Learn More
—Recently, utilizing renewable energy for wireless system has attracted extensive attention. However, due to the instable energy supply and the limited battery capacity, renewable energy cannot guarantee to provide the perpetual operation for wireless sensor networks (WSN). The coexistence of renewable energy and electricity grid is expected as a promising(More)
Sweet cherry is a non-climacteric fruit and its ripening is regulated by abscisic acid (ABA) during fruit development. In this study, four cDNAs (PacCYP707A1-4) encoding 8'-hydroxylase, a key enzyme in the oxidative catabolism of ABA, were identified in sweet cherry fruits using tobacco rattle virus-induced gene silencing (VIGS) and particle bombardment(More)
Since the first appearance in Fridrich's design, the usage of permutation-diffusion structure for designing digital image cryptosystem has been receiving increasing research attention in the field of chaos-based cryptography. Recently, a novel chaotic Image Cipher using one round Modified Permutation-Diffusion pattern (ICMPD) was proposed. Unlike(More)
To further understand the basis of abscisic acid (ABA) signal transduction in regulating sweet cherry fruit development and ripening, and also the interaction between ABA and indole acetic acid (IAA) at the onset of fruit ripening, full-length or partial cDNA of three PaPYLs (ABA receptor), six PaPP2Cs (type 2C protein phosphatase) and six PaSnRK2s(More)
—Compressive sensing (CS) has been widely studied and applied in many fields. Recently, the way to perform secure compressive sensing (SCS) has become a topic of growing interest. The existing works on SCS usually take the sensing matrix as a key and the resultant security level is not evaluated in depth. They can only be considered as a preliminary(More)
Recently, a novel image cipher [Multimed Tools Appl (2012) 56:315–330] was proposed based on mixed transformed logistic maps. The cipher includes three parts: initial permutation of all the pixels with six odd keys, nonlinear diffusion using the first chaotic keystream and xoring the second chaotic keystream with the resultant values, and Zig-Zag diffusion(More)
In this paper, the intra system and inter system interference model is studied when LTE and WiMAX coexist. A static system level simulator is used to investigate the capacity loss in case of co-existence of macro LTE uplink and macro WiMAX uplink. The capacity loss under different frequency spacing or adjacent channel interference ratios (ACIRs) and(More)