Organizer:Ministry of Education

Governing Body:Sichuan University

Editor in chief:WANG Yu-Zhong

The standing deputy editor:CHEN Zhong-Lin

ISSN:51-1595/N

Edit and Publish Editorial Department of
Journal of Sichuan University
(Natural Science Edition)

  • Current Discuss
  • Back Issue
  • Click Ranking
  • Download Ranking
    Mathematics
    • Algebraic degrees of a class of exponential sums

      Chen Chao, Peng Guo-Hua

      2020,57(6):1029-1032, DOI:

      Abstract:

      Recently Wan studied the algebraic degrees of the exponential sums S_q(f) over a finite field F_q. In this article, basing on Wan's results, we discuss the Gauss sums for the case q=p^2 and obtain that S_q(x^d) has only two possible values, if it is of degree 1. Additionlly we generalize a method proposed by Myerson in 1981 and get all explicit values of the algebraic degrees of Gauss sums in some special cases.

    • A neural network algorithm for heat conduction interface problems

      Wang Zhu-Chu, Xie Xiao-Ping

      2020,57(6):1038-1046, DOI:

      Abstract:

      This paper discusses a single hidden neural network algorithm for the heat conduction interface problems. The proposed algorithm sets the approximate solution to contain a neural network function and to meet the initial/boundary conditions and the Dirichlet interface condition, and trains the neural network by solving the discrete optimization problem derived from the original system so as to finally obtain the approximate solution. A new optimization algorithm based on the stochastic gradient method is also given to solve the corresponding discrete optimization problem. Numerical examples are provided to verify the effectiveness of the neural network algorithm.

    • Permutation properties of the Fibonacci polynomials

      Wang Zhi-Jian

      2020,57(6):1047-1051, DOI:

      Abstract:

      The permutation polynomials has wide and important applications in the fields of algebra, combinatorics, number theory, coding theory, cryptography, and so on. In this paper,by calculating the sum of equal powers of the Fibonacci polynomials, we obtain the necessary conditions for determining these Fibonacci polynomials defined on a finite fields is a permutation polynomials, solve the open problem raised by Fernando and Rashid and generalize the existing results.

    • A fast pricing algorithm for the arithmetic half-Asian option

      Chen Cong, Tang Ya-Yong

      2020,57(6):1061-1066, DOI:

      Abstract:

      The arithmetic half-Asian option is a generalized Asian option, without analytic pricing formula. The Monte Carlo methods are most unsed in option pricing. Despite of the high pricing accuracy, the calculation time is long. In this paper, a fast algorithm named the semi-analytic method for the arithmetic half-Asian option is proposed by combining the improved Monte Carlo method and moment approximation method. The mathod greatly reduces the computation time under the premise of ensuring accuracy. Then, the semi-analytic method is improved by using antithetic variable technique in order to further reduce the computation time.

    Computer Science
    • Multiphysics coupled simulation to study the mechanism of convection in microwave heating

      DU Zhi-Liao, GAN Wei-Wei, WU Zhe, ZENG Bao-Qing

      2020,57(6):1073-1076, DOI:

      Abstract:

      When a microwave oven heats liquid foods such as water or milk, there is a phenomenon of longitudinal and transverse temperature inhomogeneity because of the nonuniform of electromagnetic field distribution. To explore the mechanism for the phenomenon, the multiphysics simulation software was used to simulate the temperature change when heating a cup of water from bottom by microwave and conventional electric heaters. By analyzing the effect of the convection on the distribution of electric field and temperature, it came to conclusion that convection only occurs in the local area owing to nonuniform of microwave heating, different from the traditional method where it forms a bottom up onvection, which eventually leads to the temperature delamination.

    • An anomaly detection method based on feature regular constraints

      DENG Miao, LIU Qiang, CHEN Hong-Gang, WANG Zheng-Yong, HE Xiao-Hai

      2020,57(6):1077-1083, DOI:

      Abstract:

      Anomaly detection is a classic problem in computer vision. It is difficult to capture the anomalies in the real scene and is difficult to obtain the labels as well, an end to end anomaly detection model trained only with normal samples is proposed. First, the input image is encoded by an automatic encoder to obtain its low dimensional features, and then an autoregressive probability density estimator is used to constrain the probability distribution of low dimensional features. The decoder restores it to the original input size. Finally, a classifier determines the authenticity of the generated picture. A jumper connection is used between the codecs to maximize the memory of the model for normal samples. In this paper, the experiments were conducted on the CIFAR 10 and UCSD Ped2 datasets. The results showed that the average area under the curve (AUC) of the 10 categories of CIFAR10 reached 73.5%, and the area under the average curve (AUC) of UCSDPed2 reached 95.7%. This model can effectively improve the effect of anomaly detection.

    • An anomaly detection method based on feature regular constraints

      GAN Jian-Hong, QI Hui, HU Wen-Dong, SHU Hong-Pin, LUO Fei, HE Tong-Li, LI Ren-Guo

      2020,57(6):1084-1089, DOI:

      Abstract:

      Atmospheric jet is one of the important factors affecting weather patterns, and the jet identification can provide important data for automatic identification of weather system and intelligent weather forecast calculation. According to the property that jet axis locates at the geometric center of strong wind area,a new jet axis identification method is presented. First of all, the coherence feature of wind direction is used to obtain the jet areas, and skeleton extraction method is employed to get area geometric skeleton. The jet axis is obtained by connecting the tuned skeleton points which is computed by gravity formula. The experiment basing on MICAPS 11th format data and comparing with manual way and other methods shows that the present method can get the jet axis effectively.

    Electronics and Information Science
    • Bubble detection on the surface of medical empty bottles based on improved Retina Net

      Wu Hua-yun, Ren Dejun, LV Yi-Zhao, Hu Bin, Fu Lei, Qiu Lv

      2020,57(6):1090-1095, DOI:

      Abstract:

      In the production process of medical bottles, a large number of bubble will be generated on the surface of the empty bottle body, but the existing methods have various problems in the detection of bubbles on the surface of empty medical bottles such as the week robustness to complex scene changes, and the poor anti noise ability and so on. Aiming to the existed bubble defects on the surface of medical empty bottles, an improved deep learning target detection algorithm RetinaNet is proposed to detect the bubbles on the bottle body. This paper mainly improves the feature pyramid network structure in the original RetinaNet algorithm, and introduces the feature enhance module in the process of the feature fusion, which effectively improves the extraction of semantic features and expands the receptive field of feature maps. In order to reduce the number of parameters and calculation time of the model, considering that the bubbles on the surface of the empty bottle are all small objects, the network structure to detect large objects in the original feature pyramid network is removed, which effectively improves the detection speed. By recombining the standard ResNet50 network, a dilation convolution module is introduced to expand the feature map receptive field and the accuracy of model detection is improved. The proposed method is validated on the empty dataset of injection molding, and the accuracy is 99.72%, the missed rate was 0.12%, the false detection rate was 0.16%, the mAP is 99.49% which is higher by nearly 2.4% compared with the original RetinaNet.

    • Collaborative filtering recommendation based on transfer learning and joint matrix decomposition

      CHEB Jue-Yi, ZHU Ying-Qi, ZHOU Gang, CUI Lan-Lan, WU Shao-Mei

      2020,57(6):1096-1102, DOI:

      Abstract:

      Matrix decomposition was used in the early collaborative filtering algorithms in order to solve the problem of data sparsity. But it performed poorly in handling serious sparsity problem and cannot meet the application requirements. Then, transfer learning was introduced into collaboration filtering to deal with the data sparsity in the target domain by utilizing common users’ information in the auxiliary and target domains.Although the introduced auxiliary information would prompt knowledge acquisition in the target domain, these methods only use shallow features to measure the users’ similarity. As a result, these methods could not capture the potential features when the users have only a few common items and would result in poor performance in similarity measurement. In order to address these problems, this paper proposes a collaborative filtering recommendation method based on transfer learning and joint matrix decomposition. In this method, the information of common users and items in the two domains is mapped into a potential semantic space with the information of users as anchors; the user item joint rating matrix of two domains is decomposed with the user information as the constrain. The experiment was performed to validate the proposed method and the method showed superior performance over the state of the art migration learning methods based on similarity calculation on benchmark data set, proving its effectiveness.

    • Research on improved BP neural network PID controller in gas concentration control

      LI Hang, DU Fan, HU Xiao-Bing, ZHOU Shao-Wu

      2020,57(6):1103-1109, DOI:

      Abstract:

      The process of gas concentration control in animal hypoxia experiment is time varying and nonlinear,Combining BP neural network with traditional PID control can achieve better control results, but there are still some problems such as slow convergence speed and poor stability. To solve these problems, a new BP neural network PID controller, optimized by improved genetic algorithm, is proposed. The convergence speed and stability of genetic algorithm are improved in order to optimize the initial weights of BP neural network , then the optimized BP neural network was used to realize on line adjustment of PID parameters in this controller.Finally,the conventional and improved ontrollers are simulated in MATLAB,the results show that the improved BP neural network PID controller has better control performance, compared with the conventional BP neural network PID controller.

    Physics
    • Theoretical study on the synthesis of CdTe quantum dots by L-cysteine coordination

      CHEN Xiao, LUO Hui, LI Lai-Cai

      2020,57(6):1116-1120, DOI:

      Abstract:

      In this paper, the adsorption characteristics of L-cysteine and L-cystine on CdTe was studied by using the density functional theory. Four stable adsorption configurations were optimized, and their adsorption energies, charge densities, frontier molecular orbits and UV-Vis spectra were calculated. It is found that, when the L-cysteine is adsorbed on CdTe, the adsorption energy is large and the absorption to UV-Vis light is strong, indicating that the adsorption of L-cysteine on CdTe is stable and easy to produce molecular fluorescence. After L-cysteine is converted into L-cystine, the adsorption stability is decreased and the absorption intensity to UV-Vis light is weakened. This study provides theoretical support for the application of L-cysteine mediated synthesis of CdTe QDs fluorescence material in the detection of H2O2 and glucose in biochemical analysis.

    • Laser intensity effect on single-order harmonic enhancement

      LIU Hang, LIU Hui, FENG Li-Qiang

      2020,57(6):1121-1124, DOI:

      Abstract:

      Through the laser waveform control, the enhancement of the single-order harmonic can be achieved. Further, when the fundamental laser intensity is increased, the enhancement of the single-order harmonic is disappeared. When the controlling laser intensity is increased, the enhanced ratio of the single-order harmonic can be enhanced and a maximum enhanced value can be found at the specific laser intensity. Theoretical analyses show that the enhancement of single-order harmonic is not only dependent on the folded structure of the harmonic emission process, but also related to the interference from different harmonic emission peaks.

    • The design of framework for readout electronics of LHAASO-WFCTA

      ZHANG Jin-Wen, ZHOU Rong, ZHANG Shou-Shan, LI Yao, XIONG Hao, HU Gang-Ling, YANG Chao-Wen

      2020,57(6):1125-1130, DOI:

      Abstract:

      Wide Field of View Cherenkov Telescope Array (WFCTA) is one of the main detector arrays in the Large High Altitude Air Shower Observatory (LHAASO). Its physical goal is to measure the cosmic ray energy spectrum from 30 TeV to several EeV. The telescope readout electronics system consists of 1024 channels and the signals to be processed include both Cherenkov signals with pulse widths of tens of ns and fluorescence signals with pulse widths of μs. This paper describes the framework design of the telescope readout electronics system in detail. In order to reduce the amount of data, an online trigger is designed, that is to say, the first-level hardware trigger is performed on the subcluster electronics, and then the event trigger is implemented on the trigger circuit. At the same time, the electronic system uses a 4-point compression method to obtain waveform data, covering a waveform width of 2.24 μs. The laboratory test results show that the readout electronics system can correctly obtain the signal waveform, and the dynamic range of the charge measurement can cover 10 P.E. (Photon Electron) to 32 143 P.E. The overlap area of the high gain channel and the low gain channel is from 857 P.E. to 1 714 P.E., and the high-low gain ratio is consistent with the design. The charge resolution is better than 20% at 10 P.E., better than 5% at 32 000 P.E., and the relative deviation is better than 5% at 10 P.E., and better than 2% at 32 000 P.E, and thus readout electronics system meets design requirements.

    • Ehancement of quantum coherence and three-body entanglement by dynamical decoupling pulses

      HE Qi-Liang, DING Min, SONG Xiao-Shu, XIAO Yong-Jun

      2020,57(6):1137-1146, DOI:

      Abstract:

      The influence of dynamical decoupling pulses on the quantum coherence, quantum entanglement and quantum discord in cavity quantum electrodynamics system is investigated. We find that the quantum coherence and non-classical correlations (entanglement and quantum discord) between two atoms can be increased by applying a train of dynamical decoupling pulses. Furthermore, by making use of the trace distance, we also explore the reason for enhancement of quantum coherence of two atoms. It is shown that the dynamical decoupling pulses can control and accelerate the return of quantum information from other subsystems to two atoms, and reduce the flow of quantum information between two atoms and other subsystems, which leads to the increase of quantum coherence and non-classical correlations between two atoms. Finally, we investigate the three-body entanglement of the system by using state preparation fidelity. It demonstrates that the genuine three-body entanglement may emerge in the system during the evolution of time. In particular, the period of emergence of three-body entanglement can be adjusted and enhanced by dynamical decoupling pulses.

    Chemistry
    • Experimental study on on-line cleaning of Ar/O2 plasma on metal niobium surface

      LI Min, YANG Li, CHEN Jian-Jun, CHEN-Bo, WANG Hong-Bin, WU An-Dong, YE Zong-Biao, GOU Fu-Jun, WEI Jian-Jun

      2020,57(6):1147-1151, DOI:

      Abstract:

      Hydrocarbon contamination in superconducting niobium cavity results in the decrease of surface work function of niobium, field emission and the deterioration of accelerating gradient of superconducting cavity. After working for a period of time, it is necessary to clean the hydrocarbon contamination to ensure its normal running. At present, the cleaning effect after plasma processing cannot be judged accurately and timely to control the cleaning cut-off point. In addition, the off-line testing may cause some secondary pollution.Therefore, we present a plasma cleaning and on-line monitoring device based on electrostatic quadrupole plasma (EQP) mass spectrometer and Kelvin probe. The plasma cleaning and residual gas monitoring were successfully integrated and put into use. During the experiment, the changes of cleaning byproducts and work function were monitored online. It was proved that the Ar/O2 mixed plasma produced by the inductively coupled plasma source with a plasma density of 1016~1017m-3 could effectively remove hydrocarbon contaminations from niobium surface and make oxidation modification on niobium surface, raising the work function from 4.0 eV to 5.3 eV.

    Material Science
    • Effects of non-harmonic vibration on the thermoelectric properties of semiconductor-based epitaxial graphene

      GAO Jun-Hua, ZHENG Rui-Lun

      2020,57(6):1157-1164, DOI:

      Abstract:

      In this paper, we establish the physical model of semiconductor-based epitaxial graphene. By considering the atomic non-harmonic vibration, we have the variations of the hybrid potential and thermoelectric potential of semiconductor-based epitaxial graphene with chemical potential and temperature are investigated, respectively. The influence of atomic non-harmonic vibration on the thermoelectric effect is also discussed. The results show that: 1) The hybrid potential is independent of temperature under the simple harmonic approximation. If the first non-harmonic term is considered, the hybrid potential increases with increasing temperature. However, if both the first and second non-harmonic terms are considered, the hybrid potential decreases with increasing temperature. 2) At a given temperature, the variation curve of thermoelectric potential of epitaxial graphene with chemical potential is left-right asymmetric at the chemical potential of zero, and there is a mutation near the chemical potential eV. 3) At a given chemical potential, the thermoelectric potential of epitaxial graphene is similar to that of single-layer graphene, namely that both decrease nonlinearly with increasing temperature, while the thermoelectric potential value of epitaxial graphene is larger than that of single-layer graphene. Compared with the simple harmonic approximation, the non-harmonic effect can reduce the thermoelectric potential value of the epitaxial graphene with a small amount. The influence of the non-harmonic effect on the thermoelectric potential increases slowly with increasing temperature, ranging from 0.23% to 0.25%.

    Biology
    • Comparative transcriptome analysis of Ascosphaera apis mycelium and spore

      JIANG Hai-Bin, DU Yu, FAN Xiao-Xue, WANG Jie, ZHU Zhi-Wei, FAN Yuan-Chan, XIONG Cui-Ling, FU Zhong-Min, XU Guo-Jun, CHEN Da-Fu, GUO Rui

      2020,57(6):1177-1185, DOI:

      Abstract:

      In order to explore the correlation among the common genes, specific genes and differentially expressed genes (DEGs) of mycelium (AaM) and spore (AaS) samples of Ascosphaera apis cultured in lab condition with the fungal growth, development, reproduction and pathogenicity, comparative transcriptome analysis of AaM and AaS was performed using RNA-seq technology and bioinformatic methods, followed by RT-qPCR to confirm the reliability of the sequencing data. The results showed that there were 7,362 genes shared by AaM and AaS, involving 44 functional terms and 122 pathways. The specific genes of AaM and AaS were 195 and 278, respectively. In AaM vs AaS comparison group, 977 up-regulated genes and 687 down-regulated genes were discovered, which were associated with 32 and 32 functional terms, respectively. Additionally, the DEGs mentioned above were related to 113 pathways such as glycolysis/gluconeogenesis and biosynthesis of secondary metabolites. Based on comparative transcriptome analysis, it’s revealed that the common genes, specific genes and DEGs may participate in the growth, development and reproduction process of A.apis mycelium and spore through regulating several pivotal pathways such as cell activity, metabolic process, endocytosis and MAPK signaling pathway.

