Skip to main content

Advances, Systems and Applications

Table 2 List of symbols and descriptions

From: An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems

Symbols

Descriptions

\(PF=\{PF_1,PF_2...PF_N\}\)

Set of fog nodes

\(PF=\{IS_1,IS_2...IS_n\}\)

Sensor nodes

\(T_{s_{Sco}}\)

Trust score

\(Conf_{Thre}\)

Confident threshold

\(min(x_i),max(x_i)\)

Minimum and maximum values of the data

\(T_{s_{Val}}\)

Transaction value

\(N_{Ts}\)

Number of transactions

\((k)=\{k_1,k_2,\ldots , k_n\}\)

Total number of features

X

Dataset

\(C_{Adr}\)

Content addressed hash value

\(Tr_N\)

Number of transactions

\(Dis_H\)

Distributed hash table

\(Tr_N\)

Number of transactions

\(Pre_H\)

Previous hash value

\(Blk_{idx}\)

Block index

t

Timestamp

p

Proof

\(Cu_H\)

Current hash value

\(r_1 and r_2\)

Random parameters

\(h_i and q_i\)

Data points for the given attributes

\(Cr_e\)

Correlation efficient

\(k_i\)

Data sample

\(c_i\)

Target class

M

Orthogonal matrix

G

Matrix column

\(\epsilon _i\)

Eigen value