{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T09:40:18Z","timestamp":1774950018888,"version":"3.50.1"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T00:00:00Z","timestamp":1668729600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T00:00:00Z","timestamp":1668729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71971109"],"award-info":[{"award-number":["71971109"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71201077"],"award-info":[{"award-number":["71201077"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CCF-Tencent Rhino-Bird Young Faculty Open Research Fund"},{"name":"Open Project of Jiangsu Key Laboratory of Financial Engineering"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Industry and research communities have widely studied Blockchain technology, and the consortium blockchain is currently the most used category with a wide range of applications. However, issues, such as the performance of consensus mechanisms, have become essential constraints on promoting and applying the consortium blockchain. To improve the performance of the consortium blockchain consensus, we use the practical Byzantine fault tolerance (PBFT) consensus widely used in consortium blockchains to reduce the number of consensus nodes to optimize performance. Using the PBFT consensus, we screen high-performance nodes and obtain a reliable and limited number of consensus nodes. We propose a genetic algorithm-based blockchain consensus algorithm improvement scheme, design the fitness function of blockchain nodes and the genetic algorithm to iterate out consensus node groups with excellent indicators continuously, and finally iterate the nodes participating in the consensus. This algorithm can increase the speed and efficiency of the consensus, block generation, and computation. The algorithm in this article is tested on the FISCO BCOS (i.e., a consortium blockchain platform built by the FISCO open-source working group), and controlled experiments and the experimental results illustrate the safety and practicability of the method.<\/jats:p>","DOI":"10.1007\/s40747-022-00907-2","type":"journal-article","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T11:03:41Z","timestamp":1668769421000},"page":"3085-3105","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["A node selection algorithm with a genetic method based on PBFT in consortium blockchains"],"prefix":"10.1007","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0628-8856","authenticated-orcid":false,"given":"Jinyu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yumeng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Deyu","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,18]]},"reference":[{"issue":"4","key":"907_CR1","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng Z, Xie S, Dai HN, Chen X, Wang H (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):352\u2013375. https:\/\/doi.org\/10.1504\/IJWGS.2018.095647","journal-title":"Int J Web Grid Serv"},{"key":"907_CR2","doi-asserted-by":"publisher","unstructured":"Zhang J, Zhao H, Yang Y, Yan J (2019) Towards transparency and trustworthy: a used-car deposit platform based on Blockchain. In: The 2019 IEEE international conference on software quality, reliability & security, pp 46\u201350. https:\/\/doi.org\/10.1109\/QRS-C.2019.00022","DOI":"10.1109\/QRS-C.2019.00022"},{"issue":"1","key":"907_CR3","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1186\/s40854-016-0049-2","volume":"2","author":"JL Zhao","year":"2016","unstructured":"Zhao JL, Fan S, Yan J (2016) Overview of business innovations and research opportunities in blockchain and introduction to the special issue. Financ Innov 2(1):28. https:\/\/doi.org\/10.1186\/s40854-016-0049-2","journal-title":"Financ Innov"},{"issue":"5","key":"907_CR4","doi-asserted-by":"publisher","first-page":"653","DOI":"10.6633\/IJNS.201709.19(5).01","volume":"19","author":"IC