    • Comparative analysis of the interaction sites of curcin, curcin C with adenine

      WU Peng, DENG Yu-Shan, CHEN Fang, XU Ying

      2020,57(6):1186-1192, DOI:

      Abstract:

      The ribosome-inactivating proteins of Jatropha curcas curcin and curcin C have antitumor activity, but the activity level of the latter is significantly higher than the former. In order to explore the structural basis for this difference, the online homology modeling prediction software SWISSMODEL was used to predict the three dimensional structural models of the ribosomal inactivating proteins curcin and curcin C. SYBYL was used to optimize the energy of the prediction model, and PROCHECK, VERIFY 3D and ERRAT software were used to evaluate the quality of the model before and after the optimization, and then AutoDock software was used to analyze the predicted model and adenine for molecular docking. The results show that the two proteins interacted with adenine in a similar way to Ricin A, but there were differences in the types and number of amino acid residues that interact, as well as the hydrogen bonds and hydrophobic interactions formed. Among them, curcin C had the strongest binding ability with adenine, and curcin had the lowest.

    • Effects of Napabucasin on the proliferation and migration of colorectal cancer cells

      XU Shu-Tao, PENG Rui, ZOU Fang-Dong

      2020,57(6):1193-1197, DOI:

      Abstract:

      This study aims to explore the effect of the novel small molecule inhibitor Napabucasin on the proliferation and migration of colorectal cancer cells. Firstly, the interaction mechanism between Napabucasin and STAT3 was analyzed by molecular docking. Then, it was proved that Napabucasin can significantly inhibit the colony formation and migration ability of colorectal cancer cells using clone formation experiments and wound healing assay. Napabucasin and Wnt agonist 1 were then used to co treat the HCT116 cells, combined with Western blot experiments, it was found that the Wnt signaling pathway mediates the inhibition of the migration and proliferation of colorectal cancer cells by Napabucasin. The research results show that Napabucasin can inhibit the proliferation and migration ability of colorectal cancer cells in vitro, and the Wnt signaling pathway is involved in mediating this inhibition process.

    • Chemical composition analysis of Salvia chinensis based on HPLC-Q-TOF-MS/MS method and its network pharmacology exploration in the treatment of gastric cancer

      HUANG Wen-Ji, RUAN Shuai, WEN Fang, WANG Hui, LU Xiao-Na, WANG Yu-Lan, LIU Shen-Lin, HU Yue, SHU Peng

      2020,57(6):1198-1208, DOI:

      Abstract:

      To identify and analyze the main ingredients of Salvia chinensis and to explore its therapeutic targets for gastric cancer, HPLC-Q-TOF-MS/MS was used to analyze the water dissolved compositions in Salvia chinensis and the TCMSP platform was used to screen the potential active ingredients. The results showed that a total of 48 compounds were identified, mainly including phenolic acids, flavonoids and other common substances. And among 48 compounds, there were 9 ingredients owning excellent in vivo activity. The therapeutic targets of the active ingredients were obtained by searching the Swiss Target Prediction database, and then taking the intersection with the gastric cancer targets retrieved from the DisGeNET database, a total of 18 targets for the treatment of gastric cancer were obtained. GO and KEGG pathway enrichment analysis using DAVID revealed that the components from Salvia chinensis involved 48 biological processes (BP), 8 cellular components (CC), 27 molecular functions (MF) and 8 pathways in the treatment of gastric cancer. Finally, STRING database and Cytoscape software were used to construct a PPI network. The results showed that target proteins such as EGFR、CDH1、CTNNB1、PTGS2、EGF, etc. played a key role in the PPI network. It can be concluded that there are various active ingredients in Salvia chinensis, and they can treat gastric cancer mainly by inhibiting proliferation, migration, inducing apoptosis, reducing drug resistance through drug reaction, plasma membrane, enzyme binding, etc.

    • Study on lipid accumulation of Phaeodactylum tricornutum strain overexpressing glycerol kinase

      HOU Xing-Guo, FANG Yan, BAI Huan, HU Sha-Sha, QING Ren-Wei, LAN Li-Qiong

      2020,57(6):1209-1216, DOI:

      Abstract:

      In order to obtain high-yield algae strains that meet biodiesel standards, the growth, lipid yield and fatty acid composition of Phaeodactylum tricornutum wild-type(WT), Phaeodactyllum tricornutum with glycerol kinase overexpression (GKOE) and glycerol kinase RNA interfered(GKRNi), which were cultured in a medium supplemented with 20 mmol/L exogenous glycerol, were investigated. The results showed that: (1) the cell concentration of GKOE in the medium with exogenous glycerol could reach 2.23×107 /mL, significantly higher than WT(1.79×107 /mL) and GKRNi(1.78×107 /mL) in the medium with exogenous glycerol; (2) the lipid content of GKOE in the medium with exogenous glycerol was up to 31.73%, which was much higher than WT(27.20%) and GKRNi(26.63%) in the medium with exogenous glycerol; (3) the fluorescence intensity of GKOE in the medium with exogenous glycerol was 16.26% and 17.83% higher than WT and GKRNi in the medium with exogenous glycerol by Nile red staining, respectively; (4) the total fatty acid yield of GKOE reached 0.052 mg/mL, which was 16.26% and 17.83% higher than WT and GKRNi in the medium with exogenous glycerol, and suitable for biodiesel development.

      Physics
      • The comparison of several time phase unwrapping methods

        zhaowenjing, chen wen jing, su xian yu

        2016,53(1):110-117, DOI:

        Abstract:

        Abstract: One of the key steps in 3D optical shape measurement based on the structured light projection is the phase unwrapping. The unwrapping issue about the complicated phase map is also the difficult step of the methods. The temporal phase unwrapping provide a useful tool to obtain the continuous phase map from the complicated wrapped phase map. Along the time direction, the temporal phase unwrapping is independently carried out from a 3D distribution demodulated from grating fringes with different pitches projected on the tested object. Therefore the problem of the error propagation in 2D phase unwrapping algorithm can be avoided. Followed by the comparison among the typical temporal phase unwrapping methods, including the negative exponential method, three pitches unwrapping method, three pitches heterodyne unwrapping method and its improved technique, a segmentation curve fitting method is used to improves the phase calculation accuracy. The computer simulations and experiments are carried out to verify that the phase error is deduced greatly through the segmentation curve fitting.

      • Effect of many-body interactions on the equation of state for Solid Argon

        LI Ji-Hong, ZHENG Xing-Rong, PENG Chang-Ning

        2016,53(1):131-137, DOI:

        Abstract:

        By using ab initio self-consistent field Hartree-Fork methods and atomic clusters expanding theory and employing Gamess program, two- and three-body interaction energies and the equation of state for solid argon in fcc crystal have been quantificationally calculated at the neighboring atomic distance R=2.40 -4.00 Å under high pressure. In addition, the convergence and truncation of atomic energy multi-body expansion are analyzed. It is found that two-body contribution to the cohesive energy is positive, while the three-body contribution is negative in solid argon under high pressure. At high pressure, only the consideration of the two-body contribution will overestimate the cohesive energy, hence it is necessary to introduce the three-body negative effects. The phenomenon of the experiment under 80GPa can be explained by considering the three-body potential.

      • Preparation and luminescent of Zn1-xMnxS nanoparticles

        WANG Qing, ZHANG Xu-Dong, WEI Zhi-Qiang, DAI Jian-Feng, LI Wei-Xue

        2016,53(1):152-156, DOI:

        Abstract:

        Mn-doped ZnS (ZnS:Mn) nanoparticles were prepared via hydrothermal method, studied effects on photoluminescence that different proportions Mn ions on Zn1-xMnxS. The composition, morphology, microstructure and optical property of the sample were characterized by X-ray diffraction (XRD).The results showed that the Zn1-xMnxS (x = 0,0.01,0.03,0.05,0.07,0.10) nanoparticles were spherical hexagonal structure of nanocrystalline, uniform particle size between 15 ~ 20nm. At room temperature, using the UV excitation wavelength is 350nm stimulate Zn1-xMnxS nanoparticles. Blue light emission which is produced by transition between shallow donor level and manganese t2 level can be obtained. Luminous intensity with the increasing amount of manganese-doped increased decreased after the first.And emission peaks have a mobile with the change of manganese-doped content. The reason may be related to sulfur vacancies which influence shallow donor level of ZnS. The proportion of zinc-manganese has an impact on the amount of sulfur vacancies and level position.

      • Pathology of the Fermionic Representation of Transverse Ising Model

        GUO Xiao-Ting, LI Peng

        2016,53(1):124-130, DOI:

        Abstract:

        When studying the quantum Ising chain in a transverse field, we usually transform the spin operators to fermion operators by applying the Jordan-Wigner transformation,i.e.we take it for granted that the spin model and corresponding fermionic model are equivalent naively. But deliberate treatment could reveal that the equivalence accompanies some delicate conditions.Redundant degrees of freedom should be projected out carefully, especially for finite length of chain. In this paper, we compare the two models in detail so as to find the conditions of equivalence of them,including the interaction, the boundary conditions, and odevity of the number of lattice sites.We also exemplify in detail how to project out the redundant degrees of freedom for the fermionic representation.

      Electronics and Information Science
      • Time Variation Characteristics and Assessment of Electromagnetic Environment in a Campus

        ZHANG Ming-An, ZHAO Xiang, XU Jin-Hai, YAN Li-Ping, HUANG Ka-Ma

        2016,53(1):93-97, DOI:

        Abstract:

        With the increasing complexity of the electromagnetic environment (EME), it is necessary to perform actual measurement and evaluation of the EME. Because of the temporal dynamic and random variation of the EME, time variation characteristics of the EME in a campus are considered in this paper. By choosing sampling points in different regions of the campus, respectively measuring electric field value of the sampling points during different time periods, and using statistical analysis of the measurement data, we get the figures of probability density distribution and time variation curve of the electric field. And then, the time variation characteristics of the actual EME are analyzed and discussed, the distributions of the EME in different regions are compared, as well as a brief evaluation of the electromagnetic radiation level in the campus is given.

      • A novel error resilience scheme for key frames in Wyner-Ziv video coding

        LIU Xiao-Juan, QING Lin-Bo, XIONG Shu-Hua, OU Xian-Feng

        2016,53(1):98-104, DOI:

        Abstract:

        In Wyner-Ziv video coding system, correct transimission and accurate decoding of key frames would affect the whole system performance directly. However, in wireless communication system, data loss of key frames often happened due to network failure, network congestion or other reasons. Data lossy seriously affect the decoding quality. This paper presents a novel solution for the data loss of key frames under the conditions of feedback channel. In the solution, by sending some extra Wyner-Ziv code streams along with the origin key frames, errors of the damaged image at the decoder can be high-efficiently corrected and restored. Simulation results show that the proposed solution could reconstruct the damaged image effectively, and the quality could be improved up to 20dB compared with typical error concealment method when the data loss ratio is 1%~20%. Furthermore, R-D performance of key frames could be improved even if the data loss ratio is very high.

      • Quantum authentication and key agreement scheme for SIP protocol

        YANG Guang, NIE Min, YANG Wu-Jun

        2016,53(1):87-92, DOI:

        Abstract:

        To overcome the shortcomings of current SIP safety scheme, such as the incapability to detect the wiretap and the vulnerability of the classical key system in case of quantum computation attack, this paper proposed a novel user authentication and key agreement scheme that combined quantum safe communication methods and SIP protocol. The SIP server prepared the three particle W states and distributed two of them to the SIP users. The random inserted particles were measured first to detect the wiretap; then the rest of the W states were operated and measured to authenticate the user. After that, every particle of the W states was measured randomly and the two SIP users got the initial conversation key according to the results of the effective measurements. The performance analysis shows our scheme is capable of resisting the impersonation attack and wiretap attack, thus can increase the safety of SIP protocol effectually.

      Computer Science
      • Image enhancement new model based on rational-order Partial Differential

        jiangwei, 李小龙, 刘亚威

        2016,53(1):47-53, DOI:

        Abstract:

        In order to sharpen the image edge features while enhancing texture detail, the image enhancement model based on space rational-order derivative was constructed by the effective combination of integer-order theory and fractional-order calculus theory to derive the differential expression of rational-order partial differential, and the numerical of enhanced model was achieved using rational-order partial differential mask operator. The experimental results showed that compared with the fractional-order differential method , the image enhancement model can be obtained the effect of continuous variation, that not only enhanced image texture well, but also improved the edge enhancement effect. Objectively, using image edge evaluation parameters of texture features such as information entropy and average gradient for quantitative analysis and experimental verification shown that the new model combined the advantages of integer and fractional order differential to make up for their lack of own and achieved a good image enhancement results.

      • Research of Internal Image Move-Copy Tampering Forensics Algorithm

        LI Ruo-Chen, JU Shen-Gen, ZHOU Gang, SHAO Shou-Ping

        2016,53(1):67-72, DOI:

        Abstract:

        According to the low robustness characteristics of image tampering with evidence of general move-copy algorithm, this paper proposes a new algorithm. Firstly, it uses the color invariant feature to detect feature points, which improves recall forensic results. Secondly, it uses the RGB color channel to expansion Surf descriptor, which increases the robustness of feature vectors. Then, it defines noise sensitivity coefficients to identify and deal with the image noise points and use sequential similarity detection algorithm to improve feature points registration. Finally, it uses Kendall coefficient and the four hypothesis to constrain the forensic results and get the final result. Experimental results show that the new algorithm reflects higher accuracy and strong robustness and it has strong ability of forensics.

      • Automatically generating visually pleasing Information Walls

        CHEN Rui, XIE Ying-Tao, HUA Li-Xian, CHEN Yu, LIN Tao

        2016,53(1):61-66, DOI:

        Abstract:

        Information Wall (IW) is a GUI composed of rectangular cells each contains various kinds of information. The design and implementation of IW are mainly in a manual way nowadays, which typically leads to less variability in appearance style and low efficiency. This paper develops a tool to automate the generation of text-IWs based on a genetic programming algorithm. A model, which evaluates the visual quality of text-IWs, is also proposed and incorporated in the algorithm to make generated IWs more visually pleasing. Test results show that the tool is able to efficiently produce good looking IWs with variable appearance styles. With the help of the tool, designer productivity could be improved by utilizing machine-generated prototypes.

      Biology
      • Construction and Application of RecET Recombination System in Zymomonas mobilis

        LI Tao, CAO-Qing-Hua, ZHANG Yi-Zheng, WU Yan, Tan Xue-Mei

        2016,53(1):209-214, DOI:

        Abstract:

        Zymomonas mobilis is a Gram-negative bacterium with excellent ethanol-producing capabilities. The ability of ethanol yield and substrate utilization can be further improved through genetic manipulations. In this study, in order to increase the recombination efficiency of foreign genes into chromosome of Z. mobilis, the RecET genes were cloned into the E. coli-Z. mobilis shuttle expression vector pSUZM3a, resulted in pSUZM3a-RecET. The adhA gene encoding the alcohol dehydrogenase and tetracycline resistant gene were used as the target and the selection marker genes, respectively. The PCR fragments of tetracycline resistant marker with 60bp flanking sequences homologous to adhA were electroporated directly into Z. mobilis ZM4 cells which harbored pSUZM3a-RecET. After the PCR analysis and DNA sequencing, it was found that the RecET-mediated recombination reaction resulted in adhA gene replaced by tetracycline resistant gene. The result showed that RecET system could make efficient, rapid targeted gene knock-out with only 60bp homologous arm in Z. mobilis.

      • Expression and Purification of Recombinant Chicken TSHβ, FSHβ, and LHβ Proteins

        YAN Zhen-Xin, MO Chun-Heng, WANG Ya-Jun, LI Juan

        2016,53(1):163-168, DOI:

        Abstract:

        Gonadotropin(Follicle-stimulating hormone (FSH), Luteinizing hormone (LH))and Thyroid-stimulating hormone (TSH) are glycoprotein secreted by pituitary. Gonadotropin plays a key role in the regulation of the development and function of vertebrate gonads. TSH participates in development and metabolism by stimulate the thyroid to secrete T4 and T3. In the study, we prepared the prokaryotic expression plasmids encoding chicken TSHβ subunit, FSHβ subunit and LHβ subunit and produced the three recombinant proteins using RT-PCR and molecular approaches. We also purified the recombinant proteins by Metal Ion Affinity Chromatography. This work paves the way for future preparation of polyclonal antibodies against chicken TSHβ, FSHβ and LHβ in rabbits.

      • Human elongation factor 1A1(eEF1A1) promotes drug tolerance in lung cancer cell line

        DING Mu-Ran, LIU Tao, LI Lin

        2016,53(1):198-202, DOI:

        Abstract:

        Human translational elongation factor 1A (eEF1A)is a multi-functional protein besides its roles in protein translation system. The protein expressional level of eEF1A is related to cell viability in oxidative stress and apoptotic process. Based on the knowledge of multifunctional roles of eEF1A and its relation to cell viability, we studied the possible effect of the isoform eEF1A1 on the drug resistance in cancer cell lines. The eukaryotic expression vector containing eEF1A1 sequence was constructed and was transiently transfected into human lung cancer cell line H1299. After verifying the expression of FLAG -eEF1A1, MTT assay was utilized to measure the cell viability of transfected H1299 after treatment by two common anti-cancer drugs. H1299 transfected with eEF1A1 showed enhanced drug tolerance to both taxol and adriamycin. Lung cancer cell highly expressing EEF1A1 behave more tolerance to antineoplastic drugs.

      • TAp73α-mediated cisplatin sensitivity was suppressed by miR-330 in colorectal cancer cell HCT116

        HUANG Ling, TONG Ying, XIAO Zhi-Xiong, ZHANG Yu-Jun

        2016,53(1):228-234, DOI:

        Abstract:

        The p53 family member p73 is a transcription factor involved in the regulation of cell cycle, apoptosis and cancer cell drug-resistant. Here we reported that knockdown of p73 sensitized HCT116 colorectal cancer cells to cisplatin treatment independent of p53. Hsa-miR-330 (miR-330) was identified to be able to directly repress the expression of TAp73α. Overexpression of miR-330 decreased the protein levels of endogenous TAp73α and phenocopied the effect of p73 knockdown. Restoration of TAp73α eliminated miR-330-induced chemosensitivity toward cisplatin. Our results demonstrated a novel function of TAp73α to impair cisplatin sensitivity in colorectal cancer cells which can be repressed by miR-330, thus provided an effective strategy for therapeutic treatment of cisplatin-resistant cancer cells.

