83 results on '"Chunfang, Yang"'
Search Results
2. Digital watermarking method based on context word prediction and window compression coding
- Author
-
Lingyun XIANG, Minghao HUANG, Chenling ZHANG, and Chunfang YANG
- Subjects
digital watermarking ,word substitution ,word prediction ,watermarking coding ,Telecommunication ,TK5101-6720 - Abstract
To address the problems of limited number of substitutable words and low watermark extraction efficiency in the existing natural language digital watermarking methods, a creative method based on context word prediction and window compression coding was proposed.Firstly, the contextual semantic features of each word in the original text were automatically learned through a neural network language model, and then the candidate word set for each word was predicted, thus the number of substitutable words that could be utilized for carrying watermark information was expanded.Meanwhile, considering the difference of the semantic impact caused by the substitutions of candidate words at different positions, the watermark information was embedded into each window containing several words, and the selection of candidate words for watermark embedding was optimized by the similarity between sentences before and after performing word substitutions.Finally, a semantic-independent window compression coding method was proposed, which encoded each window as appointed watermark information in terms of the character information of words contained in the window.So that during watermark extraction, the dependence on the original context at the position of word substitution was eliminated.The experimental results show that the proposed method greatly improves the watermark extraction efficiency with high embedding capacity and text quality.
- Published
- 2024
- Full Text
- View/download PDF
3. SEGCN: a subgraph encoding based graph convolutional network model for social bot detection
- Author
-
Feng Liu, Zhenyu Li, Chunfang Yang, Daofu Gong, Haoyu Lu, and Fenlin Liu
- Subjects
Medicine ,Science - Abstract
Abstract Message passing neural networks such as graph convolutional networks (GCN) can jointly consider various types of features for social bot detection. However, the expressive power of GCN is upper-bounded by the 1st-order Weisfeiler–Leman isomorphism test, which limits the detection performance for the social bots. In this paper, we propose a subgraph encoding based GCN model, SEGCN, with stronger expressive power for social bot detection. Each node representation of this model is computed as the encoding of a surrounding induced subgraph rather than encoding of immediate neighbors only. Extensive experimental results on two publicly available datasets, Twibot-20 and Twibot-22, showed that the proposed model improves the accuracy of the state-of-the-art social bot detection models by around 2.4%, 3.1%, respectively.
- Published
- 2024
- Full Text
- View/download PDF
4. Digital economy empowers sustainable agriculture: Implications for farmers’ adoption of ecological agricultural technologies
- Author
-
Chunfang Yang, Xing Ji, Changming Cheng, Shiou Liao, Bright Obuobi, and Yifeng Zhang
- Subjects
Digital economy empowerment ,Ecological agricultural technologies ,Adoption behaviors ,Treatment effect model ,Sustainable agriculture ,Ecology ,QH540-549.5 - Abstract
Adopting ecological agricultural technologies (EATs) is an effective way to guarantee food security and protect the environment. With the advancement of the digital village strategy, the continuous integration of the digital economy with the rural economy has gradually become an emerging driving force for sustainable agriculture. However, few studies have examined the impact of farmers’ participation in the digital economy in different links of the agricultural industry chain on EATs adoption from a micro perspective. Using data from 2,825 grain farmers from the 2020 China Rural Revitalization Survey, this paper applies the treatment effect model and the mediating effect model to empirically analyze the impact and mechanism of participation in the digital economy on farmers’ EATs adoption from an ecological effect perspective. This paper characterizes farmers’ participation in the digital economy in terms of digital production, digital sales, and digital finance. The results show that participation in the digital economy significantly promotes farmers’ EATs adoption. The sub-dimensional test found that participation in digital production, digital sales, and digital finance significantly promotes farmers’ EATs adoption. The above findings remain robust after a series of robustness tests, such as changing the estimation method and replacing the dependent variable. Mechanism analysis shows that participation in the digital economy, especially digital sales and digital finance, could promote farmers’ EATs adoption by increasing the demand for agricultural machinery services, improving information availability, and enhancing food safety cognition; participation in the digital production could promote farmers’ EATs adoption by increasing the demand for agricultural machinery services. Results of heterogeneity analysis show that the promotion effect of participation in the digital economy on EATs adoption is more substantial among farmers with higher digital literacy and larger cultivated land scales. The findings of this paper provide insights for China and other countries to effectively use digital technology to promote sustainable agriculture under the pressure of achieving sustainable development goals.
- Published
- 2024
- Full Text
- View/download PDF
5. AENet: attention efficient network for cross-view image geo-localization
- Author
-
Jingqian Xu, Ma Zhu, Baojun Qi, Jiangshan Li, and Chunfang Yang
- Subjects
cross-view image geo-localization ,attention mechanism ,filter ,hard sample ,Mathematics ,QA1-939 ,Applied mathematics. Quantitative methods ,T57-57.97 - Abstract
To address the problem that task-irrelevant objects such as cars, pedestrians and sky, will interfere with the extracted feature descriptors in cross-view image geo-localization, this paper proposes a novel method for cross-view image geo-localization, named as AENet. The method includes two main parts: an attention efficient network fusing channel and spatial attention mechanisms and a triplet loss function based on a multiple hard samples weighting strategy. In the first part, the EfficientNetV2 network is used to extract features from the images and preliminarily filter irrelevant features from the channel dimension, then the Triplet Attention layer is applied to further filter irrelevant features from the spatial dimension. In the second part, a multiple hard samples weighting strategy is proposed to enhance the learning of hard samples. Experimental results show that our proposed method significantly outperforms the state-of-the-art method on two existing benchmark datasets.
- Published
- 2023
- Full Text
- View/download PDF
6. ENTREPRENEURIAL OPPORTUNITY, VALUE EVOLUTION, AND ORGANIZATIONAL INTEGRATION OF PROFESSIONAL FARMER ENTREPRENEURSHIP: A MULTI-CASE COMPARISON IN CHINA
- Author
-
Yifeng ZHANG, Chunfang YANG, Bright OBUOBI, Martin Kobby GRANT
- Subjects
benefit-linked mechanism ,featured agriculture ,organizational integration ,professional farmers ,rural cooperative ,structural hole theory ,Agriculture (General) ,S1-972 - Abstract
● The choice of a modern agriculture project was found to be rational for professional farmers to reduce interference from non-market factors. The success of this project is due to its capacity to successfully fill the structural hole in the market transaction network. ● Professional farmers were shown to start their businesses by occupying the 'self-benefit' or 'mutual-benefit' structural hole of the market transaction network in economically developed areas. ● Professional farmers were found to occupy the organizational-governance structural hole of the rural social relationship network and the 'mutual-benefit' structural hole of the market network to start their businesses in traditional agricultural areas. A comparative multi-case analysis of professional farmer entrepreneurship cases in China was performed by applying the structural hole theory. The results confirmed four views. (1) Choosing the modern agriculture project entrepreneurship is rational for professional farmers, who return from urban, to reduce the interference from non-market factors. The success of this project stems from its ability to successfully occupy the structural hole of the market trading network. (2) In economically developed areas, professional farmers start their businesses and reduce transaction costs with factors by occupying 'self-benefit' or 'mutual-benefit' structural holes in market networks. (3) In traditional agricultural areas, for reducing factor transaction costs, professional farmers occupy the organizational-governance structural hole of rural social relationship networks and the mutual-benefit structural hole of market networks to start their businesses. (4) The embedding order of these two structural holes will change depending on the differences in the local resource endowment. This article proposes some suggestions to encourage professional farmers to develop featured agricultural projects, build a close benefit-linked mechanism with smallholders through the provision of socialized services, and participate in the governance of rural communities.
