RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Identification and characterization of microRNAs involved in double-color formation in Paeonia suffruticosa ‘Shima Nishiki’ by high-throughput sequencing

        Xinpeng Zhang,Jinshan Jia,Ming-yuan Zhao,Cheng Li,Xu Han,Zongda Xu 한국원예학회 2022 Horticulture, Environment, and Biotechnology Vol.63 No.1

        Paeonia suffruticosa ‘Shima Nishiki’ is a valuable double-color cultivar, but the mechanism of its double-color formationis still unknown at the post-translational level. Moreover, many studies have shown that microRNAs (miRNAs) play a keyrole in regulating anthocyanin biosynthesis. In this study, small RNA sequencing was performed to identify and characterizemiRNAs in six libraries of the red (LH) and pink (LF) petals. A total of 591 conserved and 53 novel miRNAs wereidentified, among which 68 conserved and 2 novel miRNAs were differentially expressed between the LH and LF libraries. Meanwhile, the corresponding target genes for these differentially expressed miRNAs (DEMs) were successfully predictedand annotated. Among them, two DEMs (miR858 and miR156a-5p) and their corresponding target genes possibly relatedto anthocyanin biosynthesis were screened. We further confirmed the relative expression of 15 candidate miRNAs (2 DEMsand other 13 miRNAs) and the 4 corresponding target genes of these DEMs by quantitative real-time PCR (qRT-PCR). Among these four target genes, only CL2846.Contig2_All [Annotation: transcription factor MYB12] showed a substantiallyhigher differential expression between the red and pink petals. Based on the above results, we concluded that miR858 andmiR156a-5p (especially miR858) are possibly involved in mediating double-color formation. These results provide a newunderstanding about the mechanism of double-color formation in P. suffruticosa ‘Shima Nishiki’.

      • A Fast Intra Mode Decision Algorithm for HEVC Using Sobel Operator in Edge Detection

        Qiuwen Zhang,Xinpeng Huang,Xiao Wang,Weiwei Zhang 보안공학연구지원센터 2015 International Journal of Multimedia and Ubiquitous Vol.10 No.9

        As a successor to H.264/AVC, High Efficiency Video Coding (HEVC) standard has an outstanding performance than before. To make the coding efficiency higher, one introduced new coding feature in HEVC is adding intra prediction modes up to 35 instead of 9 in H.264, but it increases calculation complexity. To save the coding time, this paper proposes a fast intra mode decision algorithm based on edge detection technology using sobel operator. Because of the principle that sobel operator can find the texture edge directly, the proposed algorithm can save large numbers of coding time with only a little BD-rate rising. Experimental results show that the proposed fast intra mode decision algorithm can save 38.8% computational complexity on average with a 1.6% BD-rate rise.

      • KCI등재

        Observations on the ultrastructure of extrusomes in the hypotrichous ciliate Architricha indica (Protist, Ciliophora)

        Xiaocui Zhang,Xinpeng Fan,Linying Yang,Yiwen Wang,Bing Ni,Saleh A. Al-Farraj,Fukang Gu 한국통합생물학회 2014 Animal cells and systems Vol.18 No.2

        Extrusomes of different categories in ciliates have been suggested to have different structures and functions. To investigate the characteristics of extrusomes in the hypotrichous ciliate, we examined Architricha indicausing scanning and transmission electron microscopy and electron microscopic enzymo-cytochemistry. Theresults showed that the mature extrusomes were ellipsoidal vesicles with structureless cavities on their anteriorparts and arranged in rows beneath the pellicle; the extruded structures of extrusomes were cyathiform and canremain outside of the cell surface after extrusion. These findings differ distinctly from that of previouslyreported extrusomes in other ciliates and thus suggest a new type of extrusomes. These organelles originatedfrom endoplasmic reticulum in the deeper part of the cytoplasm, underwent a serious of development,gradually migrated to the cortical cytoplasm and finally positioned in their functional areas. In contrast withlower forms of ciliates, density, arrangement, and localization of extrusomes in A. indica showed obviousdifferences between the ventral and dorsal surface of cells. This may be in some way related to thedifferentiation of the dorsoventral cortex, and functional ciliature happened to the hypotrichous ciliates. Inaddition, the extrusomes may perform protective or defensive function, which associates with the activity ofmitochondria and contributes to the pellicle retrieval or renewal.

