realize secure cross-chain communication while decentralizing the network. Future research directions focus on scalability solutions, intelligible legislations, and consistent consensus algorithms that will further unlock the ability to use Blockchain for various applications.
APA, Harvard, Vancouver, ISO, and other styles
4

Huang, Qipeng, Minsheng Tan, and Wenlong Tian. "Cross-Chain Identity Authentication Method Based on Relay Chain." Information 16, no. 1 (2025): 27. https://doi.org/10.3390/info16010027.

Full text
Abstract:
The cross-chain identity authentication method based on relay chains provides a promising solution to the issues brought by the centralized notary mechanism. Nonetheless, it continues to encounter numerous challenges regarding data privacy, security, and issues of heterogeneity. For example, there is a concern regarding the protection of identity information during the cross-chain authentication process, and the incompatibility of cryptographic components across different blockchains during cross-chain transactions. We design and propose a cross-chain identity privacy protection method based on relay chains to address these issues. In this method, the decentralized nature of relay chains ensures that the cross-chain authentication process is not subject to subjective manipulation, guaranteeing the authenticity and reliability of the data. Regarding the compatibility issue, we unify the user keys according to the identity manager organization, storing them on the relay chain and eliminating the need for users to configure identical key systems. Additionally, to comply with General Data Protection Regulation (GDPR) principles, we store the user keys from the relay chain in distributed servers using the InterPlanetary File System (IPFS). To address privacy concerns, we enable pseudonym updates based on the user’s public key during cross-chain transactions. This method ensures full compatibility while protecting user privacy. Moreover, we introduce Zero-Knowledge Proof (ZKP) technology, ensuring that audit nodes cannot trace the user’s identity information with malicious intent. Our method offers compatibility while ensuring unlinkability and anonymity through thorough security analysis. More importantly, comparative analysis and experimental results show that our proposed method achieves lower computational cost, reduced storage cost, lower latency, and higher throughput. Therefore, our method demonstrates superior security and performance in cross-chain privacy protection.
APA, Harvard, Vancouver, ISO, and other styles
5

Rahul Arulkumaran,, Pattabi Rama Rao Thumati, Pavan Kanchi, Lagan Goel, and Prof.(Dr.) Arpit Jain. "Cross-Chain NFT Marketplaces with Layer Zero and Chain link." Modern Dynamics: Mathematical Progressions 1, no. 2 (2024): 316–36. http://dx.doi.org/10.36676/mdmp.v1.i2.26.

Full text
Abstract:
The introduction of non-fungible tokens (NFTs) has revolutionised digital ownership and asset management in the quickly changing environment of blockchain technology. NFTs are a kind of token that cannot be exchanged for another token. On the other hand, as the market for NFTs continues to grow, customers are becoming more and more interested in interoperability across various blockchain networks. Cross-chain non-fungible token markets have been developed as a result of this necessity. These marketplaces make it possible for different blockchain ecosystems to engage in transactions and interactions with one another. LayerZero and Chainlink are two technologies that are very significant in addressing the difficulty of interoperability across different chains.
APA, Harvard, Vancouver, ISO, and other styles
6

Herlihy, Maurice, Barbara Liskov, and Liuba Shrira. "Cross-chain deals and adversarial commerce." Proceedings of the VLDB Endowment 13, no. 2 (2019): 100–113. http://dx.doi.org/10.14778/3364324.3364326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hasamon, Pengman Mustakim Bin Melan Suhaila Abdul Hanan. "Reviews In Cross-Border Logistics; Problems And Contribution Toward The Global Supply Chain." Multicultural Education 7, no. 11 (2021): 268. https://doi.org/10.5281/zenodo.5679077.

Full text
Abstract:
<em>A high level of the economy, competition around the world has forced the business companiesto compete inoffering goods or services. It based on the respond to the needs of consumers with the best offerings under the times and expenses gaps. The revolution of the situation in each era has driven organizations to increase their capability to manage internal and external expectations together for organizational achievement. Therefore, cross-border logistics is one significant operation of all activities in term of logistics functions. This is to ensure for better trades between countries where the point of origin to final destination are formulated. The research indicates that the problems occurring in the global supply chain concern cross-border operations, logistics service providers and government administration. The most mentioned issue involved processes at the border area, especially for trading performed by logistics service providers and government administration. These reviews were established on the components of effective operations for global supply chain contribution including electronic processing system, infrastructure development and improvement of customs inspection.</em>
APA, Harvard, Vancouver, ISO, and other styles
8

Hu, Xiaohui, Hang Feng, Pengcheng Xia, et al. "Piecing Together the Jigsaw Puzzle of Transactions on Heterogeneous Blockchain Networks." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 3 (2024): 1–27. https://doi.org/10.1145/3700424.

Full text
Abstract:
The Web3 ecosystem is increasingly evolving to multi-chain, with decentralized applications (dApps) distributing across different blockchains, which drives the need for cross-chain bridges for blockchain interoperability. However, it further opens new attack surfaces, and media outlets have reported serious attacks related to cross-chain bridges. Nevertheless, few prior research studies have studied cross-chain bridges and their related transactions, especially from a security perspective. To fill the void, this paper presents the first comprehensive analysis of cross-chain transactions. We first make efforts to create by far the largest cross-chain transaction dataset based on semantic analysis of popular cross-chain bridges, covering 13 decentralized bridges and 7 representative blockchains, with over 80 million transactions in total. Based on this comprehensive dataset, we present the landscape of cross-chain transactions from angles including token usage, user profile and the purposes of transactions, etc. We further observe that cross-chain bridges can be abused for malicious/aggressive purposes, thus we design an automated detector and deploy it in the wild to flag misbehaviors from millions of cross-chain transactions. We have identified hundreds of abnormal transactions related to exploits and arbitrages, etc. Our research underscores the prevalence of cross-chain ecosystems, unveils their characteristics, and proposes an effective detector for pinpointing security threats.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Shuhui, Ruiyao Zhou, Lianhai Wang, Shujiang Xu, and Wei Shao. "Cross-Chain Asset Transaction Method Based on Ring Signature for Identity Privacy Protection." Electronics 12, no. 24 (2023): 5010. http://dx.doi.org/10.3390/electronics12245010.