      • Screening of Phospholipase D producing Strains and its transphosphatidylation activity

        SHI Chuang, WANG Yi-Ding, MA Qin-Qin, YUAN Xiang-Hua

        2016,53(1):215-220, DOI:

        Abstract:

        Using soybean Phospholipids as substrates,one strain which expressed Phospholipase was isolated from soil near oil mill ,the Phospholipase produce by SNUPLD-6 was identified which contain Phospholipase D . According to its mor -phological characteristics and ITS sequence , The strain SNUPLD-6 was identified as Geotrichum candidum. study on the Conditions for the growth of the bacteria and the PLD reaction conditions which expressed by SNUPLD-6. The results showed that its optimum growthtemperature is 30℃ .its optimum growth pH value is 6.0,its optimum carbon source is glucose,its optimum nitrogen source for the beef extract and peptone 50% each. the optimal fermentation time of phospholipase D producing is 3d, its optimum transphosphatidylation-temperature is 32℃. its optimum transphosphatidylation pH value is 6.0,its optimum reaction buffer for pH=5.5 0.02M HAc -NaAC buffer, its Optimal metalion activator as Ca2 +, Zn2 +.

      Mathematics
      • Positive solutions of third-order ∞-point boundary value problems

        GAO Ting, HAN Xiao-Ling

        2016,53(1):35-41, DOI:

        Abstract:

        In this paper, we study the existence of positive solutions to the third-order ∞-point boundary value problem u'''+ λa(t)f(u) = 0, t ∈ (0,1),u(0) = βu'(0), u(1) =∑αiu(ξi), u'(1) = 0,where λ > 0 is a parameter, ξi∈ (0,1), αi∈ [0,+∞], and satisfy ∑αi>1,0<∑αiξi(2−ξi) < 1. a(t) ∈ C([0,1],[0,∞)), f ∈ C([0,∞),[0,∞)).By using Krasnoselskii’s fixed point theorem in cones, we can obtain the existence of the positive solution and the eigenvalue intervals on which there exists a positive solution if f is either superlinear or sublinear.

      • Time Variation Characteristics and Assessment of Electromagnetic Environment in a Campus

        ZHANG Ming-An, ZHAO Xiang, XU Jin-Hai, YAN Li-Ping, HUANG Ka-Ma

        2016,53(1):93-97, DOI:

        Abstract:

        With the increasing complexity of the electromagnetic environment (EME), it is necessary to perform actual measurement and evaluation of the EME. Because of the temporal dynamic and random variation of the EME, time variation characteristics of the EME in a campus are considered in this paper. By choosing sampling points in different regions of the campus, respectively measuring electric field value of the sampling points during different time periods, and using statistical analysis of the measurement data, we get the figures of probability density distribution and time variation curve of the electric field. And then, the time variation characteristics of the actual EME are analyzed and discussed, the distributions of the EME in different regions are compared, as well as a brief evaluation of the electromagnetic radiation level in the campus is given.

      • Image enhancement new model based on rational-order Partial Differential

        jiangwei, 李小龙, 刘亚威

        2016,53(1):47-53, DOI:

        Abstract:

        In order to sharpen the image edge features while enhancing texture detail, the image enhancement model based on space rational-order derivative was constructed by the effective combination of integer-order theory and fractional-order calculus theory to derive the differential expression of rational-order partial differential, and the numerical of enhanced model was achieved using rational-order partial differential mask operator. The experimental results showed that compared with the fractional-order differential method , the image enhancement model can be obtained the effect of continuous variation, that not only enhanced image texture well, but also improved the edge enhancement effect. Objectively, using image edge evaluation parameters of texture features such as information entropy and average gradient for quantitative analysis and experimental verification shown that the new model combined the advantages of integer and fractional order differential to make up for their lack of own and achieved a good image enhancement results.

      • Construction and Application of RecET Recombination System in Zymomonas mobilis

        LI Tao, CAO-Qing-Hua, ZHANG Yi-Zheng, WU Yan, Tan Xue-Mei

        2016,53(1):209-214, DOI:

        Abstract:

        Zymomonas mobilis is a Gram-negative bacterium with excellent ethanol-producing capabilities. The ability of ethanol yield and substrate utilization can be further improved through genetic manipulations. In this study, in order to increase the recombination efficiency of foreign genes into chromosome of Z. mobilis, the RecET genes were cloned into the E. coli-Z. mobilis shuttle expression vector pSUZM3a, resulted in pSUZM3a-RecET. The adhA gene encoding the alcohol dehydrogenase and tetracycline resistant gene were used as the target and the selection marker genes, respectively. The PCR fragments of tetracycline resistant marker with 60bp flanking sequences homologous to adhA were electroporated directly into Z. mobilis ZM4 cells which harbored pSUZM3a-RecET. After the PCR analysis and DNA sequencing, it was found that the RecET-mediated recombination reaction resulted in adhA gene replaced by tetracycline resistant gene. The result showed that RecET system could make efficient, rapid targeted gene knock-out with only 60bp homologous arm in Z. mobilis.

      • Expression and Purification of Recombinant Chicken TSHβ, FSHβ, and LHβ Proteins

        YAN Zhen-Xin, MO Chun-Heng, WANG Ya-Jun, LI Juan

        2016,53(1):163-168, DOI:

        Abstract:

        Gonadotropin(Follicle-stimulating hormone (FSH), Luteinizing hormone (LH))and Thyroid-stimulating hormone (TSH) are glycoprotein secreted by pituitary. Gonadotropin plays a key role in the regulation of the development and function of vertebrate gonads. TSH participates in development and metabolism by stimulate the thyroid to secrete T4 and T3. In the study, we prepared the prokaryotic expression plasmids encoding chicken TSHβ subunit, FSHβ subunit and LHβ subunit and produced the three recombinant proteins using RT-PCR and molecular approaches. We also purified the recombinant proteins by Metal Ion Affinity Chromatography. This work paves the way for future preparation of polyclonal antibodies against chicken TSHβ, FSHβ and LHβ in rabbits.

      • Human elongation factor 1A1(eEF1A1) promotes drug tolerance in lung cancer cell line

        DING Mu-Ran, LIU Tao, LI Lin

        2016,53(1):198-202, DOI:

        Abstract:

        Human translational elongation factor 1A (eEF1A)is a multi-functional protein besides its roles in protein translation system. The protein expressional level of eEF1A is related to cell viability in oxidative stress and apoptotic process. Based on the knowledge of multifunctional roles of eEF1A and its relation to cell viability, we studied the possible effect of the isoform eEF1A1 on the drug resistance in cancer cell lines. The eukaryotic expression vector containing eEF1A1 sequence was constructed and was transiently transfected into human lung cancer cell line H1299. After verifying the expression of FLAG -eEF1A1, MTT assay was utilized to measure the cell viability of transfected H1299 after treatment by two common anti-cancer drugs. H1299 transfected with eEF1A1 showed enhanced drug tolerance to both taxol and adriamycin. Lung cancer cell highly expressing EEF1A1 behave more tolerance to antineoplastic drugs.

      • Research of Internal Image Move-Copy Tampering Forensics Algorithm

        LI Ruo-Chen, JU Shen-Gen, ZHOU Gang, SHAO Shou-Ping

        2016,53(1):67-72, DOI:

        Abstract:

        According to the low robustness characteristics of image tampering with evidence of general move-copy algorithm, this paper proposes a new algorithm. Firstly, it uses the color invariant feature to detect feature points, which improves recall forensic results. Secondly, it uses the RGB color channel to expansion Surf descriptor, which increases the robustness of feature vectors. Then, it defines noise sensitivity coefficients to identify and deal with the image noise points and use sequential similarity detection algorithm to improve feature points registration. Finally, it uses Kendall coefficient and the four hypothesis to constrain the forensic results and get the final result. Experimental results show that the new algorithm reflects higher accuracy and strong robustness and it has strong ability of forensics.

      • A novel error resilience scheme for key frames in Wyner-Ziv video coding

        LIU Xiao-Juan, QING Lin-Bo, XIONG Shu-Hua, OU Xian-Feng

        2016,53(1):98-104, DOI:

        Abstract:

        In Wyner-Ziv video coding system, correct transimission and accurate decoding of key frames would affect the whole system performance directly. However, in wireless communication system, data loss of key frames often happened due to network failure, network congestion or other reasons. Data lossy seriously affect the decoding quality. This paper presents a novel solution for the data loss of key frames under the conditions of feedback channel. In the solution, by sending some extra Wyner-Ziv code streams along with the origin key frames, errors of the damaged image at the decoder can be high-efficiently corrected and restored. Simulation results show that the proposed solution could reconstruct the damaged image effectively, and the quality could be improved up to 20dB compared with typical error concealment method when the data loss ratio is 1%~20%. Furthermore, R-D performance of key frames could be improved even if the data loss ratio is very high.

      • Positive solutions of third-order ∞-point boundary value problems

        GAO Ting, HAN Xiao-Ling

        2016,53(1):35-41, DOI:

        Abstract:

        In this paper, we study the existence of positive solutions to the third-order ∞-point boundary value problem u'''+ λa(t)f(u) = 0, t ∈ (0,1),u(0) = βu'(0), u(1) =∑αiu(ξi), u'(1) = 0,where λ > 0 is a parameter, ξi∈ (0,1), αi∈ [0,+∞], and satisfy ∑αi>1,0<∑αiξi(2−ξi) < 1. a(t) ∈ C([0,1],[0,∞)), f ∈ C([0,∞),[0,∞)).By using Krasnoselskii’s fixed point theorem in cones, we can obtain the existence of the positive solution and the eigenvalue intervals on which there exists a positive solution if f is either superlinear or sublinear.

      • TAp73α-mediated cisplatin sensitivity was suppressed by miR-330 in colorectal cancer cell HCT116

        HUANG Ling, TONG Ying, XIAO Zhi-Xiong, ZHANG Yu-Jun

        2016,53(1):228-234, DOI:

        Abstract:

        The p53 family member p73 is a transcription factor involved in the regulation of cell cycle, apoptosis and cancer cell drug-resistant. Here we reported that knockdown of p73 sensitized HCT116 colorectal cancer cells to cisplatin treatment independent of p53. Hsa-miR-330 (miR-330) was identified to be able to directly repress the expression of TAp73α. Overexpression of miR-330 decreased the protein levels of endogenous TAp73α and phenocopied the effect of p73 knockdown. Restoration of TAp73α eliminated miR-330-induced chemosensitivity toward cisplatin. Our results demonstrated a novel function of TAp73α to impair cisplatin sensitivity in colorectal cancer cells which can be repressed by miR-330, thus provided an effective strategy for therapeutic treatment of cisplatin-resistant cancer cells.

      • Automatically generating visually pleasing Information Walls

        CHEN Rui, XIE Ying-Tao, HUA Li-Xian, CHEN Yu, LIN Tao

        2016,53(1):61-66, DOI:

        Abstract:

        Information Wall (IW) is a GUI composed of rectangular cells each contains various kinds of information. The design and implementation of IW are mainly in a manual way nowadays, which typically leads to less variability in appearance style and low efficiency. This paper develops a tool to automate the generation of text-IWs based on a genetic programming algorithm. A model, which evaluates the visual quality of text-IWs, is also proposed and incorporated in the algorithm to make generated IWs more visually pleasing. Test results show that the tool is able to efficiently produce good looking IWs with variable appearance styles. With the help of the tool, designer productivity could be improved by utilizing machine-generated prototypes.

      • Quantum authentication and key agreement scheme for SIP protocol

        YANG Guang, NIE Min, YANG Wu-Jun

        2016,53(1):87-92, DOI:

        Abstract:

        To overcome the shortcomings of current SIP safety scheme, such as the incapability to detect the wiretap and the vulnerability of the classical key system in case of quantum computation attack, this paper proposed a novel user authentication and key agreement scheme that combined quantum safe communication methods and SIP protocol. The SIP server prepared the three particle W states and distributed two of them to the SIP users. The random inserted particles were measured first to detect the wiretap; then the rest of the W states were operated and measured to authenticate the user. After that, every particle of the W states was measured randomly and the two SIP users got the initial conversation key according to the results of the effective measurements. The performance analysis shows our scheme is capable of resisting the impersonation attack and wiretap attack, thus can increase the safety of SIP protocol effectually.

      • Screening of Phospholipase D producing Strains and its transphosphatidylation activity

        SHI Chuang, WANG Yi-Ding, MA Qin-Qin, YUAN Xiang-Hua

        2016,53(1):215-220, DOI:

        Abstract:

        Using soybean Phospholipids as substrates,one strain which expressed Phospholipase was isolated from soil near oil mill ,the Phospholipase produce by SNUPLD-6 was identified which contain Phospholipase D . According to its mor -phological characteristics and ITS sequence , The strain SNUPLD-6 was identified as Geotrichum candidum. study on the Conditions for the growth of the bacteria and the PLD reaction conditions which expressed by SNUPLD-6. The results showed that its optimum growthtemperature is 30℃ .its optimum growth pH value is 6.0,its optimum carbon source is glucose,its optimum nitrogen source for the beef extract and peptone 50% each. the optimal fermentation time of phospholipase D producing is 3d, its optimum transphosphatidylation-temperature is 32℃. its optimum transphosphatidylation pH value is 6.0,its optimum reaction buffer for pH=5.5 0.02M HAc -NaAC buffer, its Optimal metalion activator as Ca2 +, Zn2 +.

      • The comparison of several time phase unwrapping methods

        zhaowenjing, chen wen jing, su xian yu

        2016,53(1):110-117, DOI:

        Abstract:

        Abstract: One of the key steps in 3D optical shape measurement based on the structured light projection is the phase unwrapping. The unwrapping issue about the complicated phase map is also the difficult step of the methods. The temporal phase unwrapping provide a useful tool to obtain the continuous phase map from the complicated wrapped phase map. Along the time direction, the temporal phase unwrapping is independently carried out from a 3D distribution demodulated from grating fringes with different pitches projected on the tested object. Therefore the problem of the error propagation in 2D phase unwrapping algorithm can be avoided. Followed by the comparison among the typical temporal phase unwrapping methods, including the negative exponential method, three pitches unwrapping method, three pitches heterodyne unwrapping method and its improved technique, a segmentation curve fitting method is used to improves the phase calculation accuracy. The computer simulations and experiments are carried out to verify that the phase error is deduced greatly through the segmentation curve fitting.

      • Image enhancement new model based on rational-order Partial Differential

        jiangwei, 李小龙, 刘亚威

        2016,53(1):47-53, DOI:

        Abstract:

        In order to sharpen the image edge features while enhancing texture detail, the image enhancement model based on space rational-order derivative was constructed by the effective combination of integer-order theory and fractional-order calculus theory to derive the differential expression of rational-order partial differential, and the numerical of enhanced model was achieved using rational-order partial differential mask operator. The experimental results showed that compared with the fractional-order differential method , the image enhancement model can be obtained the effect of continuous variation, that not only enhanced image texture well, but also improved the edge enhancement effect. Objectively, using image edge evaluation parameters of texture features such as information entropy and average gradient for quantitative analysis and experimental verification shown that the new model combined the advantages of integer and fractional order differential to make up for their lack of own and achieved a good image enhancement results.

      • Construction and Application of RecET Recombination System in Zymomonas mobilis

        LI Tao, CAO-Qing-Hua, ZHANG Yi-Zheng, WU Yan, Tan Xue-Mei

        2016,53(1):209-214, DOI:

        Abstract:

        Zymomonas mobilis is a Gram-negative bacterium with excellent ethanol-producing capabilities. The ability of ethanol yield and substrate utilization can be further improved through genetic manipulations. In this study, in order to increase the recombination efficiency of foreign genes into chromosome of Z. mobilis, the RecET genes were cloned into the E. coli-Z. mobilis shuttle expression vector pSUZM3a, resulted in pSUZM3a-RecET. The adhA gene encoding the alcohol dehydrogenase and tetracycline resistant gene were used as the target and the selection marker genes, respectively. The PCR fragments of tetracycline resistant marker with 60bp flanking sequences homologous to adhA were electroporated directly into Z. mobilis ZM4 cells which harbored pSUZM3a-RecET. After the PCR analysis and DNA sequencing, it was found that the RecET-mediated recombination reaction resulted in adhA gene replaced by tetracycline resistant gene. The result showed that RecET system could make efficient, rapid targeted gene knock-out with only 60bp homologous arm in Z. mobilis.

      • Expression and Purification of Recombinant Chicken TSHβ, FSHβ, and LHβ Proteins

        YAN Zhen-Xin, MO Chun-Heng, WANG Ya-Jun, LI Juan

        2016,53(1):163-168, DOI:

        Abstract:

        Gonadotropin(Follicle-stimulating hormone (FSH), Luteinizing hormone (LH))and Thyroid-stimulating hormone (TSH) are glycoprotein secreted by pituitary. Gonadotropin plays a key role in the regulation of the development and function of vertebrate gonads. TSH participates in development and metabolism by stimulate the thyroid to secrete T4 and T3. In the study, we prepared the prokaryotic expression plasmids encoding chicken TSHβ subunit, FSHβ subunit and LHβ subunit and produced the three recombinant proteins using RT-PCR and molecular approaches. We also purified the recombinant proteins by Metal Ion Affinity Chromatography. This work paves the way for future preparation of polyclonal antibodies against chicken TSHβ, FSHβ and LHβ in rabbits.

