Xuefeng Zheng

Learn More
BACKGROUND/AIMS We aimed to elucidate the effect of Snail transcriptional factor on invasion and metastasis and related molecular mechanisms in HCC. METHODOLOGY Quantitative RT-PCR was performed to evaluate Snail, E-cadherin and MMP-2 mRNA expressions in HCC tissues from 47 patients as well as the expressions with metastases in these patients. Snail siRNA(More)
PURPOSE Both passive flexion-active extension and active rehabilitation have shown advantages and disadvantages in tendon healing. The purpose of this study was to measure the effect of a combination of these 2 rehabilitation protocols. METHODS A tendon injury model was used in white Leghorn chickens. Thirty-two animals were randomly assigned into 4(More)
Many projects have tried to analyze the structure and dynamics of application overlay networks on the Internet using packet analysis and network flow data. While such analysis is essential for a variety of network management and security tasks, it is difficult on many networks: either the volume of data is so large as to make packet inspection intractable,(More)
Given signatures on distinct messages from n distinct users, aggregate signature scheme is possible to aggregate all these signature into a single short signature. In this paper, we propose an identity-based aggregate signature scheme which requires constant pairing operations in the verification. We prove that the proposed signature scheme is secure(More)
An emerging internet based super computing model is represented by cloud computing. Cloud computing is the convergence and evolution of several concepts from virtualization, distributed storage, grid, and automation management to enable a more flexible approach for deploying and scaling applications. However, cloud computing moves the application software(More)
In this paper, the security of electronic commerce and the security methods are introduced firstly. Then, the history of Java security architecture and its design principles are described. After that, partial implementation of elliptic curve cryptosystem developed with Java is discussed. In the end, the advantages of electronic commerce systems developed(More)
STUDY DESIGN A dissection-based study of 6 embalmed cadavers. OBJECTIVE To identify and describe the extraforaminal ligaments (EFLs) in relation to the area of the cervical intervertebral foramina and to evaluate their clinical significance. SUMMARY OF BACKGROUND DATA EFLs between the lumbar spinal nerves and the tissues surrounding the intervertebral(More)
In order to improve the accuracy of trust evaluation of subscribers (or key holders) from relying parties’ point of view, a new model of trust degrees for PKI is proposed. By analyzing the security risks during the applying and using process of certificates and private keys, we introduce non-trust factor (NTF); then based on NTF, a method for trust(More)
This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present the key management scheme as a combination of identity-based and threshold cryptography for ad hoc networks. It is a certificateless solution which eliminates the need for public key distribution and certificates in conventional public key(More)
Feature subset selection, as an important processing step to knowledge discovery and machine learning, is effective method in reducing irrelevant and or redundant features, compressing repeated data, and improving classification accuracy. Rough set theory is an important tool to select feature subset from high-dimensional data. In this work, feature subset(More)