Full text
Abstract:
In recent years, the rapid development of blockchain technology has facilitated the transfer of value and asset exchange between different blockchains. However, achieving interoperability among various blockchains necessitates the exploration of cross-chain technology. While cross-chain technology enables asset flow between different blockchains, it also introduces the risk of identity privacy leakage, thus posing a significant threat to user security. To tackle this issue, this article proposes a cross-chain privacy protection scheme that leverages ring signature and relay chain technology. Specifically, this scheme utilizes RCROSS contracts based on ring signatures to handle cross-chain transactions, thereby ensuring the privacy of both parties involved in the transaction. This cross-chain solution demonstrates practicality and efficiency in facilitating cross-chain asset trading. Furthermore, it effectively combats reuse attacks and man-in-the-middle attacks at the application layer while also providing resistance against denial-of-service attacks at the network layer. To validate the proposed cross-chain solution, we conducted tests by constructing a specific cross-chain scenario and by focusing on the natural gas consumption values generated by the RCROSS contract function used in the application chain. The findings indicate that our proposed solution is highly practical in safeguarding the identity privacy of transaction participants. This article’s framework guarantees reliability, security, and efficiency in cross-chain asset transactions. By incorporating ring-based signatures and relay chain technology, users can confidently protect their identity privacy, thus ensuring secure and smooth cross-chain transactions.
APA, Harvard, Vancouver, ISO, and other styles
10

Ding, Yuhang, Yanran Zhang, Bo Qin, Qin Wang, Zihan Yang, and Wenchang Shi. "A Scalable Cross-Chain Access Control and Identity Authentication Scheme." Sensors 23, no. 4 (2023): 2000. http://dx.doi.org/10.3390/s23042000.

Full text
Abstract:
Cross-chain is an emerging blockchain technology which builds the bridge across homogeneous and heterogeneous blockchains. However, due to the differentiation of different blockchains and the lack of access control and identity authentication of cross-chain operation subjects, existing cross-chain technologies are struggling to accomplish the identity transformation of cross-chain subjects between different chains, and also pose great challenges in terms of the traceability and supervision of dangerous transactions. To address the above issues, this paper proposes a scalable cross-chain access control and identity authentication scheme, which can authenticate the legitimacy of blockchains in the cross-chain system and ensure that all cross-chain operations are carried out by verified users. Furthermore, it will record all cross-chain operations with the help of Superchain in order to regulate and trace illegal transactions. Our scheme is scalable and, at the same time, has low invasiveness to blockchains in the cross-chain system. We implement the scheme and accordingly conduct the evaluations, which prove its security, efficiency, and scalability.
APA, Harvard, Vancouver, ISO, and other styles
11

Han, Yutong, Chundong Wang, Huaibin Wang, Yi Yang, and Xi Wang. "A study of blockchain-based liquidity cross-chain model." PLOS ONE 19, no. 6 (2024): e0302145. http://dx.doi.org/10.1371/journal.pone.0302145.

Full text
Abstract:
Blockchain cross-chaining is about interconnectivity and interoperability between chains and involves both physical to virtual digital aspects and cross-chaining between digital networks. During the process, the liquidity transfer of information or assets can increase the use of items with other chains, so it is worth noting that the enhancement of cross-chain liquidity is of great practical importance to cross-chain technology. In this model, Layerzero is used as the primary secure cross-chain facility to build a full-chain identity by unifying NFT-distributed autonomous cross-chain identity IDs; applying super-contract pairs to enhance cross-chain liquidity; and initiating a dynamic transaction node creditworthiness model to increase the security of the cross-chain model and its risk management. Finally, by verifying three important property metrics timeliness is improved by at least 18%, robustness is increased by at least 50.9%, and radius of convergence is reduced by at least 25%. It is verified that the liquidity cross-chain model can eliminate the authentication transition between hierarchies while saving the cross-chain time cost, as a way to truly realize the liquid interoperability between multiple chains of blockchain.
APA, Harvard, Vancouver, ISO, and other styles
12

Hu, Xiaohui, Hang Feng, Pengcheng Xia, et al. "Piecing Together the Jigsaw Puzzle of Transactions on Heterogeneous Blockchain Networks." ACM SIGMETRICS Performance Evaluation Review 53, no. 1 (2025): 192–94. https://doi.org/10.1145/3744970.3727306.

Full text
Abstract:
The Web3 ecosystem is increasingly evolving to include multiple chains, with decentralized applications (dApps) distributed across different blockchains. This has driven the need for cross-chain bridges to enable blockchain interoperability. However, this opens up novel attack surface, and media outlets have reported serious attacks related to cross-chain bridges. Nevertheless, few prior works have studied cross-chain bridges and their related transactions, especially from a security perspective. To fill the void, this paper presents the first comprehensive analysis of cross-chain transactions. We first build a cross-chain transaction dataset based on semantic analysis of popular cross-chain bridges, covering 13 decentralized bridges and 7 representative blockchains, with over 80 million transactions in total. Based on this comprehensive dataset, we study the landscape of cross-chain transactions from several angles, including token usage, user profile and the purposes of transactions. We further observe that cross-chain bridges can be abused for malicious/aggressive purposes. Thus we design an automated detector and deploy it in-the-wild to flag misbehaviors from millions of cross-chain transactions. We identify hundreds of abnormal transactions related to exploits and arbitrages, etc. Our research underscores the importance of the cross-chain ecosystem, and offers an effective detector for pinpointing security threats.
APA, Harvard, Vancouver, ISO, and other styles
13

Chen, Longfei, Zhongyuan Yao, Xueming Si, and Qian Zhang. "Three-Stage Cross-Chain Protocol Based on Notary Group." Electronics 12, no. 13 (2023): 2804. http://dx.doi.org/10.3390/electronics12132804.

Full text
Abstract:
With the continuous development of blockchain technology and economy, blockchain applications have been well developed in multiple key areas. The demand for interoperability between different blockchains is also increasing. Cross-chain protocol has become a major approach to solve cross-chain problems by defining a series of cross-chain processes and standards. In response to the problems of long transaction time, high transaction costs, and high degree of centralization in most cross-chain protocols, this paper proposes a three-stage cross-chain protocol based on transaction notary groups and verification notary groups. Without increasing transaction costs and transaction time, the centralization problem of notary mechanism cross-chain technology is solved, realizing secure and fast interaction between different blockchains. Experimental results show that as long as malicious nodes in the notary group do not exceed one-third, the three-stage cross-chain protocol can effectively ensure the security of cross-chain transactions and solve the centralization problem.
APA, Harvard, Vancouver, ISO, and other styles
14

Phuoc Thong, Tran Nguyen, and Dao Thi Thu Hang. "Premilinary analysis of cross-shareholding in the green supply chain and recommendations for regulatory policy in the Philippines." Southeastern Philippines Journal of Research and Development 28, no. 2 (2023): 55–67. http://dx.doi.org/10.53899/spjrd.v28i2.252.

