To enhance the accuracy and efficiency of bridge damage identification,a novel data-driven damage identification method was proposed.First,convolutional autoencoder(CAE)was used to extract key features from the accele...To enhance the accuracy and efficiency of bridge damage identification,a novel data-driven damage identification method was proposed.First,convolutional autoencoder(CAE)was used to extract key features from the acceleration signal of the bridge structure through data reconstruction.The extreme gradient boosting tree(XGBoost)was then used to perform analysis on the feature data to achieve damage detection with high accuracy and high performance.The proposed method was applied in a numerical simulation study on a three-span continuous girder and further validated experimentally on a scaled model of a cable-stayed bridge.The numerical simulation results show that the identification errors remain within 2.9%for six single-damage cases and within 3.1%for four double-damage cases.The experimental validation results demonstrate that when the tension in a single cable of the cable-stayed bridge decreases by 20%,the method accurately identifies damage at different cable locations using only sensors installed on the main girder,achieving identification accuracies above 95.8%in all cases.The proposed method shows high identification accuracy and generalization ability across various damage scenarios.展开更多
Codon usage is the selective and nonrandom use of synonymous codons to encode amino acids in genes for proteins. The analysis of codon usage may improve the understanding of cocion preferences between different specie...Codon usage is the selective and nonrandom use of synonymous codons to encode amino acids in genes for proteins. The analysis of codon usage may improve the understanding of cocion preferences between different species and allow to rebuild the codons of exogenous genes to increase the expression efficiency of exogenous genes, Here, codon DNA sequence (CDS) of four poplar species, including Populus tremuloides Michx., P. tomentosa Carr., P. deltoides Marsh., and P. trichocarpa Torr. & Gray., is used to analyze the relative frequency of synonymous codon (RFSC). High-frequency codons are selected by high-frequency (HF) codon analysis. The results indicate that the codon usage is common for all four poplar species and the codon preference is quite similar among the four poplar species. However, CCT encoding for Pro, and ACT coding for Thr are the preferred codons in P. tremuloides and P. tomentosa, whereas CCA coding for Pro, and ACA coding for Thr are preferred in P. deltoides and P. trichocarpa The codons such as TGC coding for Cys, TTC coding for Phe, and AAG coding for Lys, are preferred in the poplar species except P trichocarpa. GAG coding for Glu is preferred only in P deltoides, while the other three poplar species prefer to use GAA. The commonness of preferred codon allows exogenous gene designed by the preferred cocion of one of the different poplar species to be used in other poplar species.展开更多
An efficient design method for a 24 × 24 bit +48 bit parallel saturating multiply-accumulate (MAC) unit is described. The augend in the MAC is merged as a partial product into Wallace tree array. The optimized...An efficient design method for a 24 × 24 bit +48 bit parallel saturating multiply-accumulate (MAC) unit is described. The augend in the MAC is merged as a partial product into Wallace tree array. The optimized saturation detection logic is proposed. The 679. 2 μm × 132. 5μm area size has been achieved in 0. 18 μm 1.8 V 1P6M CMOS technology by the full-custom circuit layout design. The simulation results show that the design way has significantly less area (about 23.52% reduction) and less delay than those of the common saturating MAC based on standard cell library.展开更多
A modular architecture for two dimension (2 D) discrete wavelet transform (DWT) is designed.The image data can be wavelet transformed in real time,and the structure can be easily scaled up to higher levels of DWT.A f...A modular architecture for two dimension (2 D) discrete wavelet transform (DWT) is designed.The image data can be wavelet transformed in real time,and the structure can be easily scaled up to higher levels of DWT.A fast zerotree image coding (FZIC) algorithm is proposed by using a simple sequential scan order and two flag maps.The VLSI structure for FZIC is then presented.By combining 2 D DWT and FZIC,a wavelet image coder is finally designed.The coder is programmed,simulated,synthesized,and successfully verified by ALTERA CPLD.展开更多
This paper presents an efficient quadtree based fractal image coding scheme in wavelet transform domain based on the wavelet based theory of fractal image compression introduced by Davis. In the scheme, zerotrees of...This paper presents an efficient quadtree based fractal image coding scheme in wavelet transform domain based on the wavelet based theory of fractal image compression introduced by Davis. In the scheme, zerotrees of wavelet coefficients are used to reduce the number of domain blocks, which leads to lower bit cost required to represent the location information of fractal coding, and overall entropy constrained optimization is performed for the decision trees as well as for the sets of scalar quantizers and self quantizers of wavelet subtrees. Experiment results show that at the low bit rates, the proposed scheme gives about 1 dB improvement in PSNR over the reported results.展开更多