- Published
- 2023
- Full Text
- View/download PDF
7. Transcriptomic Analysis of Sodium-Silicate-Induced Resistance against Rhizoctonia solani AG-3 in Potato
- Author
-
Yayan Feng, Jianjun Hao, Dongmei Zhang, Hongli Huo, Lele Li, Zhijun Xiu, Chunfang Yang, and Xiaoyu Zhang
- Subjects
Solanum tuberosum ,Rhizoctonia solani ,sodium silicate ,differentially expressed genes ,RNA sequencing ,transcriptome ,Agriculture - Abstract
Stem canker and black scurf of potatoes, caused by Rhizoctonia solani, are economically important diseases. Although the field application of sodium silicate has been shown to improve potato’s resistance against R. solani, the underlying mechanism remains unclear. In this study, we examined this resistance using transcriptomic analysis. Potato stems inoculated with R. solani were treated with sodium silicate, while a control group received no sodium silicate treatment. The plants were grown under natural environmental conditions at the farm of Inner Mongolia Agricultural University. Potato stems were sampled 4, 8, and 12 days after treatment. Total RNA was extracted using the TRIzol reagent and transformed into cDNA. The cDNA was sequenced, the reads were aligned, and the expression levels of genes were quantified and compared between the treated and control groups. A total of 1491 genes were identified as differentially expressed genes (DEGs). Furthermore, these DEGs were found to be involved in hydrolase activity, plant–pathogen interactions, hormone signal transduction, and the phenylpropanoid biosynthesis pathway. To confirm the up- and down-regulation of DEGs, quantitative real-time polymerase chain reaction (qRT-PCR) was performed on randomly selected genes. The results showed that the application of sodium silicate induces a complex defense network in potato plants involving physical barriers, innate immunity, phytohormone signaling, and various phenylpropanoid compounds to combat R. solani infection. This study provides valuable insights into the molecular mechanisms underlying sodium-silicate-induced resistance and its potential for reducing stem canker and black scurf in potato crops.
- Published
- 2024
- Full Text
- View/download PDF
8. Corrigendum to 'Apigenin inhibits STAT3/CD36 signaling axis and reduces visceral obesity' [Pharmacol. Res. (2020) 152 104586]
- Author
-
Tao Su, Chunhua Huang, Chunfang Yang, Ting Jiang, Junfang Su, Minting Chen, Sarwat Fatima, Rui-Hong Gong, Xianjing Hu, Zhaoxiang Bian, Zhongqiu Liu, and Hiu Yee Kwan
- Subjects
Therapeutics. Pharmacology ,RM1-950 - Published
- 2023
- Full Text
- View/download PDF
9. Biochemical and structural insights of multifunctional flavin-dependent monooxygenase FlsO1-catalyzed unexpected xanthone formation
- Author
-
Chunfang Yang, Liping Zhang, Wenjun Zhang, Chunshuai Huang, Yiguang Zhu, Xiaodong Jiang, Wei Liu, Mengran Zhao, Bidhan Chandra De, and Changsheng Zhang
- Subjects
Science - Abstract
The biosynthesis of xanthones has not been well documented. Here, the authors report that monooxygenase FlsO1 catalyzes three successive oxidations – hydroxylation, epoxidation and Baeyer–Villiger oxidation—to form the xanthone scaffold in actinomycetes.
- Published
- 2022
- Full Text
- View/download PDF
10. Flavin-enabled reductive and oxidative epoxide ring opening reactions
- Author
-
Bidhan Chandra De, Wenjun Zhang, Chunfang Yang, Attila Mándi, Chunshuai Huang, Liping Zhang, Wei Liu, Mark W. Ruszczycky, Yiguang Zhu, Ming Ma, Ghader Bashiri, Tibor Kurtán, Hung-wen Liu, and Changsheng Zhang
- Subjects
Science - Abstract
Epoxide ring opening reactions are important in both biological processes and synthetic applications. Here, the authors show that flavin cofactors can catalyze reductive and oxidative epoxide ring opening reactions and propose the underlying mechanisms.
- Published
- 2022
- Full Text
- View/download PDF
11. Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths
- Author
-
Jialin Li, Xiangyang Luo, Yi Zhang, Pei Zhang, Chunfang Yang, and Fenlin Liu
- Subjects
Information security ,Image steganography ,STC coding ,Parameter recognition ,Information technology ,T58.5-58.64 - Abstract
Privacy protection is the key to maintaining the Internet of Things (IoT) communication strategy. Steganography is an important way to achieve covert communication that protects user data privacy. Steganalysis technology is the key to checking steganography security, and its ultimate goal is to extract embedded messages. Existing methods cannot extract under known cover images. To this end, this paper proposes a method of extracting embedded messages under known cover images. First, the syndrome-trellis encoding process is analyzed. Second, a decoding path in the syndrome trellis is obtained by using the stego sequence and a certain parity-check matrix, while the embedding process is simulated using the cover sequence and parity-check matrix. Since the decoding path obtained by the stego sequence and the correct parity-check matrix is optimal and has the least distortion, comparing the path consistency can quickly filter the coding parameters to determine the correct matrices, and embedded messages can be extracted correctly. The proposed method does not need to embed all possible messages for the second time, improving coding parameter recognition significantly. The experimental results show that the proposed method can identify syndrome-trellis coding parameters in stego images embedded by adaptive steganography quickly to realize embedded message extraction.
- Published
- 2022
- Full Text
- View/download PDF
12. Double umbilical artery converging into a single umbilical artery: A case report.
- Author
-
Chunfang Yang, Xiaolu Yang, Lihua Qiu, and Zhihui Liu
- Published
- 2024
- Full Text
- View/download PDF
13. JPEG image steganography payload location based on optimal estimation of cover co-frequency sub-image
- Author
-
Jie Wang, Chunfang Yang, Ma Zhu, Xiaofeng Song, Yuan Liu, and Yuemeng Lian
- Subjects
Steganography ,JPEG image ,Payload location ,Cover estimation ,Electronics ,TK7800-8360 - Abstract
Abstract The excellent cover estimation is very important to the payload location of JPEG image steganography. But it is still hard to exactly estimate the quantized DCT coefficients in cover JPEG image. Therefore, this paper proposes a JPEG image steganography payload location method based on optimal estimation of cover co-frequency sub-image, which estimates the cover JPEG image based on the Markov model of co-frequency sub-image. The proposed method combines the coefficients of the same position in each 8 × 8 block in the JPEG image to obtain 64 co-frequency sub-images and then uses the maximum a posterior (MAP) probability algorithm to find the optimal estimations of cover co-frequency sub-images by the Markov model. Then, the residual of each DCT coefficient is obtained by computing the absolute difference between it and the estimated cover version of it, and the average residual over coefficients in the same position of multiple stego images embedded along the same path is used to estimate the stego position. The experimental results show that the proposed payload location method can significantly improve the locating accuracy of the stego positions in low frequencies.
- Published
- 2021
- Full Text
- View/download PDF
14. Stego key recovery method for F5 steganography with matrix encoding
- Author
-
Jiufen Liu, Chunfang Yang, Junchao Wang, and Yanan Shi
- Subjects
Steganalysis ,Forensics ,F5 steganography ,Stego key ,Matrix encoding ,Shuffle ,Electronics ,TK7800-8360 - Abstract
Abstract When embedding secret message into image by steganography with matrix encoding, there are still no effective methods to recover the stego key because it is difficult to statistically distinguish the stego coefficient sequences selected by true and false keys. Therefore, this paper proposes a method for recovering the stego key of a typical JPEG (Joint Photographic Experts Group) image steganography—F5 which composes of the check matrix and shuffling key. Firstly, the check matrix is recovered based on the embedding ratio estimated by quantitative steganalysis. The shuffling key is then recovered based on the distribution difference between the bit sequences extracted by the true and false shuffling keys. Additionally, the cardinality of the shuffling key space is significantly reduced by examining the extracted encoding parameter and message length. Experimental results show that the proposed method can recover the stego key accurately and efficiently, even when the existing Xu’s method fails for the high or very low embedding ratio.