Full text
Abstract:
Cross-shareholding is increasingly used in supply chains to improve strategic synergy between companies. However, regulations on cross-ownership within green supply chains are still in their early stages of development. Cross-ownership affects both the government’s pricing strategy and its carbon reduction policies. Additionally, the cross-shareholding structure impacts the profitability of the supply chain by introducing power dynamics between manufacturers and retailers. When cross-shareholding regulations and models are implemented, manufacturers and retailers within the supply chain exhibit more substantial reductions in their carbon footprint and experience increased profits, particularly in decentralized supply chains when cross ownership surpasses a specific threshold. The adoption of cross-shareholding profit-sharing agreements could enhance the performance of green supply chains. This article synthesizes the views of scholars on cross shareholding in the supply chain. It uses analytical methods to evaluate the role of the negotiation process, trade credit, and cross-shareholding in the supply chain. The article uses jurisprudence to recommend a cross shareholding policy in the Philippines to enhance supply chain efficiency. It uses the “Stackelberg Leadership Model” to analyze the impact of cross-shareholding on two levels of the supply chain, offering recommendations for future implementation to improve supply chain efficiency. The article recommends that the Philippines’ supply chain policy include mechanisms to encourage new companies to join the existing cross-ownership network, capitalize on the impact of cross-shareholding on supply chain assessment, and develop ways to use equity ratio and trade credit. These recommendations aim to refine policy and legislation in the Philippines to effectively utilize trade credit, equity ratios, and cross-shareholdings in supply chain management.
APA, Harvard, Vancouver, ISO, and other styles
15

She, Wei, Bo Wang, Zhao Tian, Jian sen Chen, Wei Liu, and Zhihao Gu. "A channel matching scheme for cross-chain." International Journal of Embedded Systems 1, no. 1 (2020): 1. http://dx.doi.org/10.1504/ijes.2020.10027914.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

She, Wei, Zhi hao Gu, Wei Liu, Jian sen Chen, Bo Wang, and Zhao Tian. "A channel matching scheme for cross-chain." International Journal of Embedded Systems 12, no. 4 (2020): 500. http://dx.doi.org/10.1504/ijes.2020.107646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Krone, Volker, Helmut Ringsdorf, Martina Ebert, Harald Hirschmann, and Joachim H. Wendorff. "Cross-shaped mesogens in main chain polymers." Liquid Crystals 9, no. 2 (1991): 195–206. http://dx.doi.org/10.1080/02678299108035497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Shao, Bin, and Kunpeng Li. "Cross-Sale In Integrated Supply Chain System." Journal of Business & Economics Research (JBER) 10, no. 5 (2012): 277. http://dx.doi.org/10.19030/jber.v10i5.6979.

Full text
Abstract:
In this article, we study two manufacturers, each producing a single substituting product, selling the products through their own centralized distribution channels, and also using each others distribution channel at their choice. Distribution channels are also substitutable. Using price competition and a game theoretic approach, we find that the same products can be sold at a higher price in the cross-sale channel than in its own centralized distribution channel. The first mover in doing a cross-sale doesnt necessarily enjoy the advantage in terms of higher profit. Not only manufacturers can charge higher prices for their own and cross-sold product from their competitor, but also cross-sale increases the profits of both manufacturers; and most importantly, cross-sale improves the systems profit dramatically.
APA, Harvard, Vancouver, ISO, and other styles
19

Datta, Anwitaman, Daniël Reijsbergen, Jingchi Zhang, and Suman Majumder. "BlockChain I/O: Enabling Cross-Chain Commerce." IEEE Access 12 (2024): 90915–28. http://dx.doi.org/10.1109/access.2024.3421527.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Mohammed Abdul, Shezon Saleem, Anup Shrestha, and Jianming Yong. "CrossDeFi: A Novel Cross-Chain Communication Protocol." Future Internet 16, no. 9 (2024): 314. http://dx.doi.org/10.3390/fi16090314.

Full text
Abstract:
Decentralized finance (DeFi) is rapidly evolving, promising to revolutionize financial services through blockchain technology. Successful integration of asset transfers across diverse DeFi platforms hinges on effective interoperability and transaction finality, ensuring security and cost efficiency. This paper introduces CrossDeFi, a novel cross-chain communication protocol tailored to address the challenges posed by heterogeneity in consensus mechanisms, smart contracts, and token systems. CrossDeFi introduces two key mechanisms: Miner and bridge selection (MBS) and improved transfer confirmation (ITC). The MBS mechanism optimizes the selection of miners and bridges based on the unique characteristics of each blockchain, significantly improving transfer accuracy, cost efficiency, and speed. Meanwhile, the ITC mechanism leverages cryptographic primitives to secure asset transfer confirmations, ensuring robust transaction finality. The protocol’s effectiveness is demonstrated through detailed efficiency and security analyses, complemented by a prototype evaluation that showcases its capabilities in reducing transfer durations and costs. These findings underscore the potential of CrossDeFi to transform the DeFi ecosystem.
APA, Harvard, Vancouver, ISO, and other styles
21

Vogt, John Joseph. "THE SUCCESSFUL CROSS-DOCK BASED SUPPLY CHAIN." Journal of Business Logistics 31, no. 1 (2010): 99–119. http://dx.doi.org/10.1002/j.2158-1592.2010.tb00130.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Mintmire, J. W., and C. T. White. "Theoretical photoelectron cross sections for chain polymers." International Journal of Quantum Chemistry 24, S17 (2009): 609–12. http://dx.doi.org/10.1002/qua.560240864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Davies, Gareth, Angela Mison, and Richard Ward. "Cross-disciplinary AI supply chain risk assessment." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 185–90. http://dx.doi.org/10.34190/iccws.19.1.2179.

