Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modem cryptnlogy. For examp...Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modem cryptnlogy. For example, in digital image encryption system, substitution can disrupt the original order of the images and eliminate the correlation of image information which not only can realize security of images, but also can resist intentional attack and destruction of clipping and noise. And transposition transformation is introduced into the design of block ciphers. The substitution has the feature of high efficiency and resistance, which makes it meet the specific requirements of encryption. So substitution cypher can be applied to modern encryption system.展开更多
Computational analysis is essential for transforming the masses of microarray datainto a mechanistic understanding of cancer. Here we present a method for findinggene functional modules of cancer from microarray data ...Computational analysis is essential for transforming the masses of microarray datainto a mechanistic understanding of cancer. Here we present a method for findinggene functional modules of cancer from microarray data and have applied it tocolon cancer. First, a colon cancer gene network and a normal colon tissue genenetwork were constructed using correlations between the genes. Then the modulesthat tended to have a homogeneous functional composition were identified by split-ting up the network. Analysis of both networks revealed that they are scale-free.Comparison of the gene functional modules for colon cancer and normal tissuesshowed that the modules’ functions changed with their structures.展开更多
文摘Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modem cryptnlogy. For example, in digital image encryption system, substitution can disrupt the original order of the images and eliminate the correlation of image information which not only can realize security of images, but also can resist intentional attack and destruction of clipping and noise. And transposition transformation is introduced into the design of block ciphers. The substitution has the feature of high efficiency and resistance, which makes it meet the specific requirements of encryption. So substitution cypher can be applied to modern encryption system.
基金the National Natural Science Foundation of China (Grant No. 60234020).
文摘Computational analysis is essential for transforming the masses of microarray datainto a mechanistic understanding of cancer. Here we present a method for findinggene functional modules of cancer from microarray data and have applied it tocolon cancer. First, a colon cancer gene network and a normal colon tissue genenetwork were constructed using correlations between the genes. Then the modulesthat tended to have a homogeneous functional composition were identified by split-ting up the network. Analysis of both networks revealed that they are scale-free.Comparison of the gene functional modules for colon cancer and normal tissuesshowed that the modules’ functions changed with their structures.