RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        A General Design Method of Constructing Fully Homomorphic Encryption with Ciphertext Matrix

        ( Xinxia Song ),( Zhigang Chen ) 한국인터넷정보학회 2019 KSII Transactions on Internet and Information Syst Vol.13 No.5

        It is important to construct fully homomorphic encryption with ciphertext matrix that makes fully homomorphic encryption become very nature and simple. We present a general design method of constructing fully homomorphic encryption whose ciphertext is matrix. By using this design method, we can deduce a fully homomorphic encryption scheme step by step based on a basic encryption scheme. The process of deduction is similar to solving equation and the final output result is a fully homomorphic encryption scheme with ciphertext matrix. The idea of constructing ciphertext matrix is ciphertexts stack, which don’t simply stack ciphertexts together but is to obtain the desired homomorphic property. We use decryption structure as tool to analyze homomorphic property and noise growth during homomorphic evaluation. By using this design method, we obtain three corresponding fully homomorphic encryption schemes. Our obtained fully homomorphic encryption schemes are more efficient. Finally, we introduce the adversary advantage and improve the previous method of estimating concert parameters of fully homomorphic encryption. We give the concert parameters of these schemes.

      • KCI등재

        Iris Ciphertext Authentication System Based on Fully Homomorphic Encryption

        Xinxia Song,Zhigang Chen,Dechao Sun 한국정보처리학회 2020 Journal of information processing systems Vol.16 No.3

        With the application and promotion of biometric technology, biometrics has become more and more importantto identity authentication. In order to ensure the privacy of the user, the biometrics cannot be stored or manipulatedin plaintext. Aiming at this problem, this paper analyzes and summarizes the scheme and performanceof the existing biometric authentication system, and proposes an iris-based ciphertext authentication systembased on fully homomorphic encryption using the FV scheme. The implementation of the system is partlypowered by Microsoft’s SEAL (Simple Encrypted Arithmetic Library). The entire system can complete irisauthentication without decrypting the iris feature template, and the database stores the homomorphic ciphertextof the iris feature template. Thus, there is no need to worry about the leakage of the iris feature template. At thesame time, the system does not require a trusted center for authentication, and the authentication is completedon the server side directly using the one-time MAC authentication method. Tests have shown that when thesystem adopts an iris algorithm with a low depth of calculation circuit such as the Hamming distance comparisonalgorithm, it has good performance, which basically meets the requirements of real applicationscenarios.

      • SCIESCOPUSKCI등재

        Targeted Editing of Myostatin Gene in Sheep by Transcription Activator-like Effector Nucleases

        Zhao, Xinxia,Ni, Wei,Chen, Chuangfu,Sai, Wujiafu,Qiao, Jun,Sheng, Jingliang,Zhang, Hui,Li, Guozhong,Wang, Dawei,Hu, Shengwei Asian Australasian Association of Animal Productio 2016 Animal Bioscience Vol.29 No.3

        Myostatin (MSTN) is a secreted growth factor expressed in skeletal muscle and adipose tissue that negatively regulates skeletal muscle mass. Gene knockout of MSTN can result in increasing muscle mass in sheep. The objectives were to investigate whether myostatin gene can be edited in sheep by transcription activator-like effector nucleases (TALENs) in tandem with single-stranded DNA oligonucleotides (ssODNs). We designed a pair of TALENs to target a highly conserved sequence in the coding region of the sheep MSTN gene. The activity of the TALENs was verified by using luciferase single-strand annealing reporter assay in HEK 293T cell line. Co-transfection of TALENs and ssODNs oligonucleotides induced precise gene editing of myostatin gene in sheep primary fibroblasts. MSTN gene-edited cells were successfully used as nuclear donors for generating cloned embryos. TALENs combined with ssDNA oligonucleotides provide a useful approach for precise gene modification in livestock animals.

      • KCI등재

        Research on meiotic chromosome pairing in Roegneria sinica var. media evaluated using genomic in situ hybridization

        Ainong Gao,Jiwei Shi,Xinxia Liang 한국식물생명공학회 2016 Plant biotechnology reports Vol.10 No.2

