http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Chuan-Te Tsai,Yung-Ming Chang,Shu-Luan Lin,Yueh-Sheng Chen,Yu-Lan Yeh,Viswanadha Vijaya Padma,Chin-Chuan Tsai,Ray-Jade Chen,Tsung-Jung Ho,Chih-Yang Huang 한국식품영양과학회 2016 Journal of medicinal food Vol.19 No.3
Angiotensin II (Ang II) is a very important cardiovascular disease inducer and may cause cardiac pathological hypertrophy and remodeling. We evaluated a Chinese traditional medicine, alpinate oxyphyllae fructus (AOF), for therapeutic efficacy for treating Ang II-induced cardiac hypertrophy. AOF has been used to treat patients with various symptoms accompanying hypertension and cerebrovascular disorders in Korea. We investigated its protective effect against Ang II-induced cytoskeletal change and hypertrophy in H9c2 cells. The results showed that treating cells with Ang II resulted in pathological hypertrophy, such as increased expression of transcription factors NFAT-3/p-NFAT-3, hypertrophic response genes (atrial natriuretic peptide [ANP] and b-type natriuretic peptide [BNP]), and Gαq down-stream effectors (PLCβ3 and calcineurin). Pretreatment with AOF (60–100 μg/mL) led to significantly reduced hypertrophy. We also found that AOF pretreatment significantly suppressed the cardiac remodeling proteins, metalloproteinase (MMP9 and MMP2), and plasminogen activator, induced by Ang II challenge. In conclusion, we provide evidence that AOF protects against Ang II-induced pathological hypertrophy by specifically inhibiting the insulin-like growth factor (IGF) II/IIR-related signaling pathway in H9c2 cells. AOF might be a candidate for cardiac hypertrophy and ventricular remodeling prevention in chronic cardiovascular diseases.
Space Partitioning Technique for Indoor Location Estimation using Wireless Sensor Network
Chuan-Chin Pu,Wan-Young Chung 대한전자공학회 2007 ITC-CSCC :International Technical Conference on Ci Vol.2007 No.7
In a small and high RF reflection environment, the received radio signal strength indication (RSSI) values are not linearly distributed correspond to the distances respectively. Therefore, instead of using trilateration method, the possibility of localization using RF-based space partitioning method was studied in this paper. This is similar to the spatial signature techniques which requires to construct a database for location search. The proposed method divides an indoor area into several partitionedareas centered with a signature-point in the databased. For limited resource constraint, the proposed method was implemented into wireless sensor networks and verified that it is able to provide potential improvement in indoor localization.
An Integrated Approach for Position Estimation using RSSI in Wireless Sensor Network
Chuan-Chin Pu,Wan-Young Chung 대한전자공학회 2008 JUCT : Journal of Ubiquitous Convergence Technolog Vol.2 No.2
Received signal strength indicator (RSSI) is used as one of the ranging techniques to locate dynamic sensor nodes in wireless sensor network. Before it can be used for position estimation, RSSI values must be converted to distances using path loss model. These distances among sensor nodes are combined using trilateration method to find position. This paper presents an idea which attempts to integrate both path loss model and trilateration as one algorithm without going through RSSI-distance conversion. This means it is not simply formulas combination but a whole new model was developed. Several advantages were found after integration: it is able to reduce processing load, and ensure that all values do not exceed the maximum range of 16-bit signed or unsigned numbers due to antilog operation in path loss model. The results also show that this method is able to reduce estimation error while inaccurate environmental parameters are used for RSSI-distance conversion.
An Integrated Approach for Position Estimation using RSSI in Wireless Sensor Network
Pu, Chuan-Chin,Chung, Wan-Young The Institute of Electronics and Information Engin 2008 JUCT : Journal of Ubiquitous Convergence Technolog Vol.2 No.2
Received signal strength indicator (RSSI) is used as one of the ranging techniques to locate dynamic sensor nodes in wireless sensor network. Before it can be used for position estimation, RSSI values must be converted to distances using path loss model. These distances among sensor nodes are combined using trilateration method to find position. This paper presents an idea which attempts to integrate both path loss model and trilateration as one algorithm without going through RSSI-distance conversion. This means it is not simply formulas combination but a whole new model was developed. Several advantages were found after integration: it is able to reduce processing load, and ensure that all values do not exceed the maximum range of 16-bit signed or unsigned numbers due to antilog operation in path loss model. The results also show that this method is able to reduce estimation error while inaccurate environmental parameters are used for RSSI-distance conversion.
