Learn More
XML digital signature is an important specification of W3C, while most implementations of the digital signatures are based on the overall XML document at present. This paper mainly describes a method and process of digital signature for XML resource document fragment. The method is available and effective through practice by JDK 6.
OBJECTIVE To study the expression of matrix metalloproteinase (MMP)-2, 9 and tissue inhibitor of metalloproteinase (TIMP)-1, 2 protein in human endometrial carcinoma tissue and its relation to the invasion and metastasis of endometrial carcinoma. METHODS Immunocytochemistry and zymography techniques were used to measure the MMP-2, MMP-9, TIMP-1, TIMP-2(More)
Low Al-composition p-GaN/Mg-doped Al0.25Ga0.75N/n(+)-GaN polarization-induced backward tunneling junction (PIBTJ) was grown by metal-organic chemical vapor deposition on sapphire substrate. A self-consistent solution of Poisson-Schrödinger equations combined with polarization-induced theory was used to model PIBTJ structure, energy band diagrams and free(More)
Targeted therapy is currently a hot topic in the fields of cancer research and drug design. An important requirement for this approach is the development of potent and selective inhibitors for the identified target protein. However, current ways to estimate inhibitor efficacy rely on empirical protein-ligand interaction scoring functions which, suffering(More)
We report intrinsic current-voltage properties of ZnO nanowire measured by a four-tip scanning tunneling microscopy ͑F-STM͒. It is found that after bending the nanowire with the F-STM the conductance is reduced by about five orders of magnitude. The cathodoluminescent spectra indicate that the ZnO nanowires contain a sizable amount of defects in the surface(More)
Calculation of large complex systems remains to be a great challenge, where there is always a trade-off between accuracy and efficiency. Recently, we proposed the extended our own n-layered integrated molecular orbital (ONIOM) method (XO) (Guo, Wu, Xu, Chem. Phys. Lett. 2010, 498, 203) which surmounts some inherited limitations of the popular ONIOM method(More)
  • Wenping Guo
  • 2011
How to ensure the security of digital image information is a difficult and hot problem. This paper presents a new digital image scrambling encryption algorithm based on chaotic sequence. The algorithm utilizes the good features of chaotic sequence related to cryptographic properties, such as pseudo-random, sensitivity to initial conditions and aperiodicity.(More)
As lack of semantic for information description and semantic support for the query processing, traditional Blog systems are unable to satisfying users in the performance of information organization and retrieval. Through analyzing the existing technologies in Blog systems and focusing on semantic retrieval of Blog information resource, this paper proposes(More)
The technology of Instant Messaging (IM) is becoming an important means of communication nowadays. However, some inherit security weaknesses have been recognized as a serious barrier for IM building up its position as an Internet key application. This paper presents a security design for IM on the basis of comparison between the RSA algorithm and the 3DES(More)