- Published
- 2020
- Full Text
- View/download PDF
15. Characterization and Identification of a New Daidzein Reductase Involved in (S)-Equol Biosynthesis in Clostridium sp. ZJ6
- Author
-
Yunfei Hu, Chunfang Yang, Can Song, Weixuan Zhong, Baiyuan Li, Linyan Cao, Huahai Chen, Changhui Zhao, and Yeshi Yin
- Subjects
(S)-equol ,gut microbes ,Clostridium ,functional gene ,daidzein reductase ,dihydrodaidzein ,Microbiology ,QR1-502 - Abstract
(S)-equol (EQ) is an isoflavone with high estrogen-like activity in the human body, and is only produced by some gut bacteria in vivo. It plays an important role in maintaining individual health, however, the dearth of resources associated with (S)-EQ-producing bacteria has seriously restricted the production and application of (S)-EQ. We report here a new functional gene KEC48-07020 (K-07020) that was identified from a chick (S)-EQ-producing bacterium (Clostridium sp. ZJ6, ZJ6). We found that recombinant protein of K-07020 possessed similar function to daidzein reductase (DZNR), which can convert daidzein (DZN) into R/S-dihydrodaidzein (R/S-DHD). Interestingly, K-07020 can reversely convert (R/S)-DHD (DHD oxidase) into DZN even without cofactors under aerobic conditions. Additionally, high concentrations of (S)-EQ can directly promote DHD oxidase but inhibit DZNR activity. Molecular docking and site-directed mutagenesis revealed that the amino acid > Arg75 was the active site of DHD oxidase. Subsequently, an engineered E. coli strain based on K-07020 was constructed and showed higher yield of (S)-EQ than the engineered bacteria from our previous work. Metagenomics analysis and PCR detection surprisingly revealed that K-07020 and related bacteria may be prevalent in the gut of humans and animals. Overall, a new DZNR from ZJ6 was found and identified in this study, and its bidirectional enzyme activities and wide distribution in the gut of humans and animals provide alternative strategies for revealing the individual regulatory mechanisms of (S)-EQ-producing bacteria.
- Published
- 2022
- Full Text
- View/download PDF
16. Locating secret messages based on quantitative steganalysis
- Author
-
Chunfang Yang, Fenlin Liu, Shuangkui Ge, Jicang Lu, and Junwei Huang
- Subjects
steganalysis ,steganography ,locating steganalysis ,embedding path ,Biotechnology ,TP248.13-248.65 ,Mathematics ,QA1-939 - Abstract
Steganography poses a serious challenge to forensics because investigators cannot identify even traces of secret messages embedded using a steganographer. Contrarily, the objective of locating steganalysis is to locate the embedded message, which should help extract the secret message. In this paper, a methodology of locating steganalysis using quantitative steganalysis is presented for multiple stego images with embedded messages along the same embedding path. Three typical quantitative steganalysis methods are applied to the methodology to locate the messages embedded using LSB re-placement. Experimental results show that the presented methods can reliably estimate the embedding positions, which verifies the validity of the presented methodology. The presented methodology points out a new use of quantitative steganalysis, and further demonstrates that it is necessary to design more precise quantitative steganalysis methods.
- Published
- 2019
- Full Text
- View/download PDF
17. Color image steganalysis based on embedding change probabilities in differential channels
- Author
-
Chunfang Yang, Yuhan Kang, Fenlin Liu, Xiaofeng Song, Jie Wang, and Xiangyang Luo
- Subjects
Electronic computers. Computer science ,QA75.5-76.95 - Abstract
It is a potential threat to persons and companies to reveal private or company-sensitive data through the Internet of Things by the color image steganography. The existing rich model features for color image steganalysis fail to utilize the fact that the content-adaptive steganography changes the pixels in complex textured regions with higher possibility. Therefore, this article proposes a variant of spatial rich model feature based on the embedding change probabilities in differential channels. The proposed feature is extracted from the residuals in the differential channels to reduce the image content information and enhance the stego signals significantly. Then, the embedding change probability of each element in the differential channels is added to the corresponding co-occurrence matrix bin to emphasize the interference of the residuals in textured regions to the improved co-occurrence matrix feature. The experimental results show that the proposed feature can significantly improve the detection performances for the WOW and S-UNIWARD steganography, especially when the payload size is small. For example, when the payload size is 0.05 bpp, the detection errors can be reduced respectively by 5.20% and 4.90% for WOW and S-UNIWARD by concatenating the proposed feature to the color rich model feature CRMQ1.
- Published
- 2020
- Full Text
- View/download PDF
18. Steganalysis of Content-Adaptive Steganography Based on Massive Datasets Pre-Classification and Feature Selection
- Author
-
Jicang Lu, Gang Zhou, Chunfang Yang, Zhenyu Li, and Mingjing Lan
- Subjects
Computer applications ,computer security ,data analysis ,feature extraction ,information security ,multimedia communication ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
For current steganalysis of the image content-adaptive steganography, there are multiple problems to be improved, such as high difficulty and low accuracy, when detecting images with various contents and textures. For this problem, an improved steganalytic method is proposed in this paper based on the pre-classification and feature selection. First, using the features extracted based on the dependency analysis of image adjacent data, the images with various content and texture complexities are pre-classified as multiple clusters by the K-means algorithms. Then, the performance of existing various steganalytic features are analyzed for different clusters of images, and the optimal features for each cluster are selected for final classification. The experimental results show that the detection accuracy could be improved by the proposed method, and the rationality and availability are also verified. At the same time, the analysis and experimental results in this paper also show that the images with rich content and complex texture should be paid more attention both in steganography and in steganalysis.
- Published
- 2019
- Full Text
- View/download PDF
19. Molecular basis of dimer formation during the biosynthesis of benzofluorene-containing atypical angucyclines
- Author
-
Chunshuai Huang, Chunfang Yang, Wenjun Zhang, Liping Zhang, Bidhan Chandra De, Yiguang Zhu, Xiaodong Jiang, Chunyan Fang, Qingbo Zhang, Cheng-Shan Yuan, Hung-wen Liu, and Changsheng Zhang
- Subjects
Science - Abstract
Benzofluorene-containing angucyclines, bacterial natural compounds with potential use as therapeutics/antibiotics, occur as dimers. Here, the authors elucidated the dimerization mechanism which turned out to work spontaneously, without enzymatic catalysis.
- Published
- 2018
- Full Text
- View/download PDF
20. A Word-Embedding-Based Steganalysis Method for Linguistic Steganography via Synonym Substitution
- Author
-
Lingyun Xiang, Jingmin Yu, Chunfang Yang, Daojian Zeng, and Xiaobo Shen
- Subjects
Steganalysis ,steganography ,word embedding ,Skip-gram language model ,TF-IDF ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The development of steganography technology threatens the security of privacy information in smart campus. To prevent privacy disclosure, a linguistic steganalysis method based on word embedding is proposed to detect the privacy information hidden in synonyms in the texts. With the continuous Skipgram language model, each synonym and words in its context are represented as word embeddings, which aims to encode semantic meanings of words into low-dimensional dense vectors. The context fitness, which characterizes the suitability of a synonym by its semantic correlations with context words, is effectively estimated by their corresponding word embeddings and weighted by TF-IDF values of context words. By analyzing the differences of context fitness values of synonyms in the same synonym set and the differences of those in the cover and stego text, three features are extracted and fed into a support vector machine classifier for steganalysis task. The experimental results show that the proposed steganalysis improves the average F-value at least 4.8% over two baselines. In addition, the detection performance can be further improved by learning better word embeddings.
- Published
- 2018
- Full Text
- View/download PDF
21. Payload location for JPEG image steganography based on co-frequency sub-image filtering
- Author
-
Jie Wang, Chunfang Yang, Ping Wang, Xiaofeng Song, and Jicang Lu
- Subjects
Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In digital steganography, due to difficulties estimating the JPEG cover image, it is still very hard to accurately locate the hidden message embedded in a JPEG image. Therefore, this study proposes a payload location method for a category of pseudo-random scrambled JPEG image steganography. In order to estimate the quantized discrete cosine transform coefficients in the cover JPEG image, a cover JPEG image estimation method is proposed based on co-frequency sub-image filtering. The proposed payload location method defines a general residual, uses the estimated cover JPEG image to compute the residuals, and then employs the mean residuals of multiple stego images embedded along the same path to distinguish the stego positions. The proposed cover JPEG image estimation method constructs 64 co-frequency sub-images, and then filters the sub-image to estimate the cover JPEG image. Finally, using these methods, payload location algorithms are designed for two common JPEG image steganography algorithms: JSteg and F5. Experimental results show that the proposed location algorithms can effectively locate the stego positions in both JSteg and F5 steganography when the investigator possesses multiple stego images embedded along the same path. In addition, the location results can also be used to recover the steganography key to extract the embedded secret messages.
