Loading...
Welcome to Journal of University of Chinese Academy of Sciences,Today is

Current Issue

2013, Vol.30, No.1 Previous Issue    Next Issue
Research Articles
Recognition and detection of target DNA using radio-labelled peptide nucleic acids
WANG Guang-Wei, HUANG Liang, XIANG Kai-Xiang, ZHAO Hong, HE Yu-Jian
2013, 30 (1): 1-5.  DOI: 10.7523/j.issn.1002-1175.2013.01.001
Abstract ( 1387 ) PDF (KB) ( 3 )

The radio-111In3+ labelled peptide nucleic acid (PNA) was used as molecular probe and the pUC19-C1 plasmid which contains the target site of the PNA probe was constructed. The results show that PNA forms a stable double helix with not only the complementary single-stranded nucleic acid but also the plasmid in the presence of PNA opener. It is suggested that radio-labelled PNA probe can be used to detect target DNA in genes.

Facile synthesis of monodispersed β-HgS nano-superspheres and their optical properties
WANG Xiu-Xin, WU Lei, CAO Jing, LIU Ya-Ling, SONG Rui
2013, 30 (1): 6-10.  DOI: 10.7523/j.issn.1002-1175.2013.01.002
Abstract ( 2409 ) PDF (KB) ( 10 )

β-HgS superspheres with uniform sizes and micro-sub-planes were synthesized by hydrothermal method. The β-HgS superspheres have very strong absorption in a wide wavelength range from ultraviolet to visible region. In addition, they show good photovoltaic behavior with short circuit current density of ~0.12 mA·cm-2, open circuit voltage of ~0.4 V, fill factor of ~4.4%, and energy conversion efficiency of ~0.21%.

Effects of Cd on activity and gene expression of antioxidant enzymes in hyperaccumulator Solanum nigrum L
ZHANG Yu-Xiu, JIN Ling, FENG Shan-Shan, LIU Jin-Guang, CHAI Tuan-Yao
2013, 30 (1): 11-17.  DOI: 10.7523/j.issn.1002-1175.2013.01.003
Abstract ( 1532 ) PDF (KB) ( 3 )

The 6-week-old seedlings of Solanum nigrum L. were treated with 30-100 μmol/L CdCl2 for 0-72 h. It was detected that the total activities of SOD, POD, CAT, and APX in leaf and root were obviously enhanced with increased Cd concentration and prolonged Cd treatment. Real-time quantitative PCR showed that the transcripts of FSD1, CSD2, POD2, and CAT2 in leaf or FSD1, CSD2, POD1, and APX3 in root were up-regulated and the mRNAs of POD1 and CAT1 in leaf or CSD1, MSD1, and CAT1 in root were down-regulated, while no changes in the transcripts of CSD 1, MSD1, APX1, and APX3 in leaf or POD2, CAT2, and APX1 in root were detected. The results indicate that the element Cd enhances or maintain the transcription level of antioxidant enzyme genes or regulates the post-transcriptional level, and it increases the enzyme activity.

Confirmation of weak protein-protein interactions by optimizing co-immunoprecipitation
FENG Xiao-Qin, XU Feng, WANG Wei, LIU Li-Xin
2013, 30 (1): 18-23.  DOI: 10.7523/j.issn.1002-1175.2013.01.004
Abstract ( 2457 ) PDF (KB) ( 2 )

Co-immunoprecipitation is widely used to detect protein-protein interaction in physiological condition. The single-factor method was used to optimize some factors of co-immunoprecipitation, including component concentrations of cell-lysis buffer, antibody dosage, hCLP46 protein quantity, and cross-linking DSP. As a result, the weak interaction between hCLP46 (human CAP10-like protein 46) and ER chaperone calnexin is confirmed. The present work provides an important basis for further study of the protein-protein interaction.

