http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Proteomic Analysis of Shigella Virulence Effectors Secreted under Different Conditions
( Xingming Liu ),( Lilan Lu ),( Xinrui Liu ),( Xiankai Liu ),( Chao Pan ),( Erling Feng ),( Dongshu Wang ),( Chang Niu ),( Li Zhu ),( Hengliang Wang ) 한국미생물 · 생명공학회 2017 Journal of microbiology and biotechnology Vol.27 No.1
A series of novel effector molecules secreted by the type three secretion system (T3SS) of Shigella spp. have been reported in recent years. In this study, a proteomic approach was applied to study T3SS effectors systematically. First, proteins secreted by the S. flexneri wildtype strain after Congo Red induction were separated and identified using two-dimensional electrophoresis to display the relative abundance of all kinds of early effectors for the first time. Then, a gene deletion mutant of known virulence repressor (OspD1) and a gene overexpressed mutant of two known virulence activators (MxiE and IpgC) were constructed and analyzed to discover potential late effectors. Furthermore, the supernatant proteins of gene deletion mutants of two known translocators (IpaB and IpaD), which would constantly secrete effectors, were also analyzed. Among all of the secreted proteins identified in our study, IpaH1.4, IpaH_5, and IpaH_7 have not been reported before. These proteomics data of the secreted effectors will be valuable to understand the pathogenesis of S. flexneri.
Investigation of the interstitial oxygen behaviors in vanadium alloy: A first-principles study
Xingming Zhang,Yifan Li,Qiaoling He,Ruilian Li,Lei Deng,Liang Wang,Xunlin Liu,Jianfeng Tang,Huiqiu Deng,Wang-Yu Hu 한국물리학회 2018 Current Applied Physics Vol.18 No.2
This study aims at characterizing the interstitial Oxygen (O) behaviors in the Vanadium (V) Alloy by means of the first-principles calculations. For this, the interations between vacancy (Vac) and O interstitil atom are studied in detail to obtain the binding energies and stable structures of the complexes. It can be seen that monovacancy binding with two O atoms occupied the opposing octahedral stie are particularly stable, and is liable to form VacO2 cluster in the V alloys. According to the mass action analysis, the predicted temperature dependence of the concentration for VacOn complexes are presented. Apart from monovacancy, we also consider the trapping behavior of vacancy cluster on the O atoms. The results also prove that one vacancy can trap two O atoms in the V alloys. Based the diffusion theory, we obtain the diffusion coefficients as a function of temperature with or without the vacancy effect in the V alloys. The predicted O diffusion coefficients in defect-free V alloys from our first-principles calculations are in excellent ageement with the experimental data, meanings that the vacancy-limited mechanism does not play the key role for O diffusion in V alloys. Regarding the interactions between vacancy, solutes and O atom, combining with the diffusion barriers of O affected by vacancy and solute, we infer the formation mechanism of the precipitates in the V alloys.
Jingwen Liu,Wei Wang,Yumin Zhang,Xingming Xu 대한전기학회 2019 Journal of Electrical Engineering & Technology Vol.14 No.5
The electricity load scheduling problem in a household with roof-top photovoltaic (PV) system can efficiently reduce customers’ payments. Compared with previous works in which common flat rate (CFR) has been used, this paper study the case where the time-of-use pricing (TOUP) is adopt. Two conditional equations are constructed for different gains of customers. This is caused by different power direction between the household and the main grid. The two conditional gains equations for the customer are transformed into linear equations by introducing auxiliary variables and linear expression techniques. As a result, established mathematical model to maximize gains for customer is transformed into a mixed integer linear programing (MILP) problem. Thus the resulting MILP model can be easily solved by existing powerful commercial solver. The adjustable and rating power consumption property of appliances are both considered. There are two different mathematic models for them respectively. The impact of reduction of the maximum exchange power between the household and the main grid on gains of the customer, gains of the main grid, load demand during off-peak time and energy exported to the main grid is also studied. The validity and feasibility of the proposed model is illustrated by the case studies.
Quan Liu,Yong Lu,Gang Hu,Shaohe Lv,Xiaodong Wang,Xingming Zhou 한국통신학회 2018 Journal of communications and networks Vol.20 No.6
Due to dynamic channel availability in cognitive radionetworks (CRNs), rendezvous problem is known as the mostchallenging issue in the design of media access control (MAC)protocol, which is a key step for secondary users (SUs) to startcommunication. With the concept of blind rendezvous, numerouschannel-hopping sequence (CHS) based rendezvous schemeshave been proposed to solve this problem in these years. Currently,little attention is paid to the design of a carrier sensing multipleaccess/collision avoidance (CSMA/CA) MAC based on theserendezvous schemes and also the rendezvous de-synchronizationproblem brought by multiple rendezvous networking paradigminto MAC design. To this end, we propose a cooperative channelhoppingbased CSMA/CA MAC (named CoCH-CSMA/CA MAC)which works on the top of existing CHS based rendezvous schemes. Resulting from the rendezvous de-synchronization problem, a newtype of collision, named false collision, is identified. As a SU cannotdiscern the false collision by itself, we design a cooperative controlfeedback scheme which employs correlation-based signal detectionto reduce the coordination overhead of cooperation and helps SUsto avoid backoff misbehavior. Moreover, we analyze the behavior ofour MAC protocol and its advantage. Extensive simulations provethat the cooperative control feedback scheme can effectively alleviatethe impact of rendezvous de-synchronization problem on backoffmisbehavior and improve network performance.
A Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Semantic Extension
Zhihua Xia,Li Chen,Xingming Sun,Jianxiao Liu 보안공학연구지원센터 2016 International Journal of Multimedia and Ubiquitous Vol.11 No.8
With the emergence of cloud computing, many data owners outsource their local data to cloud server so as to enjoy high-quality data storage services. For the protection of data privacy, sensitive data has to be encrypted before outsourcing, which makes effective data utilization a challenging task. Although existing searchable encryption technologies enable data users to conduct secure search over encrypted data, the functionality of these schemes need to be further improved. In this paper, we construct a secure and efficient multi-keyword ranked search scheme which supports both the semantic extension search and the multi-keyword ranked search. The semantic extension is achieved through the mutual information statistical analysis of keywords. And the multi-keyword ranked search is achieved through a balanced binary tree whose nodes are the vectors of term frequency (TF) values. The splitting operation and secure transformation are utilized to encrypt the vectors of index and query. Note that, the encrypted vectors can be well used to calculate accurate relevance scores. Phantom terms are added to the index vector to blind the search results to resist statistical attacks. Due to the use of tree-based index structure, the proposed scheme can achieve the sub-linear search time. Finally, the experiments are conducted to demonstrate the efficiency of the proposed scheme.