Journal of Shandong University(Engineering Science) ›› 2024, Vol. 54 ›› Issue (6): 57-71.doi: 10.6040/j.issn.1672-3961.0.2023.003

• Machine Learning & Data Mining • Previous Articles    

Design of E-commerce community Q&A service platform based on smart contract

LI Ganglong, LIN Peiguang*, LI Jinyu, WANG Qian   

  1. School of Computer Science and Technology, Shandong University of Finance and Economics, Jinan 250014, Shandong, China
  • Published:2024-12-26

CLC Number: 

  • TP393
[1] 徐佳敏. 客服行业:除痛点找拐点[J]. 人力资源, 2021(15): 44-46. XU Jiamin. Customer service industry: remove pain points and find inflection points[J]. Human Resources, 2021(15): 44-46.
[2] 王海茹. 互联网企业客服外包风险分析与对策研究[D]. 武汉:华中师范大学, 2019. WANG Hairu. Risk analysis and countermeasure research of customer service outsourcing of Internet enterprises[D]. Wuhan: Central China Normal University, 2019.
[3] SHENG J, AMANKWAH-AMOAH J, WANG X. A multidisciplinary perspective of big data in management research[J]. International Journal of Production Economics, 2017, 191:97-112.
[4] 浦娟. 电商问答对购买意愿的影响机制研究[D]. 南京:南京大学, 2020. PU Juan. Research on the influence of E-commerce questions and answers on purchase intention[D]. Nanjing: Nanjing University, 2020.
[5] 李娜. 电商在线问答的信息属性和社交属性对消费者购买意愿的影响[D]. 西安:西安电子科技大学, 2020. LI Na. The impact of information aspect and social aspect of E-commerce online Q&A on consumers' purchase intention[D]. Xi'an: Xidian University, 2020.
[6] SALAH K, ALFALASI A, ALFALASI M. A blockchain-based system for online consumer reviews[C] //IEEE INFOCOM2019-IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS). N Y, USA: IEEE, 2019: 853-858.
[7] BELLINI E, IRAQI Y, DAMIANI E. Blockchain-based distributed trust and reputation management systems: a survey[J]. IEEE Access, 2020, 8: 21127-21151.
[8] OKSIIUK O, DMYRIEVA I. Security and privacy issues of blockchain technology[C] //2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering(TCSET). N Y, USA: IEEE, 2020: 1-5.
[9] PECK M E, MOORE S K. The blossoming of the blockchain[J]. IEEE Spectrum, 2017, 54(10): 24-25.
[10] MAGAZZENI D, MCBURNEY P, NASH W. Validation and verification of smart contracts: a research agenda[J]. Computer, 2017, 50(9): 50-57.
[11] AHLUWALIA S, MAHTO R V, GUERRERO M. Blockchain technology and startup financing: atransaction cost economics perspective[J]. Technological Forecasting and Social Change, 2020, 151: 119854.
[12] DAI H N, ZHENG Z, ZHANG Y. Blockchain for internet of things: a survey[J]. IEEE Internet of Things Journal, 2019, 6(5): 8076-8094.
[13] GRIGGS K N, OLYA O, KOHLIOS C P, et al. Healthcare blockchain system using smart contracts for secure automated remote patient monitoring[J]. Journal of Medical Systems, 2018, 42:1-7.
[14] GUO J, LI C, ZHANG G, et al. Blockchain-enabled digital rights management for multimedia resources of online education[J]. Multimedia Tools and Applications, 2020, 79: 9735-9755.
[15] LI Z, GUO H, WANG W M, et al. A blockchain and automl approach for open and automated customer service[J]. IEEE Transactions on Industrial Informatics, 2019, 15(6): 3642-3651.
[16] SABHARWAL C L, ANJUM B. An SVD-Entropy and bilinearity based product ranking algorithm using heterogeneous data[J]. Journal of Visual Languages & Computing, 2017, 41: 133-141.
[17] ZHOU Z, WANG M, YANG C N,et al. Blockchain-based decentralized reputation system in E-commerce environment[J]. Future Generation Computer Systems, 2021, 124: 155-167.
[18] LISI A, DE SALVE A, MORI P, et al. Rewarding reviews with tokens: an ethereum-based approach[J]. Future Generation Computer Systems, 2021, 120: 36-54.
[19] CHEN Y, LI H, LI K, et al. An improved P2P file system scheme based on IPFS and Blockchain[C] //2017 IEEE International Conference on Big Data. Washington, USA: IEEE, 2017: 2652-2657.
[20] ZHOU H, OUYANG X, REN Z,et al.A blockchain based witness model for trustworthy cloud service level agreement enforcement[C] //International Conference on Computer Communications. N Y, USA: IEEE, 2019: 1567-1575.
[21] 曹卫东,胡炜,王家亮,等.基于SimHash和混合相似度的多模式匹配方法[J]. 计算机应用研究, 2020, 37(1): 198-202. CAO Weidong, HU Wei, WANG Jialiang, et al. Multiple schema matching method based on SimHash and mixed similarity[J]. Application Research of Computers, 2020, 37(1): 198-202.
[22] BRODER A Z, CHARIKAR M, FRIEZE A M, et al. Min-wise independent permutations[C] //Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing. N Y, USA: ACM, 1998: 327-336.