In High Efficiency Video Coding, the Residual Quad-Yree (RQT) coding is used to encode the prediction residual for both intra and inter Coding Units (CU) and provides improved coding gains. However, this results i...In High Efficiency Video Coding, the Residual Quad-Yree (RQT) coding is used to encode the prediction residual for both intra and inter Coding Units (CU) and provides improved coding gains. However, this results in much higher computational complexities. To address this problem, we develop two fast RQT algorithms for intra- and inter-prediction residual coding respectively. For intra coding, the proposed algorithm selects the best prediction mode in the rate distortion mode decision process using a Prediction Unit (PU) size-dependent fast RQT depth decision on a reduced prediction mode candidates set from the rough mode decision process. For inter coding, in addition to CU size-dependent fast RQT depth decisions, we propose a discriminant analy- sis-based fast depth decision algorithm to det- ermine the best transform unit size. Experimental results show that on average, we can real- ise a 21.29% encoding time saving and 0.03% bit-rate reduction for intra coding, while 15% of the encoding time can be saved with a negligible coding performance loss for inter coding.展开更多
Although Pampus minor has been classified as a new species, it still remains controversial. Was used a DNA barcoding technique based on homologous sequence analysis of the16S and CO1 genes to clarify the confusion ove...Although Pampus minor has been classified as a new species, it still remains controversial. Was used a DNA barcoding technique based on homologous sequence analysis of the16S and CO1 genes to clarify the confusion over the identification of this species. Among 12 individuals whose genetic distance was 0.002, two haplotypes were found. According to the 16S sequences, the genetic distances ranged from 0.121 to 0.133 between P. minor and other Pampus species. Although the same the genetic distance between the two P minor haplotypes was generated using CO1 sequences, the haplotype of Pm22-23, Pm28, and Pm32-33 was the same as that of Pci EF607462 and EF607466, while the haplotype of Pm24-27 and Pm29-31 was the same as that of Pci EF607461 and EF607463-65. In addition, the genetic distance ranged only from 0.002 to 0.005 between P minor and Pa EF607460 and EF607458. Apart from this, the interspecies genetic distances varied from 0.135 to 0.143 between P minor and other t'ampus species according to the C01 sequences. Phylogenetic trees, using combined 16S and CO1 data, strongly support the viewpoint that all the P. minor individuals form one clade that is in a sister position to Pampus sp. individuals (EU357803, FJ434342-FJ434343, and FJ652423-FJ652427).展开更多
Evolutionary algorithm is applied for distillation separation sequence optimization synthesis problems with combination explosion. The binary tree data structure is used to describe the distillation separation sequenc...Evolutionary algorithm is applied for distillation separation sequence optimization synthesis problems with combination explosion. The binary tree data structure is used to describe the distillation separation sequence, and it is directly applied as the coding method. Genetic operators, which ensure to prohibit illegal filial generations completely, are designed by using the method of graph theory. The crossover operator based on a single parent or two parents is designed successfully. The example shows that the average ratio of search space from evolutionary algorithm with two-parent genetic operation is lower, whereas the rate of successful minimizations from evolutionary algorithm with single parent genetic operation is higher.展开更多
Time efficiency of key establishment and update is one of the major problems contributory key managements strive to address.To achieve better time efficiency in key establishment,we propose a Location-based Huffman(L-...Time efficiency of key establishment and update is one of the major problems contributory key managements strive to address.To achieve better time efficiency in key establishment,we propose a Location-based Huffman(L-Huffman) scheme.First,users are separated into several small groups to minimize communication cost when they are distributed over large networks.Second,both user's computation difference and message transmission delay are taken into consideration when Huffman coding is employed to forming the optimal key tree.Third,the combined weights in Huffman tree are located in a higher place of the key tree to reduce the variance of the average key generation time and minimize the longest key generation time.Simulations demonstrate that L-Huffman has much better performance in wide area networks and is a little better in local area network than Huffman scheme.展开更多
