- Chromatography in Natural Products
- Spectroscopy and Chemometric Analyses
- Analytical Chemistry and Chromatography
- Advanced Chemical Sensor Technologies
- Phytochemicals and Antioxidant Activities
- Phytochemistry and biological activity of medicinal plants
- Advanced Steganography and Watermarking Techniques
- Traditional Chinese Medicine Analysis
- Phytochemical and Pharmacological Studies
- Heavy Metals in Plants
- Natural product bioactivities and synthesis
- Digital Media Forensic Detection
- Chaos-based Image/Signal Encryption
- Insect and Pesticide Research
- Pesticide Residue Analysis and Safety
- Mycotoxins in Agriculture and Food
- Energy Efficient Wireless Sensor Networks
- Blind Source Separation Techniques
- Heavy Metal Exposure and Toxicity
- Nephrotoxicity and Medicinal Plants
- Educational Technology and Assessment
- Analytical Methods in Pharmaceuticals
- Genomics, phytochemicals, and oxidative stress
- Tea Polyphenols and Effects
- Fungal Plant Pathogen Control
Hunan University
2008-2019
State Key Laboratory of Chemobiosensing and Chemometrics
2016-2018
Changsha University
2017-2018
Yunnan Agricultural University
2010-2018
State Council of the People's Republic of China
2018
Sun Yat-sen University
2016
Institute of Food Science and Technology
2012
China Medical University
1988
West China Medical Center of Sichuan University
1988
A reversible (also called lossless, distortion-free, or invertible) visible watermarking scheme is proposed to satisfy the applications, in which watermark expected combat copyright piracy but can be removed losslessly recover original image. We transparently reveal image by overlapping it on a user-specified region of host through adaptively adjusting pixel values beneath watermark, depending human visual system-based scaling factors. In order achieve reversibility, reconstruction/recovery...
In recent years, obesity has become a key factor affecting human health. Moringa oleifera Lam. is perennial tropical deciduous tree, which widely used in medicine due to its nutritional and unique medicinal value. It cholesterol-lowering effect, but mechanism of action unclear. this study, we elucidated the inhibitory effect M. leaf petroleum ether extract (MOPEE) on lipid accumulation by vitro vivo experiments, described action. MOPEE suppressed adipogenesis 3T3-L1 adipocytes dose-dependent...
Aflatoxins are toxic metabolites produced by fungi. The objective of this study was to develop an HPLC method detect the presence aflatoxins in Pu-erh tea. developed had recovery rates 81.02–90.69%. results revealed that teas from Yunnan, China, contained aflatoxins, especially AFB1 (8.333 μg/kg raw and 20.149 ripe tea). All tea samples aflatoxin levels below national maximum permissible limits; however, higher than those allowed European Union, USA, Japan. hinders its international marketability.
A chemometrics-assisted HPLC-DAD strategy is applied for direct determination of phenolic compounds in wines and authentication vintage year.
Abstract Flavonoid constituents in a crude ethanol extract from dried fruits of sea buckthorn (Hippophae rhamnoides) were subjected to countercurrent chromatography with two-phase solvent system composed chloroform, methanol and water at 4:3:2 volume ratio. Separations performed two different types the coil planet centrifuge: One is called multilayer centrifuge other, horizontal flow-through centrifuge. Both instruments permit continuous elution through rotating column without use rotary...
A methodology for simultaneously measuring seventeen polyphenols in six Chinese raw propolis samples by using chemometrics-assisted high performance liquid chromatography-diode array detection (HPLC-DAD) was developed and validated.
Since the data of wireless sensor networks play an important role in communication, many strategies have been devised to protect security networks. Due importance copyright protection for valuable data, we present a robust watermark algorithm as solution this paper. We make use numerical characteristic sending time packet embed watermark. compare performance three watermarking schemes, i.e., method without key, with 8-bit key length, and 16-bit through conducting lots simulation experiments....
Simultaneous determination of estrogens in infant milk powder using a second-order calibration method coupled with LC-MS operated full scan mode.
In this work, a smart chemometrics-enhanced strategy, high-performance liquid chromatography, and diode array detection coupled with second-order calibration method based on alternating trilinear decomposition algorithm was proposed to simultaneously quantify 12 polyphenols in different kinds of apple peel pulp samples. The strategy proved be powerful tool solve the problems coelution, unknown interferences, chromatographic shifts process chromatography analysis, making it possible for...
In the present work, a practical method that combines excitation-emission matrix fluorescence with second-order calibration based on an alternating trilinear decomposition (ATLD) algorithm was developed in order to simultaneously and directly determine contents of warfarin (WAR) aspirin (ASA) human plasma urine samples, even presence unknown interferences. With pre-estimated component number 4, obtained average spiked recoveries were 105.4 ± 7.8 104.2 8.3% for WAR, 96.5 2.8 91.2 2.3% ASA...
Idiosyncratic hepatotoxicity of Polygonum multiflorum has attracted a great attention in the world. The most toxic part idiosyncratic was screened by MTT assay and flow cytometry, which 50% ethanol elute macroporous adsorptive resins from alcohol-extraction P. multiflorum. fingerprints were collected HPLC crude processed different habitats, then 14 common peaks determined. Spectrum-toxicity relationship analyzed rough set theory(RST). Two main chemical components predicted for...
Microsoft PowerPoint files (PPT for short) are widely used today but steganographic schemes them have rarely been reported. Through detailed analysis, we discover that the PPT file update mechanism, which is employed by Application to corresponding when saving a modified presentation, can produce redundant data in file. In light of fact, novel method based on presented this paper. The basic idea proposed first locating derived from updating, and then overwriting some fields with encrypted...