Full text
Abstract:
While AI remains chip based and part of both commercial and national strategic superiority goals, it is useful to examine the security and risks associated with achieving those goals. The future strategy rests perilously on an unstable inverted triangle of financial and economic reality. This paper presents the AI chip supply chain as an inverted triangle which base/apex is dependent on a global single supplier with the capability of producing equipment essential for their manufacture. It highlights the dependence on a single company for the fabrication of those chips, and the security risks associated with that supplier being Taiwanese in limited foreign ownership. It is suggested that the increasing tensions between China and the USA have resulted, in part, from this dependence, which was demonstrated by the supply chain crisis resulting from Covid-19. The attempt to reduce this dependence led to the CHIPS and Science Act 2022, signed into law by President Biden. In part of the inverted triangle are found Big Tech and the major Cloud Service Providers. They vary between 60% - 80% of their market capital being in financial institutional ownership, most of which is held by a very limited number of institutions, not all of whom are publicly quoted. To doubt the influence wielded by those financial institutions, just a single institution with major Big Tech and Cloud holdings has, at 31 December 2022, USD 8.59 trillion of assets under management. This represents economic power and places it between the equivalent Gross Domestic Product of China (USD 19.37 trillion) and Japan (USD 4.41 trillion) the second and third entries behind the USA in the GDP rankings. Financial institutions are market driven to achieve growth, contribute to economic stability, and are to an extent regulated by unelected vested interests and organisations. The battlefield for national supremacy of AI may concern chips, until the arrival of quantum AI. Current Chinese economic woes are providing the momentum for pre-emptive strikes at the semiconductor industry, and an inverted triangle is neither a secure nor stable structure for a supply chain.
APA, Harvard, Vancouver, ISO, and other styles
24

Lu, Shaofei, Jingru Pei, Renke Zhao, et al. "CCIO: A Cross-Chain Interoperability Approach for Consortium Blockchains Based on Oracle." Sensors 23, no. 4 (2023): 1864. http://dx.doi.org/10.3390/s23041864.

Full text
Abstract:
Cross-chain interoperability can expand the ability of data interaction and value circulation between different blockchains, especially the value interaction and information sharing between industry consortium blockchains. However, some current public blockchain cross-chain technologies or data migration schemes between consortium blockchains need help to meet the consortium blockchain requirements for efficient two-way data interaction. The critical issue to solve in cross-chain technology is improving the efficiency of cross-chain exchange while ensuring the security of data transmission outside the consortium blockchain. In this article, we design a cross-chain architecture based on blockchain oracle technology. Then, we propose a bidirectional information cross-chain interaction approach (CCIO) based on the former architecture, we novelly improve three traditional blockchain oracle patterns, and we combine a mixture of symmetric and asymmetric keys to encrypt private information to ensure cross-chain data security. The experimental results demonstrate that the proposed CCIO approach can achieve efficient and secure two-way cross-chain data interactions and better meet the application needs of large-scale consortium blockchains.
APA, Harvard, Vancouver, ISO, and other styles
25

Fang, Zhiqi, and Qifeng Wang. "Cross-Border E-Commerce Supply Chain Risk Evaluation with FUZZY-ISM Model." Security and Communication Networks 2021 (September 6, 2021): 1–14. http://dx.doi.org/10.1155/2021/5155524.

Full text
Abstract:
As a main new business model of Internet plus foreign trade, cross-border e-commerce has become an important way and breakthrough for China creating new foreign trade requirements in Internet economy. Cross-border supply chain management is one of the most important supports for cross-border e-commerce. Compared with domestic e-commerce, the supply chain of cross-border e-commerce faces more risks. In order to effectively identify and avoid the operational risks in the cross-border e-commerce supply chain, this article firstly analyzes the cross-border e-commerce supply chain risks from the operation process of the cross-border e-commerce supply chain. The risks include product selection management risks, cross-border transaction risks, and customs clearance risks that exist in the operation of cross-border e-commerce. Secondly, the cross-border e-commerce supply chain risk evaluation index system is established based on the risk elements. Finally, the risk evaluation is carried out through the FUZZY-ISM evaluation method, and the internal connection of each risk factor and the risk generation mechanism are revealed through structural model analysis, which provides a theoretical reference for cross-border e-commerce enterprise supply chain risk management.
APA, Harvard, Vancouver, ISO, and other styles
26

Masubuchi, Yuichi, and Yoshifumi Amamoto. "Effect of Osmotic Force on Orientational Cross-correlation in Primitive Chain Network Simulation." Nihon Reoroji Gakkaishi 44, no. 4 (2016): 219–22. http://dx.doi.org/10.1678/rheology.44.219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

BINDU, RUPA SUNIL, and B. B. AHUJA. "Rejuvenating the Supply Chain by Benchmarking using Fuzzy Cross-Boundary Performance Evaluation Approach." International Journal of Engineering and Technology 2, no. 6 (2010): 547–57. http://dx.doi.org/10.7763/ijet.2010.v2.180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Duval, Cédric, Peter Allan, Simon D. A. Connell, Victoria C. Ridger, Helen Philippou та Robert A. S. Ariëns. "Roles of fibrin α- and γ-chain specific cross-linking by FXIIIa in fibrin structure and function". Thrombosis and Haemostasis 111, № 05 (2014): 842–50. http://dx.doi.org/10.1160/th13-10-0855.

Full text
Abstract:
SummaryFactor XIII is responsible for the cross-linking of fibrin γ-chains in the early stages of clot formation, whilst α-chain cross-linking occurs at a slower rate. Although γ- and α-chain cross-linking was previously shown to contribute to clot stiffness, the role of cross-linking of both chains in determining clot structure is currently unknown. Therefore, the aim of this study was to determine the role of individual α- and γ-chain cross-linking during clot formation, and its effects on clot structure. We made use of a recombinant fibrinogen (γQ398N/Q399N/K406R), which does not allow for y-chain cross-linking. In the absence of cross-linking, intact D-D interface was shown to play a potential role in fibre appearance time, clot stiffness and elasticity. Cross-linking of the fibrin α-chain played a role in the thickening of the fibrin fibres over time, and decreased lysis rate in the absence of α2-antiplasmin. We also showed that α-chain cross-linking played a role in the timing of fibre appearance, straightening fibres, increasing clot stiffness and reducing clot deformation. Cross-linking of the γ-chain played a role in fibrin fibre appearance time and fibre density. Our results show that α- and γ-chain cross-linking play independent and specific roles in fibrin clot formation and structure.
APA, Harvard, Vancouver, ISO, and other styles
29

Kohale, Swapnil C., and Rajesh Khare. "Cross stream chain migration in nanofluidic channels: Effects of chain length, channel height, and chain concentration." Journal of Chemical Physics 130, no. 10 (2009): 104904. http://dx.doi.org/10.1063/1.3078798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Liao, Zeqin, Yuhong Nan, Henglong Liang, et al. "SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis." Proceedings of the ACM on Software Engineering 1, FSE (2024): 249–70. http://dx.doi.org/10.1145/3643738.