A blind and readable image watermarking scheme using wavelet tree quantization is proposed. In order to increase the algorithm robustness and ensure the watermark integrity,error correction coding techniques are used ...A blind and readable image watermarking scheme using wavelet tree quantization is proposed. In order to increase the algorithm robustness and ensure the watermark integrity,error correction coding techniques are used to encode the embedded watermark. In the watermark embedding process, the wavelet coefficients of the host image are grouped into wavelet trees and each watermark bit is embedded by using two trees. The trees are so quantized that they exhibit a large enough statistical difference, which will later be used for watermark extraction. The experimental results show that the proposed algorithm is effective and robust to common image processing operations and some geometric operations such as JPEG compression, JPEG2000 compression, filtering, Gaussian noise attack, and row-column removal. It is demonstrated that the proposed technique is practical.展开更多
AIM To investigate the enhanced cytotoxic T lymphocyte responses against pancreatic cancer (PC) in vitro induced by dendritic cells (DCs) engineered to secrete anti-DcR3 monoclonal antibody (mAb). METHODS DCs, T lymph...AIM To investigate the enhanced cytotoxic T lymphocyte responses against pancreatic cancer (PC) in vitro induced by dendritic cells (DCs) engineered to secrete anti-DcR3 monoclonal antibody (mAb). METHODS DCs, T lymphocytes and primary PC cells were obtained from PC patients. DCs were transfected with a designed humanized anti-DcR3 monoclonal antibody heavy and light chain mRNA and/or total tumor RNA (DC-tumor-anti-DcR3 RNA or DC-total tumor RNA) by using electroporation technology. The identification, concentration and function of anti-DcR3 mAb secreted by DC-tumor-anti-DcR3 RNA were determined by western blotting and enzyme-linked immunosorbent assay. After co-culturing of autologous isolated PC cells with target DCs, the effects of secreting anti-DcR3 mAb on RNA-DCs' viability and apoptosis were assessed by MTT assay and flow cytometry. Analysis of enhanced antigen-specific immune response against PC induced by anti-DcR3 mAb secreting DCs was performed using a Cr-51 releasing test. T cell responses induced by RNAloaded DCs were analyzed by measuring cytokine levels, including IFN-gamma, IL-10, IL4, TNF-alpha and IL-12. RESULTS The anti-DcR3 mAb secreted by DCs reacted with recombinant human DcR3 protein and generated a band with 35 kDa molecular weight. The secreting mAb was transient, peaking at 24 h and becoming undetectable after 72 h. After co-incubation with DCtumor- anti-DcR3 RNA for designated times, the DcR3 level in the supernatant of autologous PC cells was significantly down-regulated (P < 0.05). DCs secreting anti-DcR3 mAb could improve cell viability and slow down the apoptosis of RNA-loaded DCs, compared with DC-total tumor RNA (P < 0.01). The anti-DcR3 mAb secreted by DC-tumor-anti-DcR3 RNA could enhance the induction of cytotoxic T lymphocytes (CTLs) activity toward RNA-transfected DCs, primary tumor cells, and PC cell lines, compared with CTLs stimulated by DC-total tumor RNA or control group (P < 0.05). Meanwhile, the antigen-specific CTL responses were MHC class I-restricted. The CD4+ T cells and CD8+ T cells incubated with anti-DcR3 mAb secreting DCs could produce extremely higher level IFN-gamma and lower level IL4 than those incubated with DC-total tumor RNA or controls (P < 0.01). CONCLUSION DCs engineered to secrete anti-DcR3 antibody can augment CTL responses against PC in vitro, and the immune-enhancing effects may be partly due to their capability of down-regulating DC apoptosis and adjusting the Th1/Th2 cytokine network.展开更多
To reduce the time required to complete the regeneration process of erasure codes, we propose a Tree-structured Parallel Regeneration (TPR) scheme for multiple data losses in distributed storage systems. Under the sch...To reduce the time required to complete the regeneration process of erasure codes, we propose a Tree-structured Parallel Regeneration (TPR) scheme for multiple data losses in distributed storage systems. Under the scheme, two algorithms are proposed for the construction of multiple regeneration trees, namely the edge-disjoint algorithm and edge-sharing algorithm. The edge-disjoint algorithm constructs multiple independent trees, and is simple and appropriate for environments where newcomers and their providers are distributed over a large area and have few intersections. The edge-sharing algorithm constructs multiple trees that compete to utilize the bandwidth, and make a better utilization of the bandwidth, although it needs to measure the available band-width and deal with the bandwidth changes; it is therefore difficult to implement in practical systems. The parallel regeneration for multiple data losses of TPR primarily includes two optimizations: firstly, transferring the data through the bandwidth optimized-paths in a pipe-line manner; secondly, executing data regeneration over multiple trees in parallel. To evaluate the proposal, we implement an event-based simulator and make a detailed comparison with some popular regeneration methods. The quantitative comparison results show that the use of TPR employing either the edge-disjoint algorithm or edge-sharing algorithm reduces the regeneration time significantly.展开更多
基金The National Natural Science Foundation of China(No.52361165658,52378318,52078459).