      • Human elongation factor 1A1(eEF1A1) promotes drug tolerance in lung cancer cell line

        DING Mu-Ran, LIU Tao, LI Lin

        2016,53(1):198-202, DOI:

        Abstract:

        Human translational elongation factor 1A (eEF1A)is a multi-functional protein besides its roles in protein translation system. The protein expressional level of eEF1A is related to cell viability in oxidative stress and apoptotic process. Based on the knowledge of multifunctional roles of eEF1A and its relation to cell viability, we studied the possible effect of the isoform eEF1A1 on the drug resistance in cancer cell lines. The eukaryotic expression vector containing eEF1A1 sequence was constructed and was transiently transfected into human lung cancer cell line H1299. After verifying the expression of FLAG -eEF1A1, MTT assay was utilized to measure the cell viability of transfected H1299 after treatment by two common anti-cancer drugs. H1299 transfected with eEF1A1 showed enhanced drug tolerance to both taxol and adriamycin. Lung cancer cell highly expressing EEF1A1 behave more tolerance to antineoplastic drugs.

      • Research of Internal Image Move-Copy Tampering Forensics Algorithm

        LI Ruo-Chen, JU Shen-Gen, ZHOU Gang, SHAO Shou-Ping

        2016,53(1):67-72, DOI:

        Abstract:

        According to the low robustness characteristics of image tampering with evidence of general move-copy algorithm, this paper proposes a new algorithm. Firstly, it uses the color invariant feature to detect feature points, which improves recall forensic results. Secondly, it uses the RGB color channel to expansion Surf descriptor, which increases the robustness of feature vectors. Then, it defines noise sensitivity coefficients to identify and deal with the image noise points and use sequential similarity detection algorithm to improve feature points registration. Finally, it uses Kendall coefficient and the four hypothesis to constrain the forensic results and get the final result. Experimental results show that the new algorithm reflects higher accuracy and strong robustness and it has strong ability of forensics.

      • Positive solutions of third-order ∞-point boundary value problems

        GAO Ting, HAN Xiao-Ling

        2016,53(1):35-41, DOI:

        Abstract:

        In this paper, we study the existence of positive solutions to the third-order ∞-point boundary value problem u'''+ λa(t)f(u) = 0, t ∈ (0,1),u(0) = βu'(0), u(1) =∑αiu(ξi), u'(1) = 0,where λ > 0 is a parameter, ξi∈ (0,1), αi∈ [0,+∞], and satisfy ∑αi>1,0<∑αiξi(2−ξi) < 1. a(t) ∈ C([0,1],[0,∞)), f ∈ C([0,∞),[0,∞)).By using Krasnoselskii’s fixed point theorem in cones, we can obtain the existence of the positive solution and the eigenvalue intervals on which there exists a positive solution if f is either superlinear or sublinear.

      • TAp73α-mediated cisplatin sensitivity was suppressed by miR-330 in colorectal cancer cell HCT116

        HUANG Ling, TONG Ying, XIAO Zhi-Xiong, ZHANG Yu-Jun

        2016,53(1):228-234, DOI:

        Abstract:

        The p53 family member p73 is a transcription factor involved in the regulation of cell cycle, apoptosis and cancer cell drug-resistant. Here we reported that knockdown of p73 sensitized HCT116 colorectal cancer cells to cisplatin treatment independent of p53. Hsa-miR-330 (miR-330) was identified to be able to directly repress the expression of TAp73α. Overexpression of miR-330 decreased the protein levels of endogenous TAp73α and phenocopied the effect of p73 knockdown. Restoration of TAp73α eliminated miR-330-induced chemosensitivity toward cisplatin. Our results demonstrated a novel function of TAp73α to impair cisplatin sensitivity in colorectal cancer cells which can be repressed by miR-330, thus provided an effective strategy for therapeutic treatment of cisplatin-resistant cancer cells.

      • Automatically generating visually pleasing Information Walls

        CHEN Rui, XIE Ying-Tao, HUA Li-Xian, CHEN Yu, LIN Tao

        2016,53(1):61-66, DOI:

        Abstract:

        Information Wall (IW) is a GUI composed of rectangular cells each contains various kinds of information. The design and implementation of IW are mainly in a manual way nowadays, which typically leads to less variability in appearance style and low efficiency. This paper develops a tool to automate the generation of text-IWs based on a genetic programming algorithm. A model, which evaluates the visual quality of text-IWs, is also proposed and incorporated in the algorithm to make generated IWs more visually pleasing. Test results show that the tool is able to efficiently produce good looking IWs with variable appearance styles. With the help of the tool, designer productivity could be improved by utilizing machine-generated prototypes.

      • Effect of many-body interactions on the equation of state for Solid Argon

        LI Ji-Hong, ZHENG Xing-Rong, PENG Chang-Ning

        2016,53(1):131-137, DOI:

        Abstract:

        By using ab initio self-consistent field Hartree-Fork methods and atomic clusters expanding theory and employing Gamess program, two- and three-body interaction energies and the equation of state for solid argon in fcc crystal have been quantificationally calculated at the neighboring atomic distance R=2.40 -4.00 Å under high pressure. In addition, the convergence and truncation of atomic energy multi-body expansion are analyzed. It is found that two-body contribution to the cohesive energy is positive, while the three-body contribution is negative in solid argon under high pressure. At high pressure, only the consideration of the two-body contribution will overestimate the cohesive energy, hence it is necessary to introduce the three-body negative effects. The phenomenon of the experiment under 80GPa can be explained by considering the three-body potential.

      • Preparation and luminescent of Zn1-xMnxS nanoparticles

        WANG Qing, ZHANG Xu-Dong, WEI Zhi-Qiang, DAI Jian-Feng, LI Wei-Xue

        2016,53(1):152-156, DOI:

        Abstract:

        Mn-doped ZnS (ZnS:Mn) nanoparticles were prepared via hydrothermal method, studied effects on photoluminescence that different proportions Mn ions on Zn1-xMnxS. The composition, morphology, microstructure and optical property of the sample were characterized by X-ray diffraction (XRD).The results showed that the Zn1-xMnxS (x = 0,0.01,0.03,0.05,0.07,0.10) nanoparticles were spherical hexagonal structure of nanocrystalline, uniform particle size between 15 ~ 20nm. At room temperature, using the UV excitation wavelength is 350nm stimulate Zn1-xMnxS nanoparticles. Blue light emission which is produced by transition between shallow donor level and manganese t2 level can be obtained. Luminous intensity with the increasing amount of manganese-doped increased decreased after the first.And emission peaks have a mobile with the change of manganese-doped content. The reason may be related to sulfur vacancies which influence shallow donor level of ZnS. The proportion of zinc-manganese has an impact on the amount of sulfur vacancies and level position.

      • Screening of Phospholipase D producing Strains and its transphosphatidylation activity

        SHI Chuang, WANG Yi-Ding, MA Qin-Qin, YUAN Xiang-Hua

        2016,53(1):215-220, DOI:

        Abstract:

        Using soybean Phospholipids as substrates,one strain which expressed Phospholipase was isolated from soil near oil mill ,the Phospholipase produce by SNUPLD-6 was identified which contain Phospholipase D . According to its mor -phological characteristics and ITS sequence , The strain SNUPLD-6 was identified as Geotrichum candidum. study on the Conditions for the growth of the bacteria and the PLD reaction conditions which expressed by SNUPLD-6. The results showed that its optimum growthtemperature is 30℃ .its optimum growth pH value is 6.0,its optimum carbon source is glucose,its optimum nitrogen source for the beef extract and peptone 50% each. the optimal fermentation time of phospholipase D producing is 3d, its optimum transphosphatidylation-temperature is 32℃. its optimum transphosphatidylation pH value is 6.0,its optimum reaction buffer for pH=5.5 0.02M HAc -NaAC buffer, its Optimal metalion activator as Ca2 +, Zn2 +.

      • Pathology of the Fermionic Representation of Transverse Ising Model

        GUO Xiao-Ting, LI Peng

        2016,53(1):124-130, DOI:

        Abstract:

        When studying the quantum Ising chain in a transverse field, we usually transform the spin operators to fermion operators by applying the Jordan-Wigner transformation,i.e.we take it for granted that the spin model and corresponding fermionic model are equivalent naively. But deliberate treatment could reveal that the equivalence accompanies some delicate conditions.Redundant degrees of freedom should be projected out carefully, especially for finite length of chain. In this paper, we compare the two models in detail so as to find the conditions of equivalence of them,including the interaction, the boundary conditions, and odevity of the number of lattice sites.We also exemplify in detail how to project out the redundant degrees of freedom for the fermionic representation.

      • The comparison of several time phase unwrapping methods

        zhaowenjing, chen wen jing, su xian yu

        2016,53(1):110-117, DOI:

        Abstract:

        Abstract: One of the key steps in 3D optical shape measurement based on the structured light projection is the phase unwrapping. The unwrapping issue about the complicated phase map is also the difficult step of the methods. The temporal phase unwrapping provide a useful tool to obtain the continuous phase map from the complicated wrapped phase map. Along the time direction, the temporal phase unwrapping is independently carried out from a 3D distribution demodulated from grating fringes with different pitches projected on the tested object. Therefore the problem of the error propagation in 2D phase unwrapping algorithm can be avoided. Followed by the comparison among the typical temporal phase unwrapping methods, including the negative exponential method, three pitches unwrapping method, three pitches heterodyne unwrapping method and its improved technique, a segmentation curve fitting method is used to improves the phase calculation accuracy. The computer simulations and experiments are carried out to verify that the phase error is deduced greatly through the segmentation curve fitting.

      • Time Variation Characteristics and Assessment of Electromagnetic Environment in a Campus

        ZHANG Ming-An, ZHAO Xiang, XU Jin-Hai, YAN Li-Ping, HUANG Ka-Ma

        2016,53(1):93-97, DOI:

        Abstract:

        With the increasing complexity of the electromagnetic environment (EME), it is necessary to perform actual measurement and evaluation of the EME. Because of the temporal dynamic and random variation of the EME, time variation characteristics of the EME in a campus are considered in this paper. By choosing sampling points in different regions of the campus, respectively measuring electric field value of the sampling points during different time periods, and using statistical analysis of the measurement data, we get the figures of probability density distribution and time variation curve of the electric field. And then, the time variation characteristics of the actual EME are analyzed and discussed, the distributions of the EME in different regions are compared, as well as a brief evaluation of the electromagnetic radiation level in the campus is given.

      • Construction and Application of RecET Recombination System in Zymomonas mobilis

        LI Tao, CAO-Qing-Hua, ZHANG Yi-Zheng, WU Yan, Tan Xue-Mei

        2016,53(1):209-214, DOI:

        Abstract:

        Zymomonas mobilis is a Gram-negative bacterium with excellent ethanol-producing capabilities. The ability of ethanol yield and substrate utilization can be further improved through genetic manipulations. In this study, in order to increase the recombination efficiency of foreign genes into chromosome of Z. mobilis, the RecET genes were cloned into the E. coli-Z. mobilis shuttle expression vector pSUZM3a, resulted in pSUZM3a-RecET. The adhA gene encoding the alcohol dehydrogenase and tetracycline resistant gene were used as the target and the selection marker genes, respectively. The PCR fragments of tetracycline resistant marker with 60bp flanking sequences homologous to adhA were electroporated directly into Z. mobilis ZM4 cells which harbored pSUZM3a-RecET. After the PCR analysis and DNA sequencing, it was found that the RecET-mediated recombination reaction resulted in adhA gene replaced by tetracycline resistant gene. The result showed that RecET system could make efficient, rapid targeted gene knock-out with only 60bp homologous arm in Z. mobilis.

      • Expression and Purification of Recombinant Chicken TSHβ, FSHβ, and LHβ Proteins

        YAN Zhen-Xin, MO Chun-Heng, WANG Ya-Jun, LI Juan

        2016,53(1):163-168, DOI:

        Abstract:

        Gonadotropin(Follicle-stimulating hormone (FSH), Luteinizing hormone (LH))and Thyroid-stimulating hormone (TSH) are glycoprotein secreted by pituitary. Gonadotropin plays a key role in the regulation of the development and function of vertebrate gonads. TSH participates in development and metabolism by stimulate the thyroid to secrete T4 and T3. In the study, we prepared the prokaryotic expression plasmids encoding chicken TSHβ subunit, FSHβ subunit and LHβ subunit and produced the three recombinant proteins using RT-PCR and molecular approaches. We also purified the recombinant proteins by Metal Ion Affinity Chromatography. This work paves the way for future preparation of polyclonal antibodies against chicken TSHβ, FSHβ and LHβ in rabbits.

      • Human elongation factor 1A1(eEF1A1) promotes drug tolerance in lung cancer cell line

        DING Mu-Ran, LIU Tao, LI Lin

        2016,53(1):198-202, DOI:

        Abstract:

        Human translational elongation factor 1A (eEF1A)is a multi-functional protein besides its roles in protein translation system. The protein expressional level of eEF1A is related to cell viability in oxidative stress and apoptotic process. Based on the knowledge of multifunctional roles of eEF1A and its relation to cell viability, we studied the possible effect of the isoform eEF1A1 on the drug resistance in cancer cell lines. The eukaryotic expression vector containing eEF1A1 sequence was constructed and was transiently transfected into human lung cancer cell line H1299. After verifying the expression of FLAG -eEF1A1, MTT assay was utilized to measure the cell viability of transfected H1299 after treatment by two common anti-cancer drugs. H1299 transfected with eEF1A1 showed enhanced drug tolerance to both taxol and adriamycin. Lung cancer cell highly expressing EEF1A1 behave more tolerance to antineoplastic drugs.

      • A novel error resilience scheme for key frames in Wyner-Ziv video coding

        LIU Xiao-Juan, QING Lin-Bo, XIONG Shu-Hua, OU Xian-Feng

        2016,53(1):98-104, DOI:

        Abstract:

        In Wyner-Ziv video coding system, correct transimission and accurate decoding of key frames would affect the whole system performance directly. However, in wireless communication system, data loss of key frames often happened due to network failure, network congestion or other reasons. Data lossy seriously affect the decoding quality. This paper presents a novel solution for the data loss of key frames under the conditions of feedback channel. In the solution, by sending some extra Wyner-Ziv code streams along with the origin key frames, errors of the damaged image at the decoder can be high-efficiently corrected and restored. Simulation results show that the proposed solution could reconstruct the damaged image effectively, and the quality could be improved up to 20dB compared with typical error concealment method when the data loss ratio is 1%~20%. Furthermore, R-D performance of key frames could be improved even if the data loss ratio is very high.

      • Positive solutions of third-order ∞-point boundary value problems

        GAO Ting, HAN Xiao-Ling

        2016,53(1):35-41, DOI:

        Abstract:

        In this paper, we study the existence of positive solutions to the third-order ∞-point boundary value problem u'''+ λa(t)f(u) = 0, t ∈ (0,1),u(0) = βu'(0), u(1) =∑αiu(ξi), u'(1) = 0,where λ > 0 is a parameter, ξi∈ (0,1), αi∈ [0,+∞], and satisfy ∑αi>1,0<∑αiξi(2−ξi) < 1. a(t) ∈ C([0,1],[0,∞)), f ∈ C([0,∞),[0,∞)).By using Krasnoselskii’s fixed point theorem in cones, we can obtain the existence of the positive solution and the eigenvalue intervals on which there exists a positive solution if f is either superlinear or sublinear.

      • TAp73α-mediated cisplatin sensitivity was suppressed by miR-330 in colorectal cancer cell HCT116

        HUANG Ling, TONG Ying, XIAO Zhi-Xiong, ZHANG Yu-Jun

        2016,53(1):228-234, DOI:

        Abstract:

        The p53 family member p73 is a transcription factor involved in the regulation of cell cycle, apoptosis and cancer cell drug-resistant. Here we reported that knockdown of p73 sensitized HCT116 colorectal cancer cells to cisplatin treatment independent of p53. Hsa-miR-330 (miR-330) was identified to be able to directly repress the expression of TAp73α. Overexpression of miR-330 decreased the protein levels of endogenous TAp73α and phenocopied the effect of p73 knockdown. Restoration of TAp73α eliminated miR-330-induced chemosensitivity toward cisplatin. Our results demonstrated a novel function of TAp73α to impair cisplatin sensitivity in colorectal cancer cells which can be repressed by miR-330, thus provided an effective strategy for therapeutic treatment of cisplatin-resistant cancer cells.

      • Effect of many-body interactions on the equation of state for Solid Argon

        LI Ji-Hong, ZHENG Xing-Rong, PENG Chang-Ning

        2016,53(1):131-137, DOI:

        Abstract:

        By using ab initio self-consistent field Hartree-Fork methods and atomic clusters expanding theory and employing Gamess program, two- and three-body interaction energies and the equation of state for solid argon in fcc crystal have been quantificationally calculated at the neighboring atomic distance R=2.40 -4.00 Å under high pressure. In addition, the convergence and truncation of atomic energy multi-body expansion are analyzed. It is found that two-body contribution to the cohesive energy is positive, while the three-body contribution is negative in solid argon under high pressure. At high pressure, only the consideration of the two-body contribution will overestimate the cohesive energy, hence it is necessary to introduce the three-body negative effects. The phenomenon of the experiment under 80GPa can be explained by considering the three-body potential.

      • Quantum authentication and key agreement scheme for SIP protocol

        YANG Guang, NIE Min, YANG Wu-Jun

        2016,53(1):87-92, DOI:

        Abstract:

        To overcome the shortcomings of current SIP safety scheme, such as the incapability to detect the wiretap and the vulnerability of the classical key system in case of quantum computation attack, this paper proposed a novel user authentication and key agreement scheme that combined quantum safe communication methods and SIP protocol. The SIP server prepared the three particle W states and distributed two of them to the SIP users. The random inserted particles were measured first to detect the wiretap; then the rest of the W states were operated and measured to authenticate the user. After that, every particle of the W states was measured randomly and the two SIP users got the initial conversation key according to the results of the effective measurements. The performance analysis shows our scheme is capable of resisting the impersonation attack and wiretap attack, thus can increase the safety of SIP protocol effectually.