Lin","year":"2017","unstructured":"Lin IC, Liao TC (2017) A survey of blockchain security issues and challenges. Int J Netw Secur 19(5):653\u2013659. https:\/\/doi.org\/10.6633\/IJNS.201709.19(5).01","journal-title":"Int J Netw Secur"},{"key":"907_CR5","volume-title":"The business blockchain: promise, practice, and application of the next Internet technology","author":"W Mougayar","year":"2016","unstructured":"Mougayar W (2016) The business blockchain: promise, practice, and application of the next Internet technology. Wiley, Hoboken"},{"key":"907_CR6","doi-asserted-by":"publisher","unstructured":"Zheng Z, Xie S, Dai HN, Chen X, Wang H (2017) An overview of blockchain technology: architecture, consensus, and future trends. In: Proceedings of the 2017 IEEE international congress on big data, pp 557\u2013564. https:\/\/doi.org\/10.1109\/BigDataCongress.2017.85","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"907_CR7","doi-asserted-by":"publisher","unstructured":"Chen S, Zhang J, Shi R, Yan J (2018) A comparative testing on performance of Blockchain and relational database: foundation for applying Blockchain into current business systems. In: Streitz N, Konomi S (eds) Distributed, ambient and pervasive interactions: understanding humans. Springer-Cham, Las Vegas, pp 21\u201334. https:\/\/doi.org\/10.1007\/978-3-319-91125-0_2","DOI":"10.1007\/978-3-319-91125-0_2"},{"key":"907_CR8","unstructured":"Scherer M (2017) Performance and scalability of blockchain networks and smart contracts. Master\u2019s thesis, Ume\u00e3e University, Department of Computing Science, Sweden. https:\/\/www.diva-portal.org\/smash\/get\/diva2:1111497\/fulltext01.pdf"},{"key":"907_CR9","volume-title":"Handbook of genetic algorithms","author":"L Davis","year":"1991","unstructured":"Davis L (1991) Handbook of genetic algorithms, 1st edn. Van Nostrand Reinhold, New York","edition":"1"},{"issue":"9","key":"907_CR10","doi-asserted-by":"publisher","first-page":"1455","DOI":"10.1016\/S0031-3203(99)00137-5","volume":"33","author":"U Maulik","year":"2000","unstructured":"Maulik U, Bandyopadhyay S (2000) Genetic algorithm-based clustering technique. Pattern Recogn 33(9):1455\u20131465. https:\/\/doi.org\/10.1016\/S0031-3203(99)00137-5","journal-title":"Pattern Recogn"},{"key":"907_CR11","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.ins.2018.06.071","volume":"465","author":"J Li","year":"2018","unstructured":"Li J, Wu J, Chen L (2018) Block-secure: Blockchain based scheme for secure P2P cloud storage. Inf Sci 465:219\u2013231. https:\/\/doi.org\/10.1016\/j.ins.2018.06.071","journal-title":"Inf Sci"},{"key":"907_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cogsys.2018.05.004","volume":"52","author":"AF Hussein","year":"2018","unstructured":"Hussein AF, ArunKumar N, Ramirez-Gonzalez G, Abdulhay E, Tavares JMR, de Albuquerque VHC (2018) A medical records managing and securing blockchain based system supported by a genetic algorithm and discrete wavelet transform. Cogn Syst Res 52:1\u201311. https:\/\/doi.org\/10.1016\/j.cogsys.2018.05.004","journal-title":"Cogn Syst Res"},{"key":"907_CR13","unstructured":"FISCO BCOS (2019) FISCO BCOS Documentation. https:\/\/fisco-bcos-documentation.readthedocs.io\/en\/latest\/"},{"key":"907_CR14","unstructured":"Crosby M, Nachiappan, Pattanayak P, Verma S, Kalyanaraman V (2016) BlockChain technology: beyond Bitcoin. Appl Innov 2:6\u201310. http:\/\/scet.berkeley.edu\/wp-content\/uploads\/AIR-2016-Blockchain.pdf"},{"key":"907_CR15","doi-asserted-by":"publisher","unstructured":"Karame G (2016) On the security and scalability of Bitcoin\u2019s blockchain. