An identity-based multisignature scheme and an identity-based aggregate signature scheme are proposed in this paper. They are both from m-torsion groups on super-singular elliptic curves or hyper-elliptic curves and b...An identity-based multisignature scheme and an identity-based aggregate signature scheme are proposed in this paper. They are both from m-torsion groups on super-singular elliptic curves or hyper-elliptic curves and based on the recently proposed identity-based signature scheme of Cha and Cheon. Due to the sound properties of m-torsion groups and the base scheme, it turns out that our schemes are very simple and efficient. Both schemes are proven to be secure against adaptive chosen message attack in the random oracle model under the normal security notions with the assumption that the Computational Diffie-Hellman problem is hard in the m-torsion groups.展开更多
A new blind method is proposed for identification of CDMA Time-Varying (TV)channels in this paper. By representing the TV channel's impulse responses in the delay-Doppler spread domain, the discrete-time canonical...A new blind method is proposed for identification of CDMA Time-Varying (TV)channels in this paper. By representing the TV channel's impulse responses in the delay-Doppler spread domain, the discrete-time canonical model of CDMA-TV systems is developed and a subspace method to identify blindly the Time-Invariant (TI) coordinates is proposed. Unlike existing basis expansion methods, this new algorithm does not require .estimation of the base frequencies, neither need the assumption of linearly varying delays across symbols. The algorithm offers definite explanation of the expansion coordinates. Simulation demonstrates the effectiveness of the algorithm.展开更多
Phytohormone abscisic acid (ABA) was critical for many plant growth and developmental processesincluding seed maturation, germination and response to environmental factors. With the purpose to detectthe possible ABA r...Phytohormone abscisic acid (ABA) was critical for many plant growth and developmental processesincluding seed maturation, germination and response to environmental factors. With the purpose to detectthe possible ABA related signal transduction pathways, we tried to isolate ABA-regulated genes throughcDNA macroarray technology using ABA-treated rice seedling as materials (under treatment for 2, 4, 8 and12 h). Of 6144 cDNA clones tested, 37 differential clones showing induction or suppression for at least onetime, were isolated. Of them 30 and 7 were up- or down-regulated respectively. Sequence analyses revealedthat the putative encoded proteins were involved in different possible processes, including transcription,metabolism and resistance, photosynthesis, signal transduction, and seed maturation. 6 cDNA clones werefound to encode proteins with unknown functions. Regulation by ABA of 7 selected clones relating to signaltransduction or metabolism was confirmed by reverse transcription PCR. In addition, some clones werefurther shown to be regulated by other plant growth regulators including auxin and brassinosteroid, which,however, indicated the complicated interactions of plant hormones. Possible signal transduction pathwaysinvolved in ABA were discussed.展开更多
This paper proposed two modifications on IKE protocol with pre-shared key authentication. The first modification can improve its immunity against DDoS attack by authenticating the initiator before the responder genera...This paper proposed two modifications on IKE protocol with pre-shared key authentication. The first modification can improve its immunity against DDoS attack by authenticating the initiator before the responder generates the computation-intensive Diffie-Hellman public value. The second modification can improve its efficiency when the attack on messages occurs because it can detect the attack quickly by replacing the centralized authentication in origical IKE protocol with immediate authentication. In addition, the two modifications can be integrated into one protocol compactly.展开更多
It is a worldwide problem to let the destructive cult believers detached from the destructive cult. The most difficult point is that it is difficult to change the destructive cult belief. The reason why the destructi...It is a worldwide problem to let the destructive cult believers detached from the destructive cult. The most difficult point is that it is difficult to change the destructive cult belief. The reason why the destructive cult faith is difficult to change is because that the destructive cults embezzled the basic concepts and doctrines of many legitimate religions in the construction of the destructive cult faith, which make the destructive cults and religious beliefs have many similarities in psychology, including the tenacity and stability of faith. The believers tend to believe it as a orthodox legitimate religion. The article points out the similarity that makes destructive cult beliefs hard to change and lists the ways to identify heretical beliefs.展开更多
Image authentication techniques used to protect the recipients against malicious forgery. In this paper, we propose a new image authentication technique based on digital signature. The authentication is verified by co...Image authentication techniques used to protect the recipients against malicious forgery. In this paper, we propose a new image authentication technique based on digital signature. The authentication is verified by comparing the features of the each block in tested image with the corresponding features of the block recorded in the digital signature. The proposed authentication scheme is capable of distinguishing visible but non-malicious changes due to common processing operations from malicious changes. At last our experimental results show that the proposed scheme is not only efficient to protect integrity of image, but also with low computation, which are feasible for practical applications.展开更多
