Most Down Articles

    Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

    All
    Please wait a minute...
    The two-grid algorithm of the finite volume element method for second-order indefinite elliptic problems
    DAI Zhen-xiang
    J4   
    Abstract1645)      PDF(pc) (240KB)(30279)       Save
    The two-grid algorithm of the finite volume element method for second-order indefinite elliptic problems in R2 was presented ,based on the P1 nonconforming element.The following error estimated in the H1-norm between the solution of the two-grid and the finite volume element appoximation of the elliptic problem were derived::‖uh-uh‖1,h≤CH2‖f‖1,‖u-uh‖1,h≤C(h+H2)‖f‖1.
    Related Articles | Metrics
    Two mixed conjugate gradient methods based on DY
    WANG Kai-rong, GAO Pei-ting
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2016, 51 (6): 16-23.   DOI: 10.6040/j.issn.1671-9352.0.2015.267
    Abstract1758)      PDF(pc) (623KB)(6038)       Save
    Based on DY method, two mixed conjugate gradient methods(GDY1 and GDY2)were proposed. The search directions generated by GDY1 and GDY2 are sufficiently decent directions under some specific conditions, and are global convergence with general wolf line search. Numerical experiments show that the new methods outperform DY conjugate gradient method.
    Reference | Related Articles | Metrics
    A sentiment analysis method based on a polarity lexicon
    ZHANG Cheng-gong 1, 2, LIU Pei-yu1, 2*, ZHU Zhen-fang1,2, FANG Ming1,2
    J4    2012, 47 (3): 47-50.  
    Abstract1919)      PDF(pc) (1026KB)(4956)       Save

    A polarity lexicon is the foundation of sentiment analysis and orientation analysis. An overall and effective polarity lexicon was constructed, including base lexicon, domain lexicon, network lexicon and modifier lexicon. The influence of modifiers to polarity words was studied. A sentiment analysis method based on a polarity lexicon was proposed, in which the modifiers and polarity words were combined into polarity phrases, and the phrase was used as the basic unit to compute the polarity of sentences and texts. Experimental results showed that the effect of orientation analysis using polarity lexicon raised in this paper was good.

    Related Articles | Metrics
    New methods for extracting emotional words based on distributed representations of words
    YANG Yang, LIU Long-fei, WEI Xian-hui, LIN Hong-fei
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2014, 49 (11): 51-58.   DOI: 10.6040/j.issn.1671-9352.3.2014.255
    Abstract1873)      PDF(pc) (3225KB)(3681)       Save
    Word-level sentiment analysis is a hot research interest in the field of affective computing. How to recognize and analyze these new emotional words automatically becomes an urgent problem. Firstly, statistics-based approach was used to identify the new words in Micro-blog corpus and then distributed representation of new words was trained by using neural network in order to get the correlation between words in corpus. Finally three vector-based methods to find new emotional words were introduced. The experimental results indicate that the proposed methods in this paper can be effectively used in discovery of new emotional words.
    Reference | Related Articles | Metrics
    Semi-supervised classification based on the Markov random field and robust error function
    LIANG Jun1,2, CHEN Long2, ZHOU Wei-qi2, TAO Wen-qian1, YAO Ming2, XU Zheng-chuan3
    J4    2010, 45 (11): 1-4.  
    Abstract1608)      PDF(pc) (979KB)(3370)       Save

    A model of semi-supervised classification was proposed to overcome the problem induced by mislabeled samples. A decision rule was learned from labeled and unlabeled data,and a new energy function based on robust error function was used in the Markov random field. Also two algorithms based on the iterative condition mode and the Markov chain Monte Carlo were designed to infer the label of both labeled and unlabeled samples. Experimental results demonstrated that the proposed methods were efficient for a real-world dataset.

