Qiang Zhang

ORCID: 0009-0004-0454-044X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Chromatography in Natural Products
  • Anomaly Detection Techniques and Applications
  • Advanced Malware Detection Techniques
  • Pharmacological Effects of Natural Compounds
  • Neurological Disease Mechanisms and Treatments
  • Traditional Chinese Medicine Analysis
  • Neuroinflammation and Neurodegeneration Mechanisms
  • Natural product bioactivities and synthesis
  • Magnolia and Illicium research
  • Technology and Security Systems
  • Microplastics and Plastic Pollution
  • Influenza Virus Research Studies
  • Advanced Mathematical Physics Problems
  • Image and Video Quality Assessment
  • Shoulder and Clavicle Injuries
  • Oral microbiology and periodontitis research
  • Bioactive natural compounds
  • Image and Signal Denoising Methods
  • Gastrointestinal motility and disorders
  • Frailty in Older Adults
  • Knee injuries and reconstruction techniques
  • Infant Health and Development
  • Software-Defined Networks and 5G

China Academy of Railway Sciences
2023-2024

Sichuan University
2007-2023

Inner Mongolia Electric Power (China)
2022

Sichuan Research Center of New Materials
2022

China Banking Regulatory Commission
2017

State Key Laboratory of Biotherapy
2007-2016

Samsung (United States)
2015

Civil Aviation Flight University of China
2012

Harbin Engineering University
2009

Harbin Science and Technology Bureau
2009

The global age-standardized prevalence rate of severe periodontitis has already reached 13.1%, which makes it the second most common cause tooth loss after caries, significantly reducing quality life for patients. Due to complexity in oral environment, is practically difficult conventional antibacterial materials enter periodontal pocket directly eliminate plaque and inactivate target bacteria, such as Porphyromonas gingivalis (P. gingivalis). To solve this problem, study proposes a type...

10.1016/j.giant.2023.100145 article EN cc-by-nc-nd Giant 2023-02-14

Eleven compounds were successfully separated from Asteris souliei by using a two-step high-performance counter-current chromatography method. The first step involved reversed phase isocratic separation hexane/ethyl acetate/methanol/water (1:0.8:1:1 v/v/v/v), which produced three fractions, the two of mixtures. second used step-gradient reversed-phase with hexane/butanol/ethyl (1:0.5:3.5:1:4 v/v/v/v/v) initially followed (1:2:1:2 v/v/v/v) to separate Fraction 1 into seven compounds; and...

10.1002/jssc.201601422 article EN Journal of Separation Science 2017-03-24

Abstract With the maturity and expand of big data tech, based on BDA, it can realize real-time monitoring network information, help system to make autonomous dynamic decision-making processing security events. At present, there are still some problems deficiencies in utilization Network Security Analysis (NSA), which need be improved urgently. Based this, this paper first analyses current situation Computer (CNS), then studies characteristics finally gives specific implementation tech.

10.1088/1742-6596/1744/3/032199 article EN Journal of Physics Conference Series 2021-02-01

With the construction of Energy Internet, 5G power virtual private network will play an important role in it. This paper first analyzes adaptability business and technology. Then, a networking architecture is proposed, including slice planning, wireless structure, bearer core etc. At last, order to verify performance, two typical electric businesses are piloted. The results show that, can meet communication requirements business.

10.1109/itoec53115.2022.9734639 article EN 2018 IEEE 4th Information Technology and Mechatronics Engineering Conference (ITOEC) 2022-03-04

Cyber security situation awareness is a new focus of information security. Its main functions include identifying the status cyberspace and understanding potential intrusion activities. To understand activities, much work has focused on prediction concrete network attacks. However, we think intents behind attacks are more important meaningful. Consequently, discuss intent recognition problem in cyber here. In this paper, first introduce some related conceptions. Then present background...

10.1109/kam.2009.315 article EN 2009-01-01

Considering both effects of the s‐wave scattering and atom‐atom interaction rather than only effect scattering, we establish a nonlinear Schrödinger model for many‐particle quantum systems prove global existence solution to obtain expression solution. Furthermore, show that Hamilton energy total particle number are conservative quantities.

10.1155/2012/387823 article EN cc-by Journal of Applied Mathematics 2012-01-01

Perceptual Image Quality Assessment (IQA) has many applications. Existing IQA approaches typically work only for one of three scenarios: full-reference, non-reference, or reduced-reference. Techniques that attempt to incorporate image structure information often rely on hand-crafted features, making them difficult be extended handle different scenarios. On the other hand, objective metrics like Mean Square Error (MSE), while being easy compute, are deemed ineffective measuring perceptual...

10.1109/icme.2015.7177436 article EN 2022 IEEE International Conference on Multimedia and Expo (ICME) 2015-06-01

Stress is a common contributing factor for irritable bowel syndrome (IBS). This study was to evaluate the efficacy of centralized health education program in improving quality life (QOL) middle school students with IBS who experienced Wenchuan earthquake on May 12, 2008. A multi-center, randomized and open evaluation design adopted. total 584 met Rome III criteria four schools were identified. Of these students, 29 excluded various reasons, remaining 555 randomly assigned either group (n =...

10.1186/s12876-018-0845-4 article EN cc-by BMC Gastroenterology 2018-07-27

Ischemic stroke (IS) has been contributing in leading causes of disability and death worldwide the cases are still increasing. In China, naturally sourced compound 3-n-butylphthalide (NBP) is widely applied clinical practice for IS treatment with established evidences efficacy safety. However, NBP an oily liquid at room temperature no active brain targeting ability, quite limiting its broader application practice. Via intravenous injection (i.v.) a prodrug (DB1) we previously developed...

10.1016/j.ejps.2022.106308 article EN cc-by-nc-nd European Journal of Pharmaceutical Sciences 2022-10-19

Welcome to the WIT Press eLibrary - home of Transactions Wessex Institute collection, providing on-line access papers presented at Institute's prestigious international conferences and from its State-of-the-Art in Science & Engineering publications.

10.2495/icacc130401 article EN WIT transactions on information and communication technologies 2014-03-01

Intrusion Detection (ID), as an effective network security protection technology, is important means to ensure security. In order solve the problem that traditional intrusion detection technology difficult adapt current complex and changeable new attacks, this paper uses Random Forest (RF) algorithm of machine learning problem. forest has good feature classification ability, which can effectively improve accuracy system. However, when characteristic values sample data are high, its time...

10.1117/12.3004665 article EN 2023-10-11

Background: Clinical decisions often rely on established thresholds for physiological indicators but rarely reexamine critical cutoffs using novel populations.Methods: For this population-based cohort study, we used data from the China Health and Retirement Longitudinal Study (CHARLS) representing Chinese middle-aged elderly people. We fitted Cox proportional hazards regression models adjusted age sex to assess associations of with all-cause mortality. examined non-linear by nature spline...

10.2139/ssrn.4089483 article EN SSRN Electronic Journal 2022-01-01
Coming Soon ...