        The analysis of chromosome pairing during meiosis is important for understanding the relationships between different genomes. To evaluate the diversity of chromosome pairing behavior in the wild species of Roegneria sinica var. media Keng with St and H genomes in Triticeae (Poaceae), differences and similarities in the meiotic chromosome pairing behaviors of the two genomes in two populations of R. sinica var. media, were analyzed using genomic in situ hybridization. Chromosome pairing at meiotic metaphase I in the two populations of R. sinica var. media mainly formed bivalents, although several univalents, trivalents and quadrivalents also occurred. Chromosome pairings occurred mainly between homologous chromosomes. However, some non-homologous pairings were observed under natural conditions. No significant differences in karyotype were found between the St and H genomes. Chromosome pairing behaviors differed between and within the two populations. Genetic variation occurred mainly within populations (94.04 %), and variation was more abundant in one population than the other. The genomes St and H differed, but there was some relationship between the two genomes. These findings suggest that homoeologous pairing of chromosomes or exchanges occurred between different genomes of the wild species in Triticeae during evolution. The findings also provide conclusive cytological evidence for genetic variation within the wild species, which forms the basis of their genetic diversity.

      • KCI등재

        Contact Tracking Development Trend Using Bibliometric Analysis

        Chaoqun Li,Zhigang Chen,Tongrui Yu,Xinxia Song 한국정보처리학회 2022 Journal of information processing systems Vol.18 No.3

        The new crown pneumonia (COVID-19) has become a global epidemic. The disease has spread to mostcountries and poses a challenge to the healthcare system. Contact tracing technology is an effective way forpublic health to deal with diseases. Many experts have studied traditional contact tracing and developed digitalcontact tracking. In order to better understand the field of contact tracking, it is necessary to analyze thedevelopment of contact tracking in the field of computer science by bibliometrics. The purpose of this researchis to use literature statistics and topic analysis to characterize the research literature of contact tracking in thefield of computer science, to gain an in-depth understanding of the literature development status of contacttracking and the trend of hot topics over the past decade. In order to achieve the aforementioned goals, weconducted a bibliometric study in this paper. The study uses data collected from the Scopus database. Whichcontains more than 10,000 articles, including more than 2,000 in the field of computer science. For populartrends, we use VOSviewer for visual analysis. The number of contact tracking documents published annuallyin the computer field is increasing. At present, there are 200 to 300 papers published in the field of computerscience each year, and the number of uncited papers is relatively small. Through the visual analysis of the paper,we found that the hot topic of contact tracking has changed from the past “mathematical model,” “biologicalmodel,” and “algorithm” to the current “digital contact tracking,” “privacy,” and “mobile application” and othertopics. Contact tracking is currently a hot research topic. By selecting the most cited papers, we can displayhigh-quality literature in contact tracking and characterize the development trend of the entire field throughtopic analysis. This is useful for students and researchers new to field of contact tracking ai well as forpresenting our results to other subjects. Especially when comprehensive research cannot be conducted due totime constraints or lack of precise research questions, our research analysis can provide value for it.

      • KCI등재

        A SPH-Lagrangian-Eulerian Approach for the Simulation of Concrete Gravity Dams under Combined Effects of Penetration and Explosion

        Guangdong Yang,Gaohui Wang,Wenbo Lu,Peng Yan,Ming Chen,Xinxia Wu 대한토목학회 2018 KSCE Journal of Civil Engineering Vol.22 No.8

        The damage prediction of high dams under the attacks of earth-penetrating weapons has gained significant importance in recentyears. For this purpose, a SPH-Lagrangian-Eulerian coupled approach is proposed to describe the damage processes of concretegravity dams subjected to the combined action of the penetration and explosion. The SPH method is used to model the concretematerial with the large deformation near the penetration and explosion regions. The Lagrangian algorithm is adopted to simulate thehigh-velocity projectile and dam body with the small distortion. And the Eulerian algorithm is employed to describe the dynamicbehavior of the water and air media. The validity of the penetration model is calibrated against a previous penetration test. Meanwhile, the SPH-Lagrangian-Eulerian coupled method is verified by implementing an underwater explosion test in a concretecube. The computed distribution of cracking damage is consistent with the result of the experimental test, which validates the validityof the proposed SPH-Lagrangian-Eulerian coupling method. Subsequently, the penetration processes of a concrete gravity dam underthe high-velocity projectile are presented. After the rapid penetration, the explosives are detonated in the dam with the initialpenetration damage. The shock wave propagation characteristics in the dam and reservoir water are discussed. The failure processesand dynamic responses of the dam subjected to the combined action of the penetration and explosion are investigated. The influenceof the initial penetration damage and the reservoir water on the failure processes of the dam subjected to the internal blast loading is alsodiscussed. The results show that the penetration of the high-velocity projectile only causes a local damage to the concrete gravity dam. However, the combined effects of the penetration and explosion cause significantly more damage to the upper region of the dam.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