- Published
- 2020
- Full Text
- View/download PDF
22. Color image steganalysis based on channel gradient correlation
- Author
-
Yuhan Kang, Fenlin Liu, Chunfang Yang, Lingyun Xiang, Xiangyang Luo, and Ping Wang
- Subjects
Electronic computers. Computer science ,QA75.5-76.95 - Abstract
It is one of the potential threats to the Internet of Things to reveal confidential messages by color image steganography. The existing color image steganalysis algorithm based on channel geometric transformation measures owns higher accuracy than the others, but it fails to utilize the correlation between the gradient amplitudes of different color channels. Therefore, this article points out that the color image steganography weakens the correlation between the gradient amplitudes of different color channels and proposes a color image steganalysis algorithm based on channel gradient correlation. The proposed algorithm extracts the co-occurrence matrix feature from the gradient amplitude residuals among different color channels and then combines it with the existing color image steganalysis features to train the ensemble classifier for color image steganalysis. The experimental results show that, for WOW and S-UNIWARD steganography, compared with the existing algorithms, the proposed algorithm outperforms the existing algorithms.
- Published
- 2019
- Full Text
- View/download PDF
23. The impact of the Internet on household consumption expenditure: an empirical study based on China Family Panel Studies data
- Author
-
Chunfang, Yang, Yifeng, Zhang, Suyun, Wang, Chunfang, Yang, Yifeng, Zhang, and Suyun, Wang
- Abstract
This article empirically analyzes the impact of Internet usage on household consumption expenditure based on the China Family Panel Studies (CFPS) data for three periods 2014, 2016, and 2018. The results show that Internet use significantly increases household consumption. This boost persists after adding a series of control variables, accounting for differences in time and region, or changing the measurement of the main explanatory variables. After introducing instrumental variables to overcome potential endogeneity problems and further including the Internet use of the financial decision maker’s spouse for a series of robustness tests, the findings remain robust. The positive boost is even more significant. Finally, heterogeneity analysis is conducted for different consumption types, urban and rural areas, gender of financial decision-makers, and use of other Internet tools.
- Published
- 2023
24. Marine Bacterial Aromatic Polyketides From Host-Dependent Heterologous Expression and Fungal Mode of Cyclization
- Author
-
Chunshuai Huang, Chunfang Yang, Yiguang Zhu, Wenjun Zhang, Chengshan Yuan, and Changsheng Zhang
- Subjects
heterologous expression ,aromatic polyketides ,type II polyketide synthase ,cyclization modes ,pathway crosstalk ,Chemistry ,QD1-999 - Abstract
The structure diversity of type II polyketide synthases-derived bacterial aromatic polyketides is often enhanced by enzyme controlled or spontaneous cyclizations. Here we report the discovery of bacterial aromatic polyketides generated from 5 different cyclization modes and pathway crosstalk between the host and the heterologous fluostatin biosynthetic gene cluster derived from a marine bacterium. The discovery of new compound SEK43F (2) represents an unusual carbon skeleton resulting from a pathway crosstalk, in which a pyrrole-like moiety derived from the host Streptomyces albus J1074 is fused to an aromatic polyketide SEK43 generated from the heterologous fluostatin type II PKSs. The occurrence of a new congener, fluoquinone (3), highlights a bacterial aromatic polyketide that is exceptionally derived from a characteristic fungal F-mode first-ring cyclization. This study expands our knowledge on the power of bacterial type II PKSs in diversifying aromatic polyketides.
- Published
- 2018
- Full Text
- View/download PDF
25. The impact of the Internet on household consumption expenditure: an empirical study based on China Family Panel Studies data
- Author
-
Chunfang, Yang, primary, Yifeng, Zhang, additional, and Suyun, Wang, additional
- Published
- 2022
- Full Text
- View/download PDF
26. Feature Selection of the Rich Model Based on the Correlation of Feature Components
- Author
-
Yuanyuan Ma, Fenlin Liu, Chunfang Yang, Shunhao Jin, and Yuan Liu
- Subjects
Steganalysis ,Science (General) ,Article Subject ,Correlation coefficient ,Computer Networks and Communications ,Computer science ,business.industry ,Computation ,Feature selection ,Pattern recognition ,computer.file_format ,JPEG ,Q1-390 ,Feature (computer vision) ,Component (UML) ,T1-995 ,Artificial intelligence ,business ,computer ,Technology (General) ,Information Systems ,Curse of dimensionality - Abstract
Currently, the popular Rich Model steganalysis features usually contain a large number of redundant feature components which may bring “curse of dimensionality” and large computation cost, but the existing feature selection methods are difficult to effectively reduce the dimensionality when there are many strongly correlated effective feature components. This paper proposes a novel selection method for Rich Model steganalysis features. First, the separability of each feature component in the submodels of Rich Model is measured based on the Fisher criterion, and the feature components are sorted in the descending order based on the separability. Second, the correlation coefficient between any two feature components in each submodel is calculated, and feature selection is performed according to the Fisher value of each component and the correlation coefficients. Finally, the selected submodels are combined as the final steganalysis feature. The results show that the proposed feature selection method can effectively reduce the dimensionalities of JPEG domain and spatial domain Rich Model steganalysis features without affecting the detection accuracies.
- Published
- 2021
- Full Text
- View/download PDF
27. ECM-mimetic immunomodulatory hydrogel for methicillin-resistant
- Author
-
Wenshuai, Liu, Rui, Gao, Chunfang, Yang, Zujian, Feng, Wenbin, Ou-Yang, Xiangbin, Pan, Pingsheng, Huang, Chuangnian, Zhang, Deling, Kong, and Weiwei, Wang
- Subjects
Inflammation ,Methicillin-Resistant Staphylococcus aureus ,Wound Healing ,Glycopeptides ,Humans ,Hydrogels ,Anti-Bacterial Agents ,Extracellular Matrix - Abstract
The treatment of difficult-to-heal wounds remains a substantial clinical challenge due to deteriorative tissue microenvironment including the loss of extracellular matrix (ECM), excessive inflammation, impaired angiogenesis, and bacterial infection. Inspired by the chemical components, fibrous structure, and biological function of natural ECM, antibacterial and tissue environment-responsive glycopeptide hybrid hydrogel was developed for chronic wound healing. The hydrogel can facilitate the cell proliferation and macrophage polarization to M2 phenotype, and show potent antibacterial efficacy against both Gram-negative and Gram-positive bacteria. Significantly, the glycopeptide hydrogel accelerated the reconstruction of methicillin-resistant
- Published
- 2022
28. Inactivation of Flavoenzyme-Encoding Gene flsO1 in Fluostatin Biosynthesis Leads to Diversified Angucyclinone Derivatives
- Author
-
Li-Ping Zhang, Qingbo Zhang, Chunfang Yang, Chunshuai Huang, Siqiang Chen, Wenjun Zhang, Chunyan Fang, and Changsheng Zhang
- Subjects
chemistry.chemical_classification ,010405 organic chemistry ,Stereochemistry ,Organic Chemistry ,Mutant ,Kinamycin ,010402 general chemistry ,01 natural sciences ,0104 chemical sciences ,Quinone ,Complementation ,chemistry.chemical_compound ,Biosynthesis ,chemistry ,Cytotoxicity ,Gene ,Lactone - Abstract
Inactivation of the flavoenzyme-encoding gene flsO1 in fluostatin biosynthesis led to the isolation of four new angucyclinone derivatives (11, 12, 14, and 15), among which fluostarenes A (14) and B (15) featured the unprecedented 6/6/5/6/6 pentacyclic skeleton with fusion of a benzo[b]fluorene and a six-membered lactone ring. Both 14 and 15 were putatively generated via quinone methide-mediated nonenzymatic reactions. Fluostarene B (15) exhibited cytotoxicity against several cancer cell lines with IC50 values ranging from 7 to 10 μM. Fluostarenes A (14), B (15), and PK1 (16) showed α-glucosidase inhibition activity with IC50 of 0.89, 1.58, and 0.13 μM, respectively. Successful complementation of the ΔflsO1 mutant with alpK from kinamycin biosynthesis suggests that FlsO1 should function equivalently to AlpK as a putative C-5 hydroxylase.