Full text
Abstract:
With the increasing popularity of blockchain, different blockchain platforms coexist in the ecosystem (e.g., Ethereum, BNB, EOSIO, etc.), which prompts the high demand for cross-chain communication. Cross-chain bridge is a specific type of decentralized application for asset exchange across different blockchain platforms. Securing the smart contracts of cross-chain bridges is in urgent need, as there are a number of recent security incidents with heavy financial losses caused by vulnerabilities in bridge smart contracts, as we call them Cross-Chain Vulnerabilities (CCVs). However, automatically identifying CCVs in smart contracts poses several unique challenges. Particularly, it is non-trivial to (1) identify application-specific access control constraints needed for cross-bridge asset exchange, and (2) identify inconsistent cross-chain semantics between the two sides of the bridge. In this paper, we propose SmartAxe, a new framework to identify vulnerabilities in cross-chain bridge smart contracts. Particularly, to locate vulnerable functions that have access control incompleteness, SmartAxe models the heterogeneous implementations of access control and finds necessary security checks in smart contracts through probabilistic pattern inference. Besides, SmartAxe constructs cross-chain control-flow graph (xCFG) and data-flow graph (xDFG), which help to find semantic inconsistency during cross-chain data communication. To evaluate SmartAxe, we collect and label a dataset of 88 CCVs from real-attacks cross-chain bridge contracts. Evaluation results show that SmartAxe achieves a precision of 84.95% and a recall of 89.77%. In addition, SmartAxe successfully identifies 232 new/unknown CCVs from 129 real-world cross-chain bridge applications (i.e., from 1,703 smart contracts). These identified CCVs affect a total amount of digital assets worth 1,885,250 USD
APA, Harvard, Vancouver, ISO, and other styles
31

Si, Haiping, Weixia Li, Qingyi Wang, Haohao Cao, Fernando Bacao, and Changxia Sun. "A secure cross-domain interaction scheme for blockchain-based intelligent transportation systems." PeerJ Computer Science 9 (November 15, 2023): e1678. http://dx.doi.org/10.7717/peerj-cs.1678.

Full text
Abstract:
In the intelligent transportation system (ITS), secure and efficient data communication among vehicles, road testing equipment, computing nodes, and transportation agencies is important for building a smart city-integrated transportation system. However, the traditional centralized processing approach may face threats in terms of data leakage and trust. The use of distributed, tamper-proof blockchain technology can improve the decentralized storage and security of data in the ITS network. However, the cross-trust domain devices, terminals, and transportation agencies in the heterogeneous blockchain network of the ITS still face great challenges in trusted data communication and interoperability. In this article, we propose a heterogeneous cross-chain interaction mechanism based on relay nodes and identity encryption to solve the problem of data cross-domain interaction between devices and agencies in the ITS. First, we propose the ITS cross-chain communication framework and improve the cross-chain interaction model. The relay nodes are interconnected through libP2P to form a relay node chain, which is used for cross-chain information verification and transmission. Secondly, we propose a relay node secure access scheme based on identity-based encryption to provide reliable identity authentication for relay nodes. Finally, we build a standard cross-chain communication protocol and cross-chain transaction lifecycle for this mechanism. We use Hyperledger Fabric and FISCO BCOS blockchain to design and implement this solution, and verify the feasibility of this cross-chain interaction mechanism. The experimental results show that the mechanism can achieve a stable data cross-chain read throughput of 2,000 transactions per second, which can meet the requirements of secure and efficient cross-chain communication and interaction among heterogeneous blockchains in the ITS, and has high application value.
APA, Harvard, Vancouver, ISO, and other styles
32

Standeven, Kristina F., Angela M. Carter, Peter J. Grant та ін. "Functional analysis of fibrin γ-chain cross-linking by activated factor XIII: determination of a cross-linking pattern that maximizes clot stiffness". Blood 110, № 3 (2007): 902–7. http://dx.doi.org/10.1182/blood-2007-01-066837.

Full text
Abstract:
Abstract Activated coagulation factor XIII (FXIIIa) cross-links the γ-chains of fibrin early in clot formation. Cross-linking of the α-chains occurs more slowly, leading to high molecular weight multimer formations that can also contain γ-chains. To study the contribution of FXIIIa-induced γ-chain cross-linking on fibrin structure and function, we created 2 recombinant fibrinogens (γQ398N/Q399N/K406R and γK406R) that modify the γ-chain cross-linking process. In γK406R, γ-dimer cross-links were absent, but FXIIIa produced a cross-linking pattern similar to that observed in tissue transglutaminase cross-linked fibrin(ogen) with mainly α-γ cross-links. In Q398N/Q399N/K406R, cross-links with any γ-chain involvement were completely absent, and only α-chain cross-linking occurred. Upon cross-linking, recombinant normal fibrin yielded a 3.5-fold increase in stiffness, compared with a 2.5-fold increase by α-chain cross-linking alone (γQ398N/Q399N/K406R). γK406R fibrin showed a 1.5-fold increase in stiffness after cross-linking. No major differences in clot morphology, polymerization, and lysis rates were observed, although fiber diameter was slightly lower in cross-linked normal fibrin relative to the variants. Our results show that γ-chain cross-linking contributes significantly to clot stiffness, in particular through γ-dimer formation; α-γ hybrid cross-links had the smallest impact on clot stiffness.
APA, Harvard, Vancouver, ISO, and other styles
33

Vogt, John, and Wessel Pienaar. "Implementation of cross-docks." Corporate Ownership and Control 8, no. 1 (2010): 474–84. http://dx.doi.org/10.22495/cocv8i1c4p6.

Full text
Abstract:
The cross-dock-based supply chain is an integrated supply chain which uses the unique characteristics of a cross-dock to speed goods to downstream customers. A comparison is made with the warehouse process to demonstrate the improved efficiency of a cross-dock supply chain. There are three types of cross-docks and they all utilize the same design parameters to determine the shape and size of the facility. A method to determine these parameters is presented and practical design methods are illustrated. The relative advantages of manual and automated processes are discussed.
APA, Harvard, Vancouver, ISO, and other styles
34

Husain, SS, AA Hasan, and AZ Budzynski. "Differences between binding of one-chain and two-chain tissue plasminogen activators to non-cross-linked and cross-linked fibrin clots." Blood 74, no. 3 (1989): 999–1006. http://dx.doi.org/10.1182/blood.v74.3.999.999.

