Learn More
Information security risk can be measured by probability of the potential risk incident and its impact. Various quantitative methodologies are given to compute information security risks, but among the existed research, seldom of them considered the difficulties of obtaining data of risk probability and risk impact. Considering the efficiency and(More)
Corynespora cassiicola has been found for the first time in China on Hevea rubber tree (Hevea brasiliensis in south China during a survey in 2006. Symptoms on leaves included fishbone necrosis and spots. Sequence data from the ribosomal ITS operon placed the isolates within the Corynespora cassiicola complex.
BACKGROUND Emodin (1, 3, 8-trihvdroxy-6-methylanthraquinone) is derived from herbal medicines and proved to have a strong antimicrobial activity. However, its anti-virus effects are less known. The aim of the present study was to investigate the effects of emodin, interferon alpha (IFNalpha), and lamivudine (3TC) on hepatitis B virus (HBV) in vitro. (More)
Artificial ant colony algorithm is new in the evolution computing. The primary study shows it is a better algorithm with robust based population, but it has some shortcomings such as its slow computing speed, and it is easy to fall in local peak in large scale problem. To overcome these deficiencies, an improved ant colony algorithm is designed through(More)
Incisional hernias following abdominal operations are a common complication. Mesh is frequently employed to repair these hernias. Given the popularity of minimally invasive surgery utilizing polypropylene mesh for incisional hernia repair, related complications such postoperative hematoma and seroma, foreign body reaction, organ injury, infection, mesh(More)
Cloud computing is considered to be the next generation of information technology framework. It is the next generation computing platforms that can provide dynamic resource pools, virtualization and high availability. The new character brings a lot of new security challenges which have not been taken into account completely in the current cloud computing(More)
Hybrid Electric Vehicles (HEV) is becoming the important develop tendency of the vehicle for its better fuel economy and emission. The parameters of HEV control strategy is always optimized on some one standardized driving cycle, but the different city have its own driving cycle. So the great advantage of HEV is limited. This paper proposes an intelligent(More)
In the resource constraint Wireless Sensor Network(WSN), link quality and node residual energy are the key factors that need to be considered in the routing problem. This paper proposes a routing algorithm based on game theory. Firs it sets up the game model based on the Quality of Service(QoS) and node residual energy. Then it shows that the game has a(More)
In this paper, a new image encryption algorithm is presented based on Henon chaotic system in order to meet the requirements of secure image transfer. Shuffling the positions and changing the grey values of image pixels are combined to shuffle the relationship between the cipher-image and the original-image. First, the Arnold cat map is used to shuffle the(More)
A numbers studies had been reported that the polymorphisms in the Interleukin 4 (IL-4) and Interleukin 13 (IL-13) genes were associated with susceptibility to asthma. However, the results were inconsistent and inconclusive. We carried out a meta-analysis of case–control genetic association studies to assess whether the combined data showed this association(More)