- RNA and protein synthesis mechanisms
- Network Security and Intrusion Detection
- Smart Grid Security and Resilience
- Gas Sensing Nanomaterials and Sensors
- Advanced Malware Detection Techniques
- Remote Sensing and LiDAR Applications
- Advanced Optical Sensing Technologies
- Advanced Data and IoT Technologies
- Fractal and DNA sequence analysis
- Machine Learning in Bioinformatics
- Chaos-based Image/Signal Encryption
- Remote Sensing in Agriculture
- Privacy-Preserving Technologies in Data
- Anomaly Detection Techniques and Applications
- Digital and Cyber Forensics
- Acoustic Wave Resonator Technologies
- Information and Cyber Security
- Transition Metal Oxide Nanomaterials
- Genomics and Phylogenetic Studies
- Web Application Security Vulnerabilities
- Genomics and Chromatin Dynamics
- Face and Expression Recognition
- Software Testing and Debugging Techniques
- Cryptographic Implementations and Security
- Grey System Theory Applications
China Southern Power Grid (China)
2018-2024
First Affiliated Hospital of Sichuan Medical University
2020
Nanjing University
2017-2019
Soochow University
2009-2017
Zhongnan Hospital of Wuhan University
2011
Wuhan University
2011
City University of Hong Kong
2009-2011
Hangzhou Dianzi University
2010
In this paper, an Improved Position Weight Matrix (IPWM) method is proposed based on entropy measure for the recognition of prokaryotic promoters. method, conservative sites promoters are extracted according to measure, and then two improved position weight matrices constructed training set. By using values matrix elements in specific columns corresponding sites, test sequences scored subsequently classified. Experiment results several datasets show that algorithm outperforms existing ones.
Nucleosome positioning can affect the accessibility of underlying DNA to nuclear environment and as such plays an essential role in regulation cellular processes.Specific patterns have been found sequences nucleosome, one most important includes dinucleotides distributed every 10 11 base pairs.Based on this property, we propose match each dinucleotide sequence against its mirror occurrences for pairs both left-hand right-hand sides.A large number matches a local region will then signify...
The lidar full-waveform echo can be decomposed into a series of components each which essentially considered as Gaussian function models. In this paper, we use empirical mode decomposition to decompose the original intrinsic functions (IMFs) and final residual. noise-level is estimated based on first IMF. IMF energy density then compared white-noise theoretical spread lines 99% confidence-limit level determine whether some IMFs are contain information. A suitable selected comparison result....
The light detection and ranging (LIDAR) full-waveform echo decomposition method based on empirical mode (EMD) the local-Levenberg-Marquard (LM) algorithm is proposed in this paper. can decompose into a series of components, each which be assumed as essentially Gaussian. original decomposed intrinsic functions (IMFs) final residual by using EMD first. Then, average period (Tm¯) corresponding energy densities (EDs) all IMFs are calculated. A suitable IMF selected relationship between EDs...
The neovascularization of biomaterials for tissue engineering is not only related to growth capillaries but also involves appropriate hierarchy distribution the microvessels. In this study, we proposed contrast method which can assess vascular transport capacity, in order examine neovessels during vascularization porous silk fibroin implanted into rats and its evolution. results showed that fractal characteristics appeared toward end stages, structure microvascular network after 3 weeks...
In this paper, we propose a continuous wavelet transform and iterative decrement algorithm to decompose the light detection ranging (LiDAR) full-waveform echoes into series of components, each which can be assumed as Gaussian essentially. We calculate scale in real time according relationship between center frequency mother approximate transmitted laser pulse. The approximated is calculated half-width effective part positions model components precisely predicted maxima coefficient. And...
Single chaotic system which is realized with limited precisions in digital computers can lead to dynamical degradation of the original systems. To solve problem, this paper introduces a new kind dual encryption algorithm constructed via Logistic map and Sine iterative map. Digital PR sequence generated using system, then an E-mail based on implemented by VC++ language. In comparison single expend control parameters increase complexity chaos behavior so as improve security encryption. order...
Both the attractiveness of power systems as targets cyberattack and their vulnerability to remote attack via digital networks are evident from recent world events. Vulnerabilities in software represent a serious risk for systems. The number vulnerabilities is increasing rapidly due development new hacking techniques. In order reduce threat impact vulnerability, companies should use management frameworks. Software patching one key activities management. This paper proposes novel mechanism...
In this paper, an improved position weight matrix (PWM) method is proposed based on entropy measure for the recognition of prokaryotic promoters. method, conservative sites promoters are firstly extracted according to measure, two matrices then constructed, after which by using values elements in specific columns corresponding sites, test sequences scored and subsequently classified. Experiment results several data sets show that algorithm outperforms existing algorithms.
In view of the increasingly severe network security situation power information system, this paper draws on experience construction technology system at home and abroad, with continuous monitoring analysis as core, covering closed-loop management defense, detection, response prediction starting point, Based existing defense-based static protection architecture, a dynamic architecture based detection is established. Compared traditional PDR adds threat prediction, strengthens behavior-based...
With the rapid development of enterprises information system, many hackers illegally obtain enterprise through exploiting system vulnerabilities, which caused huge economic losses to enterprise, therefore, vulnerability scanning and governance has become an indispensable part security. This paper proposes a method based on public information, designs fast cross-regional management platform realizes discovery processing high-risk vulnerabilities in production control area area. can finish...
In the current cyberspace, vulnerability has attracted widespread attention. This paper briefly introduces typical software mining techniques. Based on existing research work, this puts forward whole idea of technology in future, and then makes some key points technologies respectively. paper, a brief study is given, which helpful to carry out follow-up work.