Full text
Abstract:
Abstract Interaction of tissue plasminogen activator (t-PA) with fibrin plays a key role in regulation of plasminogen activation and clot dissolution. Previous investigations of t-PA-fibrin interaction, using incorporation of t-PA into polymerizing fibrin clots, have suggested that no significant differences exist in the binding of one-chain or two-chain t-PA to non-cross-linked or cross-linked fibrin. In the present study, binding of 125I-labeled and affinity-purified one-chain and two-chain forms of t-PA to preformed non-cross-linked or cross-linked, sonicated suspension of fibrin was investigated. Interaction of one-chain t-PA with cross-linked fibrin involved a single type of binding site with dissociation constant (kd) of 0.58 mumol/L and a stoichiometry (n) of 1.5. Interaction of one-chain t-PA with non-cross-linked fibrin, however, involved two classes of binding sites with dissociation constants of 0.32 and 1.5 mumol/L and corresponding number of binding sites equal to 0.57 and 2.0, respectively. In contrast to the binding of one-chain t-PA to cross-linked fibrin by a limited number of sites, two-chain t-PA appeared to involve a considerably greater number of sites (minimum six) whose dissociation constant was 3.2 mumol/L. Interaction of two-chain t-PA with non-cross-linked fibrin also showed the presence of many binding sites (minimum seven) with approximate dissociation constant of 6.4 mumol/L, as well as a few (n = 0.012) high- affinity sites with a kd of 0.011 mumol/L epsilon-Aminocaproic acid did not completely reverse the binding of either one-chain t-PA or two- chain t-PA to fibrin. The present findings suggest that the fibrin- binding properties of t-PA undergo considerable changes on proteolytic conversion from one-chain to two-chain t-PA, catalyzed under physiologic conditions by plasmin. The cleavage of one-chain t-PA to two-chain t-PA allows to bind to a large number of low-affinity binding sites on fibrin. Cross-linking of fibrin by factor XIIIa results in masking of high-affinity binding sites that are present in non-cross- linked fibrin. We propose that both plasmin and factor XIIIa play an important regulatory role in dissolution of blood clots by modulating t- PA-fibrin interaction.
APA, Harvard, Vancouver, ISO, and other styles
35

Husain, SS, AA Hasan, and AZ Budzynski. "Differences between binding of one-chain and two-chain tissue plasminogen activators to non-cross-linked and cross-linked fibrin clots." Blood 74, no. 3 (1989): 999–1006. http://dx.doi.org/10.1182/blood.v74.3.999.bloodjournal743999.

Full text
Abstract:
Interaction of tissue plasminogen activator (t-PA) with fibrin plays a key role in regulation of plasminogen activation and clot dissolution. Previous investigations of t-PA-fibrin interaction, using incorporation of t-PA into polymerizing fibrin clots, have suggested that no significant differences exist in the binding of one-chain or two-chain t-PA to non-cross-linked or cross-linked fibrin. In the present study, binding of 125I-labeled and affinity-purified one-chain and two-chain forms of t-PA to preformed non-cross-linked or cross-linked, sonicated suspension of fibrin was investigated. Interaction of one-chain t-PA with cross-linked fibrin involved a single type of binding site with dissociation constant (kd) of 0.58 mumol/L and a stoichiometry (n) of 1.5. Interaction of one-chain t-PA with non-cross-linked fibrin, however, involved two classes of binding sites with dissociation constants of 0.32 and 1.5 mumol/L and corresponding number of binding sites equal to 0.57 and 2.0, respectively. In contrast to the binding of one-chain t-PA to cross-linked fibrin by a limited number of sites, two-chain t-PA appeared to involve a considerably greater number of sites (minimum six) whose dissociation constant was 3.2 mumol/L. Interaction of two-chain t-PA with non-cross-linked fibrin also showed the presence of many binding sites (minimum seven) with approximate dissociation constant of 6.4 mumol/L, as well as a few (n = 0.012) high- affinity sites with a kd of 0.011 mumol/L epsilon-Aminocaproic acid did not completely reverse the binding of either one-chain t-PA or two- chain t-PA to fibrin. The present findings suggest that the fibrin- binding properties of t-PA undergo considerable changes on proteolytic conversion from one-chain to two-chain t-PA, catalyzed under physiologic conditions by plasmin. The cleavage of one-chain t-PA to two-chain t-PA allows to bind to a large number of low-affinity binding sites on fibrin. Cross-linking of fibrin by factor XIIIa results in masking of high-affinity binding sites that are present in non-cross- linked fibrin. We propose that both plasmin and factor XIIIa play an important regulatory role in dissolution of blood clots by modulating t- PA-fibrin interaction.
APA, Harvard, Vancouver, ISO, and other styles
36

Li, Cui, Doudou Wu, and Tengfei Shao. "Research on Sustainable Cooperation Strategies for Cross-Regional Supply Chain Enterprises in Uncertain Environments." Sustainability 15, no. 22 (2023): 15707. http://dx.doi.org/10.3390/su152215707.

Full text
Abstract:
Considering the fuzziness of cooperation and the sustainability of the redevelopment of cross-regional supply chain enterprises, the fuzzy participation degree and the generalized redistribution coefficient are introduced to describe the problem of cooperation and benefit distribution of cross-regional supply chain enterprises. A fuzzy average monotone game is constructed to study the strategies of cross-regional supply chain enterprises to increase the average benefit with the expansion of the alliance scale; a generalized fuzzy reduced game is discussed to ensure the partner selection decision of supply chain enterprises; the concepts of generalized fuzzy core, generalized fuzzy bargaining set, and generalized fuzzy proportional distribution are proposed; the equivalence between the generalized fuzzy core and the generalized fuzzy bargaining set of the fuzzy average monotone game of the cross-regional supply chain enterprises is proved; the nonempty generalized fuzzy core solution of the fuzzy average monotone game is characterized; and the example analysis shows the stability of the cross-regional supply chain enterprise alliance and the existence of the optimal generalized redistribution scheme. The research results not only satisfy the willingness of cross-regional supply chain enterprises to participate in cooperation with some resources from the “environmental” pillar of supply chain enterprise management sustainability but also achieve the strategy of retaining partial benefits for the redevelopment of supply chain alliances from the “economic” pillar of supply chain enterprise management sustainability, which provides a theoretical basis for the cooperation and benefit redistribution of cross-regional supply chain enterprises under uncertain environments.
APA, Harvard, Vancouver, ISO, and other styles
37

Wu, Qun. "Cluster Supply Chain Self-Organization Evolution Based on Cross-Chain Co-Opetition Game." Advanced Materials Research 225-226 (April 2011): 1230–33. http://dx.doi.org/10.4028/www.scientific.net/amr.225-226.1230.