[23] 章宁,陈钦. 基于TF-IDF算法的P2P贷款违约预测模型[J]. 计算机应用, 2018, 38(10): 3042-3047. ZHANG Ning, CHEN Qin. P2P loan default prediction model based on TF-IDF algorithm[J]. Application Research of Computers, 2018, 38(10): 3042-3047.
[24] JAISWAL A, BABU A R, ZADEH M Z, et al. A survey on contrastive self-supervised learning[J]. Technologies, 2020, 9(1): 2.
[25] 王永贵,郑泽,李玥. Word2vec-ACV: OOV语境含义的词向量生成模型[J]. 计算机应用研究, 2019, 36(6): 1623-1628. WANG Yonggui, ZHENG Ze, LI Yue. Word2vec-ACV: word vector generation model of OOV context meaning[J]. Application Research of Computers, 2019, 36(6): 1623-1628.
[26] FARAMARZI N S, DARA A, BANERJEE R. Combining attention-based models with the MeSH ontology for semantic textual similarity in clinical notes[C] //2022 IEEE 10th International Conference on Healthcare Informatics(ICHI). N Y, USA: IEEE, 2022: 74-83.
[27] 周昊. 基于音形码的中文敏感词变形体检测[D]. 南京:南京大学, 2020. ZHOU Hao. Research on Chinese deformation sensitive word detection[D]. Nanjing: Nanjing University, 2020.
[28] CHRISTIANI T, PAGH R. Set similarity search beyond minhash[C] //Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing. N Y, USA: ACM, 2017: 1094-1107.
[29] 沈晓鹰. 网约车服务中的位置隐私保护方法研究[D]. 北京:北京邮电大学, 2021. SHEN Xiaoying. Research on location privacy protection in Ride-Hailing service[D]. Beijing: Beijing University of Posts and Telecommunications, 2021.
[30] THORUP M. Bottom-k and priority sampling, set similarity and subset sums with minimal independence[C] //Acm Symposium on Theory of Computing. N Y, USA: ACM, 2013: 371-380.
[31] WOOD G. Ethereum: a secure decentralised generalised transaction ledger[J]. Ethereum Project Yellow Paper, 2014,(151): 1-32.
[32] DABBAGH M, CHOO K K R, BEHESHTI A, et al. A survey of empirical performance evaluation of permissioned blockchain platforms: challenges and opportunities[J]. Computers & Security, 2021, 100: 102078.
[1] Fang GUO,Lei CHEN,Ziwen YANG. Real-time traffic prediction based on MGU for large-scale IP backbone networks [J]. Journal of Shandong University(Engineering Science), 2019, 49(2): 88-95.
[2] Ya'nan YANG,Bin XIA,Nan XIE,Wenhao YUAN. Hybrid localization algorithm based on BP neural network and multivariable Taylor series [J]. Journal of Shandong University(Engineering Science), 2019, 49(1): 36-40.
[3] ZHANG Xihua, LU Shanshan, SU Jianjun. Countermeasure and technology patent development of global energy interconnection [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2017, 47(6): 143-150.
[4] HE Qijia, LIU Zhenbing, XU Tao, JIANG Shujie. MR image classification based on LBP and extreme learning machine [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2017, 47(2): 86-93.
[5] MA Wenjing, WU Dongya, TANG Kai, WANG Dongzhu. A design method for object resolution system applied in transport field [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2015, 45(4): 10-18.
[6] WANG Qiming, LI Zhanguo, FAN Aiwan. Quantum ant colony algorithm based on the game theory [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2015, 45(2): 33-36.
[7] HAN Zhongming, WU Yang, TAN Xusheng, LIU Wen, YANG Weijie. Comparison and analysis on measure indexes for structural hole nodes in social network [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2015, 45(1): 1-8.
[8] LIU Qi, LIU Yi-xun, QIN Feng-lin. Modeling research of free riding in P2P streaming systems [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(6): 31-36.
[9] SUN Xiang-hua. The improvement of wireless sensor networks routing algorithm based on the distance vector simulation [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(6): 25-30.
[10] LIU Dong-hui1,2, JIANG Wei1*. Research on Web negative information mining based on event ontology [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(5): 35-40.
[11] JI Tao, LI Yong-zhong. Blind data processing in cloud computing based on trusted computing mechanisms [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(5): 30-34.
[12] DING Yan, LI Yong-zhong*. Research on intrusion detection algorithm based on PCA and semisupervised clustering [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(5): 41-46.
[13] CAI Xiaojun , ZHAGN Qing , CHAI Qiaolin 1, KONG Suli 2. AnDivided multipath dynamic source routing based on energybalanced [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(2): 141-145.
[14] Chen Dongyan. [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(1): 41-49.
[15] CAI Zhong-xin,ZHANG Hua-zhong . The clustering protocol based on a sleeping and selective-gateway mechanism [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2008, 38(1): 56-60 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!