Chin Woi Ho,Wen Siang Tan,Wei Boon Yap,Tau Chuan Ling,Beng Ti Tey 한국생물공학회 2008 Biotechnology and Bioprocess Engineering Vol.13 No.5
A comparative evaluation of five different cell-disruption methods for the release of recombinant hepatitis B core antigen (HBcAg) from Escherichia coli was investigated. The cell disruption techniques evaluated in this study were high-pressure homogenization, batch-mode bead milling, continuous-recycling bead milling, ultrasonication, and enzymatic lysis. Continu-ous-recycling bead milling was found to be the most effective method in terms of operating cost and time. However, the highest degree of cell disruption and amounts of HBcAg were obtained from the high-pressure homogenization process. The direct purification of HBcAg from the unclarified cell disruptate derived from high-pressure homogenization and bead milling techniques, using batch anion-exchange adsorption methods, showed that the conditions of cell disruption have a substantial effect on subsequent protein recovery steps.
A Novel Reversible Data Hiding Scheme for VQ-Compressed Images Using Index Set Construction Strategy
( Chuan Qin ),( Chin-chen Chang ),( Yen-chang Chen ) 한국인터넷정보학회 2013 KSII Transactions on Internet and Information Syst Vol.7 No.8
In this paper, we propose a novel reversible data hiding scheme in the index tables of the vector quantization (VQ) compressed images based on index set construction strategy. On the sender side, three index sets are constructed, in which the first set and the second set include the indices with greater and less occurrence numbers in the given VQ index table, respectively. The index values in the index table belonging to the second set are added with prefixes from the third set to eliminate the collision with the two derived mapping sets of the first set, and this operation of adding prefixes has data hiding capability additionally. The main data embedding procedure can be achieved easily by mapping the index values in the first set to the corresponding values in the two derived mapping sets. The same three index sets reconstructed on the receiver side ensure the correctness of secret data extraction and the lossless recovery of index table. Experimental results demonstrate the effectiveness of the proposed scheme.
An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards
Chin-Chen Chang,Hao-Chuan Tsai,Yi-Hui Chen 보안공학연구지원센터 2007 International Journal of Security and Its Applicat Vol.1 No.2
In 2003, Yang, Chang, and Hwang proposed an enhanced scheme of Peyravivan-Zunic’s password authentication scheme by using the Diffie-Hellman scheme. Later, Yoon, Ryu, and Yoo demonstrated that Yang-Chang-Hwang’s scheme is vulnerable to a stolen-verifier attack and a denial-of-service attack, and then proposed an improved scheme. In this paper, we show that Yoon-Ryu-Yoo’s scheme is still vulnerable to a stolen-verifier attack and a server spoofing attack under some reasonable assumption. In addition, we propose an improved scheme to eliminate such security flaws.
Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability
( Chuan Qin ),( Chin-chen Chang ),( Tai-jung Hsu ) 한국인터넷정보학회 2013 KSII Transactions on Internet and Information Syst Vol.7 No.11
In this paper, we propose an effective fragile image watermarking scheme for tampering detection and content recovery. Cover image is divided into a series of non-overlapping blocks and a block mapping relationship is constructed by the secret key. Several DCT coefficients with direct current and lower frequencies of the MSBs for each block are used to generate the reference bits, and different coefficients are assigned with different bit numbers for representation according to their importance. To enhance recovery performance, authentication bits are generated by the MSBs and the reference bits, respectively. After LSB substitution hiding, the embedded watermark bits in each block consist of the information of itself and its mapping blocks. On the receiver side, all blocks with tampered MSBs can be detected and recovered using the valid extracted reference bits. Experimental results demonstrate the effectiveness of the proposed scheme.