文摘To enhance the accuracy and efficiency of bridge damage identification,a novel data-driven damage identification method was proposed.First,convolutional autoencoder(CAE)was used to extract key features from the acceleration signal of the bridge structure through data reconstruction.The extreme gradient boosting tree(XGBoost)was then used to perform analysis on the feature data to achieve damage detection with high accuracy and high performance.The proposed method was applied in a numerical simulation study on a three-span continuous girder and further validated experimentally on a scaled model of a cable-stayed bridge.The numerical simulation results show that the identification errors remain within 2.9%for six single-damage cases and within 3.1%for four double-damage cases.The experimental validation results demonstrate that when the tension in a single cable of the cable-stayed bridge decreases by 20%,the method accurately identifies damage at different cable locations using only sensors installed on the main girder,achieving identification accuracies above 95.8%in all cases.The proposed method shows high identification accuracy and generalization ability across various damage scenarios.
基金This work was supported by the National Major Basic Research and Development Program(No.TG1999016004)Jiangsu Provincial Natural Science Foundation(No.BK2003213).
文摘Codon usage is the selective and nonrandom use of synonymous codons to encode amino acids in genes for proteins. The analysis of codon usage may improve the understanding of cocion preferences between different species and allow to rebuild the codons of exogenous genes to increase the expression efficiency of exogenous genes, Here, codon DNA sequence (CDS) of four poplar species, including Populus tremuloides Michx., P. tomentosa Carr., P. deltoides Marsh., and P. trichocarpa Torr. & Gray., is used to analyze the relative frequency of synonymous codon (RFSC). High-frequency codons are selected by high-frequency (HF) codon analysis. The results indicate that the codon usage is common for all four poplar species and the codon preference is quite similar among the four poplar species. However, CCT encoding for Pro, and ACT coding for Thr are the preferred codons in P. tremuloides and P. tomentosa, whereas CCA coding for Pro, and ACA coding for Thr are preferred in P. deltoides and P. trichocarpa The codons such as TGC coding for Cys, TTC coding for Phe, and AAG coding for Lys, are preferred in the poplar species except P trichocarpa. GAG coding for Glu is preferred only in P deltoides, while the other three poplar species prefer to use GAA. The commonness of preferred codon allows exogenous gene designed by the preferred cocion of one of the different poplar species to be used in other poplar species.
基金The National Natural Science Foundation of China(No.90407009),the National High Technology Research and Develop-ment Program of China(863Program) (No.2003AA1Z1340)
文摘An efficient design method for a 24 × 24 bit +48 bit parallel saturating multiply-accumulate (MAC) unit is described. The augend in the MAC is merged as a partial product into Wallace tree array. The optimized saturation detection logic is proposed. The 679. 2 μm × 132. 5μm area size has been achieved in 0. 18 μm 1.8 V 1P6M CMOS technology by the full-custom circuit layout design. The simulation results show that the design way has significantly less area (about 23.52% reduction) and less delay than those of the common saturating MAC based on standard cell library.
文摘A modular architecture for two dimension (2 D) discrete wavelet transform (DWT) is designed.The image data can be wavelet transformed in real time,and the structure can be easily scaled up to higher levels of DWT.A fast zerotree image coding (FZIC) algorithm is proposed by using a simple sequential scan order and two flag maps.The VLSI structure for FZIC is then presented.By combining 2 D DWT and FZIC,a wavelet image coder is finally designed.The coder is programmed,simulated,synthesized,and successfully verified by ALTERA CPLD.
文摘This paper presents an efficient quadtree based fractal image coding scheme in wavelet transform domain based on the wavelet based theory of fractal image compression introduced by Davis. In the scheme, zerotrees of wavelet coefficients are used to reduce the number of domain blocks, which leads to lower bit cost required to represent the location information of fractal coding, and overall entropy constrained optimization is performed for the decision trees as well as for the sets of scalar quantizers and self quantizers of wavelet subtrees. Experiment results show that at the low bit rates, the proposed scheme gives about 1 dB improvement in PSNR over the reported results.