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp 1861\u20131862. https:\/\/doi.org\/10.1145\/2976749.2976756","DOI":"10.1145\/2976749.2976756"},{"key":"907_CR16","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.jii.2019.04.002","volume":"15","author":"L Yang","year":"2019","unstructured":"Yang L (2019) The blockchain: state-of-the-art and research challenges. J Ind Inf Integr 15:80\u201390. https:\/\/doi.org\/10.1016\/j.jii.2019.04.002","journal-title":"J Ind Inf Integr"},{"key":"907_CR17","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.tele.2018.11.006","volume":"36","author":"F Casino","year":"2019","unstructured":"Casino F, Dasaklis TK, Patsakis C (2019) A systematic literature review of blockchain-based applications: current status, classification and open issues. Telemat Inform 36:55\u201381. https:\/\/doi.org\/10.1016\/j.tele.2018.11.006","journal-title":"Telemat Inform"},{"key":"907_CR18","doi-asserted-by":"publisher","unstructured":"Kokoris-Kogias E, Jovanovic P, Gasser L, Gailly N, Syta E, Ford B (2018) OmniLedger: a secure, scale-out, decentralized ledger via sharding. In: Proceedings of 2018 IEEE symposium on security and privacy, pp 583\u2013598. https:\/\/doi.org\/10.1109\/SP.2018.000-5","DOI":"10.1109\/SP.2018.000-5"},{"key":"907_CR19","doi-asserted-by":"publisher","unstructured":"Bach LM, Mihaljevic B, Zagar M (2018) Comparative analysis of blockchain consensus algorithms. In: Proceedings of 2018 41st international convention on information and communication technology, electronics and microelectronics, pp 1545\u20131550. https:\/\/doi.org\/10.23919\/MIPRO.2018.8400278","DOI":"10.23919\/MIPRO.2018.8400278"},{"key":"907_CR20","unstructured":"Baliga DA (2017) Understanding blockchain consensus models. https:\/\/www.persistent.com\/wp-content\/uploads\/2017\/04\/WP-Understanding-Blockchain-Consensus-Models.pdf"},{"key":"907_CR21","doi-asserted-by":"publisher","unstructured":"Yang T, Guo Q, Tai X, Sun H, Zhang B, Zhao W, Lin C (2017) Applying blockchain technology to decentralized operation in future energy internet. In: Proceedings of 2017 IEEE conference on energy internet and energy system integration, pp 1\u20135. https:\/\/doi.org\/10.1109\/EI2.2017.8244418","DOI":"10.1109\/EI2.2017.8244418"},{"key":"907_CR22","doi-asserted-by":"publisher","unstructured":"Eberhardt J, Tai S (2017) On or off the blockchain? Insights on off-chaining computation and data. In: Paoli FD, Schulte S, Johnsen EB (eds) Service-oriented and cloud computing. Springer-Cham, Oslo, pp 3\u201315. https:\/\/doi.org\/10.1007\/978-3-319-67262-5_1","DOI":"10.1007\/978-3-319-67262-5_1"},{"key":"907_CR23","doi-asserted-by":"publisher","unstructured":"Pilkington M (2016) Blockchain technology: principles and applications. In: Olleros FX, Zhegu M (eds) Research handbook on digital transformations. Edward Elgar Publishing, pp 225\u2013253. https:\/\/doi.org\/10.4337\/9781784717766.00019","DOI":"10.4337\/9781784717766.00019"},{"key":"907_CR24","doi-asserted-by":"publisher","unstructured":"Borowsky E, Gafni E (1993) Generalized FLP impossibility result for t-resilient asynchronous computations. In: Proceedings of the 25th annual ACM symposium on theory of computing, pp 91\u2013100. https:\/\/doi.org\/10.1145\/167088.167119","DOI":"10.1145\/167088.167119"},{"key":"907_CR25","unstructured":"Cachin C, Vukoli\u0107 M (2017) Blockchain consensus protocols in the wild. arXiv:1707.01873v2"},{"key":"907_CR26","unstructured":"Bano S, Sonnino A, Al-Bassam M, Azouvi S, McCorry P, Meiklejohn S, Danezis G (2017) Consensus in the age of blockchains. arXiv:1711.03936"},{"issue":"2","key":"907_CR27","doi-asserted-by":"publisher","first-page":"1432","DOI":"10.1109\/COMST.2020.2969706","volume":"22","author":"Y Xiao","year":"2020","unstructured":"Xiao Y, Zhang N, Lou W, Hou YT (2020) A survey of distributed consensus protocols for Blockchain networks. IEEE Commun Surv Tutor 22(2):1432\u20131465. https:\/\/doi.org\/10.1109\/COMST.2020.2969706","journal-title":"IEEE Commun Surv