To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties o...To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties of the pairings and the characters of key generations of certificate-based cryptosystems and ID-based cryptosystems,a construction for such a scheme is also presented.To prove the security of the proposed scheme,a general security model for this scheme under adaptive chosen-PKG,chosen-ID,chosen-delegation,chosen-ProxySigner-public-key,chosen-proxy-key and chosen-message attack is defined.The proposed scheme is provably secure under the random oracle model and the hardness assumption of computational Diffie-Hellman problem.展开更多
In order to obtain coding gain along with diversity gain,rotation code was applied to cooperative diversity employing decoded-and-forward cooperative protocol.Different from the same two symbols transmitted in convent...In order to obtain coding gain along with diversity gain,rotation code was applied to cooperative diversity employing decoded-and-forward cooperative protocol.Different from the same two symbols transmitted in conventional repetition-coded scheme,two different symbols were transmitted separately in two successive timeslots in the proposed rotation-coded cooperative diversity.In this way,constellation spread in the available two-dimensional signal space rather than on a single-dimensional line in repetition-coded scheme,which was supposed to be responsible for the additional coding gain.Under the proposed cooperative transmission model,upper bounds for the symbol-error-rate(SER)of cooperative diversity based on repetition code and rotation code were derived respectively.Both analytical and simulated results show that cooperative diversity based on rotation code can obtain an improved coding gain(by about 2 dB)than repetition-coded scheme without the expense of power or bandwidth.展开更多
with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced ...with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality.展开更多
We developed a novel absolute multi-pole encoder structure to improve the resolution of the multi-pole encoder, realize absolute output and reduce the manufacturing cost of the encoder. The structure includes two ring...We developed a novel absolute multi-pole encoder structure to improve the resolution of the multi-pole encoder, realize absolute output and reduce the manufacturing cost of the encoder. The structure includes two ring alnicos defined as index track and sub-division track, respectively. The index track is magnetized based on the improved gray code, with linear halls placed around the track evenly. The outputs of linear halls show the region the rotor belongs to. The sub-division track is magnetized to N-S-N-S (north-south-north-south), and the number of N-S pole pairs is determined by the index track. Three linear hall sensors with an air-gap of 2 mm are used to translate the magnetic filed to voltage signals. The relative offset in a single N-S is obtained through look-up. The magnetic encoder is calibrated using a higher-resolution incremental optical encoder. The pulse output from the optical encoder and hall signals from the magnetic encoder are sampled at the same time and transmitted to a computer, and the relation between them is calculated, and stored in the FLASH of MCU (micro controller unit) for look-up. In the working state, the absolute angle is derived by looking-up with hall signals. The structure is simple and the manufacturing cost is very low and suitable for mass production.展开更多
As the popularity of open source projects,the volume of incoming pull requests is too large,which puts heavy burden on integrators who are responsible for accepting or rejecting pull requests.An accepted pull request ...As the popularity of open source projects,the volume of incoming pull requests is too large,which puts heavy burden on integrators who are responsible for accepting or rejecting pull requests.An accepted pull request prediction approach can help integrators by allowing them either to enforce an immediate rejection of code changes or allocate more resources to overcome the deficiency.In this paper,an approach CTCPPre is proposed to predict the accepted pull requests in GitHub.CTCPPre mainly considers code features of modified changes,text features of pull requests’description,contributor features of developers’previous behaviors,and project features of development environment.The effectiveness of CTCPPre on 28 projects containing 221096 pull requests is evaluated.Experimental results show that CTCPPre has good performances by achieving accuracy of 0.82,AUC of 0.76 and F1-score of 0.88 on average.It is compared with the state of art accepted pull request prediction approach RFPredict.On average across 28 projects,CTCPPre outperforms RFPredict by 6.64%,16.06%and 4.79%in terms of accuracy,AUC and F1-score,respectively.展开更多
Signcryption, which was introduced by ZHEN~ is a cryptographic primitive that fulfils the functions of both digital signature and encryption and guarantees confidentiality, integrity and non-repudiation in a more effi...Signcryption, which was introduced by ZHEN~ is a cryptographic primitive that fulfils the functions of both digital signature and encryption and guarantees confidentiality, integrity and non-repudiation in a more effi- cient way. Certificateless signcryption and pro- xy signcryption in identity-based cryptography were proposed for different applications. Most of these schemes are constructed by bilinear pairings from elliptic curves. However, some schemes were recently presented without pai- rings. In this paper, we present a certificateless proxy identity-based signcryption scheme with- out bilinear pairings, which is efficient and secure.展开更多
