- Blockchain Technology Applications and Security
- Advanced Decision-Making Techniques
- Electronic Health Records Systems
- IPv6, Mobility, Handover, Networks, Security
- Web Application Security Vulnerabilities
- Network Security and Intrusion Detection
- Energy, Environment, and Transportation Policies
- Data Quality and Management
- Immune responses and vaccinations
- Viral gastroenteritis research and epidemiology
- Tryptophan and brain disorders
- Cybercrime and Law Enforcement Studies
- Coenzyme Q10 studies and effects
- Schizophrenia research and treatment
- Embedded Systems Design Techniques
- Antioxidants, Aging, Portulaca oleracea
- Nutrition and Health in Aging
- Energy, Environment, Economic Growth
- Currency Recognition and Detection
- Artificial Intelligence in Healthcare
- Cloud Data Security Solutions
- Cryptography and Data Security
- Advanced Neuroimaging Techniques and Applications
- COVID-19 diagnosis using AI
- IoT and GPS-based Vehicle Safety Systems
Heilongjiang Bayi Agricultural University
2023-2024
Tonghua Normal University
2024
Central University of Finance and Economics
2024
Sichuan University
2014-2020
Chengdu University
2017-2020
Zhengzhou University of Science and Technology
2017
General Hospital of Guangzhou Military Command
2006
Aims: This study combines traditional Chinese medicine polysaccharides with nanomaterials to enhance drug bioavailability and immunological activity. Background: The of polysaccharide preparation, structure identification, pharmacological activity, mechanism action is deepening, but the research combined new delivery system relatively weak, so application still facing great limitations. In order prolong time improve their bioavailability, liposome has become most promising carrier....
As a global decentralized distributed ledger, Bitcoin's POW mechanism is so complex that the transaction's confirmation very time-consuming. If dust attacks occur in blockchain, which sends large amounts of transactions to time transactions' will be more longer, lead security problems, such as double-spending or blockchain forks. In order identify and prevent attacks, this paper proposes an innovative Anti-Dust model, analyzes characteristics learns from historical big data, uses Gaussian...
Diarrhea is one of the most common causes death in young piglets. Porcine rotavirus (PoRV) belongs to genus Rotavirus within family Reoviridae, and considered be primary pathogen causing diarrhea Portulaca oleracea L. (POL) has been reported alleviate viral infections. However, antiviral effect polysaccharide (POL-P), an active component POL, on PoRV infection remains unclear. This study demonstrated that safe concentration range POL-P IPEC-J2 cells 0-400 μg/mL. (400 μg/mL) effectively...
Online wallet has become an important method to manage Bitcoin. In a Bitcoin transaction, online manages the private key automatically, and stores encrypted in remote ensure accessibility of anywhere. traditional wallet, is stored centrally storage unit. However, if unit collapsed or hacked, users will suffer risk losing their Bitcoins. Motivated by this, this paper, we propose new architecture: HA-eWallet. HA-eWallet, transaction signed multiple keys rather than one, are separately...
Smart contract helps to broaden the application of blockchain various fields. In many cases, non-blockchain systems (NBS) are involved. However, when a smart directly interacts with NBS, there is non-deterministic issue (or state conflict issue). The reason that different nodes may obtain statuses NBS changes in NBS. If we can solve this issue, be used interact current without an additional adaptor or bridge required by existing solutions. paper, regard states as sequence instead single and...
In this paper, we propose a new technology that improves Diffie-Hellman's safeness and keeps its good property.The is called "Hyperbolic Curve Cryptography System" (HCCS) which designed on hyperbolic curve over finite filed.HCCS has solid Abel group structure whose order diverse field the system secure mainly based discrete logarithm problem (DLP) hardness of solving fundamental solution.Compared with Diffie-Hellman, HCCS same calculation complexity, but it excellently flexible.Therefore,...
AbstractThis paper’s purpose is to evaluate faculty members’ and students’ opinions regarding the quality, benefits challenges of online learning, transitioning from face-to-face learning during after COVID-19 in Chinese universities. The paper relied on a quantitative study involving an survey using random sample method June 2020. size was 400 persons, including 160 instructors 240 students university China. Scores earned by who took Introduction Economics course same quarantine were...
In order to assess network security threats better, we model the attacker's and defender's behavior based on attack-defense graph from perspective of both attacker defender, which lays foundation further research for scientific precise information threat assessment. Due existing problems generating traditional (e.g. explosion state space, large-scale complex generation graph), in this paper propose a method reduction, then defender security. Finally, proposed are proved be effective within...
In order to correctly analyze the multi-step attack and comprehensively assess network security situation, a multistep attack-oriented assessing method of situation is proposed.The events are clustered into different scenarios for identifying attackers.Based on causal correlation between every scenario, traces phase can be distinguished.Finally, quantitative criterion established realize assessment situation.Two defense experiments used verify correctness effectiveness, result shows proposed...