基金supported by the National Natural Science Foundation of China under Grant No.61272502the National Basic Research Program of China (973 Program) under Grant No.2010CB327900the National Science Fund for Distinguished Young Scholars under Grant No.61125206
文摘In High Efficiency Video Coding, the Residual Quad-Yree (RQT) coding is used to encode the prediction residual for both intra and inter Coding Units (CU) and provides improved coding gains. However, this results in much higher computational complexities. To address this problem, we develop two fast RQT algorithms for intra- and inter-prediction residual coding respectively. For intra coding, the proposed algorithm selects the best prediction mode in the rate distortion mode decision process using a Prediction Unit (PU) size-dependent fast RQT depth decision on a reduced prediction mode candidates set from the rough mode decision process. For inter coding, in addition to CU size-dependent fast RQT depth decisions, we propose a discriminant analy- sis-based fast depth decision algorithm to det- ermine the best transform unit size. Experimental results show that on average, we can real- ise a 21.29% encoding time saving and 0.03% bit-rate reduction for intra coding, while 15% of the encoding time can be saved with a negligible coding performance loss for inter coding.
基金Supported by National Natural Science Foundation of China (No. 40676085)
文摘Although Pampus minor has been classified as a new species, it still remains controversial. Was used a DNA barcoding technique based on homologous sequence analysis of the16S and CO1 genes to clarify the confusion over the identification of this species. Among 12 individuals whose genetic distance was 0.002, two haplotypes were found. According to the 16S sequences, the genetic distances ranged from 0.121 to 0.133 between P. minor and other Pampus species. Although the same the genetic distance between the two P minor haplotypes was generated using CO1 sequences, the haplotype of Pm22-23, Pm28, and Pm32-33 was the same as that of Pci EF607462 and EF607466, while the haplotype of Pm24-27 and Pm29-31 was the same as that of Pci EF607461 and EF607463-65. In addition, the genetic distance ranged only from 0.002 to 0.005 between P minor and Pa EF607460 and EF607458. Apart from this, the interspecies genetic distances varied from 0.135 to 0.143 between P minor and other t'ampus species according to the C01 sequences. Phylogenetic trees, using combined 16S and CO1 data, strongly support the viewpoint that all the P. minor individuals form one clade that is in a sister position to Pampus sp. individuals (EU357803, FJ434342-FJ434343, and FJ652423-FJ652427).
文摘Evolutionary algorithm is applied for distillation separation sequence optimization synthesis problems with combination explosion. The binary tree data structure is used to describe the distillation separation sequence, and it is directly applied as the coding method. Genetic operators, which ensure to prohibit illegal filial generations completely, are designed by using the method of graph theory. The crossover operator based on a single parent or two parents is designed successfully. The example shows that the average ratio of search space from evolutionary algorithm with two-parent genetic operation is lower, whereas the rate of successful minimizations from evolutionary algorithm with single parent genetic operation is higher.
基金Supported by National Basic Research and Development Program of China (2007CB307102)
文摘Time efficiency of key establishment and update is one of the major problems contributory key managements strive to address.To achieve better time efficiency in key establishment,we propose a Location-based Huffman(L-Huffman) scheme.First,users are separated into several small groups to minimize communication cost when they are distributed over large networks.Second,both user's computation difference and message transmission delay are taken into consideration when Huffman coding is employed to forming the optimal key tree.Third,the combined weights in Huffman tree are located in a higher place of the key tree to reduce the variance of the average key generation time and minimize the longest key generation time.Simulations demonstrate that L-Huffman has much better performance in wide area networks and is a little better in local area network than Huffman scheme.
文摘A blind and readable image watermarking scheme using wavelet tree quantization is proposed. In order to increase the algorithm robustness and ensure the watermark integrity,error correction coding techniques are used to encode the embedded watermark. In the watermark embedding process, the wavelet coefficients of the host image are grouped into wavelet trees and each watermark bit is embedded by using two trees. The trees are so quantized that they exhibit a large enough statistical difference, which will later be used for watermark extraction. The experimental results show that the proposed algorithm is effective and robust to common image processing operations and some geometric operations such as JPEG compression, JPEG2000 compression, filtering, Gaussian noise attack, and row-column removal. It is demonstrated that the proposed technique is practical.