Realtime speech communications require high efficient compression algorithms to encode speech signals. As the compressed speech parameters are highly sensitive to transmission errors, robust source and channel decodin...Realtime speech communications require high efficient compression algorithms to encode speech signals. As the compressed speech parameters are highly sensitive to transmission errors, robust source and channel decoding and demodulation schemes are both important and of practical use. In this paper, an it- erative joint souree-channel decoding and demodulation algorithm is proposed for mixed excited linear pre- diction (MELP) vocoder by both exploiting the residual redundancy and passing soft information through- out the receiver while introducing systematic global iteration process to further enhance the performance. Being fully compatible with existing transmitter structure, the proposed algorithm does not introduce addi- tional bandwidth expansion and transmission delay. Simulations show substantial error correcting perfor- mance and synthesized speech quality improvement over conventional separate designed systems in delay and bandwidth constraint channels by using the joint source-channel decoding and demodulation (JSCCM) algorithm.展开更多
Reverse-transcription qualitative PCR(RT-qPCR)was used to analyze the changes in transcription levels of the sulfur metabolism-related periplasmic protein genes of Acidithiobacillus ferrooxidans ATCC 23270 grown on su...Reverse-transcription qualitative PCR(RT-qPCR)was used to analyze the changes in transcription levels of the sulfur metabolism-related periplasmic protein genes of Acidithiobacillus ferrooxidans ATCC 23270 grown on sulfur or ferrous.Seven periplasmic proteins with apparently higher abundance grown on elemental sulfur than on ferrous sulfate were identified by matrix-assisted laser desorption ionization time-of-flight mass spectrometry(MALDI-TOF-MS).Expression analysis of the corresponding genes by RT-qPCR shows that the constitutive expression of all those genes are more up-regulated grown on sulfur than those grown on ferrous(>10 folder).Study on the corresponding genes of the identified periplasmic proteins by RT-qPCR confirmed the results of two-dimensioned gel electrophoresis,indicating they may be related with sulfur metabolism in A.ferrooxidans.展开更多
The famous F5 algorithm for computing Grobner basis was presented by Faugere in 2002. The original version of F5 is given in programming codes, so it is a bit difficult to understand. In this paper, the F5 algorithm i...The famous F5 algorithm for computing Grobner basis was presented by Faugere in 2002. The original version of F5 is given in programming codes, so it is a bit difficult to understand. In this paper, the F5 algorithm is simplified as F5B in a Buchberger's style such that it is easy to understand and implement. In order to describe F5B, we introduce F5-reduction, which keeps the signature of labeled polynomials unchanged after reduction. The equivalence between F5 and F5B is also shown. At last, some versions of the F5 algorithm are illustrated.展开更多
Labeling information in a complex irregular region is a useful procedure occurring frequently in sheet metal and the furniture industry which will be beneficial in parts management.A fast code-based labeler(FCBL) is p...Labeling information in a complex irregular region is a useful procedure occurring frequently in sheet metal and the furniture industry which will be beneficial in parts management.A fast code-based labeler(FCBL) is proposed to accomplish this objective in this paper.The region is first discretized,and then encoded by the Freeman encoding technique for providing the 2D regional information by 1D codes with redundancies omitted.We enhance the encoding scheme to make it more suitable for our complex problem.Based on the codes,searching algorithms are designed and can be extended with customized constraints.In addition,by introducing a smart optimal direction estimation,the labeling speed and accuracy of FCBL are significantly improved.Experiments with a large range of real data gained from industrial factories demonstrate the stability and millisecond-level speed of FCBL.The proposed method has been integrated into a shipbuilding CAD system,and plays a very important role in ship parts labeling process.展开更多
Transcriptomics is one of the most developed fields in the post-genomic era.Transcriptome is the complete set of RNA transcripts in a specific cell type or tissue at a certain developmental stage and/or under a specif...Transcriptomics is one of the most developed fields in the post-genomic era.Transcriptome is the complete set of RNA transcripts in a specific cell type or tissue at a certain developmental stage and/or under a specific physiological condition,including messenger RNA,transfer RNA,ribosomal RNA,and other non-coding RNAs.Transcriptomics focuses on the gene expression at the RNA level and offers the genome-wide information of gene structure and gene function in order to reveal the molecular mechanisms involved in specific biological processes.With the development of next-generation high-throughput sequencing technology,transcriptome analysis has been progressively improving our understanding of RNA-based gene regulatory network.Here,we discuss the concept,history,and especially the recent advances in this inspiring field of study.展开更多
基金The National Natural Science Foundation of China(No.60473028)the Natural Science Foundation of Zhengzhou University of Light Industry(No.2006XXJ18)the Doctor Foundation of Zhengzhou University of Light Industry(No.20080014)
文摘To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties of the pairings and the characters of key generations of certificate-based cryptosystems and ID-based cryptosystems,a construction for such a scheme is also presented.To prove the security of the proposed scheme,a general security model for this scheme under adaptive chosen-PKG,chosen-ID,chosen-delegation,chosen-ProxySigner-public-key,chosen-proxy-key and chosen-message attack is defined.The proposed scheme is provably secure under the random oracle model and the hardness assumption of computational Diffie-Hellman problem.