Stepwise approach for identifying pairwise fracture intersections in 3D fracture networks
LIU Hua-Mei, WANG Ming-Yu, SONG Xian-Feng
2013, 30 (1): 24-32.  DOI: 10.7523/j.issn.1002-1175.2013.01.005
Abstract ( 1600 ) PDF (KB) ( 3 )

Numerical computation for flow and solute transport in fractured rocks will be very efficient if only the connected fractures are kept. An approach is proposed for progressively identifying pairwise fracture intersections in 3D stochastically distributed fracture networks based on spatial indexing. By comparing the simulation results obtained using the proposed stepwise approach and the traditional exhaustion algorithm, we observed that, the proposed approach is much more effective.

Motion simulation of three-dimensional ideal water based on central-differences method
DING Zhen, RUI Xiao-Ping, LIU Zhen-Yu, LU Jin
2013, 30 (1): 33-39.  DOI: 10.7523/j.issn.1002-1175.2013.01.006
Abstract ( 1424 ) PDF (KB) ( 2 )

We propose a method for simulating the motion effect of three-dimensional water surface. First, the shape of water surface is built by the method of fractional Brownian motion. Secondly, the simplified equation of fluid mechanics is discretized by using central-differences method. Finally, the texture mapping and the LOD construction for simulation of large-scale water surface are also discussed. Experimental results show that this method is effective and it can achieve a good visualization effect.

Detection of selected pathogenic bacteria during oxidation ditch wastewater treatment
LIN Yu-Xin, ZHANG Zhen-Nan, XU Ya-Hui, LI Juan, LIU Xin-Chun
2013, 30 (1): 40-46.  DOI: 10.7523/j.issn.1002-1175.2013.01.007
Abstract ( 1324 ) PDF (KB) ( 2 )

Indicator bacterium E. coli and pathogenic bacteria Salmonella and Legionella were detected during the wastewater treatment of oxidation ditch, using SYBR I Real-time quantitative PCR. The detected amount of E.coli was 108 copies/mL and decreased by 2 orders of magnitude eventually. In the initial stages, the amount of Salmonella ranged from 102 to 103 copies/mL but was eliminated or reduced to undetectable level eventually. The amount of Legionella was detected to be 10-102 copies/mL in the sample of activated sludge. However, the amount of Legionella in the effluent samples was detectable and similar to those in the influent samples, which ranged from 104 to 105 copies/mL.

DEM extraction via circular synthetic aperture radar
LIU Ting, LIN Yun, TAN Wei-Xian, HONG Wen, WANG Yan-Ping
2013, 30 (1): 47-52.  DOI: 10.7523/j.issn.1002-1175.2013.01.008
Abstract ( 1523 ) PDF (KB) ( 1 )

Circular synthetic aperture radar (CSAR) has the capabilities of 360°all-aspect observation and high-resolution 3D reconstruction. Therefore it can obtain the DEM of the scenes. We propose a method to directly extract the DEM via CSAR. We cut the radar track circle into different arcs and then divide each arc into many sub-apertures. By utilizing the similarity of the sub-aperture images we extract the DEM by the way of the cross correlation. The data obtained in the microwave anechoic chamber indicate that this method is effective.

Real-time data acquisition system for baseline measurements of InSAR based on PCI and FPGA
WANG Jing, LIU Zhong-Sheng, DING Bin, XIANG Mao-Sheng, WEI Li-Deng, SUN Xi-Rui
2013, 30 (1): 53-59.  DOI: 10.7523/j.issn.1002-1175.2013.01.009
Abstract ( 1535 ) PDF (KB) ( 2 )

A hardware design of a data acquisition and storage system based on PCI and FPGA for the baseline measurement system of dual-antenna interferometric SAR is proposed and implemented, for fulfilling the high speed and real-time requirements. The system realizes high speed data transmission between PCI bus and CCD camera and Laser range finder. The system controls and buffers the data by FPGA and large amount SDRAM using multiple hard disk array for real-time storage. The performance test results show that the system has large data throughput, good real-time, and stable performance.