      • Preparation and luminescent of Zn1-xMnxS nanoparticles

        WANG Qing, ZHANG Xu-Dong, WEI Zhi-Qiang, DAI Jian-Feng, LI Wei-Xue

        2016,53(1):152-156, DOI:

        Abstract:

        Mn-doped ZnS (ZnS:Mn) nanoparticles were prepared via hydrothermal method, studied effects on photoluminescence that different proportions Mn ions on Zn1-xMnxS. The composition, morphology, microstructure and optical property of the sample were characterized by X-ray diffraction (XRD).The results showed that the Zn1-xMnxS (x = 0,0.01,0.03,0.05,0.07,0.10) nanoparticles were spherical hexagonal structure of nanocrystalline, uniform particle size between 15 ~ 20nm. At room temperature, using the UV excitation wavelength is 350nm stimulate Zn1-xMnxS nanoparticles. Blue light emission which is produced by transition between shallow donor level and manganese t2 level can be obtained. Luminous intensity with the increasing amount of manganese-doped increased decreased after the first.And emission peaks have a mobile with the change of manganese-doped content. The reason may be related to sulfur vacancies which influence shallow donor level of ZnS. The proportion of zinc-manganese has an impact on the amount of sulfur vacancies and level position.

      • Screening of Phospholipase D producing Strains and its transphosphatidylation activity

        SHI Chuang, WANG Yi-Ding, MA Qin-Qin, YUAN Xiang-Hua

        2016,53(1):215-220, DOI:

        Abstract:

        Using soybean Phospholipids as substrates,one strain which expressed Phospholipase was isolated from soil near oil mill ,the Phospholipase produce by SNUPLD-6 was identified which contain Phospholipase D . According to its mor -phological characteristics and ITS sequence , The strain SNUPLD-6 was identified as Geotrichum candidum. study on the Conditions for the growth of the bacteria and the PLD reaction conditions which expressed by SNUPLD-6. The results showed that its optimum growthtemperature is 30℃ .its optimum growth pH value is 6.0,its optimum carbon source is glucose,its optimum nitrogen source for the beef extract and peptone 50% each. the optimal fermentation time of phospholipase D producing is 3d, its optimum transphosphatidylation-temperature is 32℃. its optimum transphosphatidylation pH value is 6.0,its optimum reaction buffer for pH=5.5 0.02M HAc -NaAC buffer, its Optimal metalion activator as Ca2 +, Zn2 +.

      • Pathology of the Fermionic Representation of Transverse Ising Model

        GUO Xiao-Ting, LI Peng

        2016,53(1):124-130, DOI:

        Abstract:

        When studying the quantum Ising chain in a transverse field, we usually transform the spin operators to fermion operators by applying the Jordan-Wigner transformation,i.e.we take it for granted that the spin model and corresponding fermionic model are equivalent naively. But deliberate treatment could reveal that the equivalence accompanies some delicate conditions.Redundant degrees of freedom should be projected out carefully, especially for finite length of chain. In this paper, we compare the two models in detail so as to find the conditions of equivalence of them,including the interaction, the boundary conditions, and odevity of the number of lattice sites.We also exemplify in detail how to project out the redundant degrees of freedom for the fermionic representation.

      • The comparison of several time phase unwrapping methods

        zhaowenjing, chen wen jing, su xian yu

        2016,53(1):110-117, DOI:

        Abstract:

        Abstract: One of the key steps in 3D optical shape measurement based on the structured light projection is the phase unwrapping. The unwrapping issue about the complicated phase map is also the difficult step of the methods. The temporal phase unwrapping provide a useful tool to obtain the continuous phase map from the complicated wrapped phase map. Along the time direction, the temporal phase unwrapping is independently carried out from a 3D distribution demodulated from grating fringes with different pitches projected on the tested object. Therefore the problem of the error propagation in 2D phase unwrapping algorithm can be avoided. Followed by the comparison among the typical temporal phase unwrapping methods, including the negative exponential method, three pitches unwrapping method, three pitches heterodyne unwrapping method and its improved technique, a segmentation curve fitting method is used to improves the phase calculation accuracy. The computer simulations and experiments are carried out to verify that the phase error is deduced greatly through the segmentation curve fitting.

      • Time Variation Characteristics and Assessment of Electromagnetic Environment in a Campus

        ZHANG Ming-An, ZHAO Xiang, XU Jin-Hai, YAN Li-Ping, HUANG Ka-Ma

        2016,53(1):93-97, DOI:

        Abstract:

        With the increasing complexity of the electromagnetic environment (EME), it is necessary to perform actual measurement and evaluation of the EME. Because of the temporal dynamic and random variation of the EME, time variation characteristics of the EME in a campus are considered in this paper. By choosing sampling points in different regions of the campus, respectively measuring electric field value of the sampling points during different time periods, and using statistical analysis of the measurement data, we get the figures of probability density distribution and time variation curve of the electric field. And then, the time variation characteristics of the actual EME are analyzed and discussed, the distributions of the EME in different regions are compared, as well as a brief evaluation of the electromagnetic radiation level in the campus is given.

      • Image enhancement new model based on rational-order Partial Differential

        jiangwei, 李小龙, 刘亚威

        2016,53(1):47-53, DOI:

        Abstract:

        In order to sharpen the image edge features while enhancing texture detail, the image enhancement model based on space rational-order derivative was constructed by the effective combination of integer-order theory and fractional-order calculus theory to derive the differential expression of rational-order partial differential, and the numerical of enhanced model was achieved using rational-order partial differential mask operator. The experimental results showed that compared with the fractional-order differential method , the image enhancement model can be obtained the effect of continuous variation, that not only enhanced image texture well, but also improved the edge enhancement effect. Objectively, using image edge evaluation parameters of texture features such as information entropy and average gradient for quantitative analysis and experimental verification shown that the new model combined the advantages of integer and fractional order differential to make up for their lack of own and achieved a good image enhancement results.

      • Research of Internal Image Move-Copy Tampering Forensics Algorithm

        LI Ruo-Chen, JU Shen-Gen, ZHOU Gang, SHAO Shou-Ping

        2016,53(1):67-72, DOI:

        Abstract:

        According to the low robustness characteristics of image tampering with evidence of general move-copy algorithm, this paper proposes a new algorithm. Firstly, it uses the color invariant feature to detect feature points, which improves recall forensic results. Secondly, it uses the RGB color channel to expansion Surf descriptor, which increases the robustness of feature vectors. Then, it defines noise sensitivity coefficients to identify and deal with the image noise points and use sequential similarity detection algorithm to improve feature points registration. Finally, it uses Kendall coefficient and the four hypothesis to constrain the forensic results and get the final result. Experimental results show that the new algorithm reflects higher accuracy and strong robustness and it has strong ability of forensics.

      • A novel error resilience scheme for key frames in Wyner-Ziv video coding

        LIU Xiao-Juan, QING Lin-Bo, XIONG Shu-Hua, OU Xian-Feng

        2016,53(1):98-104, DOI:

        Abstract:

        In Wyner-Ziv video coding system, correct transimission and accurate decoding of key frames would affect the whole system performance directly. However, in wireless communication system, data loss of key frames often happened due to network failure, network congestion or other reasons. Data lossy seriously affect the decoding quality. This paper presents a novel solution for the data loss of key frames under the conditions of feedback channel. In the solution, by sending some extra Wyner-Ziv code streams along with the origin key frames, errors of the damaged image at the decoder can be high-efficiently corrected and restored. Simulation results show that the proposed solution could reconstruct the damaged image effectively, and the quality could be improved up to 20dB compared with typical error concealment method when the data loss ratio is 1%~20%. Furthermore, R-D performance of key frames could be improved even if the data loss ratio is very high.

      • Positive solutions of third-order ∞-point boundary value problems

        GAO Ting, HAN Xiao-Ling

        2016,53(1):35-41, DOI:

        Abstract:

        In this paper, we study the existence of positive solutions to the third-order ∞-point boundary value problem u'''+ λa(t)f(u) = 0, t ∈ (0,1),u(0) = βu'(0), u(1) =∑αiu(ξi), u'(1) = 0,where λ > 0 is a parameter, ξi∈ (0,1), αi∈ [0,+∞], and satisfy ∑αi>1,0<∑αiξi(2−ξi) < 1. a(t) ∈ C([0,1],[0,∞)), f ∈ C([0,∞),[0,∞)).By using Krasnoselskii’s fixed point theorem in cones, we can obtain the existence of the positive solution and the eigenvalue intervals on which there exists a positive solution if f is either superlinear or sublinear.

      • Automatically generating visually pleasing Information Walls

        CHEN Rui, XIE Ying-Tao, HUA Li-Xian, CHEN Yu, LIN Tao

        2016,53(1):61-66, DOI:

        Abstract:

        Information Wall (IW) is a GUI composed of rectangular cells each contains various kinds of information. The design and implementation of IW are mainly in a manual way nowadays, which typically leads to less variability in appearance style and low efficiency. This paper develops a tool to automate the generation of text-IWs based on a genetic programming algorithm. A model, which evaluates the visual quality of text-IWs, is also proposed and incorporated in the algorithm to make generated IWs more visually pleasing. Test results show that the tool is able to efficiently produce good looking IWs with variable appearance styles. With the help of the tool, designer productivity could be improved by utilizing machine-generated prototypes.

      • Effect of many-body interactions on the equation of state for Solid Argon

        LI Ji-Hong, ZHENG Xing-Rong, PENG Chang-Ning

        2016,53(1):131-137, DOI:

        Abstract:

        By using ab initio self-consistent field Hartree-Fork methods and atomic clusters expanding theory and employing Gamess program, two- and three-body interaction energies and the equation of state for solid argon in fcc crystal have been quantificationally calculated at the neighboring atomic distance R=2.40 -4.00 Å under high pressure. In addition, the convergence and truncation of atomic energy multi-body expansion are analyzed. It is found that two-body contribution to the cohesive energy is positive, while the three-body contribution is negative in solid argon under high pressure. At high pressure, only the consideration of the two-body contribution will overestimate the cohesive energy, hence it is necessary to introduce the three-body negative effects. The phenomenon of the experiment under 80GPa can be explained by considering the three-body potential.

      • Quantum authentication and key agreement scheme for SIP protocol

        YANG Guang, NIE Min, YANG Wu-Jun

        2016,53(1):87-92, DOI:

        Abstract:

        To overcome the shortcomings of current SIP safety scheme, such as the incapability to detect the wiretap and the vulnerability of the classical key system in case of quantum computation attack, this paper proposed a novel user authentication and key agreement scheme that combined quantum safe communication methods and SIP protocol. The SIP server prepared the three particle W states and distributed two of them to the SIP users. The random inserted particles were measured first to detect the wiretap; then the rest of the W states were operated and measured to authenticate the user. After that, every particle of the W states was measured randomly and the two SIP users got the initial conversation key according to the results of the effective measurements. The performance analysis shows our scheme is capable of resisting the impersonation attack and wiretap attack, thus can increase the safety of SIP protocol effectually.

      • Preparation and luminescent of Zn1-xMnxS nanoparticles

        WANG Qing, ZHANG Xu-Dong, WEI Zhi-Qiang, DAI Jian-Feng, LI Wei-Xue

        2016,53(1):152-156, DOI:

        Abstract:

        Mn-doped ZnS (ZnS:Mn) nanoparticles were prepared via hydrothermal method, studied effects on photoluminescence that different proportions Mn ions on Zn1-xMnxS. The composition, morphology, microstructure and optical property of the sample were characterized by X-ray diffraction (XRD).The results showed that the Zn1-xMnxS (x = 0,0.01,0.03,0.05,0.07,0.10) nanoparticles were spherical hexagonal structure of nanocrystalline, uniform particle size between 15 ~ 20nm. At room temperature, using the UV excitation wavelength is 350nm stimulate Zn1-xMnxS nanoparticles. Blue light emission which is produced by transition between shallow donor level and manganese t2 level can be obtained. Luminous intensity with the increasing amount of manganese-doped increased decreased after the first.And emission peaks have a mobile with the change of manganese-doped content. The reason may be related to sulfur vacancies which influence shallow donor level of ZnS. The proportion of zinc-manganese has an impact on the amount of sulfur vacancies and level position.

      • Pathology of the Fermionic Representation of Transverse Ising Model

        GUO Xiao-Ting, LI Peng

        2016,53(1):124-130, DOI:

        Abstract:

        When studying the quantum Ising chain in a transverse field, we usually transform the spin operators to fermion operators by applying the Jordan-Wigner transformation,i.e.we take it for granted that the spin model and corresponding fermionic model are equivalent naively. But deliberate treatment could reveal that the equivalence accompanies some delicate conditions.Redundant degrees of freedom should be projected out carefully, especially for finite length of chain. In this paper, we compare the two models in detail so as to find the conditions of equivalence of them,including the interaction, the boundary conditions, and odevity of the number of lattice sites.We also exemplify in detail how to project out the redundant degrees of freedom for the fermionic representation.

      • The comparison of several time phase unwrapping methods

        zhaowenjing, chen wen jing, su xian yu

        2016,53(1):110-117, DOI:

        Abstract:

        Abstract: One of the key steps in 3D optical shape measurement based on the structured light projection is the phase unwrapping. The unwrapping issue about the complicated phase map is also the difficult step of the methods. The temporal phase unwrapping provide a useful tool to obtain the continuous phase map from the complicated wrapped phase map. Along the time direction, the temporal phase unwrapping is independently carried out from a 3D distribution demodulated from grating fringes with different pitches projected on the tested object. Therefore the problem of the error propagation in 2D phase unwrapping algorithm can be avoided. Followed by the comparison among the typical temporal phase unwrapping methods, including the negative exponential method, three pitches unwrapping method, three pitches heterodyne unwrapping method and its improved technique, a segmentation curve fitting method is used to improves the phase calculation accuracy. The computer simulations and experiments are carried out to verify that the phase error is deduced greatly through the segmentation curve fitting.

      • Time Variation Characteristics and Assessment of Electromagnetic Environment in a Campus

        ZHANG Ming-An, ZHAO Xiang, XU Jin-Hai, YAN Li-Ping, HUANG Ka-Ma

        2016,53(1):93-97, DOI:

        Abstract:

        With the increasing complexity of the electromagnetic environment (EME), it is necessary to perform actual measurement and evaluation of the EME. Because of the temporal dynamic and random variation of the EME, time variation characteristics of the EME in a campus are considered in this paper. By choosing sampling points in different regions of the campus, respectively measuring electric field value of the sampling points during different time periods, and using statistical analysis of the measurement data, we get the figures of probability density distribution and time variation curve of the electric field. And then, the time variation characteristics of the actual EME are analyzed and discussed, the distributions of the EME in different regions are compared, as well as a brief evaluation of the electromagnetic radiation level in the campus is given.

      • Image enhancement new model based on rational-order Partial Differential

        jiangwei, 李小龙, 刘亚威

        2016,53(1):47-53, DOI:

        Abstract:

        In order to sharpen the image edge features while enhancing texture detail, the image enhancement model based on space rational-order derivative was constructed by the effective combination of integer-order theory and fractional-order calculus theory to derive the differential expression of rational-order partial differential, and the numerical of enhanced model was achieved using rational-order partial differential mask operator. The experimental results showed that compared with the fractional-order differential method , the image enhancement model can be obtained the effect of continuous variation, that not only enhanced image texture well, but also improved the edge enhancement effect. Objectively, using image edge evaluation parameters of texture features such as information entropy and average gradient for quantitative analysis and experimental verification shown that the new model combined the advantages of integer and fractional order differential to make up for their lack of own and achieved a good image enhancement results.

      • Construction and Application of RecET Recombination System in Zymomonas mobilis

        LI Tao, CAO-Qing-Hua, ZHANG Yi-Zheng, WU Yan, Tan Xue-Mei

        2016,53(1):209-214, DOI:

        Abstract:

        Zymomonas mobilis is a Gram-negative bacterium with excellent ethanol-producing capabilities. The ability of ethanol yield and substrate utilization can be further improved through genetic manipulations. In this study, in order to increase the recombination efficiency of foreign genes into chromosome of Z. mobilis, the RecET genes were cloned into the E. coli-Z. mobilis shuttle expression vector pSUZM3a, resulted in pSUZM3a-RecET. The adhA gene encoding the alcohol dehydrogenase and tetracycline resistant gene were used as the target and the selection marker genes, respectively. The PCR fragments of tetracycline resistant marker with 60bp flanking sequences homologous to adhA were electroporated directly into Z. mobilis ZM4 cells which harbored pSUZM3a-RecET. After the PCR analysis and DNA sequencing, it was found that the RecET-mediated recombination reaction resulted in adhA gene replaced by tetracycline resistant gene. The result showed that RecET system could make efficient, rapid targeted gene knock-out with only 60bp homologous arm in Z. mobilis.

      • Expression and Purification of Recombinant Chicken TSHβ, FSHβ, and LHβ Proteins

        YAN Zhen-Xin, MO Chun-Heng, WANG Ya-Jun, LI Juan

        2016,53(1):163-168, DOI:

        Abstract:

        Gonadotropin(Follicle-stimulating hormone (FSH), Luteinizing hormone (LH))and Thyroid-stimulating hormone (TSH) are glycoprotein secreted by pituitary. Gonadotropin plays a key role in the regulation of the development and function of vertebrate gonads. TSH participates in development and metabolism by stimulate the thyroid to secrete T4 and T3. In the study, we prepared the prokaryotic expression plasmids encoding chicken TSHβ subunit, FSHβ subunit and LHβ subunit and produced the three recombinant proteins using RT-PCR and molecular approaches. We also purified the recombinant proteins by Metal Ion Affinity Chromatography. This work paves the way for future preparation of polyclonal antibodies against chicken TSHβ, FSHβ and LHβ in rabbits.