基金Project(2006AA01Z270)supported by the National High Technology Research and Development Program of ChinaProject(U0635003)supported by the National Natural Science Foundation of Guangdong Province,ChinaProject(2007F07)supported by the National Science Foundation of Shaanxi Province,China
文摘In order to obtain coding gain along with diversity gain,rotation code was applied to cooperative diversity employing decoded-and-forward cooperative protocol.Different from the same two symbols transmitted in conventional repetition-coded scheme,two different symbols were transmitted separately in two successive timeslots in the proposed rotation-coded cooperative diversity.In this way,constellation spread in the available two-dimensional signal space rather than on a single-dimensional line in repetition-coded scheme,which was supposed to be responsible for the additional coding gain.Under the proposed cooperative transmission model,upper bounds for the symbol-error-rate(SER)of cooperative diversity based on repetition code and rotation code were derived respectively.Both analytical and simulated results show that cooperative diversity based on rotation code can obtain an improved coding gain(by about 2 dB)than repetition-coded scheme without the expense of power or bandwidth.
文摘with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality.
基金Funded partly by Heilongjiang Province Financial Fund for Researchers Returning from Abroad
文摘We developed a novel absolute multi-pole encoder structure to improve the resolution of the multi-pole encoder, realize absolute output and reduce the manufacturing cost of the encoder. The structure includes two ring alnicos defined as index track and sub-division track, respectively. The index track is magnetized based on the improved gray code, with linear halls placed around the track evenly. The outputs of linear halls show the region the rotor belongs to. The sub-division track is magnetized to N-S-N-S (north-south-north-south), and the number of N-S pole pairs is determined by the index track. Three linear hall sensors with an air-gap of 2 mm are used to translate the magnetic filed to voltage signals. The relative offset in a single N-S is obtained through look-up. The magnetic encoder is calibrated using a higher-resolution incremental optical encoder. The pulse output from the optical encoder and hall signals from the magnetic encoder are sampled at the same time and transmitted to a computer, and the relation between them is calculated, and stored in the FLASH of MCU (micro controller unit) for look-up. In the working state, the absolute angle is derived by looking-up with hall signals. The structure is simple and the manufacturing cost is very low and suitable for mass production.
基金Project(2018YFB1004202)supported by the National Key Research and Development Program of ChinaProject(61732019)supported by the National Natural Science Foundation of ChinaProject(SKLSDE-2018ZX-06)supported by the State Key Laboratory of Software Development Environment,China
文摘As the popularity of open source projects,the volume of incoming pull requests is too large,which puts heavy burden on integrators who are responsible for accepting or rejecting pull requests.An accepted pull request prediction approach can help integrators by allowing them either to enforce an immediate rejection of code changes or allocate more resources to overcome the deficiency.In this paper,an approach CTCPPre is proposed to predict the accepted pull requests in GitHub.CTCPPre mainly considers code features of modified changes,text features of pull requests’description,contributor features of developers’previous behaviors,and project features of development environment.The effectiveness of CTCPPre on 28 projects containing 221096 pull requests is evaluated.Experimental results show that CTCPPre has good performances by achieving accuracy of 0.82,AUC of 0.76 and F1-score of 0.88 on average.It is compared with the state of art accepted pull request prediction approach RFPredict.On average across 28 projects,CTCPPre outperforms RFPredict by 6.64%,16.06%and 4.79%in terms of accuracy,AUC and F1-score,respectively.
基金supported by the National Natural Science Foundation of China under Grants No.61272499,No.10990011
文摘Signcryption, which was introduced by ZHEN~ is a cryptographic primitive that fulfils the functions of both digital signature and encryption and guarantees confidentiality, integrity and non-repudiation in a more effi- cient way. Certificateless signcryption and pro- xy signcryption in identity-based cryptography were proposed for different applications. Most of these schemes are constructed by bilinear pairings from elliptic curves. However, some schemes were recently presented without pai- rings. In this paper, we present a certificateless proxy identity-based signcryption scheme with- out bilinear pairings, which is efficient and secure.