    Related Articles | Metrics
    The analysis of stock index sequence based on timing series model
    CUI Yu-quan, LI Pei-pei, LI Lin-lin
    J4    2013, 48 (8): 68-77.  
    Abstract1117)      PDF(pc) (1320KB)(3365)       Save

    According to econometric time series model, the paper creatively proposed combing econometric model and fractal dimension based on Shanghai and Shenzhen stock market data system of great wisdom and statistical software EVIEWS during 2005-2009.It uses a high-dimensional chaotic characteristics of the stock index, using LP algorithm to determine the fractal dimension, using vector autoregressive VAR model to test unit root on the two stock markets in Shanghai and Shenzhen. According to AIC and SC information criterion, it determine the number of lags, predict the future trend of the stock market in dynamic and static state and obtain more reasonable results.

    Related Articles | Metrics
    A system of monitoring and protecting Android privacy leakage
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2016, 51 (9): 59-67.   DOI: 10.6040/j.issn.1671-9352.1.2015.293
    Abstract2427)      PDF(pc) (3349KB)(3187)       Save
    In order to protect the data of Android operating system, we present a system called FlowMonitor to monitor and protect privacy flow based on Android. FlowMonitor adds taint marks and identity tags onto data. Moreover, it is a real-time, dynamic monitoring system. In order to avoid leaking private data by collusion attack, it uses the mechanism of taint's identity authentication based on the idea of RBAC, and finds all probable malicious applications. Based on open and closed policies, labels were designed for each data to control the use of private data. The user can control applications using private data based on their choices. Evaluation results show that Flowmonitor out performs taint Droid. It can not only find out all probable malicious applications which steal private data by collusion attack, but also control applications using each private data. Extensive experimental results demonstrate that FlowMonitor effectively protects the user privacy.
    Reference | Related Articles | Metrics
    Elliptic curves in cryptography: past, present and future…
    ZHANG Fang-guo
    J4    2013, 48 (05): 1-13.  
    Abstract1728)      PDF(pc) (1139KB)(2988)       Save

     From the beginning of the nineteenth century, mathematicians have put the elliptic curves as a research objective of algebra, geometry and number theory to study in-depth. So far, the theory of elliptic curves applied not only in the field of mathematics, and also widely in computing science, information security, physics and other fields. In this paper, we reviewed the application of elliptic curves in cryptography, from the primality testing, integer factorization to elliptic curve cryptosystem, bilinear pairing based cryptosystem and the quantum-resistant cryptosystems from elliptic curve isogenies. We introduced the basic principles and the status of these applications. Finally, we briefly discussed some open questions and possible future progress in this area.

    Related Articles | Metrics
    Advances of gene knockout in mice
    ZHANG Jian, YANG Xiao-mei*, GAO Jian-gang*
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2011, 46 (10): 183-196.  
    Abstract1719)      PDF(pc) (1176KB)(2977)       Save

    With the successful completion of Human Genome Project (HGP),the biological research of postgenome era has a urgent need for an effective gene function analysis. Application of knockout mouse model provides a strong support for the study of gene function and the search for new therapeutic interventions in human disease. As two different techniques, gene targeting and gene trapping are producing knockout mice from embryonic stem cells (ES cells).The characteristic of gene trapping is highthroughput, random, and sequence tagged,while gene targeting is a specific gene knockout. Two decades ago, the first gene targeting and gene trapping mice were generated. In recent years, new tools for gene targeting and gene trapping are emerging, and the related organizations have been formed. These organizations can knock out genes in the mouse genome using these two methods. The international gene trap consortium (IGTC) and the knockout mouse project (KOMP) have begun to create a worldwide resource for research facilities, and plan to knock out all the mouse genes. KOMP organizers consider it as important as the HGP. From conventional gene targeting to high throughput conditional gene targeting, gene targeting methods have changed. The combined advantages of trapping and targeting enhance the gene trapping spectrum and gene targeting efficiency. As a newly developed insertional mutation system, transposons in trapping genes have more advantages than retrovirus. Emergence of the international knockout mouse consortium (IKMC) is the beginning of global cooperation. The organization is committed to systematically knock out all genes in the mouse genome, and then to carry out functional genomics studies.