- Published
- 2021
- Full Text
- View/download PDF
29. Mutation of an atypical oxirane oxyanion hole improves regioselectivity of the α/β-fold epoxide hydrolase Alp1U
- Author
-
Attila Mándi, Bidhan Chandra De, Yiguang Zhu, Zhuangjie Fang, Changsheng Zhang, Li-Ping Zhang, Wenjun Zhang, Chunfang Yang, and Tibor Kurtán
- Subjects
Ethylene Oxide ,0301 basic medicine ,Stereochemistry ,Diol ,Epoxide ,Crystallography, X-Ray ,Biochemistry ,Structure-Activity Relationship ,03 medical and health sciences ,chemistry.chemical_compound ,Nucleophile ,Epoxide hydrolase ,Molecular Biology ,Epoxide Hydrolases ,Sequence Homology, Amino Acid ,030102 biochemistry & molecular biology ,Chemistry ,Hydrolysis ,Regioselectivity ,Stereoisomerism ,Cell Biology ,Streptomyces ,Enzyme structure ,Protein Structure, Tertiary ,Kinetics ,030104 developmental biology ,Mutation ,Mutagenesis, Site-Directed ,Enzymology ,Epoxy Compounds ,Oxyanion hole - Abstract
Epoxide hydrolases (EHs) have been characterized and engineered as biocatalysts that convert epoxides to valuable chiral vicinal diol precursors of drugs and bioactive compounds. Nonetheless, the regioselectivity control of the epoxide ring opening by EHs remains challenging. Alp1U is an α/β-fold EH that exhibits poor regioselectivity in the epoxide hydrolysis of fluostatin C (compound 1) and produces a pair of stereoisomers. Herein, we established the absolute configuration of the two stereoisomeric products and determined the crystal structure of Alp1U. A Trp-186/Trp-187/Tyr-247 oxirane oxygen hole was identified in Alp1U that replaced the canonical Tyr/Tyr pair in α/β-EHs. Mutation of residues in the atypical oxirane oxygen hole of Alp1U improved the regioselectivity for epoxide hydrolysis on 1. The single site Y247F mutation led to highly regioselective (98%) attack at C-3 of 1, whereas the double mutation W187F/Y247F resulted in regioselective (94%) nucleophilic attack at C-2. Furthermore, single-crystal X-ray structures of the two regioselective Alp1U variants in complex with 1 were determined. These findings allowed insights into the reaction details of Alp1U and provided a new approach for engineering regioselective epoxide hydrolases.
- Published
- 2020
- Full Text
- View/download PDF
30. Research on the Impact of Internet Use on Farmers’ Adoption of Agricultural Socialized Services
- Author
-
Chunfang Yang, Changming Cheng, Nanyang Cheng, and Yifeng Zhang
- Subjects
Renewable Energy, Sustainability and the Environment ,Geography, Planning and Development ,Building and Construction ,Management, Monitoring, Policy and Law ,internet use ,social network ,agricultural socialized services ,agricultural sustainable development - Abstract
Developing agricultural socialized services is of great significance for promoting agricultural sustainable development and ensuring food security. The use of the Internet provides new opportunities to promote the development of agricultural socialized services. Using data from the China Family Panel Studies (CFPS) in 2016 and 2018 with 8850 observations, this paper investigates the effects of Internet use on farmers’ adoption decision and adoption degree of agricultural socialized services, and explores the mediating effect of social networks. The adoption of agricultural socialized services is divided into adoption decision and adoption degree, and the Probit model and Tobit model are used for empirical analysis. The results showed that: (1) Internet use has a significant positive impact on both the adoption decision and the adoption degree of agricultural socialized services. Specifically, the impact of Internet use on the adoption decision and adoption degree of agricultural machinery services is greater than that of agricultural hired labor services. (2) The mechanism analysis found that social networks partially mediated the effect of Internet use on farmers’ adoption decision and adoption degree of agricultural socialized services. Furthermore, social networks have a greater mediating effect on the influence of Internet use on farmers’ adoption decision and adoption degree of agricultural machinery services compared to agricultural hired labor services. (3) The heterogeneity test found that Internet use has no significant impact on the adoption of agricultural socialized services by older farmers and farmers with a low education level. Therefore, it is crucial to fully leverage the potential of the Internet to facilitate the supply and demand of agricultural socialized services. Moreover, it is essential to integrate the market of agricultural socialized services with the rural social network to realize the synergy of “Internet plus social network”. This integration facilitates the organic connection between small farmers and modern agricultural development.
- Published
- 2023
- Full Text
- View/download PDF
31. Discovery of Stealthin Derivatives and Implication of the Amidotransferase FlsN3 in the Biosynthesis of Nitrogen-Containing Fluostatins
- Author
-
Chunshuai Huang, Chunfang Yang, Zhuangjie Fang, Liping Zhang, Wenjun Zhang, Yiguang Zhu, and Changsheng Zhang
- Subjects
angucyclines ,N–N bond ,raceme ,gene inactivation ,biosynthesis ,marine ,Micromonospora ,Biology (General) ,QH301-705.5 - Abstract
Diazobenzofluorene-containing atypical angucyclines exhibit promising biological activities. Here we report the inactivation of an amidotransferase-encoding gene flsN3 in Micromonospora rosaria SCSIO N160, a producer of fluostatins. Bioinformatics analysis indicated that FlsN3 was involved in the diazo formation. Chemical investigation of the flsN3-inactivation mutant resulted in the isolation of a variety of angucycline aromatic polyketides, including four racemic aminobenzo[b]fluorenes stealthins D–G (9–12) harboring a stealthin C-like core skeleton with an acetone or butanone-like side chain. Their structures were elucidated on the basis of nuclear magnetic resonance (NMR) spectroscopic data and X-ray diffraction analysis. A plausible mechanism for the formation of stealthins D–G (9–12) was proposed. These results suggested a functional role of FlsN3 in the formation/modification of N–N bond-containing fluostatins.
- Published
- 2019
- Full Text
- View/download PDF
32. Image Geolocation Method Based on Attention Mechanism Front Loading and Feature Fusion
- Author
-
Huayuan Lu, Chunfang Yang, Baojun Qi, Ma Zhu, and Jingqian Xu
- Subjects
Article Subject ,Computer Networks and Communications ,Electrical and Electronic Engineering ,Information Systems - Abstract
Image geolocation is an important technique for robotics and autonomous systems. The existing methods mainly extract local features from images directly and use global descriptors, which are aggregated by these local features, to retrieve candidate references from all references. Thus, the training efficiency is affected by the image noises and the accuracy is so limited that the further verification is extremely time consuming. To address these issues, this work proposes an image geolocation framework, which adds the noise filtering layer before local feature extraction. Based on this framework, an image geolocation method based on attention mechanism front loading and feature fusion is designed. In the noise filtering layer, the proposed method uses triplet attention to denoise images thus leading to higher training efficiency. In the feature aggregation layer, an improved SPP (spatial pyramid pooling) is designed to extract the local factors reflected by the position relationships among local features. Then, the local factors are incorporated with the global factors extracted by NetVLAD. The fused descriptors contain not only the statistic of the geometric elements but also the position relationships among them. The experimental results show that the proposed method outperforms NetVLAD in terms of the training convergence round and Recall@ N ( N = 1 , 5 , 10 , 20 ); especially, the convergence round of Recall@5 reduces from 25 to 10, the convergence round of Recall@10 reduces from 25 to 7, Recall@1 increases from 79.45% to 84.01%, and Recall@5 increases from 90.10% to 92.81%.
- Published
- 2022
- Full Text
- View/download PDF
33. Novel Hidden Bit Location Method towards JPEG Steganography
- Author
-
Binmin Pan, Tong Qiao, Jiaming Li, Yiyang Chen, and Chunfang Yang
- Subjects
Article Subject ,Computer Networks and Communications ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Information Systems - Abstract
Image steganalysis has been widely studied, most of which can only complete the binary task of identifying the existence of hidden bits in an inquiry image. Currently, although some algorithms have been proposed to locate hidden bits, most of them mainly focus on the spatial domain, while usually ignoring the study of locating secret bits hidden in DCT domain for JPEG image. To address that challengeable problem, in this paper, towards two classical steganographic algorithms JSteg and F5, hiding bits in DCT domain, we propose a novel payload location method. The principal step of payload location is to estimate the cover image. We novelly propose to assign the different weights to the DCT coefficient residual in virtue of the texture of regions measured by the local variance, leading to the remarkable improvement of location results. Compared with the state of the art, the numerical experiments empirically verify that our proposed location method achieves the superior performance. In particular, when locating hidden bits in JSteg steganographic images with quality factor of 95 at the payload 0.1, the accuracy of location is remarkably improved from 46.18% to 90.22%.
