期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Exploring diversity of different classificatory human tandem repeats
1
作者 Zhong-Yu Liu Xu-Feng Li +2 位作者 Xian-Ping Ding Bo Liu Yi Yang 《Journal of Biomedical Science and Engineering》 2008年第2期127-132,共6页
Tandem repeats (TRs) are associated with dis-ease genes, play an important role in evolution and are important in genomic organization and function. Much research has been done on de-scriptions of properties of tandem... Tandem repeats (TRs) are associated with dis-ease genes, play an important role in evolution and are important in genomic organization and function. Much research has been done on de-scriptions of properties of tandem repeats, such as copy-number, period, etc, and correlation be-tween mutations within tandem repeats and dis-ease. This project aims to detect some differ-ences which may exist within the features of dif-ferent tandem repeats associated with disease in human whole-genome. The features of tandem repeats associated with diabetes genes were compared to the counterparts of non-diabetes disease genes. 展开更多
关键词 DIVERSITY of DIFFERENT classificatory HUMAN TANDEM REPEATS
下载PDF
Security analysis of access control model in hybrid cloud based on security entropy 被引量:2
2
作者 车天伟 Ma Jianfeng +1 位作者 Li Na Wang Chao 《High Technology Letters》 EI CAS 2015年第2期200-204,共5页
To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put... To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud. 展开更多
关键词 hybrid cloud security entropy classificatory access control model directly unauthorized access right about access indirectly unauthorized access
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部