Liang Y.,Henan Institute of Science and Technology
Journal of Chemical and Pharmaceutical Research | Year: 2014
Internet banking is an extension for the private internet of present banking as well as a supplement for business structure of traditional banking and with the increase of some software as well as hardware instruments, users can connect the banking system with home computers to process some common banking business, which remedies the deficiency of operating branches as well as operating time for traditional banking business. To realize adopting fire wall on network layers which prevent extraneous attack and guarantee the safety for business data transportation on the public internet, integrity identification as well as key management should be simultaneously implemented on the application layers for sensitive data as well as encrypted information. In the context of the safety for internal banking business system as well as the safety for external banking business, this project preceded the internet safety design from the aspects of various banking business, business connection between the head office and branches, OA system and internet banking. In this project, high-quality fire walls are equipped on the panel points of all subsidiary banks of different levels, which guarantee the confidentiality of the IP package. Meanwhile, users' sensitive information can be protected in business system form illegally distorted, which will achieve the safety functions of encryption as well as identification for business data.
Liu Y.-B.,Henan Institute of Science and Technology
Physical Review D | Year: 2017
The vectorlike top partners T are predicted in many extensions of the Standard Model (SM). In a simplified model including a single vectorlike T quark with charge 2/3, we investigate the process pp → Tj induced by the couplings between the top partner with the first and the third generation quarks at the LHC. We find that the mixing with the first generation can enhance the production cross section. We further study the observability of the single heavy top partner through the process pp → T(→ th)j → t(→ bℓνℓ)h(→ γγ)j at the high-luminosity (HL)-LHC (a 14 TeV pp collider with an integrated luminosity of 3 ab-1). For three typical heavy T quark masses mT = 600, 800 and 1000 GeV, the 3σ exclusion limits, as well as the 5σ discovery reach in the parameter plane of the two variables g∗ - RL, are respectively obtained at the HL-LHC. © 2017 American Physical Society.
Liu Y.-B.,Henan Institute of Science and Technology |
Xiao Z.-J.,Nanjing Normal University
Physical Review D - Particles, Fields, Gravitation and Cosmology | Year: 2016
In this paper, we investigated the process pp→W-hj induced by the top-Higgs flavor-changing neutral current couplings at the LHC. We found that the cross section of pp→W-hj mainly comes from the resonant process pp→W-t→W-hq due to the anomalous tqH couplings (where q denotes up and charm quarks). We further studied the observability of the top-Higgs flavor-changing neutral current couplings through the process pp→W-(→-ν)h(→γγ)j and found that the branching ratios Br(t→qh) can be probed to 0.16% at 3σ level at 14 TeV LHC with an integrated luminosity of 3000 fb-1. © 2016 American Physical Society.
Liu Y.-B.,Henan Institute of Science and Technology
Nuclear Physics B | Year: 2017
The new vector-like top partners with charge 2/3 are a typical feature of many new physics models beyond the Standard Model (SM). We propose a search strategy for single production of top partners T focusing on both the T→Wb and T→th decay channels at the Large Hadron Electron Collider (LHeC). Our analysis is based on a simplified model in which the top partner is an SU(2) singlet, with couplings only to the third generation of SM quarks. We study the observability of the single T through the processes e+p→T(→bW+)ν¯e→bℓ++E̸T miss and e+p→T(→th)ν¯e→t(→jj′b)h(→bb¯)E̸T miss at the LHeC with the proposed 140 GeV electron beam (with 80% polarization) and 7 TeV proton beam. For three typical T-quark masses (800, 900 and 1000 GeV), the 3σ exclusion limits on the TWb coupling are respectively presented for various values of the integrated luminosity. © 2017 The Author
Liu B.,Henan Institute of Science and Technology
Food chemistry | Year: 2013
The formation of supramolecular inclusion complexes between luteolin and five cyclodextrins namely β-cyclodextrin (β-CD), methyl-β-cyclodextrin (M-β-CD), hydroxyethyl-β-cyclodextrin (HE-β-CD), hydroxypropyl-β-cyclodextrin (HP-β-CD) and glucosyl-β-cyclodextrin (G-β-CD) was investigated. Results from phase-solubility studies showed that luteolin formed 1:1 stoichiometric inclusion complexes with these cyclodextrins with the G-β-CD complex displaying the greatest stability constant. The supramolecular structure of the luteolin/G-β-CD complex was investigated by ultraviolet-visible spectroscopy (UV), Fourier transform infrared spectroscopy (FT-IR), scanning electron microscopy (SEM), differential scanning calorimetry (DSC) and X-ray diffractometry (XRD). Results showed clearly the formation of a supramolecular complex in which the guest molecule, luteolin, was entrapped inside the cavity of the host, G-β-CD. The close association between luteolin and G-β-CD resulted in changes in some of the characteristic spectral, phase transitional and morphological properties of luteolin. Furthermore, molecular docking study showed that the complex was formed with the B ring of luteolin inserted into the cavity of G-β-CD. Copyright © 2013 Elsevier Ltd. All rights reserved.