Tutor"},{"issue":"4","key":"907_CR28","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1145\/571637.571640","volume":"20","author":"M Castro","year":"2002","unstructured":"Castro M, Liskov B (2002) Practical byzantine fault tolerance and proactive recovery. ACM Trans Comput Syst 20(4):398\u2013461. https:\/\/doi.org\/10.1145\/571637.571640","journal-title":"ACM Trans Comput Syst"},{"key":"907_CR29","doi-asserted-by":"publisher","unstructured":"Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, Caro AD, Enyeart D, Ferris C, Laventman G, Manevich Y, Muralidharan S, Murthy C, Nguyen B, Sethi M, Singh G, Smith K, Sorniotti A, Stathakopoulou C, Vukoli\u0107 M, Cocco S. W, Yellick J (2018) Hyperledger fabric: A distributed operating system for permissioned blockchains. In: Proceedings of the 13th EuroSys conference, pp 1\u201315. https:\/\/doi.org\/10.1145\/3190508.3190538","DOI":"10.1145\/3190508.3190538"},{"issue":"4","key":"907_CR30","doi-asserted-by":"publisher","first-page":"3796","DOI":"10.1109\/COMST.2019.2928178","volume":"21","author":"M Belotti","year":"2019","unstructured":"Belotti M, Bo\u017ei\u0107 N, Pujolle G, Secci S (2019) A vademecum on Blockchain technologies: when, which, and how. IEEE Commun Surv Tutor 21(4):3796\u20133838. https:\/\/doi.org\/10.1109\/COMST.2019.2928178","journal-title":"IEEE Commun Surv Tutor"},{"key":"907_CR31","doi-asserted-by":"publisher","unstructured":"Brewer EA (2000) Towards robust distributed systems (abstract). In: Proceedings of the 19th annual ACM symposium on principles of distributed computing. Portland Oregon. https:\/\/doi.org\/10.1145\/343477.343502","DOI":"10.1145\/343477.343502"},{"key":"907_CR32","doi-asserted-by":"publisher","unstructured":"Vukoli\u0107 M (2015) The quest for scalable blockchain fabric: proof-of-work vs. BFT replication. In: Camenisch J, Kesdo\u011fan D (eds) Open problems in network security. Springer-Cham, Zurich, pp 112\u2013125. https:\/\/doi.org\/10.1007\/978-3-319-39028-4_9","DOI":"10.1007\/978-3-319-39028-4_9"},{"key":"907_CR33","doi-asserted-by":"publisher","unstructured":"Herrera-Joancomart\u00ed J, P\u00e9rez-Sol\u00e0 C (2016) Privacy in bitcoin transactions: new challenges from blockchain scalability solutions. In: Torra V, Narukawa Y, Navarro-Arribas G, Ya\u00f1ez C (eds) Modeling decisions for artificial intelligence. Springer-Cham, Sant Juli\u00e0 de L\u00f2ria, pp 26\u201344. https:\/\/doi.org\/10.1007\/978-3-319-45656-0_3","DOI":"10.1007\/978-3-319-45656-0_3"},{"key":"907_CR34","doi-asserted-by":"publisher","unstructured":"Suankaewmanee K, Hoang DT, Niyato D, Sawadsitang S, Wang P, Han Z (2018) Performance analysis and application of mobile blockchain. In: Proceedings of 2018 international conference on computing, networking and communications, pp 642\u2013646. https:\/\/doi.org\/10.1109\/ICCNC.2018.8390265","DOI":"10.1109\/ICCNC.2018.8390265"},{"key":"907_CR35","unstructured":"Schwartz D, Youngs N, Britto A (2014) The ripple protocol consensus algorithm. Ripple Labs, San Francisco, White Paper V. 1.0. https:\/\/cryptoguide.ch\/cryptocurrency\/ripple\/whitepaper.pdf"},{"key":"907_CR36","unstructured":"Mazieres D (2015) The stellar consensus protocol: a federated model for internet-level consensus. Stellar Development Foundation: San Francisco. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.696.93&amp=&rep=rep1&amp=&type=pdf"},{"key":"907_CR37","unstructured":"Boyd M, Shcherbakov A, Shcherbakov A (2019) Welcome to Indy Plenum\u2019s documentation! Hyperledger Indy Documentation, V. 1.0. https:\/\/hyperledger-indy.readthedocs.io\/projects\/plenum\/en\/latest\/index.html"},{"key":"907_CR38","doi-asserted-by":"publisher","unstructured":"Aublin PL, Mokhtar SB, Qu\u00e9ma V (2013) RBFT: redundant byzantine fault tolerance. In: 2013 IEEE 33rd international conference on distributed computing systems, pp 297\u2013306. https:\/\/doi.org\/10.1109\/ICDCS.2013.53","DOI":"10.1109\/ICDCS.2013.53"},{"key":"907_CR39","doi-asserted-by":"publisher","unstructured":"Luu L, Narayanan V, Zheng C, Baweja K, Gilbert S, Saxena P (2016) A secure sharding protocol for Open Blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp 17\u201330. https:\/\/doi.org\/10.1145\/2976749.2978389","DOI":"10.1145\/2976749.2978389"},{"key":"907_CR40","doi-asserted-by":"publisher","unstructured":"Karlsson K, Jiang W, Wicker S, Adams D, Ma E, Renesse RV, Weatherspoon H (2018) Vegvisir: a partition-tolerant Blockchain for the Internet-of-Things. In: 2018 IEEE 38th international conference on distributed computing systems, pp 1150\u20131158. https:\/\/doi.org\/10.1109\/ICDCS.2018.00114","DOI":"10.1109\/ICDCS.2018.00114"},{"key":"907_CR41","unstructured":"Kwon J (2014) Tendermint: consensus without mining. Draft V 06 Fall, vol. 1. https:\/\/cdn.relayto.com\/media\/files\/LPgoWO18TCeMIggJVakt_tendermint.pdf"},{"key":"907_CR42","doi-asserted-by":"publisher","unstructured":"Bessani A, Sousa J, Alchieri E (2014) State machine replication for the masses with BFT-SMaRt. In: 2014 44th Annual IEEE\/IFIP international conference on dependable systems and networks, pp 35\u2013362. https:\/\/doi.org\/10.1109\/DSN.2014.43","DOI":"10.1109\/DSN.2014.43"},{"issue":"1","key":"907_CR43","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/6306.6308","volume":"4","author":"M Herlihy","year":"1986","unstructured":"Herlihy M (1986) A quorum-consensus replication method for abstract data types. ACM Trans Comput Syst 4(1):32\u201353. https:\/\/doi.org\/10.1145\/6306.6308","journal-title":"ACM Trans Comput Syst"},{"issue":"6","key":"907_CR44","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/1323293.1294267","volume":"41","author":"R Kotla","year":"2007","unstructured":"Kotla R, Alvisi L, Dahlin M, Clement A, Wong E (2007) Zyzzyva: speculative byzantine fault tolerance. ACM SIGOPS Oper Syst Rev 41(6):45\u201358. https:\/\/doi.org\/10.1145\/1323293.1294267","journal-title":"ACM SIGOPS Oper Syst Rev"},{"issue":"6","key":"907_CR45","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/2.294850","volume":"27","author":"JL Ribeiro Filho","year":"1994","unstructured":"Ribeiro Filho JL, Treleaven PC, Alippi C (1994) Genetic-algorithm programming environments. Computer 27(6):28\u201343. https:\/\/doi.org\/10.1109\/2.294850","journal-title":"Computer"},{"issue":"2","key":"907_CR46","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1023\/A:1022602019183","volume":"3","author":"DE Goldberg","year":"1988","unstructured":"Goldberg DE, Holland JH (1988) Genetic algorithms and machine learning. Mach Learn 3(2):95\u201399. https:\/\/doi.org\/10.1023\/A:1022602019183","journal-title":"Mach Learn"},{"key":"907_CR47","doi-asserted-by":"crossref","unstructured":"Holland JH (1992) Genetic algorithms. Sci Am 267(1):66\u201373. http:\/\/www.jstor.org\/stable\/24939139","DOI":"10.1038\/scientificamerican0792-66"},{"key":"907_CR48","volume-title":"Genetic programming: on the programming of computers by means of natural selection","author":"JR Koza","year":"1992","unstructured":"Koza JR (1992) Genetic programming: on the programming of computers by means of natural selection, 1st edn. MIT Press, Cambridge","edition":"1"},{"key":"907_CR49","doi-asserted-by":"publisher","first-page":"8827084","DOI":"10.1155\/2020\/8827084","volume":"2020","author":"X Wu","year":"2020","unstructured":"Wu X (2020) Research on English online education platform based on genetic algorithm and Blockchain technology. Wirel Commun Mob Comput 2020:8827084. https:\/\/doi.org\/10.1155\/2020\/8827084","journal-title":"Wirel Commun Mob Comput"},{"key":"907_CR50","doi-asserted-by":"publisher","first-page":"141269","DOI":"10.1109\/ACCESS.2020.3013282","volume":"8","author":"J