In crab, embryogenesis is a complicated developmental program marked by a series of critical events. RNA-Sequencing technology offers developmental biologists a way to identify many more developmental genes than ever ...In crab, embryogenesis is a complicated developmental program marked by a series of critical events. RNA-Sequencing technology offers developmental biologists a way to identify many more developmental genes than ever before. Here, we present a comprehensive analysis of the transcriptomes of Eriocheir sinensis oosperms (Os) and embryos at the 2-4, cell stage (Cs), which are separated by a cleavage event. Atotal of 18 923 unigenes were identified, and 403 genes matched with gene ontology (GO) terms related to developmental processes. In total, 432 differentially expressed genes (DEGs) were detected between the two stages. Nine DEGs were specifically expressed at only one stage. These DEGs may be relevant to stage-specific molecular events during development. A number of DEGs related to 'hedgehog signaling pathway', 'Wnt signaling pathway' 'germplasm', 'nervous system', 'sensory perception' and 'segment polarity' were identified as being up-regulated at the Cs stage. The results suggest that these embryonic developmental events begin before the early cleavage event in crabs, and that many of the genes expressed in the two transeriptomes might be maternal genes. Our study provides ample information for further research on the molecular mechanisms underlying crab development.展开更多
Objective: The aim of the study was to discuss the diagnostic value of dynamic contrast enhanced-magnetic resonance imaging (DCE-MRI) in distinguishing malignant tumors of breast from benign lesions. Methods: A DCE-MR...Objective: The aim of the study was to discuss the diagnostic value of dynamic contrast enhanced-magnetic resonance imaging (DCE-MRI) in distinguishing malignant tumors of breast from benign lesions. Methods: A DCE-MRI study was performed on 18 benign lesions, 16 malignant tumors and 2 borderline lesions of breast (mean age 51.7 years). The seven items including shape, marginal feature, spreading signs, time-signal intensity curve, maximum slope of increase (MSI), signal enhancement ratio (SER) and signal enhanced extent (SEE) were compared between patients with benign lesions and those with malignant tumors. Results: Shape, marginal feature, spreading signs, time-signal intensity curve, SEE and SER between the benign and malignant groups of breast represented significantly difference except MSI. The 36 cases with breast lesion displayed sensitivity, specificity, accuracy for diagnosing malignant tumor of breast using the scoring method was 93.8%, 83.3% and 88.2%, respectively. Conclusion: DCE-MRI combined with morphology and dynamic enhanced feature of breast lesion has well efficacy to differentiate malignant tumor from benign lesions.展开更多
A new kind of region pair grey difference classifier was proposed. The regions in pairs associated to form a feature were not necessarily directly-connected, but were selected dedicatedly to the grey transition betwee...A new kind of region pair grey difference classifier was proposed. The regions in pairs associated to form a feature were not necessarily directly-connected, but were selected dedicatedly to the grey transition between regions coinciding with the face pattern structure. Fifteen brighter and darker region pairs were chosen to form the region pair grey difference features with high discriminant capabilities. Instead of using both false acceptance rate and false rejection rate, the mutual information was used as a unified metric for evaluating the classifying performance. The parameters of specified positions, areas and grey difference bias for each single region pair feature were selected by an optimization processing aiming at maximizing the mutual information between the region pair feature and classifying distribution, respectively. An additional region-based feature depicting the correlation between global region grey intensity patterns was also proposed. Compared with the result of Viola-like approach using over 2 000 features, the proposed approach can achieve similar error rates with only 16 features and 1/6 implementation time on controlled illumination images.展开更多
In order to improve the effectiveness of traditional time domain identification methods in identifying damping ratios, a new damping ratio identification method based on pattern search is proposed by fluctuating the r...In order to improve the effectiveness of traditional time domain identification methods in identifying damping ratios, a new damping ratio identification method based on pattern search is proposed by fluctuating the reliable natural frequency obtained through traditional time domain identification methods by about 10% to build the boundary conditions, using all the initial identification results to establish the free decay response of the system, and using the pattern search method to correct the initial identification results with the residual sum of squares between the free decay response and the actually measured free-decay signal as the objective function. The proposed method deals with the actually measured free-decay signal with curve fitting and avoids enlarging the identified error caused by intermediate conversion, so it can effectively improve the identified accuracy of damping ratios. Simulations for a room-sized vibration isolation foundation show that the relative errors of analyzed three damping ratios are down to 1.05%, 1.51% and 3.7% by the proposed method from 8.42%, 5.85% and 8.5% by STD method when the noise level is 10%.展开更多
Traditional control does not pay much attention to information security problems in system identification enough, which are important in practical applications. This paper focuses on the security problem of input info...Traditional control does not pay much attention to information security problems in system identification enough, which are important in practical applications. This paper focuses on the security problem of input information in a class of system identification problems with noise and binary-valued observations, presents a cryptography based security protocol, and improves it in the range of allowed errors. During solving the identification problem, the improved security protocol can ensure that the input information is not leaked, and thus, can deal with passive attacks effectively. Besides, a quantitative relationship among the input information, the public key in encryption and the number of partieipailts in the improved protocol is shown. Finally, the simulation results show that, the identification algorithm can still achieve the estimation accuracy by adding the improved security protocol. However, compared with the original identification algorithm, the time complexity of the algorithm with the improved security protocol increases.展开更多
基金Supported by the National 973 Project of China (No.G1999035803), the National Natural Science Foundation of China (No.60373104) and the National 863 Project of China (No.2002AA143021).
