- Optimal Experimental Design Methods
- Advanced Multi-Objective Optimization Algorithms
- Statistical Methods in Clinical Trials
- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- Quantum Computing Algorithms and Architecture
- Coal and Its By-products
- Quantum Mechanics and Applications
- Quantum Information and Cryptography
- Spectroscopy and Chemometric Analyses
- Algal biology and biofuel production
- Recycling and utilization of industrial and municipal waste in materials production
- Complexity and Algorithms in Graphs
- Mobile Ad Hoc Networks
- Biofuel production and bioconversion
- VLSI and Analog Circuit Testing
- Cloud Data Security Solutions
- Recycling and Waste Management Techniques
- Robotics and Sensor-Based Localization
- Effects and risks of endocrine disrupting chemicals
- Advanced Graph Neural Networks
- Security in Wireless Sensor Networks
- Manufacturing Process and Optimization
- Advanced Authentication Protocols Security
- Microplastics and Plastic Pollution
Zhejiang Normal University
2024
Nanchang University
2022-2024
State Key Laboratory of Food Science and Technology
2024
Harbin Institute of Technology
2024
Qufu Normal University
2015-2023
Chongqing Medical University
2023
China Resources (China)
2021-2023
Central South University
2021-2023
Children's Hospital of Chongqing Medical University
2023
China University of Petroleum, East China
2021-2022
Abstract Temperature‐adaptive variable emissivity reflectors offer an electricity‐free and environmentally friendly cooling strategy, holding substantial potential to improve the global energy landscape. However, challenges associated with unoptimized solar absorptance can lead overcooling or overheating when modulation of infrared emittance is held constant, thereby increasing extra consumption. Herein, a temperature‐adaptive reflector based on W‐Mg co‐doped VO 2 (W‐Mg‐VER) proposed,...
Abstract Enterobacter sp. FY-07 can produce bacterial cellulose (BC) under aerobic and anaerobic conditions. Three potential BC synthesis gene clusters ( bcs I, II III) of have been predicted using genome sequencing comparative analysis, in which III was confirmed as the main contributor to by knockout functional reconstitution methods. Protein homology, arrangement constitution analysis indicated that had high identity bcsI operon 638; however, its composition were same those synthesizing...
Abstract In this paper, we investigate the potential application of quantum computation for constructing pseudo-random number generators (PRNGs) and further construct a novel PRNG based on random walks (QRWs), famous model. The merely relies equations used in QRWs thus generation algorithm is simple speed fast. proposed subjected to statistical tests such as NIST successfully passed test. Compared with representative chaotic maps (QCM), present QRWs-based has some advantages better...
Green transportation is a kind of urban system with low pollution and multiple environments. At present, the development green in China progressing gradually occupying relatively important position. In order to understand China, based on concept transportation, this paper analyzes Zhoushan as an example, selects data from three aspects: basic indicators, means road construction City. The entropy weight method used determine value each index, index evaluation established. addition, ideal...
As an Industrial Wireless Sensor Network (IWSN) is usually deployed in a harsh or unattended environment, the privacy security of data aggregation facing more and challenges. Currently, protocols mainly focus on improving efficiency transmitting aggregating, alternately, aim at enhancing data. The performances secure are trade-off several metrics, which involves transmission/fusion, energy (WSN). Unfortunately, there no paper systematic analysis about performance whether IWSN WSN. In...
In wireless network, a secure roaming authentication protocol enables mobile user to get services from foreign server when he/she is outside of the home server. However, conventional approach requires server's participation during between and So larger number requests are performed heavier burden will be on Meanwhile, in communication privacy protection also great concern for user. this paper we propose lightweight anonymous without participation. The new takes advantage ID-based...
Ciphertext-policy Attribute-based encryption (CP-ABE) is a promising tool for implementing finegrained cryptographic access control. While the uniqueness of generating private keys brings extra security issues. The key escrow inherent in CP-ABE systems because trusted authority has power to decrypt every ciphertext. are only associated with attributes nor user's identity. Some malicious users might be tempted leak their decryption privileges financial gain without risk being caught as...
Roaming authentication protocol is widely used in wireless network which can enable a seamless service for the mobile users.However, classical approach requires home server's participation during between user and foreign server.So more roaming requests are performed heavier burden will be on server.In this paper, we propose new framework communication without participation.The takes advantage of ID-based cryptography provides anonymity.It has good performance compared with protocols whose do...
Ciphertext policy attribute-based encryption (CP-ABE) is becoming a new primitive for finegrained access control. It neither produces multiple encrypted copies of the same data nor suffers from severe burden key distribution and management. The escrow problem that central authority could decrypt any ciphertexts addressed to all specific users still challenge CP-ABE mechanism. One scheme without proposed, furthermore proposed achieves fully security in standard model. performance analysis...
The construction of digital city provides powerful data support for the large-scale underground engineering construction. Analysis on effect excavation surface building damage based GIS management can quickly evaluate damage, and provide technical disaster prevention mitigation during excavation. platform was first reviewed called through professional model, which predicted deformation wallrock subsidence overlying rock mass caused from tunnel range disturbed by numerical analysis model...
Block designs are widely used in experimental situations where the units heterogeneous. The blocked general minimum lower order confounding (B-GMC) criterion is suitable for selecting optimal block when experimenters have some prior information on importance of ordering treatment factors. This paper constructs B-GMC 2n − m: 2r with 5 × 2l/16 + 1 ⩽ n (N 2l) < 2l l(r l m 1), denotes a two-level regular design N = runs, factors, and blocks. With choice blocking each has common specific...