Full text
Abstract:
Cluster supply chain network as a new organizational system, which co-opetition is different from general enterprises and single supply chains because of their determined structural features and operational characteristics. There are single-chain co-opetition and cross-links dynamics co-opetition in cluster supply chain network organization. It analyzes cross-links non-cooperative game and cooperative game of two third-order supply chains through the expansion research of Cournot game. The results indicate that supply chain cooperative game is the best option for supply chain win-win.
APA, Harvard, Vancouver, ISO, and other styles
38

Jia, Leigang, Bilin Shao, and Genqing Bian. "Cross-Chain Technology of Consortium Blockchain Based on Identity Authentication." Electronics 14, no. 6 (2025): 1185. https://doi.org/10.3390/electronics14061185.

Full text
Abstract:
With consortium blockchain becoming the mainstream form of blockchain applied to various industries, the proportion of nonasset data in blockchain applications is gradually increasing. However, there is currently no cross-chain solution for nonasset data. The aim of this study is to explore the cross-chain problem of nonasset data and design a cross-chain solution that is suitable for the application scenarios of consortium blockchains. We achieved cross-chain identity authentication through an integrated distributed trust model. We then proposed cross-chain anchor nodes as alternatives to traditional routing, eliminating third-party Relay risks while ensuring secure information transmission through smart contracts. Finally, on the basis of ensuring the timeliness and reliability of data transmission, combined with the consortium blockchain organizational structure, cross-chain technology is more in line with the characteristics of data element circulation. This study provides an effective and secure solution for cross-chain interaction and application data flow in consortium blockchains through comprehensive smart contract protection mechanisms and rigorous access controls. The proposed approach is expected to promote the safe application and development of consortium blockchain technology in various industries.
APA, Harvard, Vancouver, ISO, and other styles
39

Chai, Linzheng, Jian Yang, Tao Sun, et al. "XCOT: Cross-lingual Instruction Tuning for Cross-lingual Chain-of-Thought Reasoning." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 22 (2025): 23550–58. https://doi.org/10.1609/aaai.v39i22.34524.

Full text
Abstract:
Chain-of-thought (CoT) has emerged as a powerful technique to elicit reasoning in large language models and improve a variety of downstream tasks. CoT mainly demonstrates excellent performance in English, but its usage in low-resource languages is constrained due to poor language generalization. To bridge the gap among different languages, we propose a cross-lingual instruction fine-tuning framework (xCoT) to transfer knowledge from high-resource languages to low-resource languages. Specifically, the multilingual instruction training data (xCoT-Instruct) is created to encourage the semantic alignment of multiple languages. We introduce cross-lingual in-context few-shot learning (xICL) to accelerate multilingual agreement in instruction tuning, where some fragments of source languages in examples are randomly substituted by their counterpart translations of target languages. During multilingual instruction tuning, we adopt the randomly online CoT strategy to enhance the multilingual reasoning ability of the large language model by first translating the query to another language and then answering in English. To further facilitate the language transfer, we leverage the high-resource CoT to supervise the training of low-resource languages with cross-lingual distillation. Experimental results demonstrate the superior performance of xCoT in reducing the gap among different languages, highlighting its potential to reduce the cross-lingual gap.
APA, Harvard, Vancouver, ISO, and other styles
40

顾, 霞. "Research on Optimization of Cross-Border E-Commerce Supply Chain and Value Chain." E-Commerce Letters 13, no. 03 (2024): 6405–13. http://dx.doi.org/10.12677/ecl.2024.133790.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Wang, Yichuan, Yiliang Yan, Yaling Zhang, Mengjie Tian, and Xiaoxue Liu. "Ensuring Cross-Chain Transmission Technique Utilizing TPM and Establishing Cross-Trusted Root Security via SM Algorithm." Electronics 13, no. 15 (2024): 2978. http://dx.doi.org/10.3390/electronics13152978.

Full text
Abstract:
As blockchain technology advances, cross-chain interoperability has become a crucial requirement for achieving seamless interaction among multiple chains. To solve this problem, this paper proposes a scholarly approach to the development of a cross-chain-secure transmission technique, incorporating the Trusted Platform Module (TPM) and the SM algorithm, which is based on trusted roots. This research paper elaborates on the design and implementation of the cross-chain-secure transmission technique based on TPM and the SM algorithm, emphasizing the academic rigor necessary for addressing the security requirements of cross-chain interactions. The research shows that compared with the previous method, the throughput of production capacity is not significantly different from that before and after adding the network delay, and the success rate of preventing attacks is increased by 46.9% by simulating related attacks. After multiple rounds of experiments, the effectiveness and feasibility of this technology in protecting cross-chain communication data are verified.
APA, Harvard, Vancouver, ISO, and other styles
42

Jin, Haishui, and Yuting Zhang. "SUPPLY CHAIN INTERNAL RISK RECOGNITION OF CROSS-REGIONAL EXPANSION OF CHAIN RETAIL ENTERPRISES-BASED ON IMPROVED SCOR MODEL." International Journal of Education and Social Science Research 05, no. 03 (2022): 108–20. http://dx.doi.org/10.37500/ijessr.2022.5307.

Full text
Abstract:
With the development of economic globalization, more and more internationally renowned chain retail enterprises are flooding into the Chinese retail market, which leads to the fierce competition of chain retail products. In order to gain market space in the fierce competition, Chinese chain retail enterprises usually adopt the form of cross-regional expansion. However, the cross-regional expansion of chain retail enterprises involves scattered entities and long chains, which brings supply chain risks to enterprises. For the sake of systematically identify the internal risks in the supply chain caused by the cross-regional expansion of chain retail enterprises, the improved SCOR model is adopted to identify the risks.
APA, Harvard, Vancouver, ISO, and other styles
43

Chen, Chang, Guoyu Yang, Zhihao Li, Fuan Xiao, Qi Chen, and Jin Li. "Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols." Cryptography 8, no. 1 (2024): 6. http://dx.doi.org/10.3390/cryptography8010006.