Guruprakash","year":"2020","unstructured":"Guruprakash J, Koppu S (2020) EC-ElGamal and genetic algorithm-based enhancement for lightweight scalable Blockchain in IoT domain. IEEE Access 8:141269\u2013141281. https:\/\/doi.org\/10.1109\/ACCESS.2020.3013282","journal-title":"IEEE Access"},{"issue":"9","key":"907_CR51","doi-asserted-by":"publisher","first-page":"8547","DOI":"10.1109\/JIOT.2020.2993030","volume":"7","author":"M Xu","year":"2020","unstructured":"Xu M, Feng G, Ren Y, Zhang X (2020) On cloud storage optimization of Blockchain with a clustering-based genetic algorithm. IEEE Internet Things J 7(9):8547\u20138558. https:\/\/doi.org\/10.1109\/JIOT.2020.2993030","journal-title":"IEEE Internet Things J"},{"key":"907_CR52","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxaa196","author":"T Liu","year":"2021","unstructured":"Liu T, Wu J, Li J, Li J, Zhang Z (2021) Efficient algorithms for storage load balancing of outsourced data in Blockchain network. Comput J. https:\/\/doi.org\/10.1093\/comjnl\/bxaa196","journal-title":"Comput J"},{"key":"907_CR53","doi-asserted-by":"publisher","unstructured":"Wilczy\u0144ski A, Ko\u0142odziej J, Grzonka D (2021) Security aspects in blockchain-based scheduling in mobile multi-cloud computing. In: Proceedings of 2021 IEEE\/ACM 21st international symposium on cluster, cloud and internet computing, pp 696\u2013703. https:\/\/doi.org\/10.1109\/CCGrid51090.2021.00084","DOI":"10.1109\/CCGrid51090.2021.00084"},{"key":"907_CR54","doi-asserted-by":"publisher","unstructured":"Michalewicz Z (1994) Conclusions. In: Michalewicz Z (eds) genetic algorithms + data structures = evolution programs. Springer, Berlin, pp 287\u2013308. https:\/\/doi.org\/10.1007\/978-3-662-07418-3_14","DOI":"10.1007\/978-3-662-07418-3_14"},{"key":"907_CR55","volume-title":"Evolutionary optimization algorithms","author":"D Simon","year":"2013","unstructured":"Simon D (2013) Evolutionary optimization algorithms, 1st edn. Wiley, New Jersey","edition":"1"},{"key":"907_CR56","unstructured":"Nakamoto S (2008). Bitcoin: a peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"907_CR57","unstructured":"Wood G (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151:1\u201332. https:\/\/files.gitter.im\/ethereum\/yellowpaper\/VIyt\/Paper.pdf"},{"key":"907_CR58","doi-asserted-by":"publisher","unstructured":"Sivanandam S, Deepa S (2008) Genetic algorithms. In: Sivanandam S, Deepa S (eds) Introduction to genetic algorithms. Springer, Berlin, pp 15\u201337. https:\/\/doi.org\/10.1007\/978-3-540-73190-0_2","DOI":"10.1007\/978-3-540-73190-0_2"},{"issue":"3","key":"907_CR59","doi-asserted-by":"publisher","first-page":"237","DOI":"10.2307\/2331065","volume":"23","author":"J Hull","year":"1988","unstructured":"Hull J, White A (1988) The use of the control variate technique in option pricing. J Financ Quant Anal 23(3):237\u2013251. https:\/\/doi.org\/10.2307\/2331065","journal-title":"J Financ Quant Anal"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00907-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-022-00907-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00907-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T17:04:15Z","timestamp":1686330255000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-022-00907-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,18]]},"references-count":59,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["907"],"URL":"https:\/\/doi.org\/10.1007\/s40747-022-00907-2","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,18]]},"assertion":[{"value":"8 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 October 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no financial or non-financial interests that are directly or indirectly related to the work submitted for publication. On behalf of all the authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}