      • KCI등재

        Linear active disturbance rejection speed control with variable gain load torque sliding mode observer for IPMSMs

        Zhaoyuan Zhang,Yao Chen,Xinpeng Feng,Shirui Xie,Chaohui Zhao 전력전자학회 2022 JOURNAL OF POWER ELECTRONICS Vol.22 No.8

        A Linear Active Disturbance Rejection Control (LADRC) method with a Variable Gain Load Torque Sliding Mode Observer (VLTSMO) is proposed in this paper to reduce the effects of the load torque disturbance of Interior Permanent-Magnet Synchronous Motors (IPMSMs). First, the LADRC is used as a speed loop controller, and the linear extended state observer (LESO) is used to observe the total disturbance. Then the stability of the controller is analyzed. Second, the VLTSMO is proposed, which can output a feedforward compensation signal to improve the observation capability of the observer. In addition, after comparing several standard switching functions, the continuous switching function is selected to reduce the chattering phenomenon. Finally, a 5.5 kW IPMSM is taken as the research object. A simulation model and the dSPACE motor control platform are used to realize the algorithm. Both simulation and experimental results show that the VLTSMO has excellent observation capabilities. They also show that the LADRC + VLTSMO method can effectively improve the dynamic performance and robustness of the speed control system.

      • Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization

        Zhenjun Tang,Shuozhong Wang,Xinpeng Zhang,Weimin Wei,Shengjun Su 대한전자공학회 2008 JUCT : Journal of Ubiquitous Convergence Technolog Vol.2 No.1

        The invariance relation existing in the non-negative matrix factorization (NMF) is used for constructing robust image hashes in this work. The image is first re-scaled to a fixed size. Low-pass filtering is performed on the luminance component of the re-sized image to produce a normalized matrix. Entries in the normalized matrix are pseudo-randomly re-arranged under the control of a secret key to generate a secondary image. Non-negative matrix factorization is then performed on the secondary image. As the relation between most pairs of adjacent entries in the NMF's coefficient matrix is basically invariant to ordinary image processing, a coarse quantization scheme is devised to compress the extracted features contained in the coefficient matrix. The obtained binary elements are used to form the image hash after being scrambled based on another key. Similarity between hashes is measured by the Hamming distance. Experimental results show that the proposed scheme is robust against perceptually acceptable modifications to the image such as Gaussian filtering, moderate noise contamination, JPEG compression, re-scaling, and watermark embedding. Hashes of different images have very low collision probability. Tampering to local image areas can be detected by comparing the Hamming distance with a predetermined threshold, indicating the usefulness of the technique in digital forensics.

      • Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization

        Tang, Zhenjun,Wang, Shuozhong,Zhang, Xinpeng,Wei, Weimin,Su, Shengjun The Institute of Electronics and Information Engin 2008 JUCT : Journal of Ubiquitous Convergence Technolog Vol.2 No.1

        The invariance relation existing in the non-negative matrix factorization (NMF) is used for constructing robust image hashes in this work. The image is first re-scaled to a fixed size. Low-pass filtering is performed on the luminance component of the re-sized image to produce a normalized matrix. Entries in the normalized matrix are pseudo-randomly re-arranged under the control of a secret key to generate a secondary image. Non-negative matrix factorization is then performed on the secondary image. As the relation between most pairs of adjacent entries in the NMF's coefficient matrix is basically invariant to ordinary image processing, a coarse quantization scheme is devised to compress the extracted features contained in the coefficient matrix. The obtained binary elements are used to form the image hash after being scrambled based on another key. Similarity between hashes is measured by the Hamming distance. Experimental results show that the proposed scheme is robust against perceptually acceptable modifications to the image such as Gaussian filtering, moderate noise contamination, JPEG compression, re-scaling, and watermark embedding. Hashes of different images have very low collision probability. Tampering to local image areas can be detected by comparing the Hamming distance with a predetermined threshold, indicating the usefulness of the technique in digital forensics.

