Qianqian Zhao

ORCID: 0000-0002-3708-3511
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Optimal Experimental Design Methods
  • Advanced Multi-Objective Optimization Algorithms
  • Statistical Methods in Clinical Trials
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Quantum Computing Algorithms and Architecture
  • Coal and Its By-products
  • Quantum Mechanics and Applications
  • Quantum Information and Cryptography
  • Spectroscopy and Chemometric Analyses
  • Algal biology and biofuel production
  • Recycling and utilization of industrial and municipal waste in materials production
  • Complexity and Algorithms in Graphs
  • Mobile Ad Hoc Networks
  • Biofuel production and bioconversion
  • VLSI and Analog Circuit Testing
  • Cloud Data Security Solutions
  • Recycling and Waste Management Techniques
  • Robotics and Sensor-Based Localization
  • Effects and risks of endocrine disrupting chemicals
  • Advanced Graph Neural Networks
  • Security in Wireless Sensor Networks
  • Manufacturing Process and Optimization
  • Advanced Authentication Protocols Security
  • Microplastics and Plastic Pollution

Zhejiang Normal University
2024

Nanchang University
2022-2024

State Key Laboratory of Food Science and Technology
2024

Harbin Institute of Technology
2024

Qufu Normal University
2015-2023

Chongqing Medical University
2023

China Resources (China)
2021-2023

Central South University
2021-2023

Children's Hospital of Chongqing Medical University
2023

China University of Petroleum, East China
2021-2022

Abstract Temperature‐adaptive variable emissivity reflectors offer an electricity‐free and environmentally friendly cooling strategy, holding substantial potential to improve the global energy landscape. However, challenges associated with unoptimized solar absorptance can lead overcooling or overheating when modulation of infrared emittance is held constant, thereby increasing extra consumption. Herein, a temperature‐adaptive reflector based on W‐Mg co‐doped VO 2 (W‐Mg‐VER) proposed,...

10.1002/adfm.202410819 article EN Advanced Functional Materials 2024-09-23

Abstract Enterobacter sp. FY-07 can produce bacterial cellulose (BC) under aerobic and anaerobic conditions. Three potential BC synthesis gene clusters ( bcs I, II III) of have been predicted using genome sequencing comparative analysis, in which III was confirmed as the main contributor to by knockout functional reconstitution methods. Protein homology, arrangement constitution analysis indicated that had high identity bcsI operon 638; however, its composition were same those synthesizing...

10.1038/srep21863 article EN cc-by Scientific Reports 2016-02-25

Abstract In this paper, we investigate the potential application of quantum computation for constructing pseudo-random number generators (PRNGs) and further construct a novel PRNG based on random walks (QRWs), famous model. The merely relies equations used in QRWs thus generation algorithm is simple speed fast. proposed subjected to statistical tests such as NIST successfully passed test. Compared with representative chaotic maps (QCM), present QRWs-based has some advantages better...

10.1038/srep20362 article EN cc-by Scientific Reports 2016-02-04

Green transportation is a kind of urban system with low pollution and multiple environments. At present, the development green in China progressing gradually occupying relatively important position. In order to understand China, based on concept transportation, this paper analyzes Zhoushan as an example, selects data from three aspects: basic indicators, means road construction City. The entropy weight method used determine value each index, index evaluation established. addition, ideal...

10.3390/su13148109 article EN Sustainability 2021-07-20

As an Industrial Wireless Sensor Network (IWSN) is usually deployed in a harsh or unattended environment, the privacy security of data aggregation facing more and challenges. Currently, protocols mainly focus on improving efficiency transmitting aggregating, alternately, aim at enhancing data. The performances secure are trade-off several metrics, which involves transmission/fusion, energy (WSN). Unfortunately, there no paper systematic analysis about performance whether IWSN WSN. In...

10.32604/cmc.2019.05237 article EN Computers, materials & continua/Computers, materials & continua (Print) 2019-01-01

In wireless network, a secure roaming authentication protocol enables mobile user to get services from foreign server when he/she is outside of the home server. However, conventional approach requires server's participation during between and So larger number requests are performed heavier burden will be on Meanwhile, in communication privacy protection also great concern for user. this paper we propose lightweight anonymous without participation. The new takes advantage ID-based...

10.1109/glocom.2012.6503248 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2012-12-01

Ciphertext-policy Attribute-based encryption (CP-ABE) is a promising tool for implementing finegrained cryptographic access control. While the uniqueness of generating private keys brings extra security issues. The key escrow inherent in CP-ABE systems because trusted authority has power to decrypt every ciphertext. are only associated with attributes nor user's identity. Some malicious users might be tempted leak their decryption privileges financial gain without risk being caught as...

10.1049/cje.2019.10.006 article EN Chinese Journal of Electronics 2020-01-01

Roaming authentication protocol is widely used in wireless network which can enable a seamless service for the mobile users.However, classical approach requires home server's participation during between user and foreign server.So more roaming requests are performed heavier burden will be on server.In this paper, we propose new framework communication without participation.The takes advantage of ID-based cryptography provides anonymity.It has good performance compared with protocols whose do...

10.3837/tiis.2013.08.018 article EN KSII Transactions on Internet and Information Systems 2013-08-30

Ciphertext policy attribute-based encryption (CP-ABE) is becoming a new primitive for finegrained access control. It neither produces multiple encrypted copies of the same data nor suffers from severe burden key distribution and management. The escrow problem that central authority could decrypt any ciphertexts addressed to all specific users still challenge CP-ABE mechanism. One scheme without proposed, furthermore proposed achieves fully security in standard model. performance analysis...

10.1049/cje.2017.04.002 article EN Chinese Journal of Electronics 2017-05-01

The construction of digital city provides powerful data support for the large-scale underground engineering construction. Analysis on effect excavation surface building damage based GIS management can quickly evaluate damage, and provide technical disaster prevention mitigation during excavation. platform was first reviewed called through professional model, which predicted deformation wallrock subsidence overlying rock mass caused from tunnel range disturbed by numerical analysis model...

10.1016/j.proenv.2012.01.440 article EN Procedia Environmental Sciences 2012-01-01

Block designs are widely used in experimental situations where the units heterogeneous. The blocked general minimum lower order confounding (B-GMC) criterion is suitable for selecting optimal block when experimenters have some prior information on importance of ordering treatment factors. This paper constructs B-GMC 2n − m: 2r with 5 × 2l/16 + 1 ⩽ n (N 2l) < 2l l(r l m 1), denotes a two-level regular design N = runs, factors, and blocks. With choice blocking each has common specific...

10.1080/03610926.2017.1337148 article EN Communication in Statistics- Theory and Methods 2017-06-09
Coming Soon ...