http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Cordblood-Based High-Throughput Screening for Deafness Gene of 646 Newborns in Jinan Area of China
Shou-Xia Li,Ding-Li Chen,Su-Bin Zhao,Li-Li Guo,Hai-Qin Feng,Xiao-Fang Zhang,Li-Li Ping,Zhi-Ming Yang,Cai-Xia Sun,Gen-Dong Yao 대한이비인후과학회 2015 Clinical and Experimental Otorhinolaryngology Vol.8 No.3
Objectives. Infants with slight/mild or late-onset hearing impairment might be missed in universal newborn hearing screening (UNHS). We identified the mutation hot spot of common deaf gene in the newborns in Jinan area population by screening the mutation spot with neonate cord blood, in order to make clear whether the neonate cord blood for screening is feasible. Methods. Six hundred and forty-six newborns were subjected to both UNHS and genetic screening for deafness by using neonate cord blood. The newborn genetic screening targeted four deafness-associated genes, which were commonly found in the Chinese population including gap junction beta-2 protein (GJB2), gap junction beta-3 protein (GJB3), solute carrier family 26 member 4 (SLC26A4), and mtDNA 12S rRNA. The most common 20 spot mutations in 4 deaf genes were detected by MassARRAY iPLEX platform and mitochondrial 12S rRNA A1555G and C1494T mutations were sequenced using Sanger sequencing. Results. Among the 646 newborns, 635 cases passed the UNHS and the other 11 cases (1.7%) did not. Of the 11 failures, two cases were found to carry homozygous GJB2 p.R143W pathogenic mutation, one case was found to have heterozygous GJB2 235delC mutation, and another one case carried heterozygous GJB3 p.R180X pathogenic mutation. Six hundred and thirty-five babies passed the newborn hearing screening, in which 25 babies were identified to carry pathogenic mutations, including 12 heterozygotes (1.9%) for GJB2 235delC, eight heterozygotes (1.3%) for SLC26A4 IVS7-2A>G, one heterozygote (0.2%) for p.R409H, two homozygotes (0.3%) for m.1494C>T, and two homozygotes (0.3%) for m.1555A>G. Conclusion. Newborn genetic screening through the umbilical cord blood for common deafness-associated mutations may identify carriers sensitive to aminoglycoside antibiotic, and can effectively prevent or delay hearing loss occurs.
A Secure Fingerprinted Multimedia Distribution Using Social Network Analysis
Cong-huan Ye,Zeng-gang Xiong,Yao-ming Ding,Xueming Zhang,Guangwei Wang,Fang Xu 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.4
Collusion attack is a very effective attack for digital fingerprinting system. In order to remove or attenuate the fingerprint information hidden in fingerprinted content, a number of users produce a new colluded copy through their own fingerprinted copies. In this paper, we address a novel collusion-resisting desynchronization fingerprinting approach using social network analysis. The novelty of this paper is that collusion attack occurred in a multimedia social network community with high probability. Different from all existing works, with desynchronization model constructed upon social network, the original image is desynchronized to get many similar copies which are different from each other, and then they are assigned and distributed to subscribers according to social network analysis. Theory analysis shows that the presented desynchronization distribution method has significantly better performance than those existing distribution schemes. The experimental results also show that the average colluded images even with only two desynchronized copies have poor visual quality. And the visual quality of colluded images does not improve apparently with the increase of the number of copies.
Cong-huan Ye,Zeng-gang Xiong,Yao-Ming Ding,Xueming Zhang,Guangwei Wang,Fang Xu 보안공학연구지원센터 2016 International Journal of Multimedia and Ubiquitous Vol.11 No.7
Average collusion attack is a very effective attack for digital fingerprinting system. Moreover, the commercial value of the colluded content is often time-sensitive. The more profit the colluder will make from it when the colluded copy is distributed earlier. This paper presents a new collusion-resilience approach with recursive chaotic desynchronization and social network. It has processed chaotic transformations due to random image grid based on chaos. The experimental results show that collusion even with only two copies results in degradation of the image metric, even if those traitors try to resynchronization using image registration technology. However, it will take expensive computational cost to do that, and the visual quality is degraded expensively with the increase of the number of fingerprinted copies.