基金Supported by National Natural Science Foundation of China,No.81071982
文摘AIM To investigate the enhanced cytotoxic T lymphocyte responses against pancreatic cancer (PC) in vitro induced by dendritic cells (DCs) engineered to secrete anti-DcR3 monoclonal antibody (mAb). METHODS DCs, T lymphocytes and primary PC cells were obtained from PC patients. DCs were transfected with a designed humanized anti-DcR3 monoclonal antibody heavy and light chain mRNA and/or total tumor RNA (DC-tumor-anti-DcR3 RNA or DC-total tumor RNA) by using electroporation technology. The identification, concentration and function of anti-DcR3 mAb secreted by DC-tumor-anti-DcR3 RNA were determined by western blotting and enzyme-linked immunosorbent assay. After co-culturing of autologous isolated PC cells with target DCs, the effects of secreting anti-DcR3 mAb on RNA-DCs' viability and apoptosis were assessed by MTT assay and flow cytometry. Analysis of enhanced antigen-specific immune response against PC induced by anti-DcR3 mAb secreting DCs was performed using a Cr-51 releasing test. T cell responses induced by RNAloaded DCs were analyzed by measuring cytokine levels, including IFN-gamma, IL-10, IL4, TNF-alpha and IL-12. RESULTS The anti-DcR3 mAb secreted by DCs reacted with recombinant human DcR3 protein and generated a band with 35 kDa molecular weight. The secreting mAb was transient, peaking at 24 h and becoming undetectable after 72 h. After co-incubation with DCtumor- anti-DcR3 RNA for designated times, the DcR3 level in the supernatant of autologous PC cells was significantly down-regulated (P < 0.05). DCs secreting anti-DcR3 mAb could improve cell viability and slow down the apoptosis of RNA-loaded DCs, compared with DC-total tumor RNA (P < 0.01). The anti-DcR3 mAb secreted by DC-tumor-anti-DcR3 RNA could enhance the induction of cytotoxic T lymphocytes (CTLs) activity toward RNA-transfected DCs, primary tumor cells, and PC cell lines, compared with CTLs stimulated by DC-total tumor RNA or control group (P < 0.05). Meanwhile, the antigen-specific CTL responses were MHC class I-restricted. The CD4+ T cells and CD8+ T cells incubated with anti-DcR3 mAb secreting DCs could produce extremely higher level IFN-gamma and lower level IL4 than those incubated with DC-total tumor RNA or controls (P < 0.01). CONCLUSION DCs engineered to secrete anti-DcR3 antibody can augment CTL responses against PC in vitro, and the immune-enhancing effects may be partly due to their capability of down-regulating DC apoptosis and adjusting the Th1/Th2 cytokine network.
基金supported by the National Grand Fundamental Research of China (973 Program) under Grant No. 2011CB302601the National High Technology Research and Development of China (863 Program) under GrantNo. 2013AA01A213+2 种基金the National Natural Science Foundation of China under Grant No. 60873215the Natural Science Foundation for Distinguished Young Scholars of Hunan Province under Grant No. S2010J5050Specialized Research Fund for the Doctoral Program of Higher Education under Grant No. 20124307110015
文摘To reduce the time required to complete the regeneration process of erasure codes, we propose a Tree-structured Parallel Regeneration (TPR) scheme for multiple data losses in distributed storage systems. Under the scheme, two algorithms are proposed for the construction of multiple regeneration trees, namely the edge-disjoint algorithm and edge-sharing algorithm. The edge-disjoint algorithm constructs multiple independent trees, and is simple and appropriate for environments where newcomers and their providers are distributed over a large area and have few intersections. The edge-sharing algorithm constructs multiple trees that compete to utilize the bandwidth, and make a better utilization of the bandwidth, although it needs to measure the available band-width and deal with the bandwidth changes; it is therefore difficult to implement in practical systems. The parallel regeneration for multiple data losses of TPR primarily includes two optimizations: firstly, transferring the data through the bandwidth optimized-paths in a pipe-line manner; secondly, executing data regeneration over multiple trees in parallel. To evaluate the proposal, we implement an event-based simulator and make a detailed comparison with some popular regeneration methods. The quantitative comparison results show that the use of TPR employing either the edge-disjoint algorithm or edge-sharing algorithm reduces the regeneration time significantly.