Xiaoyuan Yang

Learn More
BACKGROUND At present, alphaherpesviruses gI gene and its encoding protein have been extensively studied. It is likely that gI protein and its homolog play similar roles in virions direct cell-to-cell spread of alphaherpesviruses. But, little is known about the characteristics of DEV gI gene. In this study, we expressed and presented the basic properties of(More)
BACKGROUND Most of the previous research work had focused on the epidemiology and prevention of duck enteritis virus (DEV). Whilst with the development of protocols in molecular biology, nowadays more and more information about the genes of DEV was reported. But little information about DEV UL53 gene and glycoprotein K(gK) was known except our reported(More)
Most modern secure image steganographic schemes define distortion functions for constraining the embedding changes to those parts of the image that are difficult to model such as textured or noisy regions. However, thus arguments disregard Kerckhoffs’ principle: the warden also knows the adaptivity criterion as well and may be able reproduce or estimate it.(More)
Fair multi-party exchange protocol is one of the foundation electronic commerce, but at present, the study of multi-party fair exchange protocol is very weak. Aiming at solving this problem, we present a secure and efficient ID-based fair multi-party exchange protocol with off-line semi-trusted third party. Application of multi-receiver identity-based(More)
A rotation resistant image watermarking algorithm is proposed to solve digital image watermarking extracting difficultly when rotating with any angle. The algorithm firstly deal watermarking with binary serialization, and then divide the source image into several circle area with the center point of the image, segment the circle area according to length of(More)
This paper designs and implements a WCDMA (Wideband Code Division Multiple Access) network mobile terminal positioning system. In this system, we use a device to call the target initiatively so as to tempt it to establish a link with the base station, but every call stops before the target perception. The system captures relevant parameters in link(More)