Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (66)
  • Open Access

    ARTICLE

    Weighted Particle Swarm Clustering Algorithm for Self-Organizing Maps

    Guorong Cui, Hao Li, Yachuan Zhang, Rongjing Bu, Yan Kang*, Jinyuan Li, Yang Hu

    Journal of Quantum Computing, Vol.2, No.2, pp. 85-95, 2020, DOI:10.32604/jqc.2020.09717

    Abstract The traditional K-means clustering algorithm is difficult to determine the cluster number, which is sensitive to the initialization of the clustering center and easy to fall into local optimum. This paper proposes a clustering algorithm based on self-organizing mapping network and weight particle swarm optimization SOM&WPSO (Self-Organization Map and Weight Particle Swarm Optimization). Firstly, the algorithm takes the competitive learning mechanism of a self-organizing mapping network to divide the data samples into coarse clusters and obtain the clustering center. Then, the obtained clustering center is used as the initialization parameter of the weight particle swarm optimization algorithm. The particle position… More >

  • Open Access

    ARTICLE

    Cipherchain: A Secure and Efficient Ciphertext Blockchain via mPECK

    Hailin Chen1, Gang Xu3, Yuling Chen2, Xiubo Chen1, 2, *, Yixian Yang1, 2, Ruibin Fan4, Kaixiang Zhang4, Huizhong Li4

    Journal of Quantum Computing, Vol.2, No.1, pp. 57-83, 2020, DOI:10.32604/jqc.2020.09291

    Abstract Most existing blockchain schemes are based on the design concept “openness and transparency” to realize data security, which usually require transaction data to be presented in the form of plaintext. However, it inevitably brings the issues with respect to data privacy and operating performance. In this paper, we proposed a novel blockchain scheme called Cipherchain, which can process and maintain transaction data in the form of ciphertext while the characteristics of immutability and auditability are guaranteed. Specifically in our scheme, transactions can be encrypted locally based on a searchable encryption scheme called multi-user public key encryption with conjunctive keyword search… More >

  • Open Access

    ARTICLE

    A Novel Method to against Quantum Noises in Quantum Teleportation

    Shengyao Wu1, Wenjie Liu2, Zhiguo Qu3, *

    Journal of Quantum Computing, Vol.2, No.1, pp. 33-55, 2020, DOI:10.32604/jqc.2019.08898

    Abstract In order to improve the anti-noise performance of quantum teleportation, this paper proposes a novel dynamic quantum anti-noise scheme based on the quantum teleportation which transmits single qubit state using Bell state. Considering that quantum noise only acts on the transmitted qubit, i.e., the entangled state that Alice and Bob share in advance is affected by the noise, thus affecting the final transmission result. In this paper, a method for dynamically adjusting the shared entangled state according to the noise environment is proposed. By calculating the maximum fidelity of the output state to determine the shared entangled state, which makes… More >

  • Open Access

    ARTICLE

    Analysis and Prediction of Regional Electricity Consumption Based on BP Neural Network

    Pingping Xia1, *, Aihua Xu2, Tong Lian1

    Journal of Quantum Computing, Vol.2, No.1, pp. 25-32, 2020, DOI:10.32604/jqc.2019.09232

    Abstract Electricity consumption forecasting is one of the most important tasks for power system workers, and plays an important role in regional power systems. Due to the difference in the trend of power load and the past in the new normal, the influencing factors are more diversified, which makes it more difficult to predict the current electricity consumption. In this paper, the grey system theory and BP neural network are combined to predict the annual electricity consumption in Jiangsu. According to the historical data of annual electricity consumption and the six factors affecting electricity consumption, the gray correlation analysis method is… More >

  • Open Access

    ARTICLE

    Smart Contract Fuzzing Based on Taint Analysis and Genetic Algorithms

    Zaoyu Wei1, *, Jiaqi Wang2, Xueqi Shen1, Qun Luo1

    Journal of Quantum Computing, Vol.2, No.1, pp. 11-24, 2020, DOI:10.32604/jqc.2020.010815

    Abstract Smart contract has greatly improved the services and capabilities of blockchain, but it has become the weakest link of blockchain security because of its code nature. Therefore, efficient vulnerability detection of smart contract is the key to ensure the security of blockchain system. Oriented to Ethereum smart contract, the study solves the problems of redundant input and low coverage in the smart contract fuzz. In this paper, a taint analysis method based on EVM is proposed to reduce the invalid input, a dangerous operation database is designed to identify the dangerous input, and genetic algorithm is used to optimize the… More >

