To address the problem that existing bipartite secret sharing scheme is short of dynamic characteristic, and to solve the problem that each participant can only use secret share once, this paper proposed a bipartite (...To address the problem that existing bipartite secret sharing scheme is short of dynamic characteristic, and to solve the problem that each participant can only use secret share once, this paper proposed a bipartite (n1+n2, m1+m2)-threshold multi-secret sharing scheme which combined cryptography and hypersphere geometry. In this scheme, we introduced a bivariate function and a coordinate function over finite field Zp to calculate the derived points of secret share, which can reconstruct the shared secrets by producing the intersection point of hypernormal plane and normal line on the hypertangent plane. At the initial stage the secret dealer distributes to each participant a secret share that can be kept secret based on the intractability of discrete logarithm problem and need not be changed with updating the shared secrets.Each cooperative participant only needs to submit a derived point calculated from the secret share without exposing this secret share during the process of reconstructing the shared secret. Analyses indicate that the proposed scheme is not only sound and secure because of hypersphere geometric properties and the difficulty of discrete logarithm problem, but also efficient because of its well dynamic behavior and the invariant secret share. Therefore, this bipartite threshold multi-secret sharing scheme is easy to implement and is applicable in practical settings.展开更多
Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computat...Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computation and electronic commerce. But up to now, study of signature based on general vector space secret sharing is very weak. Aiming at this drawback, the authors did some research on vector space secret sharing against cheaters, and proposed an efficient but secure vector space secret sharing based multi-signature scheme, which is implemented in two channels. In this scheme, the group signature can be easily produced if an authorized subset of participants pool their secret shadows and it is impossible for them to generate a group signature if an unauthorized subset of participants pool their secret shadows. The validity of the group signature can be verified by means of verification equations. A group signature of authorized subset of participants cannot be impersonated by any other set of partici- pants. Moreover, the suspected forgery can be traced, and the malicious participants can be detected in the scheme. None of several possible attacks can successfully break this scheme.展开更多
A secret sharing scheme is one of cryptographies. A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's inter...A secret sharing scheme is one of cryptographies. A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key. On the other hand, a multi-secret sharing scheme has more than one keys;that is, a multi-secret sharing scheme has p (≥2) keys. Dealers distribute shares of keys among n participants. Gathering t (≤n) participants, keys can be reconstructed. In this paper, we give a scheme of a (t,n) multi-secret sharing based on Hermite interpolation, in the case of p≤t.展开更多
Objective:To evaluate anti-diabetic effect of Caulrpa kntillifera(C.lentillifera).Methods:The inhibitory effect of C.lentillifera extract on dipeptidyl peptidase-IV and a-glucosidase enzyme was measured in a cell free...Objective:To evaluate anti-diabetic effect of Caulrpa kntillifera(C.lentillifera).Methods:The inhibitory effect of C.lentillifera extract on dipeptidyl peptidase-IV and a-glucosidase enzyme was measured in a cell free system.Then,interleukin-1βand interferon-γinduced cell death and insulin secretion were measured in rat insulinoma(RIN)cells by 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide assay and ELISA kit,respectively.Glucose uptake and glucose transporter expression were measured by fluorometry and western blotting,using 3T3-Ll adipocytes.Results:C.lentillifera extract significantly decreased dipeptidyl peptidase-IV and a-glucosidase enzyme activities,and effectively inhibited cell death and iNOS expression in interleukin-1βand interfcron-γinduced RIK cells.Furthermore,C.lntillifera extract significantly enhanced insulin secretion in RTN cells and glucose transporter expression and glucose uptake in 3T3-L1adipocytes.Conclusions:Thus,our results suggest that C.lentillifera could be used as a potential antidiabetic agenl.展开更多
To research the effect of the selection method of multi-objects genetic algorithm problem on optimizing result, thismethod is analyzed theoretically and discussed by using an autonomous underwater vehicle(AUV) as an o...To research the effect of the selection method of multi-objects genetic algorithm problem on optimizing result, thismethod is analyzed theoretically and discussed by using an autonomous underwater vehicle(AUV) as an object. A changingweight vtlue method is put forward and a selection formula is modified. Some experiments were implemented on an AUV.TwinBurger. The results shows that this method is effective and feasible.展开更多
In the video-based surveillance application, moving shadows can affect the correct localization and detection of moving objects. This paper aims to present a method for shadow detection and suppression used for moving...In the video-based surveillance application, moving shadows can affect the correct localization and detection of moving objects. This paper aims to present a method for shadow detection and suppression used for moving visual object detection. The major novelty of the shadow suppression is the integration of several features including photometric invariant color feature, motion edge feature, and spatial feature etc. By modifying process for false shadow detected, the averaging detection rate of moving object reaches above 90% in the test of Hall-Monitor sequence.展开更多