Liu Y.,Henan Institute of Science and Technology
Gene | Year: 2013
Telegony is a discredited genetic phenomenon that a previous male may influence the characteristics of offspring subsequently borne by the same female to another male. Although its reality was acknowledged by such authorities as Charles Darwin and Herbert Spencer, it has been met with skepticism because of a lack of understanding of the theoretical basis for telegony. With the discovery of fetal genes in mother's blood, the penetration of somatic cells by sperm, and the ability of RNA to program genome rearrangement, mechanisms might exist for telegony. © 2013 Elsevier B.V.
Yuan H.-D.,Henan Institute of Science and Technology
IEEE Transactions on Information Forensics and Security | Year: 2011
Exposing the processing history of a digital image is an important problem for forensic analyzers and steganalyzers. As the median filter is a popular nonlinear denoising operator, the blind forensics of median filtering is particularly interesting. This paper proposes a novel approach for detecting median filtering in digital images, which can 1) accurately detect median filtering in arbitrary images, even reliably detect median filtering in low-resolution and JPEG compressed images; and 2) reliably detect tampering when part of a median-filtered image is inserted into a nonmedian-filtered image, or vice versa. The effectiveness of the proposed approach is exhaustively evaluated in five different image databases. © 2006 IEEE.
Liu Y.-B.,Henan Institute of Science and Technology
Physics Letters, Section B: Nuclear, Elementary Particle and High-Energy Physics | Year: 2011
Besides the SM-like Higgs boson h, the left-right twin Higgs(LRTH) model predicts the existence of the neutral pseudoscalar boson Φ 0. In this Letter, we study the pair production of the pseudoscalar boson Φ 0 and SM-like Higgs bosons h at the International Linear Collider (ILC). We find that the production cross section of the process e +e -→hΦ 0 are at the level of 10 -1fb with reasonable parameter values, However, the resonance production cross section can be significantly enhanced, which can reach several hundreds fb. In some favorable case (for example, small values of f and mΦ 0), the SM backgrounds are nowhere an issue by applying suitable cut on the bb̄ invariant mass spectrum. The ILC provides an idea environment for discovering the pseudoscalar boson and measuring its properties. © 2011 Elsevier B.V.
Wang D.,Henan Institute of Science and Technology
Circuits, Systems, and Signal Processing | Year: 2013
This paper is concerned with the maximum-likelihood (ML) calibration methods tailored to the antenna arrays whose spatial responses are perturbed by mutual coupling effects and unknown sensor gain/phase responses. Unlike the existing work, the proposed methods are capable of jointly exploiting the spatial-domain information and time-domain waveform information of the calibration sources. Two kinds of numerical optimization algorithm are devised dependent on different array geometries. One is suitable for arbitrary irregular array manifold, while the other applies to some particular uniform arrays. Additionally, based on the maximum a posteriori probability (MAP) criterion, we extend the two algorithms to the scenario where the true values of the calibration source azimuths deviate slightly from the nominal ones with a priori known Gaussian distribution. The Cramér-Rao bound (CRB) expressions for the unknowns are derived in the absence and presence of the azimuth deviations, respectively. Simulation results support that the performances of the proposed algorithms are preferable to the ones which merely employs the spatial-domain information of the calibration sources, and are able to attain the corresponding CRB. © 2012 Springer Science+Business Media New York.
Yuan H.-D.,Henan Institute of Science and Technology |
Yuan H.-D.,State Key Laboratory of Mathematical Engineering and Advanced Computing
Information Sciences | Year: 2014
More and more studies have been dedicated to investigating secret sharing with steganography. Unfortunately, no previous work has ever reported its capability to resist steganalysis. In this paper, we pose the multi-cover adaptive steganography problem. Two secret sharing methods for natural images based on multi-cover adaptive steganography have been proposed. The secret information is adaptively shared into textured regions of covers by a spatial ±1 operation. In comparison to previous secret sharing methods, each of the proposed methods uses a simple share-constructing operation and each has lossless secret reconstruction and high quality shares. More importantly, the proposed methods are more secure in terms of resistance against state-of-The-Art steganalysis techniques. In comparison to previous steganographic methods, the proposed methods hide secret bits among textured regions with different covers and are thus difficult to detect. Moreover, the proposed methods can be used to adaptively embed location-sensitive secrets (e.g., secret images) and require no stego key for extracting the encrypted message. These results also have significance in individual cover steganography. The experimental results show the effectiveness of the proposed methods. © 2013 Elsevier Inc. All rights reserved.