      • KCI등재

        Novelty detection methods for online health monitoring and post data analysis of turbopumps

        Hu Lei,Hu Niaoqing,Zhang Xinpeng,Gu Fengshou,Gao Ming 대한기계학회 2013 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.27 No.7

        As novelty detection works when only normal data are available, it is of considerable promise for health monitoring in cases lacking fault samples and prior knowledge. We present two novelty detection methods for health monitoring of turbopumps in large-scale liquidpropellant rocket engines. The first method is the adaptive Gaussian threshold model. This method is designed to monitor the vibration of the turbopumps online because it has minimal computational complexity and is easy for implementation in real time. The second method is the one-class support vector machine (OCSVM) which is developed for post analysis of historical vibration signals. Via post analysis the method not only confirms the online monitoring results but also provides diagnostic results so that faults from sensors are separated from those actually from the turbopumps. Both of these two methods are validated to be efficient for health monitoring of the turbopumps.

      • KCI등재

        Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing

        ( Min Dong ),( Yanli Ren ),( Xinpeng Zhang ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.7

        With the development of cloud computing and widespread availability of mobile devices, outsourcing computation has gotten more and more attention in cloud computing services. The computation of bilinear pairing is the most expensive operation in pair-based cryptographic schemes. Currently, most of the algorithms for outsourcing bilinear pairing have small checkability or the outsourcers need to operate expensive computations. In this paper, we propose an efficient algorithm for outsourcing bilinear pairing with two servers, where the outsourcers can detect the errors with a probability of 1 if the cloud servers are dishonest, and the outsourcers are not involved in any complex computations. Finally, the performance evaluation demonstrates that the proposed algorithm is most efficient in all of fully verifiable outsourcing algorithms for bilinear pairing.

      • Kernel quaternion principal component analysis and its application in RGB-D object recognition

        Chen, Beijing,Yang, Jianhao,Jeon, Byeungwoo,Zhang, Xinpeng Elsevier 2017 Neurocomputing Vol.266 No.-

        <P><B>Abstract</B></P> <P>While the existing quaternion principal component analysis (QPCA) is a linear tool developed mainly for processing linear quaternion signals, the quaternion representation (QR) used in QPCA creates redundancy when representing a color image signal of three components by a quaternion matrix having four components. In this paper, the kernel technique is used to improve the QPCA as kernel QPCA (KQPCA) for processing nonlinear quaternion signals; in addition, both RGB information and depth information are considered to improve QR for representing RGB-D images. The improved QR fully utilizes the four-dimensional quaternion domain. We first provide the basic idea of three types of our KQPCA and then propose an algorithm for RGB-D object recognition based on bidirectional two-dimensional KQPCA (BD2DKQPCA) and the improved QR. Experimental results on four public datasets demonstrate that the proposed BD2DKQPCA-based algorithm achieves the best performance among seventeen compared algorithms including other existing PCA-based algorithms, irrespective of RGB object recognition or RGB-D object recognition. Moreover, for all compared algorithms, consideration of both RGB and depth information is shown to achieve better performance in object recognition than considering only RGB information.</P>

      • KCI등재

        Constructive Steganography by Tangles

        ( Zhenxing Qian ),( Lin Pan ),( Nannan Huang ),( Xinpeng Zhang ) 한국인터넷정보학회 2018 KSII Transactions on Internet and Information Syst Vol.12 No.8

        This paper proposes a novel steganography method to hide secret data during the generation of tangle patterns. Different from the traditional steganography based on modifying natural images, we propose to construct stego images according to the secret messages. We first create a model to group a selected image contour, and define some basic operations to generate various pattern cells. During data hiding, we create a cell library to establish the relationships between cells and secret data. By painting the cell inside the image contour, we create a dense tangle pattern to carry secret data. With the proposed method, a recipient can extract the secret data correctly. Experimental results show that the proposed method has a flexible embedding capacity. The constructed stego tangle image has good visual effects, and is secure against adversaries. Meanwhile, the stego tangle pattern is also robust to JPEG compression.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