A new spatial speckle reduction method for polarimetric SAR data
ZHANG Jing-Yi, LEI Bin, LIU Tuan-Jie
2013, 30 (1): 60-67.  DOI: 10.7523/j.issn.1002-1175.2013.01.010
Abstract ( 1254 ) PDF (KB) ( 12 )

In order to effectively reduce the speckle of PolSAR data,a new algorithm is proposed combing the improved sigma filter with unsupervised Wishart classification based on Freeman-Durden decomposition. Pixels within the sigma range and also in the same scattering category are selected and used to estimate the central pixel. The experiment results show that the proposed algorithm excels in both the suppression of the speckle and the preservation of the edges and texture details and that it can protect the scattering characteristics of targets.

Dynamic threshold control for peak detection of UWB receiver based on training sequence
WANG Yan-Yan, BAI Xue-Fei, HUANG Lu, LIU Yong
2013, 30 (1): 68-73.  DOI: 10.7523/j.issn.1002-1175.2013.01.011
Abstract ( 1442 ) PDF (KB) ( 2 )

The performance of peak detection of ultra-wide band receiver is greatly affected by the threshold of the comparator. Considering that the bit error rate is a convex function of the threshold, we propose a dynamic threshold control based on training sequence. The simulation results show that the proposed practical algorithm can track and approach the optimal comparator threshold to achieve better reception performance.

GPS-constrained estimate method of present-day slip rate along major faults of Sichuan-Yunnan region in China
GUO Xiao-Hu, WEI Dong-Ping, ZHANG Ke-Liang
2013, 30 (1): 74-82.  DOI: 10.7523/j.issn.1002-1175.2013.01.012
Abstract ( 1883 ) PDF (KB) ( 3 )

In order to obtain the long-term motions of blocks and contemporary slip rates along major bounding faults in Sichuan-Yunnan region,we built a GPS-constrained linear elastic block model with 24 blocks and eliminated the effect of internal deformation of each block. After the elimination of internal deformation effect,the results show that the RMSE of residual velocities decreased from 1.46 mm/a to 1.15 mm/a. Therefore, one should consider the elastic internal deformation effect when analyzing the motion characteristics of tectonically complicated region using block model.

Anomaly detection method in video based on spatio-temporal surprise computation
XIE Jin-Sheng, GUO Li, CHEN Yun-Bi, ZHAO Long
2013, 30 (1): 83-89.  DOI: 10.7523/j.issn.1002-1175.2013.01.013
Abstract ( 1559 ) PDF (KB) ( 2 )

We propose an anomaly detection method in video based on Bayesian surprise computation. We use the block-matching motion estimation method to extract low-level motion features (such as magnitude and direction of motion) and then calculate multi-scale histogram of motion vector. We use both spatial surprise and temporal surprise to detect not only "individual abnormal behavior" but also "group abnormal behavior". Experimental results show that our algorithm is robust and applicable and it can be easily implemented.

Adaptive replica consistency mechanism for cloud storage
WANG Xi-Mei, YANG Shou-Bao, WANG Shu-Ling, GUO Liang-Min
2013, 30 (1): 90-97.  DOI: 10.7523/j.issn.1002-1175.2013.01.014
Abstract ( 1451 ) PDF (KB) ( 2 )

An adaptive replica consistency mechanism is proposed based on consistency requirements, including update consistency and reconciliation strategy. System regulates replica consistency mechanism dynamically according to consistency requirements so that a dynamic balance between consistency, availability, and system performance is achieved. Evaluation results show that the proposed mechanism decreases the amount of operation significantly while guarantees consistency requirements and promotes replica availability.

Privacy protection of user identities in cloud computing
LI Ling, LI Jing, XU Lin, WANG Wei-Wei
2013, 30 (1): 98-105.  DOI: 10.7523/j.issn.1002-1175.2013.01.015
Abstract ( 1488 ) PDF (KB) ( 2 )

Based on identity-based cryptography in cloud computing, we focus on the privacy protection of user identities in fuzzy identity-based encryption by considering the selection of threshold parameter δ as a problem of attribute relevance analysis. We also suggest a proposal to use random masking for keeping the privacy of user identities.