基金Supported by the National Natural Science Foundation of China (No. 60572081 )
文摘Realtime speech communications require high efficient compression algorithms to encode speech signals. As the compressed speech parameters are highly sensitive to transmission errors, robust source and channel decoding and demodulation schemes are both important and of practical use. In this paper, an it- erative joint souree-channel decoding and demodulation algorithm is proposed for mixed excited linear pre- diction (MELP) vocoder by both exploiting the residual redundancy and passing soft information through- out the receiver while introducing systematic global iteration process to further enhance the performance. Being fully compatible with existing transmitter structure, the proposed algorithm does not introduce addi- tional bandwidth expansion and transmission delay. Simulations show substantial error correcting perfor- mance and synthesized speech quality improvement over conventional separate designed systems in delay and bandwidth constraint channels by using the joint source-channel decoding and demodulation (JSCCM) algorithm.
基金Projects(50674101,50974140)supported by the National Natural Science Foundation of ChinaProject(2010CB630902)supported by the National Basic Research Program of China
文摘Reverse-transcription qualitative PCR(RT-qPCR)was used to analyze the changes in transcription levels of the sulfur metabolism-related periplasmic protein genes of Acidithiobacillus ferrooxidans ATCC 23270 grown on sulfur or ferrous.Seven periplasmic proteins with apparently higher abundance grown on elemental sulfur than on ferrous sulfate were identified by matrix-assisted laser desorption ionization time-of-flight mass spectrometry(MALDI-TOF-MS).Expression analysis of the corresponding genes by RT-qPCR shows that the constitutive expression of all those genes are more up-regulated grown on sulfur than those grown on ferrous(>10 folder).Study on the corresponding genes of the identified periplasmic proteins by RT-qPCR confirmed the results of two-dimensioned gel electrophoresis,indicating they may be related with sulfur metabolism in A.ferrooxidans.
文摘The famous F5 algorithm for computing Grobner basis was presented by Faugere in 2002. The original version of F5 is given in programming codes, so it is a bit difficult to understand. In this paper, the F5 algorithm is simplified as F5B in a Buchberger's style such that it is easy to understand and implement. In order to describe F5B, we introduce F5-reduction, which keeps the signature of labeled polynomials unchanged after reduction. The equivalence between F5 and F5B is also shown. At last, some versions of the F5 algorithm are illustrated.
基金supported by the National Natural Science Foundation of China(Nos.60873181,60673006 and 60533060)the Program for New Century Excellent Talents in University,China(No.NCET-05-0275)
文摘Labeling information in a complex irregular region is a useful procedure occurring frequently in sheet metal and the furniture industry which will be beneficial in parts management.A fast code-based labeler(FCBL) is proposed to accomplish this objective in this paper.The region is first discretized,and then encoded by the Freeman encoding technique for providing the 2D regional information by 1D codes with redundancies omitted.We enhance the encoding scheme to make it more suitable for our complex problem.Based on the codes,searching algorithms are designed and can be extended with customized constraints.In addition,by introducing a smart optimal direction estimation,the labeling speed and accuracy of FCBL are significantly improved.Experiments with a large range of real data gained from industrial factories demonstrate the stability and millisecond-level speed of FCBL.The proposed method has been integrated into a shipbuilding CAD system,and plays a very important role in ship parts labeling process.
基金supported by grants from the National Natural Science Foundation of China(31271318)Natural Science Foundation of Guangdong(S2012010008912)Foundation of Key Laboratory of Plant Resources Conservation and Sustainable Utilization,South China Botanical Garden,Chinese Academy of Sciences
文摘Transcriptomics is one of the most developed fields in the post-genomic era.Transcriptome is the complete set of RNA transcripts in a specific cell type or tissue at a certain developmental stage and/or under a specific physiological condition,including messenger RNA,transfer RNA,ribosomal RNA,and other non-coding RNAs.Transcriptomics focuses on the gene expression at the RNA level and offers the genome-wide information of gene structure and gene function in order to reveal the molecular mechanisms involved in specific biological processes.With the development of next-generation high-throughput sequencing technology,transcriptome analysis has been progressively improving our understanding of RNA-based gene regulatory network.Here,we discuss the concept,history,and especially the recent advances in this inspiring field of study.