The Large Sky Area Multi-Object Fiber Spectroscopic Telescope (LAMOST, also called the Guo Shou Jing Telescope) is a special reflecting Schmidt telescope. LAMOST’s special design allows both a large aperture (effecti...The Large Sky Area Multi-Object Fiber Spectroscopic Telescope (LAMOST, also called the Guo Shou Jing Telescope) is a special reflecting Schmidt telescope. LAMOST’s special design allows both a large aperture (effective aperture of 3.6 m–4.9 m) and a wide field of view (FOV) (5°). It has an innovative active reflecting Schmidt configuration which continuously changes the mirror’s surface that adjusts during the observation process and combines thin deformable mirror active optics with segmented active optics. Its primary mirror (6.67m×6.05 m) and active Schmidt mirror (5.74m×4.40 m) are both segmented, and composed of 37 and 24 hexagonal sub-mirrors respectively. By using a parallel controllable fiber positioning technique, the focal surface of 1.75 m in diameter can accommodate 4000 optical fibers. Also, LAMOST has 16 spectrographs with 32 CCD cameras. LAMOST will be the telescope with the highest rate of spectral acquisition. As a national large scientific project, the LAMOST project was formally proposed in 1996, and approved by the Chinese government in 1997. The construction started in 2001, was completed in 2008 and passed the official acceptance in June 2009. The LAMOST pilot survey was started in October 2011 and the spectroscopic survey will launch in September 2012. Up to now, LAMOST has released more than 480 000 spectra of objects. LAMOST will make an important contribution to the study of the large-scale structure of the Universe, structure and evolution of the Galaxy, and cross-identification of multiwaveband properties in celestial objects.展开更多
Objective To compare the acute hemodynamic effects of five different pacing modes in patients with cardiac function NYHA class Ⅰ to Ⅱ without bundle branch block (BBB). Methods This study included 12 patients (SSS ...Objective To compare the acute hemodynamic effects of five different pacing modes in patients with cardiac function NYHA class Ⅰ to Ⅱ without bundle branch block (BBB). Methods This study included 12 patients (SSS 7, Ⅲ°AVB 5) undergoing pacemaker implantation. Right ventricular apex (RVA), right ventricular outflow tract (RVOT), right ventricular bifocal (RV-Bi), left ventricular base (LVB) and bi -ventricular (Bi-Ⅴ) pacing at 60 -80 ppm were done in VVI mode prior to implantation of DDD pacemaker. The cardiac index (CI), mean pulmonary artery pressure (mPAP) and pulmonary capillary wedge pressure (PCWP) were measured with Swan - Ganz thermodilution catheter after 5 minutes of each pacing mode. Results (1) Comparing to pacing at RVA (CI: 2. 41± 0. 38 L/min per m2, PCWP: 16. 7 ±3.3 mmHg), the CI increased and the PCWP decreased significantly in pacing at RVOT(CI: 2. 63 ± 0.46, PCWP: 13. 8±2. 3), LVB(CI: 2. 78±0.52, PCWP: 14. 4±3.1), RV-Bi(CI: 2. 83±0.57, PCWP: 12. 8± 2. 5) and Bi -Ⅴ pacing (CI: 2. 94± 0.60, PCWP: 12. 7±2. 5), P < 0. 01, respectively. (2) The CI of RV-Bi and Bi-Ⅴ pacing was higher than that of RVOT and LVB pacing, the PCWP was lower, P < 0. 05, respectively. (3) There was no significant difference between RV - Bi pacing and Bi-Ⅴ pacing in CI and PCWP. Conclusion There is no significant difference between RV - Bi pacing and Bi -V pacing in the acute hemodynamic effects; however,dual - site pacing is much better than single site pacing in that aspect for patients with cardiac function NYHA class Ⅰ to Ⅱ without BBB. Among single site pacing, the RVOT and LVB pacing is better than RVA pacing in cardiac function.展开更多
In this paper, a successfully studied and developed master - slave muld - microcomputers control system based on PC - BUS for hollow spindle fancy yarn spinning machine, mainly Its overall scheme, software and hardwar...In this paper, a successfully studied and developed master - slave muld - microcomputers control system based on PC - BUS for hollow spindle fancy yarn spinning machine, mainly Its overall scheme, software and hardware construction, is introduced. Spinning experiments show that the system achieves satisfactory result. This system can solve the diftkultles of mechatronical fusion between domestic hollow splndk fancy yarn spuming muchine and its microcomputer control technology.展开更多
A quantitative method is developed to identify the structures of multi-layer woven fabric in this study. Six structural parameters are selected to represent the fabric structure. With some design criteria for the rein...A quantitative method is developed to identify the structures of multi-layer woven fabric in this study. Six structural parameters are selected to represent the fabric structure. With some design criteria for the reinforcement of textile composites, the relationships among the structural parameters are derived for different binding patterns of the fabric structure. The conditions, which meet the requirements of structural cell stability,are also discussed.展开更多