Fast search method for large-scale video based on distributed LSH
CAO Hai-Bin, ZHU Ming, FENG Wei-Guo
2013, 30 (1): 106-111.  DOI: 10.7523/j.issn.1002-1175.2013.01.016
Abstract ( 1674 ) PDF (KB) ( 4 )

we propose a fast similarity-based video retrieval method for large-scale video database. This method solves scalability and efficiency problems. First, we extract feature vector set for every video and build index using a distributed memory hash structure, called MD-LSH. Secondly, we calculate the similarity of the relevant videos according to the returned similar frame sets. Finally, we return the sorted similar video list as the query results. Experiments show the effectiveness of the proposed method for large-scale video fast retrieval.

Range image registration based on Hough transform
Ablet Ibrahim, WANG Zhi-Qiang, LIU Wei, GAO Hui-Ting
2013, 30 (1): 112-116.  DOI: 10.7523/j.issn.1002-1175.2013.01.017
Abstract ( 1582 ) PDF (KB) ( 4 )

Image registration is important in the 3D-reconstruction from multi-view sampling points. A method based on Hough transform is proposed for the registration from multi-view image. First, all the lines are detected using Hough transform and the correspondent lines are fixed automatically. Then transformation matrix is calculated by using these correspondent lines. Finally the experimental results are given.

Academic resource collaborative recommendation algorithm based on content correlation
ZHOU Jia, LUO Tie-Jian
2013, 30 (1): 117-123.  DOI: 10.7523/j.issn.1002-1175.2013.01.018
Abstract ( 2113 ) PDF (KB) ( 2 )

We propose an academic resource collaborative recommendation algorithm by analyzing Web log to find learner's intention and mining content correlation to match interest. Experiments show that there is no significant difference in coverage between our algorithm and the existing method. The accuracy is improved by 5.13% and the response time reduces to 1/9. The accuracy is improved by 6.73% when the training/test ratio is less than 50%.

Secure cross-document messaging scheme based on HTML5
LI Xiao-Yu, ZHANG Yu-Qing, LIU Qi-Xu, ZHENG Chen
2013, 30 (1): 124-130.  DOI: 10.7523/j.issn.1002-1175.2013.01.019
Abstract ( 1566 ) PDF (KB) ( 3 )

We analyze security risk of the current cross-document messaging methods based on HTML5 and propose a secure cross-document messaging scheme SafePM. In SafePM, white list, two-way detection, and auto-detecting are developed to limit maliciously messaging. Moreover, with the detection of the message content, SafePM eliminates information leakage and tampering and reduce the risk for executing of cross-site scripts, which makes cross-document messaging more secure.

Quantum dynamic password authentication scheme
LI Zhao, YANG Li, ZHOU Rui-Rui
2013, 30 (1): 131-136.  DOI: 10.7523/j.issn.1002-1175.2013.01.020
Abstract ( 1193 ) PDF (KB) ( 2 )

In a classical dynamic password authentication system(CDPAS), the password changes with time to get the 'one time pad' security. The hash function is computationally secure. Thus the CDPAS is not statistically secure. We propose a quantum dynamic password scheme. It compresses the attack time period and resist the replay attack. It is statistically secure and significantly enhances the reusing times of the seed compared to the CDPAS.

Brief Report
Image super-resolution approach for license-plate recognition
YAO Zhen-Jie, YI Wei-Dong
2013, 30 (1): 137-143.  DOI: 10.7523/j.issn.1002-1175.2013.01.021
Abstract ( 2617 ) PDF (KB) ( 1 )

An object-oriented image super-resolution approach is proposed, which imitates visual cognition of human beings. The reconstruction procedure needs only a single image of the license plate. In the training stage, the corresponding relationship between high and low image patches is built by combined sparse coding. After an object is detected, the low resolution object image is reconstructed by compressing sensing under assumption of sparse representation. Experimental results on license plate images show that the PSNR is improved by nearly 2 dB compared to conventional non-object oriented strategy, and 20% of misrecognized characters are correctly recognized after reconstruction.