Research on the risk of block chain technology in Internet finance supported by wireless network

In this paper, a cascaded depth learning framework is constructed. A cascaded depth model is successfully implemented by studying and analyzing the specific feature transformation, feature selection, and classifier algorithm used in the framework. A feature combination method based on enhanced feature selection and classification is proposed according to the different features learned by each layer of the model. Combining block chain cryptography technology, distributed technology, consensus accounting mechanism of technology innovation, transaction data encapsulation into specific format data unit, encapsulated into a linear list in chronological order, using encryption algorithm trading transparency, traceability of data, security, credibility, and uniqueness in financial data analysis. The experimental results show that with the increase of the number of model layers, our method can significantly improve the classification accuracy. This result also verifies that the proposed model can learn more effective data representation features and also verifies the effectiveness of the proposed feature combination method.

[1]  Zibin Zheng,et al.  Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..

[2]  P. Brockhoff,et al.  Tests in Linear Mixed Effects Models , 2015 .

[3]  Aimin Deng,et al.  Managing Online Supply Chain finance Credit Risk ofand#8216;and#8216;Asymmetric Informationand#8217;and#8217; , 2017 .

[4]  Youdong Wen,et al.  Analysis of R & D Capability of China’s Blockchain Technologies , 2018 .

[5]  M. Iansiti,et al.  The Truth about Blockchain , 2017 .

[6]  Marc Pilkington,et al.  Blockchain Technology: Principles and Applications , 2015 .

[7]  Atalay Mert Ileri,et al.  Realizing the potential of blockchain technologies in genomics , 2018, Genome research.

[8]  Xin Xu,et al.  Multimodal Representation Learning for Recommendation in Internet of Things , 2019, IEEE Internet of Things Journal.

[9]  Aimin Deng,et al.  Managing Online Supply Chain finance Credit Risk of “ Asymmetric Information ” , 2017 .

[10]  Markus Kraft,et al.  Blockchain technology in the chemical industry: Machine-to-machine electricity market , 2017 .

[11]  C. Cardone-Riportella,et al.  Factors influencing bank risk in Europe: Evidence from the financial crisis , 2015 .

[12]  С. В. Иванов,et al.  Анализ результатов лечения больных хроническим панкреатитом , 2016 .

[13]  Zhixiong Li,et al.  A novel sparse representation model for pedestrian abnormal trajectory understanding , 2019, Expert Syst. Appl..

[14]  Per B. Brockhoff,et al.  lmerTest Package: Tests in Linear Mixed Effects Models , 2017 .

[15]  R. Monfared,et al.  Blockchain ready manufacturing supply chain using distributed ledger , 2016 .

[16]  Xu Wei,et al.  Implementation of Personal Information Security Protection Technology Based on Block Chain , 2018 .

[17]  Hamid Gharavi,et al.  Smart Grid Mesh Network Security Using Dynamic Key Distribution With Merkle Tree 4-Way Handshaking , 2014, IEEE Transactions on Smart Grid.

[18]  Ekram Hossain,et al.  Discovering Mobile Applications in Cellular Device-to-Device Communications: Hash Function and Bloom Filter-Based Approach , 2016, IEEE Transactions on Mobile Computing.

[19]  Tugrul U. Daim,et al.  Understanding the disruptive business model innovation of E-business microcredit: a comparative case study in China , 2018, Technol. Anal. Strateg. Manag..

[20]  Weili Wu,et al.  Speech corpora subset selection based on time-continuous utterances features , 2018, Journal of Combinatorial Optimization.

[21]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[22]  Carlo Kleber da Silva Rodrigues,et al.  Simply Dividing a Bitcoin Network Node may Reduce Transaction Verification Time , 2015 .

[23]  Hanna Halaburda,et al.  Beyond Bitcoin , 2022 .