To meet the development trend of multi-bar warp knit-ting machine towards high-speed,advanced technologyand computer control and the requirements of variousproducts with small quantity,there are many researcheson the ...To meet the development trend of multi-bar warp knit-ting machine towards high-speed,advanced technologyand computer control and the requirements of variousproducts with small quantity,there are many researcheson the computer-aided pattern design of multi-barwarp knitted fabrics.In terms of the special propertiesof the computer-aided pattern design of multi-barwarp knitted fabrics,the Object Oriented Program(OOP)programming-Object Windows class Library(OWL)programming is selected.According to thecharacters of the OWL programming,various functionsare defined.Pattern design and technical parameters canbe output,which offers a great convenience for the fac-tory.展开更多
文摘To address the problem that existing bipartite secret sharing scheme is short of dynamic characteristic, and to solve the problem that each participant can only use secret share once, this paper proposed a bipartite (n1+n2, m1+m2)-threshold multi-secret sharing scheme which combined cryptography and hypersphere geometry. In this scheme, we introduced a bivariate function and a coordinate function over finite field Zp to calculate the derived points of secret share, which can reconstruct the shared secrets by producing the intersection point of hypernormal plane and normal line on the hypertangent plane. At the initial stage the secret dealer distributes to each participant a secret share that can be kept secret based on the intractability of discrete logarithm problem and need not be changed with updating the shared secrets.Each cooperative participant only needs to submit a derived point calculated from the secret share without exposing this secret share during the process of reconstructing the shared secret. Analyses indicate that the proposed scheme is not only sound and secure because of hypersphere geometric properties and the difficulty of discrete logarithm problem, but also efficient because of its well dynamic behavior and the invariant secret share. Therefore, this bipartite threshold multi-secret sharing scheme is easy to implement and is applicable in practical settings.
文摘Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computation and electronic commerce. But up to now, study of signature based on general vector space secret sharing is very weak. Aiming at this drawback, the authors did some research on vector space secret sharing against cheaters, and proposed an efficient but secure vector space secret sharing based multi-signature scheme, which is implemented in two channels. In this scheme, the group signature can be easily produced if an authorized subset of participants pool their secret shadows and it is impossible for them to generate a group signature if an unauthorized subset of participants pool their secret shadows. The validity of the group signature can be verified by means of verification equations. A group signature of authorized subset of participants cannot be impersonated by any other set of partici- pants. Moreover, the suspected forgery can be traced, and the malicious participants can be detected in the scheme. None of several possible attacks can successfully break this scheme.
文摘A secret sharing scheme is one of cryptographies. A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key. On the other hand, a multi-secret sharing scheme has more than one keys;that is, a multi-secret sharing scheme has p (≥2) keys. Dealers distribute shares of keys among n participants. Gathering t (≤n) participants, keys can be reconstructed. In this paper, we give a scheme of a (t,n) multi-secret sharing based on Hermite interpolation, in the case of p≤t.
基金Supported by the Ministry of Education.Science and Technology (Grant No.2012RTAL2009172)
文摘Objective:To evaluate anti-diabetic effect of Caulrpa kntillifera(C.lentillifera).Methods:The inhibitory effect of C.lentillifera extract on dipeptidyl peptidase-IV and a-glucosidase enzyme was measured in a cell free system.Then,interleukin-1βand interferon-γinduced cell death and insulin secretion were measured in rat insulinoma(RIN)cells by 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide assay and ELISA kit,respectively.Glucose uptake and glucose transporter expression were measured by fluorometry and western blotting,using 3T3-Ll adipocytes.Results:C.lentillifera extract significantly decreased dipeptidyl peptidase-IV and a-glucosidase enzyme activities,and effectively inhibited cell death and iNOS expression in interleukin-1βand interfcron-γinduced RIK cells.Furthermore,C.lntillifera extract significantly enhanced insulin secretion in RTN cells and glucose transporter expression and glucose uptake in 3T3-L1adipocytes.Conclusions:Thus,our results suggest that C.lentillifera could be used as a potential antidiabetic agenl.
文摘To research the effect of the selection method of multi-objects genetic algorithm problem on optimizing result, thismethod is analyzed theoretically and discussed by using an autonomous underwater vehicle(AUV) as an object. A changingweight vtlue method is put forward and a selection formula is modified. Some experiments were implemented on an AUV.TwinBurger. The results shows that this method is effective and feasible.
文摘In the video-based surveillance application, moving shadows can affect the correct localization and detection of moving objects. This paper aims to present a method for shadow detection and suppression used for moving visual object detection. The major novelty of the shadow suppression is the integration of several features including photometric invariant color feature, motion edge feature, and spatial feature etc. By modifying process for false shadow detected, the averaging detection rate of moving object reaches above 90% in the test of Hall-Monitor sequence.