文摘An identity-based multisignature scheme and an identity-based aggregate signature scheme are proposed in this paper. They are both from m-torsion groups on super-singular elliptic curves or hyper-elliptic curves and based on the recently proposed identity-based signature scheme of Cha and Cheon. Due to the sound properties of m-torsion groups and the base scheme, it turns out that our schemes are very simple and efficient. Both schemes are proven to be secure against adaptive chosen message attack in the random oracle model under the normal security notions with the assumption that the Computational Diffie-Hellman problem is hard in the m-torsion groups.
文摘A new blind method is proposed for identification of CDMA Time-Varying (TV)channels in this paper. By representing the TV channel's impulse responses in the delay-Doppler spread domain, the discrete-time canonical model of CDMA-TV systems is developed and a subspace method to identify blindly the Time-Invariant (TI) coordinates is proposed. Unlike existing basis expansion methods, this new algorithm does not require .estimation of the base frequencies, neither need the assumption of linearly varying delays across symbols. The algorithm offers definite explanation of the expansion coordinates. Simulation demonstrates the effectiveness of the algorithm.
基金Researches were supported by "the State Key Project of Basic Research, G1999011604" "Key Project of Knowledge Innovation, CAS", "the National Natural Science Foundation of China, No.30070073" "National Sciences Foundation of Pan-Deng". We thank Prof.
文摘Phytohormone abscisic acid (ABA) was critical for many plant growth and developmental processesincluding seed maturation, germination and response to environmental factors. With the purpose to detectthe possible ABA related signal transduction pathways, we tried to isolate ABA-regulated genes throughcDNA macroarray technology using ABA-treated rice seedling as materials (under treatment for 2, 4, 8 and12 h). Of 6144 cDNA clones tested, 37 differential clones showing induction or suppression for at least onetime, were isolated. Of them 30 and 7 were up- or down-regulated respectively. Sequence analyses revealedthat the putative encoded proteins were involved in different possible processes, including transcription,metabolism and resistance, photosynthesis, signal transduction, and seed maturation. 6 cDNA clones werefound to encode proteins with unknown functions. Regulation by ABA of 7 selected clones relating to signaltransduction or metabolism was confirmed by reverse transcription PCR. In addition, some clones werefurther shown to be regulated by other plant growth regulators including auxin and brassinosteroid, which,however, indicated the complicated interactions of plant hormones. Possible signal transduction pathwaysinvolved in ABA were discussed.
文摘This paper proposed two modifications on IKE protocol with pre-shared key authentication. The first modification can improve its immunity against DDoS attack by authenticating the initiator before the responder generates the computation-intensive Diffie-Hellman public value. The second modification can improve its efficiency when the attack on messages occurs because it can detect the attack quickly by replacing the centralized authentication in origical IKE protocol with immediate authentication. In addition, the two modifications can be integrated into one protocol compactly.
文摘It is a worldwide problem to let the destructive cult believers detached from the destructive cult. The most difficult point is that it is difficult to change the destructive cult belief. The reason why the destructive cult faith is difficult to change is because that the destructive cults embezzled the basic concepts and doctrines of many legitimate religions in the construction of the destructive cult faith, which make the destructive cults and religious beliefs have many similarities in psychology, including the tenacity and stability of faith. The believers tend to believe it as a orthodox legitimate religion. The article points out the similarity that makes destructive cult beliefs hard to change and lists the ways to identify heretical beliefs.
文摘Image authentication techniques used to protect the recipients against malicious forgery. In this paper, we propose a new image authentication technique based on digital signature. The authentication is verified by comparing the features of the each block in tested image with the corresponding features of the block recorded in the digital signature. The proposed authentication scheme is capable of distinguishing visible but non-malicious changes due to common processing operations from malicious changes. At last our experimental results show that the proposed scheme is not only efficient to protect integrity of image, but also with low computation, which are feasible for practical applications.