- Published
- 2022
- Full Text
- View/download PDF
34. Cooperative membership, service provision, and the adoption of green control techniques: Evidence from China
- Author
-
Yifeng Zhang, Quanzhi Lu, Chunfang Yang, and Martin Kobby Grant
- Subjects
Renewable Energy, Sustainability and the Environment ,Strategy and Management ,Building and Construction ,Industrial and Manufacturing Engineering ,General Environmental Science - Published
- 2023
- Full Text
- View/download PDF
35. Optimal Configuration and Measurement Analysis of a Solar Heating System Serving an Ordos Residential District
- Author
-
Min Zhou, Yuchen Xie, and Chunfang Yang
- Abstract
In order to solve the contradiction between heating supply and demand in solar energy system in a residential area of Ordos, a solar heating system has been designed, tested, and analyzed for over a month. The main purpose of this paper is to evaluate the primary energy consumption, the carbon dioxide emissions, the initial investment, and the operation costs of the floor radiant and forced convection radiator configuration on the overall performance of the system, and analyzes its potential economic benefits. A parametric analysis has been performed in order to investigate the performance of a solar heating system integrated with dynamic automatic control system upon varying the different terminal device. Results from the present study indicate that the thermal comfort of the proposed system with forced convection radiator configuration is better than the conventional system, And the above four indices reductions from energy efficiency improvements and solar energy supply exceed over 50%.
- Published
- 2021
- Full Text
- View/download PDF
36. Titanium alloy composited with dual-cytokine releasing polysaccharide hydrogel to enhance osseointegration via osteogenic and macrophage polarization signaling pathways
- Author
-
Yaping Wang, Zujian Feng, Xiang Liu, Chunfang Yang, Rui Gao, Wenshuai Liu, Wenbin Ou-Yang, Anjie Dong, Chuangnian Zhang, Pingsheng Huang, and Weiwei Wang
- Subjects
Biomaterials - Abstract
Titanium alloy has been widely used in orthopedic surgeries as bone defect filling. However, the regeneration of high-quality new bones is limited due to the pro-inflammatory microenvironment around implants, resulting in a high occurrence rate of implant loosening or failure in osteological therapy. In this study, extracellular matrix-mimetic polysaccharide hydrogel co-delivering BMP-2 and interleukin (IL)-4 was composited with 3D printed titanium alloy to promote the osseointegration and regulate macrophage response to create a pro-healing microenvironment in bone defect. Notably, it is discovered from the bioinformatics data that IL-4 and BMP-2 could affect each other through multiple signal pathways to achieve a synergistic effect toward osteogenesis. The composite scaffold significantly promoted the osteoblast differentiation and proliferation of human bone marrow mesenchyme stem cells (hBMSCs). The repair of large-scale femur defect in rat indicated that the dual-cytokine-delivered composite scaffold could manipulate a lower inflammatory level in situ by polarizing macrophages to M2 phenotype, resulting in superior efficacy of mature new bone regeneration over the treatment of native titanium alloy or that with an individual cytokine. Collectively, this work highlights the importance of M2-type macrophages-enriched immune-environment in bone healing. The biomimetic hydrogel–metal implant composite is a versatile and advanced scaffold for accelerating in vivo bone regeneration, holding great promise in treating orthopedic diseases.
- Published
- 2021
37. Are Socialized Services of Agricultural Green Production Conducive to the Reduction in Fertilizer Input? Empirical Evidence from Rural China
- Author
-
Chunfang Yang, Yifeng ZHANG, and Hengyuan Zeng
- Subjects
China ,Farmers ,green development of agriculture ,socialized services of green production ,fertilizer reduction ,social network ,Health, Toxicology and Mutagenesis ,Public Health, Environmental and Occupational Health ,Humans ,Agriculture ,Oryza ,Fertilizers - Abstract
Reducing the use of chemical fertilizers in agricultural production is an inevitable requirement for achieving carbon neutrality and coping with global warming, and it is also an important measure for achieving green and sustainable agricultural development. Furthermore, the development of socialized services of green production provides a new approach to effectively reducing the use of fertilizers. Based on the survey data of 2202 rice growers in Jiangsu Province in 2021, this paper empirically analyzed the effects of socialized services of green production and social network on the reduction in fertilizer application by farmers. The results showed that both the socialized services of green production and social networks could significantly promote the reduction in fertilizer application by farmers. Social networks have a moderating effect between socialized services of green production and reduction in fertilizer application and can enhance the promotion of farmers’ adoption of socialized services of green production to reduce the application of fertilizers. With consideration of the potential endogenous problems of the model and the robustness test by replacing the key explanatory variables and the explained variables, all of the results were stable. Therefore, it is emphasized that the government should cultivate the main body of agricultural socialized services, improve the socialized service system of green production, and promote the green development of agriculture by service scale operation. Equally, it is necessary to strengthen the construction of rural social networks for the exchange of fertilization experience and give full play to the positive role of social networks in the reduction in fertilizer application by farmers.
- Published
- 2022
- Full Text
- View/download PDF
38. Discovery of a novel anti-obesity meroterpenoid agent targeted subcutaneous adipose tissue
- Author
-
Baisen Chen, Zhiqiang Shi, Yechun Wang, Minting Chen, Chunfang Yang, Hui Cui, Tao Su, and Hiu Yee Kwan
- Subjects
Pharmacology ,Adipogenesis ,Subcutaneous Fat ,Pharmaceutical Science ,Cell Differentiation ,Lipids ,PPAR gamma ,Mice ,Adipose Tissue ,Complementary and alternative medicine ,3T3-L1 Cells ,Drug Discovery ,Animals ,Molecular Medicine ,Anti-Obesity Agents ,Obesity ,beta Catenin ,Transcription Factors - Abstract
Meroterpenoid furanasperterpene A (T2-3) with a novel 6/6/6/6/5 pentacyclic skeleton was isolated from the Aspergillus terreus GZU-31-1. Previously, we showed that T2-3 possessed significant lipid-lowering effects in 3T3-L1 adipocytes at 5 μM concentration. However, its therapeutic effect in metabolic disease and the underlying mechanisms of action remain unclear.High fat diet-induced obesity (DIO) mouse model and 3T3-L1 cell model were used to assess the anti-obesity effects of T2-3. Lipids in the adipocytes were examined by Oil Red O staining. β-catenin expression was examined by immunofluorescence and Western blotting, its activity was assessed by TOPflash/FOPflash assay.T2-3 possessed potent anti-obesity effects in DIO mice, it significantly reduced body weight and subcutaneous adipose tissue (SAT) mass. Mechanistic studies showed that T2-3 significantly inhibited 3T3-L1 preadipocyte differentiation as indicated by the reduced number of mature adipocytes. The treatments also reduced the expressions of critical adipogenic transcription factors CEBP-α and PPAR-γ in both 3T3-L1 adipocytes and SAT in DIO mice. Interestingly, T2-3 increased the cytoplasmic and nuclear expressions of β-catenin and the transcriptional activity of β-catenin in 3T3-L1 adipocytes; the elevated β-catenin expression was also observed in SAT of the T2-3-treated DIO mice. Indeed, upregulation of β-catenin activity suppressed adipogenesis, while β-catenin inhibitor JW67 reversed the anti-adipogenic effect of T2-3. Taken together, our data suggest that T2-3 inhibits adipogenesis by upregulating β-catenin activity.Our study is the first report demonstrating meroterpenoid furanasperterpene A as a novel 6/6/6/6/5 pentacyclic skeleton (T2-3) that possesses potent anti-adipogenic effect by targeting β-catenin signaling pathway. Our findings drive new anti-obesity drug discovery and provide drug leads for chemists and pharmacologists.