      • Human elongation factor 1A1(eEF1A1) promotes drug tolerance in lung cancer cell line

        DING Mu-Ran, LIU Tao, LI Lin

        2016,53(1):198-202, DOI:

        Abstract:

        Human translational elongation factor 1A (eEF1A)is a multi-functional protein besides its roles in protein translation system. The protein expressional level of eEF1A is related to cell viability in oxidative stress and apoptotic process. Based on the knowledge of multifunctional roles of eEF1A and its relation to cell viability, we studied the possible effect of the isoform eEF1A1 on the drug resistance in cancer cell lines. The eukaryotic expression vector containing eEF1A1 sequence was constructed and was transiently transfected into human lung cancer cell line H1299. After verifying the expression of FLAG -eEF1A1, MTT assay was utilized to measure the cell viability of transfected H1299 after treatment by two common anti-cancer drugs. H1299 transfected with eEF1A1 showed enhanced drug tolerance to both taxol and adriamycin. Lung cancer cell highly expressing EEF1A1 behave more tolerance to antineoplastic drugs.

      • Research of Internal Image Move-Copy Tampering Forensics Algorithm

        LI Ruo-Chen, JU Shen-Gen, ZHOU Gang, SHAO Shou-Ping

        2016,53(1):67-72, DOI:

        Abstract:

        According to the low robustness characteristics of image tampering with evidence of general move-copy algorithm, this paper proposes a new algorithm. Firstly, it uses the color invariant feature to detect feature points, which improves recall forensic results. Secondly, it uses the RGB color channel to expansion Surf descriptor, which increases the robustness of feature vectors. Then, it defines noise sensitivity coefficients to identify and deal with the image noise points and use sequential similarity detection algorithm to improve feature points registration. Finally, it uses Kendall coefficient and the four hypothesis to constrain the forensic results and get the final result. Experimental results show that the new algorithm reflects higher accuracy and strong robustness and it has strong ability of forensics.

      • A novel error resilience scheme for key frames in Wyner-Ziv video coding

        LIU Xiao-Juan, QING Lin-Bo, XIONG Shu-Hua, OU Xian-Feng

        2016,53(1):98-104, DOI:

        Abstract:

        In Wyner-Ziv video coding system, correct transimission and accurate decoding of key frames would affect the whole system performance directly. However, in wireless communication system, data loss of key frames often happened due to network failure, network congestion or other reasons. Data lossy seriously affect the decoding quality. This paper presents a novel solution for the data loss of key frames under the conditions of feedback channel. In the solution, by sending some extra Wyner-Ziv code streams along with the origin key frames, errors of the damaged image at the decoder can be high-efficiently corrected and restored. Simulation results show that the proposed solution could reconstruct the damaged image effectively, and the quality could be improved up to 20dB compared with typical error concealment method when the data loss ratio is 1%~20%. Furthermore, R-D performance of key frames could be improved even if the data loss ratio is very high.

      • TAp73α-mediated cisplatin sensitivity was suppressed by miR-330 in colorectal cancer cell HCT116

        HUANG Ling, TONG Ying, XIAO Zhi-Xiong, ZHANG Yu-Jun

        2016,53(1):228-234, DOI:

        Abstract:

        The p53 family member p73 is a transcription factor involved in the regulation of cell cycle, apoptosis and cancer cell drug-resistant. Here we reported that knockdown of p73 sensitized HCT116 colorectal cancer cells to cisplatin treatment independent of p53. Hsa-miR-330 (miR-330) was identified to be able to directly repress the expression of TAp73α. Overexpression of miR-330 decreased the protein levels of endogenous TAp73α and phenocopied the effect of p73 knockdown. Restoration of TAp73α eliminated miR-330-induced chemosensitivity toward cisplatin. Our results demonstrated a novel function of TAp73α to impair cisplatin sensitivity in colorectal cancer cells which can be repressed by miR-330, thus provided an effective strategy for therapeutic treatment of cisplatin-resistant cancer cells.

      • Automatically generating visually pleasing Information Walls

        CHEN Rui, XIE Ying-Tao, HUA Li-Xian, CHEN Yu, LIN Tao

        2016,53(1):61-66, DOI:

        Abstract:

        Information Wall (IW) is a GUI composed of rectangular cells each contains various kinds of information. The design and implementation of IW are mainly in a manual way nowadays, which typically leads to less variability in appearance style and low efficiency. This paper develops a tool to automate the generation of text-IWs based on a genetic programming algorithm. A model, which evaluates the visual quality of text-IWs, is also proposed and incorporated in the algorithm to make generated IWs more visually pleasing. Test results show that the tool is able to efficiently produce good looking IWs with variable appearance styles. With the help of the tool, designer productivity could be improved by utilizing machine-generated prototypes.

      • Effect of many-body interactions on the equation of state for Solid Argon

        LI Ji-Hong, ZHENG Xing-Rong, PENG Chang-Ning

        2016,53(1):131-137, DOI:

        Abstract:

        By using ab initio self-consistent field Hartree-Fork methods and atomic clusters expanding theory and employing Gamess program, two- and three-body interaction energies and the equation of state for solid argon in fcc crystal have been quantificationally calculated at the neighboring atomic distance R=2.40 -4.00 Å under high pressure. In addition, the convergence and truncation of atomic energy multi-body expansion are analyzed. It is found that two-body contribution to the cohesive energy is positive, while the three-body contribution is negative in solid argon under high pressure. At high pressure, only the consideration of the two-body contribution will overestimate the cohesive energy, hence it is necessary to introduce the three-body negative effects. The phenomenon of the experiment under 80GPa can be explained by considering the three-body potential.

      • Quantum authentication and key agreement scheme for SIP protocol

        YANG Guang, NIE Min, YANG Wu-Jun

        2016,53(1):87-92, DOI:

        Abstract:

        To overcome the shortcomings of current SIP safety scheme, such as the incapability to detect the wiretap and the vulnerability of the classical key system in case of quantum computation attack, this paper proposed a novel user authentication and key agreement scheme that combined quantum safe communication methods and SIP protocol. The SIP server prepared the three particle W states and distributed two of them to the SIP users. The random inserted particles were measured first to detect the wiretap; then the rest of the W states were operated and measured to authenticate the user. After that, every particle of the W states was measured randomly and the two SIP users got the initial conversation key according to the results of the effective measurements. The performance analysis shows our scheme is capable of resisting the impersonation attack and wiretap attack, thus can increase the safety of SIP protocol effectually.

      • Preparation and luminescent of Zn1-xMnxS nanoparticles

        WANG Qing, ZHANG Xu-Dong, WEI Zhi-Qiang, DAI Jian-Feng, LI Wei-Xue

        2016,53(1):152-156, DOI:

        Abstract:

        Mn-doped ZnS (ZnS:Mn) nanoparticles were prepared via hydrothermal method, studied effects on photoluminescence that different proportions Mn ions on Zn1-xMnxS. The composition, morphology, microstructure and optical property of the sample were characterized by X-ray diffraction (XRD).The results showed that the Zn1-xMnxS (x = 0,0.01,0.03,0.05,0.07,0.10) nanoparticles were spherical hexagonal structure of nanocrystalline, uniform particle size between 15 ~ 20nm. At room temperature, using the UV excitation wavelength is 350nm stimulate Zn1-xMnxS nanoparticles. Blue light emission which is produced by transition between shallow donor level and manganese t2 level can be obtained. Luminous intensity with the increasing amount of manganese-doped increased decreased after the first.And emission peaks have a mobile with the change of manganese-doped content. The reason may be related to sulfur vacancies which influence shallow donor level of ZnS. The proportion of zinc-manganese has an impact on the amount of sulfur vacancies and level position.

      • Screening of Phospholipase D producing Strains and its transphosphatidylation activity

        SHI Chuang, WANG Yi-Ding, MA Qin-Qin, YUAN Xiang-Hua

        2016,53(1):215-220, DOI:

        Abstract:

        Using soybean Phospholipids as substrates,one strain which expressed Phospholipase was isolated from soil near oil mill ,the Phospholipase produce by SNUPLD-6 was identified which contain Phospholipase D . According to its mor -phological characteristics and ITS sequence , The strain SNUPLD-6 was identified as Geotrichum candidum. study on the Conditions for the growth of the bacteria and the PLD reaction conditions which expressed by SNUPLD-6. The results showed that its optimum growthtemperature is 30℃ .its optimum growth pH value is 6.0,its optimum carbon source is glucose,its optimum nitrogen source for the beef extract and peptone 50% each. the optimal fermentation time of phospholipase D producing is 3d, its optimum transphosphatidylation-temperature is 32℃. its optimum transphosphatidylation pH value is 6.0,its optimum reaction buffer for pH=5.5 0.02M HAc -NaAC buffer, its Optimal metalion activator as Ca2 +, Zn2 +.

      • Pathology of the Fermionic Representation of Transverse Ising Model

        GUO Xiao-Ting, LI Peng

        2016,53(1):124-130, DOI:

        Abstract:

        When studying the quantum Ising chain in a transverse field, we usually transform the spin operators to fermion operators by applying the Jordan-Wigner transformation,i.e.we take it for granted that the spin model and corresponding fermionic model are equivalent naively. But deliberate treatment could reveal that the equivalence accompanies some delicate conditions.Redundant degrees of freedom should be projected out carefully, especially for finite length of chain. In this paper, we compare the two models in detail so as to find the conditions of equivalence of them,including the interaction, the boundary conditions, and odevity of the number of lattice sites.We also exemplify in detail how to project out the redundant degrees of freedom for the fermionic representation.

      Computer Science
      • The Research of network traffic identification based on Convolutional neural network

        LI Qin, SHI Wei, SUN Jie-Ping, DONG Chao, QU Tian-Shu

        2017,54(5):959-964, DOI:

        Abstract:

        In recent years, the deep packet inspection technology and traffic identification technology based on the statistical characteristics of data packet have developed rapidly. But they have some disadvantages. The deep packet inspection technology can’t identify the encrypted network traffic, and the other technology heavily relies on subjectively chosen statistical features. A network traffic identification method based on convolutional neural network algorithm is proposed in this paper. According to certain rules, the network data is converted to gray images. In order to improve the recognition rate, the original network data is extended according to the order of the TCP packets and the disorder of the UDP packets. Experimental data shows that this method has a high detection rate both in the application and application layer protocol.

      • Malware detection technologies based on software intermediate code

        YANG Hong-Shen, ZHAO Zong-Qu, WANG Jun-Feng

        2013,50(6):1216-1222, DOI: 103969/j.issn.0490-6756.2013.6.000

        Abstract:

        The intermediate code is a special style of software representation which locates between the machine language and the high level programming language, and it can take advantage of understandable semantic information and actual execution condition for malware analysis. The malicious behavior information and characteristics can be easily found from the semantic information of intermediate code, and malware detection or classification can be realized by analyzing the whole or local information of control flow graph. Machine learning facilitates security information and rules mining in a large number of complex software representations,which is deemed as a kind of advanced malware detection method in recent malware research. This paper categorizes and analyzes the malware research technologies according to the semantic information and control flow structure of software intermediate code, and makes deep analysis to intermediate code processing and application methods based on machine learning

      • Traffic flow forecasting based on network tomography

        DAI Yu-Ting, WANG Jun Feng

        2015,52(5):985-992, DOI:

        Abstract:

        To forecast the urban traffic flow more effectively, this paper proposes a Network Tomography based traffic flow prediction model. The model builds a spanning tree based on Network Tomography, estimates traffic probability distribution in road network subnet by Expectation Maximization (EM) algorithm, forecasts the traffic flow according to the flow conservation in road network. Experimental results show that the new model has higher estimation accuracy compared to the Artificial intelligence model.

      • An algorithm for personalized query recommendation using LDA modeling of client side browsing history

        WANG Gui-Hua, CHEN Li, YU Zhong-Hua, DING Ge-Jian, LUO Qian

        2015,52(4):755-763, DOI:

        Abstract:

        Modern search engines generally provide the method of expressing queries with a few keywords for their users, which makes convenience for the common users but also difficulty to retrieve the needed information for the search engines because it is difficult for them to capture the information needs of the users exactly based on a few keywords. Therefore, query recommendation as such a technology to alleviate the difficulty begins its applications in the popular search engines of nowadays. However, almost all the approaches of query recommendation proposed until today are based on wisdom of crowds, using search logs as information source and mining behavior patterns of the users related to query construction and semantic correlation between queries. Such approach does not consider the personalized preference of information with respect to different users, and furthermore, the recommendation computing performed on the server side would impact the response efficiency and the throughput of a search engine. In this paper a strategy of personalized query recommendation running on the client side is proposed. The strategy makes use of a users browsing history as the information source and learns information preference of a user from the information source based on LDA(Latent Dirichlet Allocation)modeling. When an original query is submitted by a user, the search intention of the user is captured by the probability distribution of generating the original query from the learned LDA model, and the correlation between a term and the captured search intention is evaluated as the recommendation strength of the term with respect to the original query. The strongest Top N terms are selected as the final recommended expanded queries for the original query. The experimental validation of the proposed algorithm was performed on a test data set annotated manually. The experimental results show that the algorithm is superior to the approaches based solely on the semantic correlation between terms and original queries with respect to the accuracy of recommending expanded queries.

      • Research on heterogeneous Web object coreference recognition and resolution algorithm

        WANG Min, WANG Yong Bin, LI Ying

        2015,52(5):993-1000, DOI:

        Abstract:

        To resolve the coreference problem of the semantic Web data stream, this paper proposed a heterogeneous Web data stream object coreference resolution. First, the paper defined a framework to recognize and resolve Web data stream object coreference. Secondly, the paper described a conflict recognition system structure based on rule inference. The conflict recognition algorithm makes use of a fast rule matching, which improves the conflict recognition process efficiency and reduces the total refers to objects in space, time conflict and complexity of the digestion. In third, the paper defines three types of conflict and arbitration resolution algorithms for conflict resolution. Lastly, test sets are used in this paper to examine the application of heterogeneous Web data stream conflict recognition and coreference technology.

      • Dental surface reconstruction algorithm based on point cloud data

        CAO Wei, YUAN Zan, WU Zh- Hong

        2015,52(3):517-522, DOI:

        Abstract:

        After got the scattered point cloud model from the 3D scanner, first search the K nearest neighbors for each point by constructing the K D tree; Second according to those neighborhood relationships, use the least square fitting planar method to estimate the normal vector of each point. Next determine the boundary of point cloud, select the extreme point as the initial point, and build seed triangle. Finally use the local optimal triangle mesh growing algorithm based on multiple constraints, start from the seed triangle, make the edge as extension condition, search for suitable point to construct new triangle layer by layer. During this process four constraints added, to better select the extension point, and extend the triangle edge outward, finally generate adjacent triangle meshes, realize the surface reconstruction more realistically.

      Physics
      • The comparison of several time phase unwrapping methods

        zhaowenjing, chen wen jing, su xian yu

        2016,53(1):110-117, DOI:

        Abstract:

        Abstract: One of the key steps in 3D optical shape measurement based on the structured light projection is the phase unwrapping. The unwrapping issue about the complicated phase map is also the difficult step of the methods. The temporal phase unwrapping provide a useful tool to obtain the continuous phase map from the complicated wrapped phase map. Along the time direction, the temporal phase unwrapping is independently carried out from a 3D distribution demodulated from grating fringes with different pitches projected on the tested object. Therefore the problem of the error propagation in 2D phase unwrapping algorithm can be avoided. Followed by the comparison among the typical temporal phase unwrapping methods, including the negative exponential method, three pitches unwrapping method, three pitches heterodyne unwrapping method and its improved technique, a segmentation curve fitting method is used to improves the phase calculation accuracy. The computer simulations and experiments are carried out to verify that the phase error is deduced greatly through the segmentation curve fitting.

      Biology
      • Construction and Application of RecET Recombination System in Zymomonas mobilis

        LI Tao, CAO-Qing-Hua, ZHANG Yi-Zheng, WU Yan, Tan Xue-Mei

        2016,53(1):209-214, DOI:

        Abstract:

        Zymomonas mobilis is a Gram-negative bacterium with excellent ethanol-producing capabilities. The ability of ethanol yield and substrate utilization can be further improved through genetic manipulations. In this study, in order to increase the recombination efficiency of foreign genes into chromosome of Z. mobilis, the RecET genes were cloned into the E. coli-Z. mobilis shuttle expression vector pSUZM3a, resulted in pSUZM3a-RecET. The adhA gene encoding the alcohol dehydrogenase and tetracycline resistant gene were used as the target and the selection marker genes, respectively. The PCR fragments of tetracycline resistant marker with 60bp flanking sequences homologous to adhA were electroporated directly into Z. mobilis ZM4 cells which harbored pSUZM3a-RecET. After the PCR analysis and DNA sequencing, it was found that the RecET-mediated recombination reaction resulted in adhA gene replaced by tetracycline resistant gene. The result showed that RecET system could make efficient, rapid targeted gene knock-out with only 60bp homologous arm in Z. mobilis.

      Electronics and Information Science
      Mathematics
      • Positive solutions of third-order ∞-point boundary value problems

        GAO Ting, HAN Xiao-Ling

        2016,53(1):35-41, DOI:

        Abstract:

        In this paper, we study the existence of positive solutions to the third-order ∞-point boundary value problem u'''+ λa(t)f(u) = 0, t ∈ (0,1),u(0) = βu'(0), u(1) =∑αiu(ξi), u'(1) = 0,where λ > 0 is a parameter, ξi∈ (0,1), αi∈ [0,+∞], and satisfy ∑αi>1,0<∑αiξi(2−ξi) < 1. a(t) ∈ C([0,1],[0,∞)), f ∈ C([0,∞),[0,∞)).By using Krasnoselskii’s fixed point theorem in cones, we can obtain the existence of the positive solution and the eigenvalue intervals on which there exists a positive solution if f is either superlinear or sublinear.

