http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Zhao Lei,Wang Jianhua,Li Xiaofeng 보안공학연구지원센터(IJSIP) 2014 International Journal of Signal Processing, Image Vol.7 No.6
The traditional Snake model and GVF-Snake model set high requirements on noise and initial contour in wood cell contour extraction. To solve this problem, on the premise of considering the image texture and gray-scale information, the area information is directly introduced into the active contour extraction model through force equilibrium equation. Experiments show that the contour extracted with this method is not only more close to real cell contour, but also improved in anti-noise property. In particular, in the convergence of high noise and deep sunken areas, it has some advantages not found in other traditional methods.
Secure and Efficient Conjunctive Keyword Search Scheme without Secure Channel
( Jianhua Wang ),( Zhiyuan Zhao ),( Lei Sun ),( Zhiqiang Zhu ) 한국인터넷정보학회 2019 KSII Transactions on Internet and Information Syst Vol.13 No.5
Conjunctive keyword search encryption is an important technique for protecting sensitive data that is outsourced to cloud servers. However, the process of searching outsourced data may facilitate the leakage of sensitive data. Thus, an efficient data search approach with high security is critical. To solve this problem, an efficient conjunctive keyword search scheme based on ciphertext-policy attribute-based encryption is proposed for cloud storage environment. This paper proposes an efficient mechanism for removing the secure channel and resisting off-line keyword-guessing attacks. The storage overhead and the computational complexity are regardless of the number of keywords. This scheme is proved adaptively secure based on the decisional bilinear Diffie-Hellman assumption in the standard model. Finally, the results of theoretical analysis and experimental simulation show that the proposed scheme has advantages in security, storage overhead and efficiency, and it is more suitable for practical applications.
Hypoxia-induced circRNF13 promotes the progression and glycolysis of pancreatic cancer
Zhao Qiuyan,Zhu Zhonglin,Xiao Wenqin,Zong Guanzhao,Wang Chuanyang,Jiang Weiliang,Li Kai,Shen Jie,Guo Xingya,Cui Jianhua,Guo Lihong,Wan Rong 생화학분자생물학회 2022 Experimental and molecular medicine Vol.54 No.-
Pancreatic cancer (PC) is one of the most malignant tumors. Rapid progression and distant metastasis are the main causes of patient death. Hypoxia is a hallmark of multiple cancers and is involved in tumor biology. However, little is known about the roles of circRNAs in glycolysis and hypoxia-mediated progression of PC. Here, the expression pattern of hypoxia-related circRNAs was analyzed using RNA sequencing. A unique circRNA termed circRNF13 was found to be upregulated in PC tissues and may be a potential prognostic indicator. HIF-1α and EIF4A3 are involved in regulating the biogenesis of circRNF13. Furthermore, circRNF13 was validated to exert a stimulative effect on cell proliferation, angiogenesis, invasion and glycolysis. Importantly, we found that circRNF13 promoted PDK3 levels by acting as a miR-654-3p sponge, thus promoting the PC malignant process. Collectively, our results reveal that hypoxia-induced circRNF13 mediated by HIF-1α and EIF4A3 promotes tumor progression and glycolysis in PC, indicating the potential of circRNF13 as a prognostic biomarker and therapeutic target for PC.
Yuetao Zhao,Wenyao Yang,Yujiu Zhou,Yan Chen,Yajie Yang,Jianhua Xu,Yadong Jiang 대한금속·재료학회 2016 ELECTRONIC MATERIALS LETTERS Vol.12 No.6
The molecular weight shows great influence on dielectricand energy storage performance of poly(vinylidenefluoride) (PVDF) films and related devices. In this letter,the influences of molecular weight on the dielectric andenergy storage properties of PVDF films were studied. Ithas been found that, under a 1000 kV/cm electric field,the low-molecular-weight PVDF film presents a muchhigher energy storage efficiency as high as 80.10%,nearly three times as much as the high-molecular-weightPVDF film. Moreover, the low-molecular-weight PVDFfilm also shows high resistivity, representing an order ofmagnitude improvement over the high-molecular-weightPVDF film, which is more desirable and promising forhigh performance pulse discharge capacitor application.
( Zhiyuan Zhao ),( Jianhua Wang ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.7
Conjunctive keyword search encryption is an important technique for protecting sensitive personal health records that are outsourced to cloud servers. It has been extensively employed for cloud storage, which is a convenient storage option that saves bandwidth and economizes computing resources. However, the process of searching outsourced data may facilitate the leakage of sensitive personal information. Thus, an efficient data search approach with high security is critical. The multi-user search function is critical for personal health records (PHRs). To solve these problems, this paper proposes a novel multi-user conjunctive keyword search scheme (mNCKS) without a secure channel against keyword guessing attacks for personal health records, which is referred to as a secure channel-free mNCKS (SCF-mNCKS). The security of this scheme is demonstrated using the Decisional Bilinear Diffie-Hellman (DBDH) and Decision Linear (D-Linear) assumptions in the standard model. Comparisons are performed to demonstrate the security advantages of the SCF-mNCKS scheme and show that it has more functions than other schemes in the case of analogous efficiency.
Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing
( Zhiyuan Zhao ),( Jianhua Wang ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.6
With the development of wireless access technologies and the popularity of mobile intelligent terminals, cloud computing is expected to expand to mobile environments. Attribute-based encryption, widely applied in cloud computing, incurs massive computational cost during the encryption and decryption phases. The computational cost grows with the complexity of the access policy. This disadvantage becomes more serious for mobile devices because they have limited resources. To address this problem, we present an efficient verifiable outsourced scheme based on the bilinear group of prime order. The scheme is called the verifiable outsourced computation ciphertext-policy attribute-based encryption scheme (VOC-CP-ABE), and it provides a way to outsource intensive computing tasks during encryption and decryption phases to CSP without revealing the private information and leaves only marginal computation to the user. At the same time, the outsourced computation can be verified by two hash functions. Then, the formal security proofs of its (selective) CPA security and verifiability are provided. Finally, we discuss the performance of the proposed scheme with comparisons to several related works.