http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
A Verifiable and Traceable Secondhand Digital Media Market Protocol
( Chin-ling Chen ),( Chin-chang Chen ) 한국인터넷정보학회 2011 KSII Transactions on Internet and Information Syst Vol.5 No.8
As used product transactions are currently on the rise, the demand for transactions of secondhand digital content will grow in the future; thus, learning to make secure transactions while avoiding cyber attacks becomes an important issue. In this paper, we combine the new buyer`s secret key, the new buyer`s watermark to embed in resold digital content, and the reseller`s encrypted watermark, which can prove legal ownership of the reseller. Using the privacy homomorphism property of RSA and exponential calculus, the original seller of digital content can verify the legality of the reseller and the new buyer. We also reduced the load of encryption/decryption digital content using a partial encryption/decryption algorithm to make our protocol more efficient and practical. In the proposed protocol, the seller is not able to conduct piracy and easily frame any other innocent secondhand buyer when a case of piracy is found. In fact, piracy can be clearly traced using the privacy homomorphism property of RSA and the embedded watermark mechanism. Further, in the proposed protocol, the seller himself can trace the piracy using exponential calculus. Since it is unnecessary to trust third party participation, the conspiracy problem is resolved and the new buyer is not required to participate in the dispute. Moreover, the seller, reseller and new buyer can simultaneously benefit from the secondhand transaction.
Combined Assessment of Serum Alpha-Synuclein and Rab35 is a Better Biomarker for Parkinson’s Disease
Hung-Li Wang,Chin-Song Lu,Tu-Hsueh Yeh,Yu-Ming Shen,Yi-Hsin Weng,Ying-Zu Huang,Rou-Shayn Chen,Yu-Chuan Liu,Yi-Chuan Cheng,Hsiu-Chen Chang,Ying-Ling Chen,Yu-Jie Chen,Yan-Wei Lin,Chia Chen Hsu,Huang-Li 대한신경과학회 2019 Journal of Clinical Neurology Vol.15 No.4
Background and Purpose It is essential to develop a reliable predictive serum biomarker for Parkinson’s disease (PD). Te accumulation of alpha-synuclein (αSyn) and up-regulated expression of Rab35 participate in the etiology of PD. Te purpose of this investigation was to determine whether the combined assessment of serum αSyn and Rab35 is a useful predictive biomarker for PD. Methods Serum levels of αSyn or Rab35 were determined in serum samples from 59 sporadic PD patients, 19 progressive supranuclear palsy (PSP) patients, 20 multiple system atrophy (MSA) patients, and 60 normal controls (NC). Receiver operating characteristics (ROC) curves were calculated to determine the diagnostic accuracy of αSyn or/and Rab35 in discriminating PD patients from NC or atypical parkinsonian patients. Results The levels of αSyn and Rab35 were increased in PD patients. The serum level of Rab35 was positively correlated with that of αSyn in PD patients. Compared to analyzing αSyn or Rab35 alone, the combined analysis of αSyn and Rab35 produced a larger area under the ROC curve and performed better in discriminating PD patients from NC, MSA patients, or PSP patients. When age was dichotomized at 55, 60, 65, or 70 years, the combined assessment of αSyn and Rab35 for classifying PD was better in the group below the cutof age than in the group above the cutof age. Conclusions Combined assessment of serum αSyn and Rab35 is a better biomarker for discriminating PD patients from NC or atypical parkinsonian patients, and is a useful predictive biomarker for younger sporadic PD patients.
Lin, Chin-Wen,Yang, Jeng-Huh,Chu, Hsien-Pin,Su, Ho-Ping,Chen, Hsiao-Ling,Huang, Chia-Cheong Asian Australasian Association of Animal Productio 2001 Animal Bioscience Vol.14 No.3
The physiochemical properties and interactions between porcine blood and waxy rice were determined. Addition of calcium chloride (0.15%) improved acceptability of blood cake and increased the gelatinization degree of waxy rice. The water-holding capacity of porcine blood gel (blood/water=60/40, v/v), extent of absorption and gelatinization of waxy rice, and scanning electron microscopy showed that blood protein matrix and waxy rice are competitors for holding water in the cooking procedure. Non-haem iron content increased linearly (R=0.95) when heating temperature rose. The presence of blood proteins caused increasing of peak temperature (Tp) of gelatinization in differential scanning calorimetric thermal gram, The microstnlcture of plasma proteins and haemoglobin appeared continuous changes, and interacted with surface of waxy rice flour in terms of network and mosaic form, respectively. The electrophoretic patterns revealed an interaction between plasma proteins and waxy rice glutelin and haemoglobin when heated could be found at temperatures above $60^{\circ}C$.