      • Ensemble Kalman filter with state equality constraints

        XIE Li-Qing, HE La-Mei

        2015,52(5):958-962, DOI:

        Abstract:

        For the problem of state estimation for nonlinear systems with state equality constraints, the method that combines ensemble Kalman filter with estimate projection approaches is presented. We derive two new state estimation algorithms with constraints, by using estimate projection method for each particle of state estimation and state estimation vector after calculating weighted average respectively. The simulation shows that the new algorithms perform better in terms of estimation accuracy, comparing to particle filter and unconstrained ensemble Kalman filter.

      • The comparison of several time phase unwrapping methods

        zhaowenjing, chen wen jing, su xian yu

        2016,53(1):110-117, DOI:

        Abstract:

        Abstract: One of the key steps in 3D optical shape measurement based on the structured light projection is the phase unwrapping. The unwrapping issue about the complicated phase map is also the difficult step of the methods. The temporal phase unwrapping provide a useful tool to obtain the continuous phase map from the complicated wrapped phase map. Along the time direction, the temporal phase unwrapping is independently carried out from a 3D distribution demodulated from grating fringes with different pitches projected on the tested object. Therefore the problem of the error propagation in 2D phase unwrapping algorithm can be avoided. Followed by the comparison among the typical temporal phase unwrapping methods, including the negative exponential method, three pitches unwrapping method, three pitches heterodyne unwrapping method and its improved technique, a segmentation curve fitting method is used to improves the phase calculation accuracy. The computer simulations and experiments are carried out to verify that the phase error is deduced greatly through the segmentation curve fitting.

      • Positive solutions of third-order ∞-point boundary value problems

        GAO Ting, HAN Xiao-Ling

        2016,53(1):35-41, DOI:

        Abstract:

        In this paper, we study the existence of positive solutions to the third-order ∞-point boundary value problem u'''+ λa(t)f(u) = 0, t ∈ (0,1),u(0) = βu'(0), u(1) =∑αiu(ξi), u'(1) = 0,where λ > 0 is a parameter, ξi∈ (0,1), αi∈ [0,+∞], and satisfy ∑αi>1,0<∑αiξi(2−ξi) < 1. a(t) ∈ C([0,1],[0,∞)), f ∈ C([0,∞),[0,∞)).By using Krasnoselskii’s fixed point theorem in cones, we can obtain the existence of the positive solution and the eigenvalue intervals on which there exists a positive solution if f is either superlinear or sublinear.

      • Ensemble Kalman filter with state equality constraints

        XIE Li-Qing, HE La-Mei

        2015,52(5):958-962, DOI:

        Abstract:

        For the problem of state estimation for nonlinear systems with state equality constraints, the method that combines ensemble Kalman filter with estimate projection approaches is presented. We derive two new state estimation algorithms with constraints, by using estimate projection method for each particle of state estimation and state estimation vector after calculating weighted average respectively. The simulation shows that the new algorithms perform better in terms of estimation accuracy, comparing to particle filter and unconstrained ensemble Kalman filter.

      • Construction and Application of RecET Recombination System in Zymomonas mobilis

        LI Tao, CAO-Qing-Hua, ZHANG Yi-Zheng, WU Yan, Tan Xue-Mei

        2016,53(1):209-214, DOI:

        Abstract:

        Zymomonas mobilis is a Gram-negative bacterium with excellent ethanol-producing capabilities. The ability of ethanol yield and substrate utilization can be further improved through genetic manipulations. In this study, in order to increase the recombination efficiency of foreign genes into chromosome of Z. mobilis, the RecET genes were cloned into the E. coli-Z. mobilis shuttle expression vector pSUZM3a, resulted in pSUZM3a-RecET. The adhA gene encoding the alcohol dehydrogenase and tetracycline resistant gene were used as the target and the selection marker genes, respectively. The PCR fragments of tetracycline resistant marker with 60bp flanking sequences homologous to adhA were electroporated directly into Z. mobilis ZM4 cells which harbored pSUZM3a-RecET. After the PCR analysis and DNA sequencing, it was found that the RecET-mediated recombination reaction resulted in adhA gene replaced by tetracycline resistant gene. The result showed that RecET system could make efficient, rapid targeted gene knock-out with only 60bp homologous arm in Z. mobilis.

      • The Research of network traffic identification based on Convolutional neural network

        LI Qin, SHI Wei, SUN Jie-Ping, DONG Chao, QU Tian-Shu

        2017,54(5):959-964, DOI:

        Abstract:

        In recent years, the deep packet inspection technology and traffic identification technology based on the statistical characteristics of data packet have developed rapidly. But they have some disadvantages. The deep packet inspection technology can’t identify the encrypted network traffic, and the other technology heavily relies on subjectively chosen statistical features. A network traffic identification method based on convolutional neural network algorithm is proposed in this paper. According to certain rules, the network data is converted to gray images. In order to improve the recognition rate, the original network data is extended according to the order of the TCP packets and the disorder of the UDP packets. Experimental data shows that this method has a high detection rate both in the application and application layer protocol.

      • Malware detection technologies based on software intermediate code

        YANG Hong-Shen, ZHAO Zong-Qu, WANG Jun-Feng

        2013,50(6):1216-1222, DOI: 103969/j.issn.0490-6756.2013.6.000

        Abstract:

        The intermediate code is a special style of software representation which locates between the machine language and the high level programming language, and it can take advantage of understandable semantic information and actual execution condition for malware analysis. The malicious behavior information and characteristics can be easily found from the semantic information of intermediate code, and malware detection or classification can be realized by analyzing the whole or local information of control flow graph. Machine learning facilitates security information and rules mining in a large number of complex software representations,which is deemed as a kind of advanced malware detection method in recent malware research. This paper categorizes and analyzes the malware research technologies according to the semantic information and control flow structure of software intermediate code, and makes deep analysis to intermediate code processing and application methods based on machine learning

      • Positive solutions of third-order ∞-point boundary value problems

        GAO Ting, HAN Xiao-Ling

        2016,53(1):35-41, DOI:

        Abstract:

        In this paper, we study the existence of positive solutions to the third-order ∞-point boundary value problem u'''+ λa(t)f(u) = 0, t ∈ (0,1),u(0) = βu'(0), u(1) =∑αiu(ξi), u'(1) = 0,where λ > 0 is a parameter, ξi∈ (0,1), αi∈ [0,+∞], and satisfy ∑αi>1,0<∑αiξi(2−ξi) < 1. a(t) ∈ C([0,1],[0,∞)), f ∈ C([0,∞),[0,∞)).By using Krasnoselskii’s fixed point theorem in cones, we can obtain the existence of the positive solution and the eigenvalue intervals on which there exists a positive solution if f is either superlinear or sublinear.

      • Ensemble Kalman filter with state equality constraints

        XIE Li-Qing, HE La-Mei

        2015,52(5):958-962, DOI:

        Abstract:

        For the problem of state estimation for nonlinear systems with state equality constraints, the method that combines ensemble Kalman filter with estimate projection approaches is presented. We derive two new state estimation algorithms with constraints, by using estimate projection method for each particle of state estimation and state estimation vector after calculating weighted average respectively. The simulation shows that the new algorithms perform better in terms of estimation accuracy, comparing to particle filter and unconstrained ensemble Kalman filter.

      • Traffic flow forecasting based on network tomography

        DAI Yu-Ting, WANG Jun Feng

        2015,52(5):985-992, DOI:

        Abstract:

        To forecast the urban traffic flow more effectively, this paper proposes a Network Tomography based traffic flow prediction model. The model builds a spanning tree based on Network Tomography, estimates traffic probability distribution in road network subnet by Expectation Maximization (EM) algorithm, forecasts the traffic flow according to the flow conservation in road network. Experimental results show that the new model has higher estimation accuracy compared to the Artificial intelligence model.

      • An algorithm for personalized query recommendation using LDA modeling of client side browsing history

        WANG Gui-Hua, CHEN Li, YU Zhong-Hua, DING Ge-Jian, LUO Qian

        2015,52(4):755-763, DOI:

        Abstract:

        Modern search engines generally provide the method of expressing queries with a few keywords for their users, which makes convenience for the common users but also difficulty to retrieve the needed information for the search engines because it is difficult for them to capture the information needs of the users exactly based on a few keywords. Therefore, query recommendation as such a technology to alleviate the difficulty begins its applications in the popular search engines of nowadays. However, almost all the approaches of query recommendation proposed until today are based on wisdom of crowds, using search logs as information source and mining behavior patterns of the users related to query construction and semantic correlation between queries. Such approach does not consider the personalized preference of information with respect to different users, and furthermore, the recommendation computing performed on the server side would impact the response efficiency and the throughput of a search engine. In this paper a strategy of personalized query recommendation running on the client side is proposed. The strategy makes use of a users browsing history as the information source and learns information preference of a user from the information source based on LDA(Latent Dirichlet Allocation)modeling. When an original query is submitted by a user, the search intention of the user is captured by the probability distribution of generating the original query from the learned LDA model, and the correlation between a term and the captured search intention is evaluated as the recommendation strength of the term with respect to the original query. The strongest Top N terms are selected as the final recommended expanded queries for the original query. The experimental validation of the proposed algorithm was performed on a test data set annotated manually. The experimental results show that the algorithm is superior to the approaches based solely on the semantic correlation between terms and original queries with respect to the accuracy of recommending expanded queries.

      • Research on heterogeneous Web object coreference recognition and resolution algorithm

        WANG Min, WANG Yong Bin, LI Ying

        2015,52(5):993-1000, DOI:

        Abstract:

        To resolve the coreference problem of the semantic Web data stream, this paper proposed a heterogeneous Web data stream object coreference resolution. First, the paper defined a framework to recognize and resolve Web data stream object coreference. Secondly, the paper described a conflict recognition system structure based on rule inference. The conflict recognition algorithm makes use of a fast rule matching, which improves the conflict recognition process efficiency and reduces the total refers to objects in space, time conflict and complexity of the digestion. In third, the paper defines three types of conflict and arbitration resolution algorithms for conflict resolution. Lastly, test sets are used in this paper to examine the application of heterogeneous Web data stream conflict recognition and coreference technology.

      • Construction and Application of RecET Recombination System in Zymomonas mobilis

        LI Tao, CAO-Qing-Hua, ZHANG Yi-Zheng, WU Yan, Tan Xue-Mei

        2016,53(1):209-214, DOI:

        Abstract:

        Zymomonas mobilis is a Gram-negative bacterium with excellent ethanol-producing capabilities. The ability of ethanol yield and substrate utilization can be further improved through genetic manipulations. In this study, in order to increase the recombination efficiency of foreign genes into chromosome of Z. mobilis, the RecET genes were cloned into the E. coli-Z. mobilis shuttle expression vector pSUZM3a, resulted in pSUZM3a-RecET. The adhA gene encoding the alcohol dehydrogenase and tetracycline resistant gene were used as the target and the selection marker genes, respectively. The PCR fragments of tetracycline resistant marker with 60bp flanking sequences homologous to adhA were electroporated directly into Z. mobilis ZM4 cells which harbored pSUZM3a-RecET. After the PCR analysis and DNA sequencing, it was found that the RecET-mediated recombination reaction resulted in adhA gene replaced by tetracycline resistant gene. The result showed that RecET system could make efficient, rapid targeted gene knock-out with only 60bp homologous arm in Z. mobilis.

      • Dental surface reconstruction algorithm based on point cloud data

        CAO Wei, YUAN Zan, WU Zh- Hong

        2015,52(3):517-522, DOI:

        Abstract:

        After got the scattered point cloud model from the 3D scanner, first search the K nearest neighbors for each point by constructing the K D tree; Second according to those neighborhood relationships, use the least square fitting planar method to estimate the normal vector of each point. Next determine the boundary of point cloud, select the extreme point as the initial point, and build seed triangle. Finally use the local optimal triangle mesh growing algorithm based on multiple constraints, start from the seed triangle, make the edge as extension condition, search for suitable point to construct new triangle layer by layer. During this process four constraints added, to better select the extension point, and extend the triangle edge outward, finally generate adjacent triangle meshes, realize the surface reconstruction more realistically.

      • The Research of network traffic identification based on Convolutional neural network

        LI Qin, SHI Wei, SUN Jie-Ping, DONG Chao, QU Tian-Shu

        2017,54(5):959-964, DOI:

        Abstract:

        In recent years, the deep packet inspection technology and traffic identification technology based on the statistical characteristics of data packet have developed rapidly. But they have some disadvantages. The deep packet inspection technology can’t identify the encrypted network traffic, and the other technology heavily relies on subjectively chosen statistical features. A network traffic identification method based on convolutional neural network algorithm is proposed in this paper. According to certain rules, the network data is converted to gray images. In order to improve the recognition rate, the original network data is extended according to the order of the TCP packets and the disorder of the UDP packets. Experimental data shows that this method has a high detection rate both in the application and application layer protocol.

      • The comparison of several time phase unwrapping methods

        zhaowenjing, chen wen jing, su xian yu

        2016,53(1):110-117, DOI:

        Abstract:

        Abstract: One of the key steps in 3D optical shape measurement based on the structured light projection is the phase unwrapping. The unwrapping issue about the complicated phase map is also the difficult step of the methods. The temporal phase unwrapping provide a useful tool to obtain the continuous phase map from the complicated wrapped phase map. Along the time direction, the temporal phase unwrapping is independently carried out from a 3D distribution demodulated from grating fringes with different pitches projected on the tested object. Therefore the problem of the error propagation in 2D phase unwrapping algorithm can be avoided. Followed by the comparison among the typical temporal phase unwrapping methods, including the negative exponential method, three pitches unwrapping method, three pitches heterodyne unwrapping method and its improved technique, a segmentation curve fitting method is used to improves the phase calculation accuracy. The computer simulations and experiments are carried out to verify that the phase error is deduced greatly through the segmentation curve fitting.

      • Malware detection technologies based on software intermediate code

        YANG Hong-Shen, ZHAO Zong-Qu, WANG Jun-Feng

        2013,50(6):1216-1222, DOI: 103969/j.issn.0490-6756.2013.6.000

        Abstract:

        The intermediate code is a special style of software representation which locates between the machine language and the high level programming language, and it can take advantage of understandable semantic information and actual execution condition for malware analysis. The malicious behavior information and characteristics can be easily found from the semantic information of intermediate code, and malware detection or classification can be realized by analyzing the whole or local information of control flow graph. Machine learning facilitates security information and rules mining in a large number of complex software representations,which is deemed as a kind of advanced malware detection method in recent malware research. This paper categorizes and analyzes the malware research technologies according to the semantic information and control flow structure of software intermediate code, and makes deep analysis to intermediate code processing and application methods based on machine learning

      • Positive solutions of third-order ∞-point boundary value problems

        GAO Ting, HAN Xiao-Ling

        2016,53(1):35-41, DOI:

        Abstract:

        In this paper, we study the existence of positive solutions to the third-order ∞-point boundary value problem u'''+ λa(t)f(u) = 0, t ∈ (0,1),u(0) = βu'(0), u(1) =∑αiu(ξi), u'(1) = 0,where λ > 0 is a parameter, ξi∈ (0,1), αi∈ [0,+∞], and satisfy ∑αi>1,0<∑αiξi(2−ξi) < 1. a(t) ∈ C([0,1],[0,∞)), f ∈ C([0,∞),[0,∞)).By using Krasnoselskii’s fixed point theorem in cones, we can obtain the existence of the positive solution and the eigenvalue intervals on which there exists a positive solution if f is either superlinear or sublinear.

      • Ensemble Kalman filter with state equality constraints

        XIE Li-Qing, HE La-Mei

        2015,52(5):958-962, DOI:

        Abstract:

        For the problem of state estimation for nonlinear systems with state equality constraints, the method that combines ensemble Kalman filter with estimate projection approaches is presented. We derive two new state estimation algorithms with constraints, by using estimate projection method for each particle of state estimation and state estimation vector after calculating weighted average respectively. The simulation shows that the new algorithms perform better in terms of estimation accuracy, comparing to particle filter and unconstrained ensemble Kalman filter.

      • Traffic flow forecasting based on network tomography

        DAI Yu-Ting, WANG Jun Feng

        2015,52(5):985-992, DOI:

        Abstract:

        To forecast the urban traffic flow more effectively, this paper proposes a Network Tomography based traffic flow prediction model. The model builds a spanning tree based on Network Tomography, estimates traffic probability distribution in road network subnet by Expectation Maximization (EM) algorithm, forecasts the traffic flow according to the flow conservation in road network. Experimental results show that the new model has higher estimation accuracy compared to the Artificial intelligence model.

      • An algorithm for personalized query recommendation using LDA modeling of client side browsing history

        WANG Gui-Hua, CHEN Li, YU Zhong-Hua, DING Ge-Jian, LUO Qian

        2015,52(4):755-763, DOI:

        Abstract:

        Modern search engines generally provide the method of expressing queries with a few keywords for their users, which makes convenience for the common users but also difficulty to retrieve the needed information for the search engines because it is difficult for them to capture the information needs of the users exactly based on a few keywords. Therefore, query recommendation as such a technology to alleviate the difficulty begins its applications in the popular search engines of nowadays. However, almost all the approaches of query recommendation proposed until today are based on wisdom of crowds, using search logs as information source and mining behavior patterns of the users related to query construction and semantic correlation between queries. Such approach does not consider the personalized preference of information with respect to different users, and furthermore, the recommendation computing performed on the server side would impact the response efficiency and the throughput of a search engine. In this paper a strategy of personalized query recommendation running on the client side is proposed. The strategy makes use of a users browsing history as the information source and learns information preference of a user from the information source based on LDA(Latent Dirichlet Allocation)modeling. When an original query is submitted by a user, the search intention of the user is captured by the probability distribution of generating the original query from the learned LDA model, and the correlation between a term and the captured search intention is evaluated as the recommendation strength of the term with respect to the original query. The strongest Top N terms are selected as the final recommended expanded queries for the original query. The experimental validation of the proposed algorithm was performed on a test data set annotated manually. The experimental results show that the algorithm is superior to the approaches based solely on the semantic correlation between terms and original queries with respect to the accuracy of recommending expanded queries.

