Home / Journals / JQC / Vol.2, No.1, 2020
  • Open AccessOpen Access

    ARTICLE

    Research and Analysis of WSN Node Location in Highway Traffic Based on Priority

    Congrong Tang1, *
    Journal of Quantum Computing, Vol.2, No.1, pp. 1-9, 2020, DOI:10.32604/jqc.2020.09153 - 28 May 2020
    Abstract With the rapid development of highway transportation in China, intelligent transportation has become an important part of the traffic structure, and wireless sensor networks are also widely used in intelligent transportation. However, in the wireless traffic sensor network, there is a certain error in the positioning of the anchor blind nodes. In the process of tracking the feedback information, the results of determining the position are very different. Based on the maximum degree of tension, the road traffic wireless Research and analysis of blind node location in sensor networks, and propose solutions and measures to More >

  • Open AccessOpen Access

    ARTICLE

    Smart Contract Fuzzing Based on Taint Analysis and Genetic Algorithms

    Zaoyu Wei1, *, Jiaqi Wang2, Xueqi Shen1, Qun Luo1
    Journal of Quantum Computing, Vol.2, No.1, pp. 11-24, 2020, DOI:10.32604/jqc.2020.010815 - 28 May 2020
    Abstract Smart contract has greatly improved the services and capabilities of blockchain, but it has become the weakest link of blockchain security because of its code nature. Therefore, efficient vulnerability detection of smart contract is the key to ensure the security of blockchain system. Oriented to Ethereum smart contract, the study solves the problems of redundant input and low coverage in the smart contract fuzz. In this paper, a taint analysis method based on EVM is proposed to reduce the invalid input, a dangerous operation database is designed to identify the dangerous input, and genetic algorithm More >

  • Open AccessOpen Access

    ARTICLE

    Analysis and Prediction of Regional Electricity Consumption Based on BP Neural Network

    Pingping Xia1, *, Aihua Xu2, Tong Lian1
    Journal of Quantum Computing, Vol.2, No.1, pp. 25-32, 2020, DOI:10.32604/jqc.2019.09232 - 28 May 2020
    Abstract Electricity consumption forecasting is one of the most important tasks for power system workers, and plays an important role in regional power systems. Due to the difference in the trend of power load and the past in the new normal, the influencing factors are more diversified, which makes it more difficult to predict the current electricity consumption. In this paper, the grey system theory and BP neural network are combined to predict the annual electricity consumption in Jiangsu. According to the historical data of annual electricity consumption and the six factors affecting electricity consumption, the More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Method to against Quantum Noises in Quantum Teleportation

    Shengyao Wu1, Wenjie Liu2, Zhiguo Qu3, *
    Journal of Quantum Computing, Vol.2, No.1, pp. 33-55, 2020, DOI:10.32604/jqc.2019.08898 - 28 May 2020
    Abstract In order to improve the anti-noise performance of quantum teleportation, this paper proposes a novel dynamic quantum anti-noise scheme based on the quantum teleportation which transmits single qubit state using Bell state. Considering that quantum noise only acts on the transmitted qubit, i.e., the entangled state that Alice and Bob share in advance is affected by the noise, thus affecting the final transmission result. In this paper, a method for dynamically adjusting the shared entangled state according to the noise environment is proposed. By calculating the maximum fidelity of the output state to determine the More >

  • Open AccessOpen Access

    ARTICLE

    Cipherchain: A Secure and Efficient Ciphertext Blockchain via mPECK

    Hailin Chen1, Gang Xu3, Yuling Chen2, Xiubo Chen1, 2, *, Yixian Yang1, 2, Ruibin Fan4, Kaixiang Zhang4, Huizhong Li4
    Journal of Quantum Computing, Vol.2, No.1, pp. 57-83, 2020, DOI:10.32604/jqc.2020.09291 - 28 May 2020
    Abstract Most existing blockchain schemes are based on the design concept “openness and transparency” to realize data security, which usually require transaction data to be presented in the form of plaintext. However, it inevitably brings the issues with respect to data privacy and operating performance. In this paper, we proposed a novel blockchain scheme called Cipherchain, which can process and maintain transaction data in the form of ciphertext while the characteristics of immutability and auditability are guaranteed. Specifically in our scheme, transactions can be encrypted locally based on a searchable encryption scheme called multi-user public key More >

Per Page:

Share Link