Li-Hua Gong
YOU?
Author Swipe
View article: Optimization of Two-way Interaction Technology of Enterprise Data Based on Association Rules
Optimization of Two-way Interaction Technology of Enterprise Data Based on Association Rules Open
View article: Color watermarking algorithm combining the quantum discrete cosine transform with the sinusoidal–tent map
Color watermarking algorithm combining the quantum discrete cosine transform with the sinusoidal–tent map Open
To overcome the drawbacks of the existing sinusoidal map and tent map, this paper proposes the design of a sinusoidal–tent (ST) map. The test results indicate that the new chaotic system exhibits more significant advantages in chaos contro…
View article: Single-cell and bulk tissue sequencing unravels the heterogeneity of synovial microenvironment in arthrofibrosis
Single-cell and bulk tissue sequencing unravels the heterogeneity of synovial microenvironment in arthrofibrosis Open
Arthrofibrosis (AF) is a debilitating complication that occurs after trauma or surgery, leading to functional impairment and surgical failures worldwide. This study aimed to uncover the underlying mechanism of AF. A total of 141 patients w…
View article: Quantum evolution speed induced by Hamiltonian
Quantum evolution speed induced by Hamiltonian Open
In the issue of quantum evolution, quantum evolution speed is usually quantified by the time rate of change of state distance between the initial sate and its time evolution. In this paper, the path distance of quantum evolution is introdu…
View article: Robust dual color images watermarking scheme with hyperchaotic encryption based on quaternion DFrAT and genetic algorithm
Robust dual color images watermarking scheme with hyperchaotic encryption based on quaternion DFrAT and genetic algorithm Open
A robust dual color images watermarking algorithm is designed based on quaternion discrete fractional angular transform (QDFrAT) and genetic algorithm. To guarantee the watermark security, the original color watermark image is encrypted wi…
View article: Fast quantum image encryption scheme based on multilayer short memory fractional order Lotka-Volterra system and dual-scale triangular map
Fast quantum image encryption scheme based on multilayer short memory fractional order Lotka-Volterra system and dual-scale triangular map Open
The Caputo fractional order Lotka-Volterra system is time-consuming in practical applications, since its starting point is fixed. To tackle this problem, a short memory fractional order Lotka-Volterra system (SMFrLVS) is proposed, where th…
View article: Multi-party quantum private size comparison protocol with d-dimensional Bell states
Multi-party quantum private size comparison protocol with d-dimensional Bell states Open
A feasible multi-party quantum private comparison (MQPC) protocol based on -dimensional Bell states was proposed. In the protocol, all participants can independently encrypt their privacies and send them to a semi-honest quantum third par…
View article: Double-Color-Image Compression-Encryption Algorithm Based on Quaternion Multiple Parameter DFrAT and Feature Fusion with Preferable Restoration Quality
Double-Color-Image Compression-Encryption Algorithm Based on Quaternion Multiple Parameter DFrAT and Feature Fusion with Preferable Restoration Quality Open
To achieve multiple color images encryption, a secure double-color-image encryption algorithm is designed based on the quaternion multiple parameter discrete fractional angular transform (QMPDFrAT), a nonlinear operation and a plaintext-re…
View article: Application of Knowledge Mapping Technology in Power System
Application of Knowledge Mapping Technology in Power System Open
In order to improve the identification ability of power system topology, the application of knowledge mapping technology in power system is proposed. Based on the division of structured, semi-structured and unstructured, the power system d…
View article: Image Encryption Scheme Based on Block Scrambling, Closed-Loop Diffusion, and DNA Molecular Mutation
Image Encryption Scheme Based on Block Scrambling, Closed-Loop Diffusion, and DNA Molecular Mutation Open
A new image encryption scheme is proposed with a combination of block scrambling, closed-loop diffusion, and DNA molecular mutation. The new chaotic block scrambling mechanism is put forward to replace the traditional swapping rule by comb…
View article: Research and Practice of Cultivating Young College Teachers’ Teaching Ability Based on Assessment System
Research and Practice of Cultivating Young College Teachers’ Teaching Ability Based on Assessment System Open
Young teachers, as an important driving force to promote the better development of colleges and universities in the future, their teaching experience and teaching ability can not only play a vital role in the development of the school itse…
View article: Exploration on the Construction of Sharing Platform of Power Big Data Application
Exploration on the Construction of Sharing Platform of Power Big Data Application Open
Big data application sharing supermarket is a big data application sharing portal. The first, one or more enterprise users can share and use the same big data application product. This product comes from the contribution of enterprise user…
View article: The Difficult Position and Breakthrough of Improving Teaching Ability of College Teachers
The Difficult Position and Breakthrough of Improving Teaching Ability of College Teachers Open
Colleges and universities, as a base for cultivating skilled talents needed for social development, teachers' own teaching experience, professional level and teaching ability can directly have an important impact on students' future develo…
View article: Cultivation and Improvement of College Teachers' Informatization Teaching Ability in the Era of Education Informatization 2.0
Cultivation and Improvement of College Teachers' Informatization Teaching Ability in the Era of Education Informatization 2.0 Open
The advent of the informatization 2.0 era has brought greater vitality and vitality to the reform work in the field of education in my country. In order to achieve a more long-term development of higher education, high-efficiency teachers …
View article: Secrecy rate maximisation for non‐linear energy harvesting relay networks with cooperative jamming and imperfect channel state information
Secrecy rate maximisation for non‐linear energy harvesting relay networks with cooperative jamming and imperfect channel state information Open
The secrecy performance of a wireless‐powered relaying system is investigated in the presence of imperfect channel state information. To improve the system secrecy performance, the destination splits a part of power to transmit the coopera…
View article: Image compression-encryption algorithm combining compressive sensing with log operation
Image compression-encryption algorithm combining compressive sensing with log operation Open
View article: Cooperative Interference and Power Allocation in a Bidirectional Untrusted Relay Network With Channel Estimation Errors
Cooperative Interference and Power Allocation in a Bidirectional Untrusted Relay Network With Channel Estimation Errors Open
The secure communication of a two-way untrusted amplify-and-forward relay network under the imperfect channel state information is investigated. To improve the secrecy of the relay wiretap system, artificial noise is introduced into each s…
View article: Image encryption combining discrete fractional angular transform with Arnold transform in image bit planes
Image encryption combining discrete fractional angular transform with Arnold transform in image bit planes Open