      • Research on heterogeneous Web object coreference recognition and resolution algorithm

        WANG Min, WANG Yong Bin, LI Ying

        2015,52(5):993-1000, DOI:

        Abstract:

        To resolve the coreference problem of the semantic Web data stream, this paper proposed a heterogeneous Web data stream object coreference resolution. First, the paper defined a framework to recognize and resolve Web data stream object coreference. Secondly, the paper described a conflict recognition system structure based on rule inference. The conflict recognition algorithm makes use of a fast rule matching, which improves the conflict recognition process efficiency and reduces the total refers to objects in space, time conflict and complexity of the digestion. In third, the paper defines three types of conflict and arbitration resolution algorithms for conflict resolution. Lastly, test sets are used in this paper to examine the application of heterogeneous Web data stream conflict recognition and coreference technology.

      • Dental surface reconstruction algorithm based on point cloud data

        CAO Wei, YUAN Zan, WU Zh- Hong

        2015,52(3):517-522, DOI:

        Abstract:

        After got the scattered point cloud model from the 3D scanner, first search the K nearest neighbors for each point by constructing the K D tree; Second according to those neighborhood relationships, use the least square fitting planar method to estimate the normal vector of each point. Next determine the boundary of point cloud, select the extreme point as the initial point, and build seed triangle. Finally use the local optimal triangle mesh growing algorithm based on multiple constraints, start from the seed triangle, make the edge as extension condition, search for suitable point to construct new triangle layer by layer. During this process four constraints added, to better select the extension point, and extend the triangle edge outward, finally generate adjacent triangle meshes, realize the surface reconstruction more realistically.

      • The Research of network traffic identification based on Convolutional neural network

        LI Qin, SHI Wei, SUN Jie-Ping, DONG Chao, QU Tian-Shu

        2017,54(5):959-964, DOI:

        Abstract:

        In recent years, the deep packet inspection technology and traffic identification technology based on the statistical characteristics of data packet have developed rapidly. But they have some disadvantages. The deep packet inspection technology can’t identify the encrypted network traffic, and the other technology heavily relies on subjectively chosen statistical features. A network traffic identification method based on convolutional neural network algorithm is proposed in this paper. According to certain rules, the network data is converted to gray images. In order to improve the recognition rate, the original network data is extended according to the order of the TCP packets and the disorder of the UDP packets. Experimental data shows that this method has a high detection rate both in the application and application layer protocol.

      • The comparison of several time phase unwrapping methods

        zhaowenjing, chen wen jing, su xian yu

        2016,53(1):110-117, DOI:

        Abstract:

        Abstract: One of the key steps in 3D optical shape measurement based on the structured light projection is the phase unwrapping. The unwrapping issue about the complicated phase map is also the difficult step of the methods. The temporal phase unwrapping provide a useful tool to obtain the continuous phase map from the complicated wrapped phase map. Along the time direction, the temporal phase unwrapping is independently carried out from a 3D distribution demodulated from grating fringes with different pitches projected on the tested object. Therefore the problem of the error propagation in 2D phase unwrapping algorithm can be avoided. Followed by the comparison among the typical temporal phase unwrapping methods, including the negative exponential method, three pitches unwrapping method, three pitches heterodyne unwrapping method and its improved technique, a segmentation curve fitting method is used to improves the phase calculation accuracy. The computer simulations and experiments are carried out to verify that the phase error is deduced greatly through the segmentation curve fitting.

      • Malware detection technologies based on software intermediate code

        YANG Hong-Shen, ZHAO Zong-Qu, WANG Jun-Feng

        2013,50(6):1216-1222, DOI: 103969/j.issn.0490-6756.2013.6.000

        Abstract:

        The intermediate code is a special style of software representation which locates between the machine language and the high level programming language, and it can take advantage of understandable semantic information and actual execution condition for malware analysis. The malicious behavior information and characteristics can be easily found from the semantic information of intermediate code, and malware detection or classification can be realized by analyzing the whole or local information of control flow graph. Machine learning facilitates security information and rules mining in a large number of complex software representations,which is deemed as a kind of advanced malware detection method in recent malware research. This paper categorizes and analyzes the malware research technologies according to the semantic information and control flow structure of software intermediate code, and makes deep analysis to intermediate code processing and application methods based on machine learning

      • Positive solutions of third-order ∞-point boundary value problems

        GAO Ting, HAN Xiao-Ling

        2016,53(1):35-41, DOI:

        Abstract:

        In this paper, we study the existence of positive solutions to the third-order ∞-point boundary value problem u'''+ λa(t)f(u) = 0, t ∈ (0,1),u(0) = βu'(0), u(1) =∑αiu(ξi), u'(1) = 0,where λ > 0 is a parameter, ξi∈ (0,1), αi∈ [0,+∞], and satisfy ∑αi>1,0<∑αiξi(2−ξi) < 1. a(t) ∈ C([0,1],[0,∞)), f ∈ C([0,∞),[0,∞)).By using Krasnoselskii’s fixed point theorem in cones, we can obtain the existence of the positive solution and the eigenvalue intervals on which there exists a positive solution if f is either superlinear or sublinear.

      • Ensemble Kalman filter with state equality constraints

        XIE Li-Qing, HE La-Mei

        2015,52(5):958-962, DOI:

        Abstract:

        For the problem of state estimation for nonlinear systems with state equality constraints, the method that combines ensemble Kalman filter with estimate projection approaches is presented. We derive two new state estimation algorithms with constraints, by using estimate projection method for each particle of state estimation and state estimation vector after calculating weighted average respectively. The simulation shows that the new algorithms perform better in terms of estimation accuracy, comparing to particle filter and unconstrained ensemble Kalman filter.

      • Traffic flow forecasting based on network tomography

        DAI Yu-Ting, WANG Jun Feng

        2015,52(5):985-992, DOI:

        Abstract:

        To forecast the urban traffic flow more effectively, this paper proposes a Network Tomography based traffic flow prediction model. The model builds a spanning tree based on Network Tomography, estimates traffic probability distribution in road network subnet by Expectation Maximization (EM) algorithm, forecasts the traffic flow according to the flow conservation in road network. Experimental results show that the new model has higher estimation accuracy compared to the Artificial intelligence model.

      • An algorithm for personalized query recommendation using LDA modeling of client side browsing history

        WANG Gui-Hua, CHEN Li, YU Zhong-Hua, DING Ge-Jian, LUO Qian

        2015,52(4):755-763, DOI:

        Abstract:

        Modern search engines generally provide the method of expressing queries with a few keywords for their users, which makes convenience for the common users but also difficulty to retrieve the needed information for the search engines because it is difficult for them to capture the information needs of the users exactly based on a few keywords. Therefore, query recommendation as such a technology to alleviate the difficulty begins its applications in the popular search engines of nowadays. However, almost all the approaches of query recommendation proposed until today are based on wisdom of crowds, using search logs as information source and mining behavior patterns of the users related to query construction and semantic correlation between queries. Such approach does not consider the personalized preference of information with respect to different users, and furthermore, the recommendation computing performed on the server side would impact the response efficiency and the throughput of a search engine. In this paper a strategy of personalized query recommendation running on the client side is proposed. The strategy makes use of a users browsing history as the information source and learns information preference of a user from the information source based on LDA(Latent Dirichlet Allocation)modeling. When an original query is submitted by a user, the search intention of the user is captured by the probability distribution of generating the original query from the learned LDA model, and the correlation between a term and the captured search intention is evaluated as the recommendation strength of the term with respect to the original query. The strongest Top N terms are selected as the final recommended expanded queries for the original query. The experimental validation of the proposed algorithm was performed on a test data set annotated manually. The experimental results show that the algorithm is superior to the approaches based solely on the semantic correlation between terms and original queries with respect to the accuracy of recommending expanded queries.

      • Research on heterogeneous Web object coreference recognition and resolution algorithm

        WANG Min, WANG Yong Bin, LI Ying

        2015,52(5):993-1000, DOI:

        Abstract:

        To resolve the coreference problem of the semantic Web data stream, this paper proposed a heterogeneous Web data stream object coreference resolution. First, the paper defined a framework to recognize and resolve Web data stream object coreference. Secondly, the paper described a conflict recognition system structure based on rule inference. The conflict recognition algorithm makes use of a fast rule matching, which improves the conflict recognition process efficiency and reduces the total refers to objects in space, time conflict and complexity of the digestion. In third, the paper defines three types of conflict and arbitration resolution algorithms for conflict resolution. Lastly, test sets are used in this paper to examine the application of heterogeneous Web data stream conflict recognition and coreference technology.

      • Construction and Application of RecET Recombination System in Zymomonas mobilis

        LI Tao, CAO-Qing-Hua, ZHANG Yi-Zheng, WU Yan, Tan Xue-Mei

        2016,53(1):209-214, DOI:

        Abstract:

        Zymomonas mobilis is a Gram-negative bacterium with excellent ethanol-producing capabilities. The ability of ethanol yield and substrate utilization can be further improved through genetic manipulations. In this study, in order to increase the recombination efficiency of foreign genes into chromosome of Z. mobilis, the RecET genes were cloned into the E. coli-Z. mobilis shuttle expression vector pSUZM3a, resulted in pSUZM3a-RecET. The adhA gene encoding the alcohol dehydrogenase and tetracycline resistant gene were used as the target and the selection marker genes, respectively. The PCR fragments of tetracycline resistant marker with 60bp flanking sequences homologous to adhA were electroporated directly into Z. mobilis ZM4 cells which harbored pSUZM3a-RecET. After the PCR analysis and DNA sequencing, it was found that the RecET-mediated recombination reaction resulted in adhA gene replaced by tetracycline resistant gene. The result showed that RecET system could make efficient, rapid targeted gene knock-out with only 60bp homologous arm in Z. mobilis.

      • Dental surface reconstruction algorithm based on point cloud data

        CAO Wei, YUAN Zan, WU Zh- Hong

        2015,52(3):517-522, DOI:

        Abstract:

        After got the scattered point cloud model from the 3D scanner, first search the K nearest neighbors for each point by constructing the K D tree; Second according to those neighborhood relationships, use the least square fitting planar method to estimate the normal vector of each point. Next determine the boundary of point cloud, select the extreme point as the initial point, and build seed triangle. Finally use the local optimal triangle mesh growing algorithm based on multiple constraints, start from the seed triangle, make the edge as extension condition, search for suitable point to construct new triangle layer by layer. During this process four constraints added, to better select the extension point, and extend the triangle edge outward, finally generate adjacent triangle meshes, realize the surface reconstruction more realistically.

      • The Research of network traffic identification based on Convolutional neural network

        LI Qin, SHI Wei, SUN Jie-Ping, DONG Chao, QU Tian-Shu

        2017,54(5):959-964, DOI:

        Abstract:

        In recent years, the deep packet inspection technology and traffic identification technology based on the statistical characteristics of data packet have developed rapidly. But they have some disadvantages. The deep packet inspection technology can’t identify the encrypted network traffic, and the other technology heavily relies on subjectively chosen statistical features. A network traffic identification method based on convolutional neural network algorithm is proposed in this paper. According to certain rules, the network data is converted to gray images. In order to improve the recognition rate, the original network data is extended according to the order of the TCP packets and the disorder of the UDP packets. Experimental data shows that this method has a high detection rate both in the application and application layer protocol.

      • The comparison of several time phase unwrapping methods

        zhaowenjing, chen wen jing, su xian yu

        2016,53(1):110-117, DOI:

        Abstract:

        Abstract: One of the key steps in 3D optical shape measurement based on the structured light projection is the phase unwrapping. The unwrapping issue about the complicated phase map is also the difficult step of the methods. The temporal phase unwrapping provide a useful tool to obtain the continuous phase map from the complicated wrapped phase map. Along the time direction, the temporal phase unwrapping is independently carried out from a 3D distribution demodulated from grating fringes with different pitches projected on the tested object. Therefore the problem of the error propagation in 2D phase unwrapping algorithm can be avoided. Followed by the comparison among the typical temporal phase unwrapping methods, including the negative exponential method, three pitches unwrapping method, three pitches heterodyne unwrapping method and its improved technique, a segmentation curve fitting method is used to improves the phase calculation accuracy. The computer simulations and experiments are carried out to verify that the phase error is deduced greatly through the segmentation curve fitting.

      • Malware detection technologies based on software intermediate code

        YANG Hong-Shen, ZHAO Zong-Qu, WANG Jun-Feng

        2013,50(6):1216-1222, DOI: 103969/j.issn.0490-6756.2013.6.000

        Abstract:

        The intermediate code is a special style of software representation which locates between the machine language and the high level programming language, and it can take advantage of understandable semantic information and actual execution condition for malware analysis. The malicious behavior information and characteristics can be easily found from the semantic information of intermediate code, and malware detection or classification can be realized by analyzing the whole or local information of control flow graph. Machine learning facilitates security information and rules mining in a large number of complex software representations,which is deemed as a kind of advanced malware detection method in recent malware research. This paper categorizes and analyzes the malware research technologies according to the semantic information and control flow structure of software intermediate code, and makes deep analysis to intermediate code processing and application methods based on machine learning

      • Traffic flow forecasting based on network tomography

        DAI Yu-Ting, WANG Jun Feng

        2015,52(5):985-992, DOI:

        Abstract:

        To forecast the urban traffic flow more effectively, this paper proposes a Network Tomography based traffic flow prediction model. The model builds a spanning tree based on Network Tomography, estimates traffic probability distribution in road network subnet by Expectation Maximization (EM) algorithm, forecasts the traffic flow according to the flow conservation in road network. Experimental results show that the new model has higher estimation accuracy compared to the Artificial intelligence model.

      • An algorithm for personalized query recommendation using LDA modeling of client side browsing history

        WANG Gui-Hua, CHEN Li, YU Zhong-Hua, DING Ge-Jian, LUO Qian

        2015,52(4):755-763, DOI:

        Abstract:

        Modern search engines generally provide the method of expressing queries with a few keywords for their users, which makes convenience for the common users but also difficulty to retrieve the needed information for the search engines because it is difficult for them to capture the information needs of the users exactly based on a few keywords. Therefore, query recommendation as such a technology to alleviate the difficulty begins its applications in the popular search engines of nowadays. However, almost all the approaches of query recommendation proposed until today are based on wisdom of crowds, using search logs as information source and mining behavior patterns of the users related to query construction and semantic correlation between queries. Such approach does not consider the personalized preference of information with respect to different users, and furthermore, the recommendation computing performed on the server side would impact the response efficiency and the throughput of a search engine. In this paper a strategy of personalized query recommendation running on the client side is proposed. The strategy makes use of a users browsing history as the information source and learns information preference of a user from the information source based on LDA(Latent Dirichlet Allocation)modeling. When an original query is submitted by a user, the search intention of the user is captured by the probability distribution of generating the original query from the learned LDA model, and the correlation between a term and the captured search intention is evaluated as the recommendation strength of the term with respect to the original query. The strongest Top N terms are selected as the final recommended expanded queries for the original query. The experimental validation of the proposed algorithm was performed on a test data set annotated manually. The experimental results show that the algorithm is superior to the approaches based solely on the semantic correlation between terms and original queries with respect to the accuracy of recommending expanded queries.

      • Research on heterogeneous Web object coreference recognition and resolution algorithm

        WANG Min, WANG Yong Bin, LI Ying

        2015,52(5):993-1000, DOI:

        Abstract:

        To resolve the coreference problem of the semantic Web data stream, this paper proposed a heterogeneous Web data stream object coreference resolution. First, the paper defined a framework to recognize and resolve Web data stream object coreference. Secondly, the paper described a conflict recognition system structure based on rule inference. The conflict recognition algorithm makes use of a fast rule matching, which improves the conflict recognition process efficiency and reduces the total refers to objects in space, time conflict and complexity of the digestion. In third, the paper defines three types of conflict and arbitration resolution algorithms for conflict resolution. Lastly, test sets are used in this paper to examine the application of heterogeneous Web data stream conflict recognition and coreference technology.

      • Construction and Application of RecET Recombination System in Zymomonas mobilis

        LI Tao, CAO-Qing-Hua, ZHANG Yi-Zheng, WU Yan, Tan Xue-Mei

        2016,53(1):209-214, DOI:

        Abstract:

        Zymomonas mobilis is a Gram-negative bacterium with excellent ethanol-producing capabilities. The ability of ethanol yield and substrate utilization can be further improved through genetic manipulations. In this study, in order to increase the recombination efficiency of foreign genes into chromosome of Z. mobilis, the RecET genes were cloned into the E. coli-Z. mobilis shuttle expression vector pSUZM3a, resulted in pSUZM3a-RecET. The adhA gene encoding the alcohol dehydrogenase and tetracycline resistant gene were used as the target and the selection marker genes, respectively. The PCR fragments of tetracycline resistant marker with 60bp flanking sequences homologous to adhA were electroporated directly into Z. mobilis ZM4 cells which harbored pSUZM3a-RecET. After the PCR analysis and DNA sequencing, it was found that the RecET-mediated recombination reaction resulted in adhA gene replaced by tetracycline resistant gene. The result showed that RecET system could make efficient, rapid targeted gene knock-out with only 60bp homologous arm in Z. mobilis.

      • Dental surface reconstruction algorithm based on point cloud data

        CAO Wei, YUAN Zan, WU Zh- Hong

        2015,52(3):517-522, DOI:

        Abstract:

        After got the scattered point cloud model from the 3D scanner, first search the K nearest neighbors for each point by constructing the K D tree; Second according to those neighborhood relationships, use the least square fitting planar method to estimate the normal vector of each point. Next determine the boundary of point cloud, select the extreme point as the initial point, and build seed triangle. Finally use the local optimal triangle mesh growing algorithm based on multiple constraints, start from the seed triangle, make the edge as extension condition, search for suitable point to construct new triangle layer by layer. During this process four constraints added, to better select the extension point, and extend the triangle edge outward, finally generate adjacent triangle meshes, realize the surface reconstruction more realistically.