文摘The Large Sky Area Multi-Object Fiber Spectroscopic Telescope (LAMOST, also called the Guo Shou Jing Telescope) is a special reflecting Schmidt telescope. LAMOST’s special design allows both a large aperture (effective aperture of 3.6 m–4.9 m) and a wide field of view (FOV) (5°). It has an innovative active reflecting Schmidt configuration which continuously changes the mirror’s surface that adjusts during the observation process and combines thin deformable mirror active optics with segmented active optics. Its primary mirror (6.67m×6.05 m) and active Schmidt mirror (5.74m×4.40 m) are both segmented, and composed of 37 and 24 hexagonal sub-mirrors respectively. By using a parallel controllable fiber positioning technique, the focal surface of 1.75 m in diameter can accommodate 4000 optical fibers. Also, LAMOST has 16 spectrographs with 32 CCD cameras. LAMOST will be the telescope with the highest rate of spectral acquisition. As a national large scientific project, the LAMOST project was formally proposed in 1996, and approved by the Chinese government in 1997. The construction started in 2001, was completed in 2008 and passed the official acceptance in June 2009. The LAMOST pilot survey was started in October 2011 and the spectroscopic survey will launch in September 2012. Up to now, LAMOST has released more than 480 000 spectra of objects. LAMOST will make an important contribution to the study of the large-scale structure of the Universe, structure and evolution of the Galaxy, and cross-identification of multiwaveband properties in celestial objects.
文摘Objective To compare the acute hemodynamic effects of five different pacing modes in patients with cardiac function NYHA class Ⅰ to Ⅱ without bundle branch block (BBB). Methods This study included 12 patients (SSS 7, Ⅲ°AVB 5) undergoing pacemaker implantation. Right ventricular apex (RVA), right ventricular outflow tract (RVOT), right ventricular bifocal (RV-Bi), left ventricular base (LVB) and bi -ventricular (Bi-Ⅴ) pacing at 60 -80 ppm were done in VVI mode prior to implantation of DDD pacemaker. The cardiac index (CI), mean pulmonary artery pressure (mPAP) and pulmonary capillary wedge pressure (PCWP) were measured with Swan - Ganz thermodilution catheter after 5 minutes of each pacing mode. Results (1) Comparing to pacing at RVA (CI: 2. 41± 0. 38 L/min per m2, PCWP: 16. 7 ±3.3 mmHg), the CI increased and the PCWP decreased significantly in pacing at RVOT(CI: 2. 63 ± 0.46, PCWP: 13. 8±2. 3), LVB(CI: 2. 78±0.52, PCWP: 14. 4±3.1), RV-Bi(CI: 2. 83±0.57, PCWP: 12. 8± 2. 5) and Bi -Ⅴ pacing (CI: 2. 94± 0.60, PCWP: 12. 7±2. 5), P < 0. 01, respectively. (2) The CI of RV-Bi and Bi-Ⅴ pacing was higher than that of RVOT and LVB pacing, the PCWP was lower, P < 0. 05, respectively. (3) There was no significant difference between RV - Bi pacing and Bi-Ⅴ pacing in CI and PCWP. Conclusion There is no significant difference between RV - Bi pacing and Bi -V pacing in the acute hemodynamic effects; however,dual - site pacing is much better than single site pacing in that aspect for patients with cardiac function NYHA class Ⅰ to Ⅱ without BBB. Among single site pacing, the RVOT and LVB pacing is better than RVA pacing in cardiac function.
文摘In this paper, a successfully studied and developed master - slave muld - microcomputers control system based on PC - BUS for hollow spindle fancy yarn spinning machine, mainly Its overall scheme, software and hardware construction, is introduced. Spinning experiments show that the system achieves satisfactory result. This system can solve the diftkultles of mechatronical fusion between domestic hollow splndk fancy yarn spuming muchine and its microcomputer control technology.
文摘A quantitative method is developed to identify the structures of multi-layer woven fabric in this study. Six structural parameters are selected to represent the fabric structure. With some design criteria for the reinforcement of textile composites, the relationships among the structural parameters are derived for different binding patterns of the fabric structure. The conditions, which meet the requirements of structural cell stability,are also discussed.
文摘To meet the development trend of multi-bar warp knit-ting machine towards high-speed,advanced technologyand computer control and the requirements of variousproducts with small quantity,there are many researcheson the computer-aided pattern design of multi-barwarp knitted fabrics.In terms of the special propertiesof the computer-aided pattern design of multi-barwarp knitted fabrics,the Object Oriented Program(OOP)programming-Object Windows class Library(OWL)programming is selected.According to thecharacters of the OWL programming,various functionsare defined.Pattern design and technical parameters canbe output,which offers a great convenience for the fac-tory.