Full text
Abstract:
Cross-chain transaction technologies have greatly promoted the scalability of cryptocurrencies, which then facilitates the development of Metaverse applications. However, existing solutions rely heavily on centralized middleware (notary) or smart contracts. These schemes lack privacy considerations, and users’ cross-chain transactions are easy to master by other parties. Some signature-based payment schemes have good privacy but do not support multi-party cross-chain protocols or rely heavily on some time assumptions. The uncertainty of user behavior makes it difficult to design a secure multi-party cross-chain protocol. To solve these problems, we investigate how to design a secure multi-party cross-chain transaction protocol with offline tolerance. We propose a new signature algorithm called the pre-adaptor signature scheme, an extension of the adaptor signature scheme. The pre-adaptor signature scheme combines the multi-signature and adaptor signature schemes, which can realize the secret transmission channel between multiple parties. To provide offline tolerance, we encode our protocol into the P2SH script. Our protocol provides better privacy due to no dependence on smart contracts. The performance evaluation was conducted with ten participants. For each participant of our cross-chain protocol, the initialization and execution process can be performed in 3 milliseconds and with 6 k bytes of communication overhead at most. The cost increases linearly with the increase in the number of participants.
APA, Harvard, Vancouver, ISO, and other styles
44

Kumar Vaka Rajesh, Dilip. "Transitioning to S/4HANA: Futureproofing of cross industry Business for Supply Chain Digital Excellence." International Journal of Science and Research (IJSR) 13, no. 4 (2024): 488–94. http://dx.doi.org/10.21275/sr24406024048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Lee, Seungphil, Sung-Ho Shin, and Young-Jin Ro. "Analyzing Item-level Risks in a Global Supply Chain based on Cross-border Trust." Journal of Korea Trade 29, no. 3 (2025): 81–106. https://doi.org/10.35611/jkt.2025.29.3.81.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Huang, Keyue. "Applications of the Management Strategies of Supply Chain Risks in Cross Border Business." Frontiers in Business, Economics and Management 18, no. 1 (2025): 11–13. https://doi.org/10.54097/a0zq3k89.

Full text
Abstract:
The supply chain is a very important link for cross-border e-commerce sellers, but there are also many risks involved. Effective risk management in the supply chain can bring greater advantages to cross-border e-commerce enterprises. Common supply chain risks in cross-border business include political risk, legal risk, payment risk, logistics risk, and information risk. We can adopt risk prevention strategies, risk control strategies, and risk transfer strategies to manage supply chain risks in cross-border business and build a relatively stable supplier management system.
APA, Harvard, Vancouver, ISO, and other styles
47

Zeng, Shihua. "Cross-border Supply Chain Changes, Opportunities and Countermeasures." E3S Web of Conferences 253 (2021): 03066. http://dx.doi.org/10.1051/e3sconf/202125303066.

Full text
Abstract:
This paper compares the changes and development trend of cross-border supply chain in the context of Belt and Road, and proposes a strategy of cross-border supply chain development based on the advantages of platform, technology, market and cluster.
APA, Harvard, Vancouver, ISO, and other styles
48

Han, Siyu. "Study on the Development Trend of Cross-Border E-Commerce from the Perspective of Global Value Chains." International Journal of Global Economics and Management 3, no. 3 (2024): 96–102. http://dx.doi.org/10.62051/ijgem.v3n3.12.

Full text
Abstract:
As China's cross-border e-commerce increasingly deepens its participation in the global value chain division of labor, the rapid development of cross-border e-commerce has driven the import behavior of intermediate goods and provided endogenous motivation for the growth of cross-border e-commerce. From the perspective of the global value chain, the development of cross-border e-commerce presents a new trend. Cross-border e-commerce platforms with a single transaction function can no longer meet the needs of era development under the global value chain. This paper explores the development trends of cross-border e-commerce and its impact on the global economy from the perspective of the Global Value Chain (GVC), and proposes several reflections to achieve further development of China's cross-border e-commerce.
APA, Harvard, Vancouver, ISO, and other styles
49

Ponomareva, Polina F., Elena O. Platonova, and Alexander V. Polezhaev. "New Chain-Extenders for Recyclable Cross-Linked Polyurethanes." Key Engineering Materials 899 (September 8, 2021): 518–24. http://dx.doi.org/10.4028/www.scientific.net/kem.899.518.

Full text
Abstract:
A synthetic method for the new chain extenders with different amounts of furan groups and a prepolymer derived from three-furyl diol was developed. A series of polyurethanes cross-linked via the Diels-Alder reaction with various amounts of bismaleimide were produced. The structure, mechanical and thermal properties, and recycling ability of the obtained materials were investigated.
APA, Harvard, Vancouver, ISO, and other styles
50

Sobel, JH, I. Trakht, HQ Wu, S. Rudchenko, and R. Egbring. "Alpha-Chain cross-linking in fibrin(ogen) Marburg." Blood 86, no. 3 (1995): 989–1000. http://dx.doi.org/10.1182/blood.v86.3.989.989.

Full text
Abstract:
Abstract The fibrinogen structural variant, Marburg (A alpha 1–460B beta gamma)2, is comprised of normal B beta and gamma chains but contains severely truncated A alpha chains that are missing approximately one half of their factor XIIIa cross-linking domain. Immunochemical studies of fibrin(ogen) Marburg were conducted to characterize the degree to which deletion of a defined A alpha-chain segment, A alpha 461–610, can affect the process of fibrin stabilization, ie, the factor XIIIa- mediated covalent interaction that occurs between alpha chains of neighboring fibrin molecules and between alpha chains and alpha 2 antiplasmin (alpha 2PI). The ability of Marburg (and control) alpha chains to serve as a substrate for factor XIIIa and undergo cross- linking was examined in an in vitro plasma clotting system. The capacity for alpha-chain cross-linking was evaluated both as the covalent incorporation of the small synthetic peptide, NQEQVSPLTLLK (which represents the first 12 amino acids of alpha 2PI and includes the factor XIIIa-sensitive glutamine residue responsible for the cross- linking of alpha 2PI to fibrin), and as the appearance of native (ie, natural), high-molecular-weight, cross-linked alpha-chain species. Antibodies specific for the (A)alpha and gamma/gamma-gamma chains of fibrin(ogen) and for the peptide and its parent protein, alpha 2PI (68 kD), were used as immunoblotting probes to visualize the various cross- linked products formed during in vitro clotting. Recalcification of Marburg plasma in the presence of increasing concentrations of peptide resulted in the formation of peptide-decorated Marburg alpha-chain monomers. Their size at the highest peptide concentration examined indicated the incorporation of a maximum of 3 to 4 mol of peptide per mole of alpha-chain. In the absence of alpha 2PI 1–12 peptide, the alpha chains of Marburg fibrin cross-linked to form oligomers and polymers, as well as heterodimers that included alpha 2PI. Both the peptide-decorated monomers and the native cross-linked alpha-chain species of Marburg fibrin were smaller than their control plasma counterparts, consistent with the truncated structure of the parent Marburg A alpha chain. Collectively, the findings indicate that, although deletion of the A alpha chain region no. 461–610 in fibrinogen Marburg prevents formation of an extensive alpha polymer network (presumably due to the absence of critical COOH-terminal lysine residues), it does not interfere with initial events in the fibrin stabilization process, namely, factor XIII binding and the ability of alpha chains to undergo limited cross-linking to one another and to alpha 2PI.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!