- Published
- 2022
- Full Text
- View/download PDF
39. Research on a Control Strategy of the Symmetrical Four-Roller Bending Process Based on Experiment and Numerical Simulation
- Author
-
Gaochao Yu, Jun Zhao, Hongqiang Cao, and Chunfang Yang
- Subjects
0209 industrial biotechnology ,Physics and Astronomy (miscellaneous) ,Bending (metalworking) ,Computer science ,General Mathematics ,Mechanical engineering ,02 engineering and technology ,Curvature ,symmetrical four-roller bending ,springback ,020901 industrial engineering & automation ,0203 mechanical engineering ,Approximation error ,Computer Science (miscellaneous) ,QA1-939 ,thin-wall pipes ,Computer simulation ,Process (computing) ,Quadratic function ,020303 mechanical engineering & transports ,control strategy ,Chemistry (miscellaneous) ,visual_art ,visual_art.visual_art_medium ,Sheet metal ,Reduction (mathematics) ,Mathematics - Abstract
The intelligent production of sheet metal is a comprehensive technology involving control science, computer science, and sheet metal production. Intelligent rolling is an important development in the production process of sheet metal. In this paper, a new symmetrical four-roller bending (SFRB) process is introduced, which consists of feeding, pre-bending, reverse roll bending, second bending, and forward roll bending and unloading. A control strategy is proposed for the process, including on-line monitoring of curvature, on-line identification of the springback law, on-line prediction of final reduction, and control strategy. A convenient and reliable on-line curvature monitoring method is proposed. The quantitative relationship between the reduction and the curvature, in the form of a quadratic function, was established by physical experiments and numerical simulation, and the online identification of the springback law was realized. An on-line prediction method of the final reduction is proposed, and the determination principle of the reduction of three pre-bending processes is given. Finally, the control strategy of the SFRB process was verified by physical experiments. The relative error of the curvature radius of the final formed parts can be controlled within 0.8%. This research provides new insights into intelligent rolling.
- Published
- 2021
40. Inactivation of Flavoenzyme-Encoding Gene
- Author
-
Chunfang, Yang, Chunshuai, Huang, Chunyan, Fang, Liping, Zhang, Siqiang, Chen, Qingbo, Zhang, Changsheng, Zhang, and Wenjun, Zhang
- Subjects
Anthraquinones - Abstract
Inactivation of the flavoenzyme-encoding gene
- Published
- 2021
41. PRUDA: A Novel Measurement Attribute Set towards Robust Steganography in Social Networks
- Author
-
Yi Zhang, Chunfang Yang, Liyan Zhu, Xiangyang Luo, Jinwei Wang, and Fenlin Liu
- Subjects
Lossless compression ,Science (General) ,Steganography ,Article Subject ,Computer Networks and Communications ,Computer science ,business.industry ,Payload (computing) ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Homomorphic encryption ,Cloud computing ,Data_CODINGANDINFORMATIONTHEORY ,Lossy compression ,Encryption ,computer.software_genre ,Q1-390 ,Robustness (computer science) ,T1-995 ,Data mining ,business ,computer ,Technology (General) ,Information Systems - Abstract
Cloud services have become an increasingly popular solution to provide different services to clients. More and more data are outsourced to the cloud for storage and computing. With this comes concern about the security of outsourced data. In recent years, homomorphic encryption, blockchain, steganography, and other technologies have been applied to the security and forensics of outsourced data. While encryption technologies such as homomorphic encryption and blockchain scramble data so that they cannot be understood, steganography hides the data so that they cannot be observed. Traditional steganography assumes that the environment is lossless. Robust steganography is grounded in traditional steganography and is proposed based on a real lossy social network environment. Thus, researchers, who study robust steganography, believe that the measurement should follow traditional steganography. However, the application scenario of robust steganography breaks through the traditional default lossless environment premise. It brings about changes in the focus of steganography algorithms. Simultaneously, the existing steganography methods miss the evaluation of applicability and ease of use. In this paper, “default parameters” are observed by comparing the process of robust image steganography with traditional image steganography. The idea of “perfecting default parameters” is proposed. Based on this, the attribute set of measuring robust image steganography is presented. We call it PRUDA (Payload, Robustness, ease of Use, antiDetection, and Applicability). PRUDA perfects default parameters observed in the process of traditional steganography algorithms. Statistics on image processing attacks in mobile social apps and analyses on existing algorithms have verified that PRUDA is reasonable and can better measure a robust steganography method in practical application scenarios.
- Published
- 2021
42. Albumycin, a new isoindolequinone from Streptomyces albus J1074 harboring the fluostatin biosynthetic gene cluster
- Author
-
Wenjun Zhang, Changsheng Zhang, Chunfang Yang, Yiguang Zhu, Liang Ma, Zhuangjie Fang, and Chunshuai Huang
- Subjects
Methicillin-Resistant Staphylococcus aureus ,0301 basic medicine ,Magnetic Resonance Spectroscopy ,030106 microbiology ,Bacterial host ,Microbial Sensitivity Tests ,Isoindoles ,medicine.disease_cause ,01 natural sciences ,03 medical and health sciences ,Drug Discovery ,Gene cluster ,medicine ,Streptomyces albus ,Pharmacology ,Biological Products ,Molecular Structure ,biology ,010405 organic chemistry ,Chemistry ,Nuclear magnetic resonance spectroscopy ,biology.organism_classification ,Recombinant Proteins ,Streptomyces ,Anti-Bacterial Agents ,Biosynthetic Pathways ,0104 chemical sciences ,Biochemistry ,Staphylococcus aureus ,Heterologous expression ,Micromonospora rosaria ,Two-dimensional nuclear magnetic resonance spectroscopy - Abstract
Heterologous expression of the fluostatin biosynthetic gene cluster from the marine-derived Micromonospora rosaria SCSIO N160 in Streptomyces albus J1074 led to the isolation of a novel isoindolequinone albumycin (1) and a known isoquinolinequinone mansouramycin A (2). The structure of 1 was elucidated on the basis of detailed 1D and 2D NMR spectroscopic analysis. Mansouramycin A (2) is active against methicillin-resistant Staphylococcus aureus ATCC 43300, with a MIC of 8 μg ml-1, while albumycin (1) displayed negligible antibacterial activities. This study represents another example of activation of secondary metabolites that are non-relevant to the heterologously introduced biosynthetic gene cluster in a bacterial host.
- Published
- 2019
- Full Text
- View/download PDF
43. Color image steganalysis based on embedding change probabilities in differential channels
- Author
-
Fenlin Liu, Xiaofeng Song, Yuhan Kang, Chunfang Yang, Jie Wang, and Xiangyang Luo
- Subjects
Steganalysis ,021110 strategic, defence & security studies ,Steganography ,Computer Networks and Communications ,business.industry ,Color image ,Computer science ,0211 other engineering and technologies ,General Engineering ,Pattern recognition ,02 engineering and technology ,lcsh:QA75.5-76.95 ,Feature (computer vision) ,0202 electrical engineering, electronic engineering, information engineering ,Embedding ,020201 artificial intelligence & image processing ,Artificial intelligence ,lcsh:Electronic computers. Computer science ,Differential (infinitesimal) ,business - Abstract
It is a potential threat to persons and companies to reveal private or company-sensitive data through the Internet of Things by the color image steganography. The existing rich model features for color image steganalysis fail to utilize the fact that the content-adaptive steganography changes the pixels in complex textured regions with higher possibility. Therefore, this article proposes a variant of spatial rich model feature based on the embedding change probabilities in differential channels. The proposed feature is extracted from the residuals in the differential channels to reduce the image content information and enhance the stego signals significantly. Then, the embedding change probability of each element in the differential channels is added to the corresponding co-occurrence matrix bin to emphasize the interference of the residuals in textured regions to the improved co-occurrence matrix feature. The experimental results show that the proposed feature can significantly improve the detection performances for the WOW and S-UNIWARD steganography, especially when the payload size is small. For example, when the payload size is 0.05 bpp, the detection errors can be reduced respectively by 5.20% and 4.90% for WOW and S-UNIWARD by concatenating the proposed feature to the color rich model feature CRMQ1.