  • Open Access

    ARTICLE

    Research and Analysis of WSN Node Location in Highway Traffic Based on Priority

    Congrong Tang1, *

    Journal of Quantum Computing, Vol.2, No.1, pp. 1-9, 2020, DOI:10.32604/jqc.2020.09153

    Abstract With the rapid development of highway transportation in China, intelligent transportation has become an important part of the traffic structure, and wireless sensor networks are also widely used in intelligent transportation. However, in the wireless traffic sensor network, there is a certain error in the positioning of the anchor blind nodes. In the process of tracking the feedback information, the results of determining the position are very different. Based on the maximum degree of tension, the road traffic wireless Research and analysis of blind node location in sensor networks, and propose solutions and measures to reduce monitoring results. More >

  • Open Access

    ARTICLE

    Quantum Algorithm for Appointment Scheduling

    Wenbin Yu1, 2, 3, *, Yinsong Xu1, 2, 3, Wenjie Liu1, 2, 3, Alex Xiangyang Liu4, Baoyu Zheng5

    Journal of Quantum Computing, Vol.1, No.2, pp. 111-118, 2019, DOI:10.32604/jqc.2019.07412

    Abstract Suppose a practical scene that when two or more parties want to schedule an appointment, they need to share their calendars with each other in order to make it possible. According to the present result the whole communication cost to solve this problem should be their calendars’ length by using a classical algorithm. In this work, we investigate the appointment schedule issue made by N users and try to accomplish it in quantum information case. Our study shows that the total communication cost will be quadratic times smaller than the conventional case if we apply a quantum algorithm in the… More >

  • Open Access

    ARTICLE

    Anti-Noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model

    Zhexi Zhang1, Zhiguo Qu1,2,*

    Journal of Quantum Computing, Vol.1, No.2, pp. 89-109, 2019, DOI:10.32604/jqc.2019.07415

    Abstract How to establish a secure and efficient quantum network coding algorithm is one of important research topics of quantum secure communications. Based on the butterfly network model and the characteristics of easy preparation of Bell states, a novel anti-noise quantum network coding protocol is proposed in this paper. The new protocol encodes and transmits classical information by virtue of Bell states. It can guarantee the transparency of the intermediate nodes during information, so that the eavesdropper Eve disables to get any information even if he intercepts the transmitted quantum states. In view of the inevitability of quantum noise in quantum… More >

  • Open Access

    ARTICLE

    Quantum Multi-User Detection Based on Coherent State Signals

    Wenbin Yu1, 2, 3, 4, *, Yinsong Xu1, 2, 3, Wenjie Liu1, 2, 3, Alex Xiangyang Liu4, Baoyu Zheng5

    Journal of Quantum Computing, Vol.1, No.2, pp. 81-88, 2019, DOI:10.32604/jqc.2019.07324

    Abstract Multi-user detection is one of the important technical problems for modern communications. In the field of quantum communication, the multi-access channel on which we apply the technology of quantum information processing is still an open question. In this work, we investigate the multi-user detection problem based on the binary coherent-state signals whose communication way is supposed to be seen as a quantum channel. A binary phase shift keying model of this multi-access channel is studied and a novel method of quantum detection proposed according to the conclusion of the quantum measurement theory. As a result, the average interference between deferent… More >

  • Open Access

    ARTICLE

    An Ui Design Optimization Strategy for General App in Big Data Environment

    Hangjun Zhou1, Jieyu Zhou1,*, Guang Sun2,3, Wangdong Jiang3, Chuntian Luo1, Xiaoping Fan1, Haowen Zhang1, Haoran Zhang1

    Journal of Quantum Computing, Vol.1, No.2, pp. 65-80, 2019, DOI:10.32604/jqc.2019.07238

    Abstract Due to the huge amount of increasing data, the requirements of people for electronic products such as mobile phones, tablets, and notebooks are constantly improving. The development and design of various software applications attach great importance to users’ experiences. The rationalized UI design should allow a user not only enjoy the visual design experience of the new product but also operating it more pleasingly. This process is to enhance the attractiveness and performance of the new product and thus to promote the active usage and consuming conduct of users. In this paper, an UI design optimization strategy for general APP… More >

Displaying 51-60 on page 6 of 66. Per Page