基金Supported by the National High Technology Research and Development Program of China(863 Program)(No.2012AA10A409)the Scientific and Technological Innovation Project of Qingdao National Laboratory for Marine Science and Technology(No.2015ASKJ02)the National Natural Science Foundation of China(Nos.41276165 to Dr.CUI Zhaoxia,31302187 to Dr.HUI Min)
文摘In crab, embryogenesis is a complicated developmental program marked by a series of critical events. RNA-Sequencing technology offers developmental biologists a way to identify many more developmental genes than ever before. Here, we present a comprehensive analysis of the transcriptomes of Eriocheir sinensis oosperms (Os) and embryos at the 2-4, cell stage (Cs), which are separated by a cleavage event. Atotal of 18 923 unigenes were identified, and 403 genes matched with gene ontology (GO) terms related to developmental processes. In total, 432 differentially expressed genes (DEGs) were detected between the two stages. Nine DEGs were specifically expressed at only one stage. These DEGs may be relevant to stage-specific molecular events during development. A number of DEGs related to 'hedgehog signaling pathway', 'Wnt signaling pathway' 'germplasm', 'nervous system', 'sensory perception' and 'segment polarity' were identified as being up-regulated at the Cs stage. The results suggest that these embryonic developmental events begin before the early cleavage event in crabs, and that many of the genes expressed in the two transeriptomes might be maternal genes. Our study provides ample information for further research on the molecular mechanisms underlying crab development.
基金Supported by a grant from the Sciences Foundation of West district, Beijing, China (No. 06027)
文摘Objective: The aim of the study was to discuss the diagnostic value of dynamic contrast enhanced-magnetic resonance imaging (DCE-MRI) in distinguishing malignant tumors of breast from benign lesions. Methods: A DCE-MRI study was performed on 18 benign lesions, 16 malignant tumors and 2 borderline lesions of breast (mean age 51.7 years). The seven items including shape, marginal feature, spreading signs, time-signal intensity curve, maximum slope of increase (MSI), signal enhancement ratio (SER) and signal enhanced extent (SEE) were compared between patients with benign lesions and those with malignant tumors. Results: Shape, marginal feature, spreading signs, time-signal intensity curve, SEE and SER between the benign and malignant groups of breast represented significantly difference except MSI. The 36 cases with breast lesion displayed sensitivity, specificity, accuracy for diagnosing malignant tumor of breast using the scoring method was 93.8%, 83.3% and 88.2%, respectively. Conclusion: DCE-MRI combined with morphology and dynamic enhanced feature of breast lesion has well efficacy to differentiate malignant tumor from benign lesions.
基金Supported by the Joint Research Funds of Dalian University of Technology and Shenyang Automation Institute,Chinese Academy of Sciences
文摘A new kind of region pair grey difference classifier was proposed. The regions in pairs associated to form a feature were not necessarily directly-connected, but were selected dedicatedly to the grey transition between regions coinciding with the face pattern structure. Fifteen brighter and darker region pairs were chosen to form the region pair grey difference features with high discriminant capabilities. Instead of using both false acceptance rate and false rejection rate, the mutual information was used as a unified metric for evaluating the classifying performance. The parameters of specified positions, areas and grey difference bias for each single region pair feature were selected by an optimization processing aiming at maximizing the mutual information between the region pair feature and classifying distribution, respectively. An additional region-based feature depicting the correlation between global region grey intensity patterns was also proposed. Compared with the result of Viola-like approach using over 2 000 features, the proposed approach can achieve similar error rates with only 16 features and 1/6 implementation time on controlled illumination images.
基金Sponsored by the National Natural Science Foundation of China (Grant No.50675052)
文摘In order to improve the effectiveness of traditional time domain identification methods in identifying damping ratios, a new damping ratio identification method based on pattern search is proposed by fluctuating the reliable natural frequency obtained through traditional time domain identification methods by about 10% to build the boundary conditions, using all the initial identification results to establish the free decay response of the system, and using the pattern search method to correct the initial identification results with the residual sum of squares between the free decay response and the actually measured free-decay signal as the objective function. The proposed method deals with the actually measured free-decay signal with curve fitting and avoids enlarging the identified error caused by intermediate conversion, so it can effectively improve the identified accuracy of damping ratios. Simulations for a room-sized vibration isolation foundation show that the relative errors of analyzed three damping ratios are down to 1.05%, 1.51% and 3.7% by the proposed method from 8.42%, 5.85% and 8.5% by STD method when the noise level is 10%.
基金supported by the National Key Basic Research Program of China(973 Program)under Grant No.2014CB845301the National Natural Science Foundation of China under Grant No.61227902
文摘Traditional control does not pay much attention to information security problems in system identification enough, which are important in practical applications. This paper focuses on the security problem of input information in a class of system identification problems with noise and binary-valued observations, presents a cryptography based security protocol, and improves it in the range of allowed errors. During solving the identification problem, the improved security protocol can ensure that the input information is not leaked, and thus, can deal with passive attacks effectively. Besides, a quantitative relationship among the input information, the public key in encryption and the number of partieipailts in the improved protocol is shown. Finally, the simulation results show that, the identification algorithm can still achieve the estimation accuracy by adding the improved security protocol. However, compared with the original identification algorithm, the time complexity of the algorithm with the improved security protocol increases.