- Published
- 2020
44. Locating Steganalysis of LSB Matching Based on Spatial and Wavelet Filter Fusion
- Author
-
Jie Wang, Wenjuan Wang, Chengliang Lin, Chunfang Yang, and Huiqin Chen
- Subjects
Steganalysis ,Fusion ,business.industry ,Computer science ,Lsb matching ,Pattern recognition ,Computer Science Applications ,Biomaterials ,Mechanics of Materials ,Modeling and Simulation ,Wavelet filter ,Artificial intelligence ,Electrical and Electronic Engineering ,business - Published
- 2019
- Full Text
- View/download PDF
45. MSICST: Multiple-Scenario Industrial Control System Testbed for Security Research
- Author
-
Wei Xu, Yaodong Tao, Huiqin Chen, and Chunfang Yang
- Subjects
Biomaterials ,Mechanics of Materials ,Computer science ,Modeling and Simulation ,Testbed ,Systems engineering ,Industrial control system ,Electrical and Electronic Engineering ,Computer Science Applications - Published
- 2019
- Full Text
- View/download PDF
46. Color Image Steganalysis Based on Residuals of Channel Differences
- Author
-
Fenlin Liu, Chunfang Yang, Tingting Zhang, Yuhan Kang, and Xiangyang Luo
- Subjects
Biomaterials ,Steganalysis ,Channel (digital image) ,Mechanics of Materials ,Computer science ,business.industry ,Color image ,Modeling and Simulation ,Pattern recognition ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Computer Science Applications - Published
- 2019
- Full Text
- View/download PDF
47. Color image steganalysis based on channel gradient correlation
- Author
-
Ping Wang, Chunfang Yang, Fenlin Liu, Lingyun Xiang, Yuhan Kang, and Xiangyang Luo
- Subjects
Steganalysis ,021110 strategic, defence & security studies ,Channel (digital image) ,Steganography ,Computer Networks and Communications ,business.industry ,Computer science ,Color image ,0211 other engineering and technologies ,General Engineering ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,020207 software engineering ,02 engineering and technology ,lcsh:QA75.5-76.95 ,Correlation ,Computer Science::Multimedia ,0202 electrical engineering, electronic engineering, information engineering ,Computer vision ,Artificial intelligence ,lcsh:Electronic computers. Computer science ,business ,Computer Science::Cryptography and Security - Abstract
It is one of the potential threats to the Internet of Things to reveal confidential messages by color image steganography. The existing color image steganalysis algorithm based on channel geometric transformation measures owns higher accuracy than the others, but it fails to utilize the correlation between the gradient amplitudes of different color channels. Therefore, this article points out that the color image steganography weakens the correlation between the gradient amplitudes of different color channels and proposes a color image steganalysis algorithm based on channel gradient correlation. The proposed algorithm extracts the co-occurrence matrix feature from the gradient amplitude residuals among different color channels and then combines it with the existing color image steganalysis features to train the ensemble classifier for color image steganalysis. The experimental results show that, for WOW and S-UNIWARD steganography, compared with the existing algorithms, the proposed algorithm outperforms the existing algorithms.
- Published
- 2019
48. Genetic spectrum of renal disease for 1001 Chinese children based on a multicenter registration system
- Author
-
Chunfang Yang, Qian Li, Guomin Li, Xiang Wang, Xiaoshan Tang, Ying Shen, Mo Wang, Xiaowen Wang, Guanghai Cao, Yufeng Li, Yuhong Li, Xiaoyun Jiang, Xiaorong Liu, Duan Ma, Dongfeng Zhang, Shuzhen Sun, Jianhua Mao, Lijun Zhao, Mei Han, Huijun Wang, Xiqiang Dang, Ling Hou, Yanyan Qian, Sanling Qiu, Lizhi Chen, Yang Dong, Yang Yang, Liping Zhao, Qian Shen, Bingbing Wu, Bixia Zheng, Ying Zhu, Ying Wang, Aihua Zhang, Wenhao Zhou, Yunli Bi, Jia Rao, Zhi Chen, Xiaoshan Shao, Feiyan Wang, Xinhui Luo, Hong Xu, Li Sun, Shasha Zheng, Yubing Wu, Xuemei Liu, Jiangwei Luan, Haitao Bai, and Cuihua Liu
- Subjects
0301 basic medicine ,Male ,medicine.medical_specialty ,China ,Urinary system ,Disease ,030105 genetics & heredity ,urologic and male genital diseases ,Kidney ,Cohort Studies ,03 medical and health sciences ,Nephritic syndrome ,Calcinosis ,Internal medicine ,Exome Sequencing ,Genetics ,Medicine ,Humans ,Exome ,Genetic Predisposition to Disease ,Genetic Testing ,Renal Insufficiency, Chronic ,Child ,Urinary Tract ,Genetics (clinical) ,Genetic testing ,medicine.diagnostic_test ,business.industry ,Kidney Diseases, Cystic ,medicine.disease ,Editorial Commentary ,030104 developmental biology ,medicine.anatomical_structure ,Phenotype ,Child, Preschool ,Cohort ,Female ,business ,Kidney disease - Abstract
To explore the approaches and diagnostic yield of genetic testing for renal disease in children, we describe the genotype and phenotype of the national cohort of children with renal disease from 13 different regions of China recruited from 2014 to 2018 by building up the multicenter registration system (Chinese Children Genetic Kidney Disease Database, CCGKDD). Genetic diagnosis was confirmed in 42.1% of our cohort of 1001 pediatric patients with clinical suspicion of a genetic renal disease. Of the 106 distinct monogenetic disorders detected, 15 accounted for 60.7% of genetic diagnoses. The diagnostic yield was 29.1% in steroid resistant nephritic syndrome (SRNS), 61.4% in cystic renal disease, 17.0% in congenital anomalies of the kidney and urinary tract (CAKUT), 62.3% in renal tubular disease/renal calcinosis, and 23.9% for chronic kidney disease (CKD) 3 to 5 stage with unknown origin. Genetic approaches of target gene sequence (TGS), singleton whole-exome sequencing (WES) and trio-WES were performed with diagnostic rates of 44.8%, 36.2%, and 42.6%, respectively. The early use of trio-WES could improve the diagnostic rate especially in renal tubular disease and calcinosis. We report the genetic spectrum of Chinese children with renal disease. Establishment of the CCGKDD will improve the genetic work on renal disease.
- Published
- 2019
49. A Novel Linguistic Steganography Based on Synonym Run-Length Encoding
- Author
-
Chunfang Yang, Peng Liu, Xinhui Wang, and Lingyun Xiang
- Subjects
Linguistic steganography ,Steganalysis ,Computer science ,Speech recognition ,020207 software engineering ,02 engineering and technology ,Information security ,Artificial Intelligence ,Hardware and Architecture ,Run-length encoding ,Synonym (database) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Computer Vision and Pattern Recognition ,Electrical and Electronic Engineering ,Software - Published
- 2017
- Full Text
- View/download PDF
50. A framework of adaptive steganography resisting JPEG compression and detection
- Author
-
Fenlin Liu, Yi Zhang, Dengpan Ye, Chunfang Yang, and Xiangyang Luo
- Subjects
Steganography ,Computer Networks and Communications ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,020207 software engineering ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,computer.file_format ,ENCODE ,0202 electrical engineering, electronic engineering, information engineering ,Jpeg compression ,Discrete cosine transform ,Embedding ,020201 artificial intelligence & image processing ,Computer vision ,Artificial intelligence ,business ,Quantization (image processing) ,Algorithm ,Digital watermarking ,Lossless JPEG ,computer ,Information Systems - Abstract
Current typical adaptive steganography algorithms take the detection resistant capability into account adequately but usually cannot extract the embedded secret messages correctly when stego images suffer from compression attack. In order to solve this problem, a framework of adaptive steganography resisting JPEG compression and detection is proposed. Utilizing the relationship between Discrete Cosine Transformation DCT coefficients, the domain of messages embedding is determined; for the maximum of the JPEG compression resistant ability, the modifying magnitude of different DCT coefficients caused by messages embedding can be determined; in order to ensure the completely correct extraction of embedded messages after JPEG compression, error correct codes are used to encode the messages to be embedded; on the basis of the current distortion functions, the distortion value of DCT coefficients corresponding to the modifying magnitude in the embedding domain can be calculated; to improve the detection resistant ability of the stego images and realize the minimum distortion embedding, syndrome-trellis codes are used to embed the encoded messages into the DCT coefficients that have a smaller distortion value. Based on the proposed framework, an adaptive steganography algorithm resisting JPEG compression and detection is designed, which utilizes the relationship between coefficients in a DCT block and the means of that in three adjacent DCT blocks. The experimental results that demonstrate the proposed algorithm not only has a good JPEG compression resistant ability but also has a strong detection resistant performance. Comparing with current J-UNIWARD steganography under quality factor 85 of JPEG compression, the extraction error rates without pre-compression decrease from about 50% to nearly 0, while the stego images remain a good detection resistant ability comparing with a typical robust watermarking algorithm, which shows the validity of the proposed framework. Copyright © 2016 John Wiley & Sons, Ltd.
- Published
- 2016
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.