An Image Encryption Scheme Based on Concatenated Torus Automorphisms
( Qian Mao ),( Chin-chen Chang ),( Hsiao-ling Wu ) 한국인터넷정보학회 2013 KSII Transactions on Internet and Information Syst Vol.7 No.6
A novel, chaotic map that is based on concatenated torus automorphisms is proposed in this paper. As we know, cat map, which is based on torus automorphism, is highly chaotic and is often used to encrypt information. But cat map is periodic, which decreases the security of the cryptosystem. In this paper, we propose a novel chaotic map that concatenates several torus automorphisms. The concatenated mechanism provides stronger chaos and larger key space for the cryptosystem. It is proven that the period of the concatenated torus automorphisms is the total sum of each one`s period. By this means, the period of the novel automorphism is increased extremely. Based on the novel, concatenated torus automorphisms, two application schemes in image encryption are proposed, i.e., 2D and 3D concatenated chaotic maps. In these schemes, both the scrambling matrices and the iteration numbers act as secret keys. Security analysis shows that the proposed, concatenated, chaotic maps have strong chaos and they are very sensitive to the secret keys. By means of concatenating several torus automorphisms, the key space of the proposed cryptosystem can be expanded to 2135. The diffusion function in the proposed scheme changes the gray values of the transferred pixels, which makes the periodicity of the concatenated torus automorphisms disappeared. Therefore, the proposed cryptosystem has high security and they can resist the brute-force attacks and the differential attacks efficiently. The diffusing speed of the proposed scheme is higher, and the computational complexity is lower, compared with the existing methods.
Bactericidal Activity of Soymilk Fermentation Broth by In Vitro and Animal Models
Yi-Ping Chin,Ko-Chung Tsui,Mei-Chieh Chen,Cheng-Yi Wang,Chin-Yuh Yang,Yuh-Ling Lin 한국식품영양과학회 2012 Journal of medicinal food Vol.15 No.6
Soybean fermentation broth (SFB) exhibits potent antibacterial activity against different species of bacteria in in vitro assays and animal models. Four isoflavone compounds—daidzin, genistin, genistein, and daidzein—of SFB were analyzed and quantified by high-performance liquid chromatography. In the in vitro test, daidzin and daidzein had more potent antibacterial activity than genistin. The minimum inhibition concentration values for these bacteria of SFB ranged from 1.25%to 5%, and the minimum bactericidal concentration values of strains ranged from 2.5% to 10%, depending on the species or strain. Vancomycin-resistant Entercoccus faecalis (VRE) strains were also tested for susceptibility to SFB in two species of animal model: the Sprague–Dawley rat and the BALB/c mouse. SFB-fed Sprague–Dawley rats showed excellent elimination efficiency against VRE, close to 99% compared with the phosphate-buffered saline–fed control group. In the BALB/c mouse model, SFB antibacterial activity was 65–80% against VRE compared with the control. In conclusion, SFB contains natural antibacterial substances such as daidzin, genistin, and daidzein that inhibit bacterial growth.
Performance of adding waste glass and sewage sludge to reservoir-sediment aggregates
Ing-Jia Chiou,Chin-Ho Chen,Chia-Ling Lin 사단법인 한국계산역학회 2014 Computers and Concrete, An International Journal Vol.13 No.1
Accumulated annual reservoir sedimentation in Taiwan was 14.6 million m3 in 2010, seriously endangering reservoir safety and the water supply. In addition, the sintering temperature of reservoir-sediment aggregates (RSAs) is very high, and very energy consuming consequently. Therefore, to explore the effects of admixtures on sintering behavior and performance of the aggregates, two different admixtures are blended, waste-glass and municipal sewage sludge, into reservoir sediment to make artificial aggregates. Experimental results show that the lightweight characteristics of waste-glass/reservoir-sediment aggregates (WGRSAs) are more significant than those of sewage sludge/reservoir-sediment aggregates (SSRSAs). Moreover, as sintering temperature increases, the specific gravity of WGRSAs drops more apparently. The optimum sintering temperature of pure reservoir-sediment aggregates (PRSAs), SSRSAs, and WGRSAs was 1150°C, 1100°C, and 1050°C, respectively. The PRSAs are normal weight with better strength; the WGRSAs are lightweight and energy-saving; and the SSRSAs are lightweight with normal strength.
A Fast and Secure Scheme for Data Outsourcing in the Cloud
( Yanjun Liu ),( Hsiao-ling Wu ),( Chin-chen Chang ) 한국인터넷정보학회 2014 KSII Transactions on Internet and Information Syst Vol.8 No.8
Data outsourcing in the cloud (DOC) is a promising solution for data management at the present time, but it could result in the disclosure of outsourced data to unauthorized users. Therefore, protecting the confidentiality of such data has become a very challenging issue. The conventional way to achieve data confidentiality is to encrypt the data via asymmetric or symmetric encryptions before outsourcing. However, this is computationally inefficient because encryption/decryption operations are time-consuming. In recent years, a few DOC schemes based on secret sharing have emerged due to their low computational complexity. However, Dautrich and Ravishankar pointed out that most of them are insecure against certain kinds of collusion attacks. In this paper, we proposed a novel DOC scheme based on Shamir`s secret sharing to overcome the security issues of these schemes. Our scheme can allow an authorized data user to recover all data files in a specified subset at once rather than one file at a time as required by other schemes that are based on secret sharing. Our thorough analyses showed that our proposed scheme is secure and that its performance is satisfactory.