http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Yu, Haiyang,Duan, Wei,Sun, Qiang,Wang, Xia,Wang, Jue,Li, Jun,Choi, Jaeho Hindawi Limited 2018 Mathematical problems in engineering Vol.2018 No.-
<P>A generalized base station-relay-user equipment (BS-Relay-UE) beamforming design is investigated for a cooperative multiple-input multiple-output (MIMO) multirelay networks with imperfect channel state information (CSI). In order to minimize the worst-case mean square error (MSE) which is subject to a semi-infinite (SI) relay power constraints, a generalized optimal beamforming structure for the relay amplifying matrix is effectively proposed, and then the SI relay power constraints are converted into linear matrix inequalities (LMIs) version. In such conversion, the objective problem recasts as a decoupled biconvex semidefinite programming (SDP) one which can be efficiently solved by the proposed alternating algorithm. The system performance has been verified in terms of worst-case MSE using a set of qualitative analyses. The results show us that the proposed beamforming method outperforms the conventional schemes and can also effectively reduce the computational complexity when it is compared to the cutting-set schemes and also to the nonrobust ones.</P>
Haiyang Yu,Shangbin Yang,Haotao Li,Rongjie Wu,Biqin Lai,Qiujian Zheng 대한척추신경외과학회 2023 Neurospine Vol.20 No.1
After spinal cord injury (SCI), endogenous neural stem cells are activated and migrate to the injury site where they differentiate into astrocytes, but they rarely differentiate into neurons. It is difficult for brain-derived information to be transmitted through the injury site after SCI because of the lack of neurons that can relay neural information through the injury site, and the functional recovery of adult mammals is difficult to achieve. The development of bioactive materials, tissue engineering, stem cell therapy, and physiotherapy has provided new strategies for the treatment of SCI and shown broad application prospects, such as promoting endogenous neurogenesis after SCI. In this review, we focus on novel approaches including tissue engineering, stem cell technology, and physiotherapy to promote endogenous neurogenesis and their therapeutic effects on SCI. Moreover, we explore the mechanisms and challenges of endogenous neurogenesis for the repair of SCI.
Online probabilistic forecasting method for trapezoidal photovoltaic stream data
Yu, Haiyang,Chen, Chunyi,Yang, Huamin The Korean Institute of Power Electronics 2021 JOURNAL OF POWER ELECTRONICS Vol.21 No.11
For the probabilistic forecasting of photovoltaic generation, the design of a feasible online predictive framework is a challenging problem. To deal with this issue, an ensemble dynamic OS-ELM based on quantile estimation has been proposed. Considering inherent intermittent and random variations of the photovoltaic sequence, the weights of the forecasting model are updated according to the loss suffered. At the same time, the accommodative feature threshold can be calculated on the basis of increasing characteristics space, which builds the optimal network architecture for point forecast. A two-dimensional kernel density estimation algorithm based on a fuzzy inference method is exploited. This method breaks through the assumptive limit of error distribution. The changeable parameters help the model to be suitable for power fluctuations. Both the arriving data sample and the increasing feature space are tackled. Numerical experiments are conducted on two practical applications for solar power systems. The results show that the proposed algorithm not only has lower generalization error, but also provides higher confidence coefficient.
Semi-quantum Key Distribution Protocol Based on Bell States
Haiyang Yu,Yongquan Cai,Shanshan Kong,Fei Xue,Ditta Allah 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.12
A quantum key distribution protocol with traditional Bob has been proposed recently by Boyer et al. using single-particle state. In this paper, a semi-quantum key distribution protocol is described, in which Einstein-Podolsky-Rosen (EPR) pairs of particles are utilized to generate a secret key in remote places. This extends the quantum key distribution protocol with traditional Bob where the single-qubit channel is replaced by the entangled EPR-pair channel. And quantum Alice is able to do any quantum operations, preparing quantum states and performing quantum measurement, but traditional Bob is not able to prepare and measure a particle in the computational basis, reflect the particles. Furthermore, entanglement states are used in our protocol. The analysis shows that our protocol is secure, which can avoid the beam splitter attack automatically, and the proposed protocol is more efficient than Boyer’s scheme.
Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy
( Haiyang Yu ),( Yongquan Cai ),( Shanshan Kong ),( Zhenhu Ning ),( Fei Xue ),( Han Zhong ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.10
Cloud storage becomes a new trend that more and more users move their data to cloud storage servers (CSSs). To ensure the security of cloud storage, many cloud auditing schemes are proposed to check the integrity of users’ cloud data. However, most of them are based on public key infrastructure, which leads to complex certificates management and verification. Besides, most existing auditing schemes are inefficient when user uploads a large amount of data or a third party auditor (TPA) performs auditing for multiple users’ data on different CSSs. To overcome these problems, in this paper, we propose an efficient and secure auditing scheme based on identity-based cryptography. To relieve user’s computation burden, we introduce a proxy, which is delegated to generate and upload homomorphic verifiable tags for user. We extend our auditing scheme to support auditing for dynamic data operations. We further extend it to support batch auditing in multiple users and multiple CSSs setting, which is practical and efficient in large scale cloud storage system. Extensive security analysis shows that our scheme is provably secure in random oracle model. Performance analysis demonstrates that our scheme is highly efficient, especially reducing the computation cost of proxy and TPA.
CDK2 is Required for the DNA Damage Response during Porcine Early Embryonic Development
HaiYang Wang,Yu-Jin Jo,Tian-Yi Sun,Suk Namgoong,Xiang-Shun Cui,Jeong Su Oh,Nam-Hyung Kim 한국수정란이식학회 2016 한국수정란이식학회 학술대회 Vol.2016 No.10
CDK2 inhibition plays a central role in DNA damage–induced cell cycle arrest and DNA repair. However, whether CDK2 also influences early porcine embryo development is unknown. In this study, we examined whether CDK2 is involved in the regulation of oocyte meiosis and early embryonic development of porcine. We found that disrupting CDK2 activity with RNAi or an inhibitor did not affect meiotic resumption or MII arrest. However, CDK2 inhibitor-treated embryos showed delayed cleavage and ceased development before the blastocyst stage. Disrupting CDK2 activity is able to induce sustained DNA damage as demonstrated by the formation of distinct γH2AX foci in nuclei of day 3- and day 5-embryos. Inhibiting CDK2 triggers a DNA damage checkpoint by activating of the ATM-P53-P21 pathway. However, the mRNA expression of genes involved in non-homologous end-joining (NHEJ) or homologous recombination (HR) pathways for double strand break (DSB) repair reduced after administering CDK2 inhibitor to 5-day-old embryos. Furthermore, CDK2 inhibition caused apoptosis in day 7 blastocysts. Thus, our results indicate that an ATM-P53-P21 DNA damage checkpoint is intact in the absence of CDK2; however, CDK2 is important for proper repair of the damaged DNA by either directly or indirectly influencing DNA repair-related gene expression.