    Related Articles | Metrics
    Short text classification based on word embedding similarity
    MA Cheng-long, JIANG Ya-song, LI Yan-ling, ZHANG Yan, YAN Yong-hong
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2014, 49 (12): 18-22.   DOI: 10.6040/j.issn.1671-9352.3.2014.295
    Abstract1538)      PDF(pc) (2161KB)(2900)       Save
    As the short length of the Web short text and less shared words, a lot of out of vocabulary (OOV) words would appear, and these words make the task of text classification more difficult. To solve this problem, a new general framework based on word embedding similarity was proposed. First, get the word embedding file with unsupervised learning method based on unlabeled data. Second, extend the OOVs with the similar words in training data through computing the similarities of different word embeddings. The comparison with the baseline system shows that the proposed method gets better 1%-2% rate and outperforms more 10% rate on small training data set.
    Reference | Related Articles | Metrics
    Study and application of CAD technology in grade crossing vertical design
    WANG Gui-Jie, WANG Wen-De, TAO De-Li
    J4    2009, 44 (11): 79-82.  
    Abstract1272)      PDF(pc) (1883KB)(2896)       Save

    he advantages and disadvantages are analysed on the basis of the grade crossing vertical design. Based on these design methods and computer aided design(CAD)technology,grid and contour line construction drawings are given by auto draft.Design results could be checked by the threedimensional Surface model based on the grids data and the threedimensional panoramic dynamic perspective picture.Finally, as certification, some road grade crossing engineering cases which are designed by these methods and CAD technology are presented.

    Related Articles | Metrics
    Sentiment classification method of Chinese Micro-blog based on semantic analysis
    YANG Jia-neng, YANG Ai-min, ZHOU Yong-mei
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2014, 49 (11): 14-21.   DOI: 10.6040/j.issn.1671-9352.3.2014.069
    Abstract1791)      PDF(pc) (1943KB)(2792)       Save
    By analyzing the structural features of Chinese Micro-blog, a sentiment classification method based on semantic analysis was proposed. For the proposed method, firstly, an emoticons sentiment lexicon and a network language sentiment lexicon were built. Then by using these two lexicons and the dependency parsing results, the sentiment expression Binary Tree was constructed. Finally, the sentiment strength, which was calculated by the established rules, was applied into the sentiment classification. Experimental results show that this method is effective and two built sentiment lexicons can better enhance the performance of the sentiment analysis system.
    Reference | Related Articles | Metrics
    Measuring user influence of a microblog based on information diffusion
    GUO Hao, LU Yu-liang, WANG Yu, ZHANG Liang
    J4    2012, 47 (5): 78-83.  
    Abstract1146)      PDF(pc) (832KB)(2779)       Save

    Information diffusion and influence modeling are hot topics in microblog research. To do research on influence quantitatively, a concept based on the message diffusion was introduced and complied with how to count it out. The proposed approach was validated on real world datasets, and the result of experiments shows that our method is both effective and stable, especially in condition of limited dataset and time span.

    Related Articles | Metrics
    An Upper Bound on the Sum of the k Largest Eigenvalues of  the Signless Laplacian Matrix of a Graph
    JIN Guang-qing, ZUO Lian-cui*
    J4    2013, 48 (8): 1-4.  
    Abstract1373)      PDF(pc) (671KB)(2716)       Save

    The sum of the k largest eigenvalues of the signless Laplacian matrix of a simple connected graph is studied and an upper bound is obtained in terms of the degree sequence and the order of the graph.

    Related Articles | Metrics
    Generalized interval-valued fuzzy rough sets and axiomatic characterizations
    ZHANG Hai-dong1, HE Yan-ping 2
    J4    2013, 48 (09): 56-63.  
    Abstract745)      PDF(pc) (718KB)(2714)       Save

    A general framework is presented for the study of generalized interval-valued fuzzy rough sets integrating the rough set theory with the interval-valued fuzzy set theory by using constructive approach. Firstly, through employing an interval-valued fuzzy residual implicator and its dual operator, generalized upper and lower interval-valued fuzzy rough approximation operators with respect to an arbitrary interval-valued fuzzy approximation space are first defined. Based on properties of interval-valued fuzzy residual implicator on LI,  some interesting properties of interval-valued fuzzy rough approximation operators are then examined. In the axiomatic approach, interval-valued fuzzy rough approximation operators are further defined by axioms. And different axiom sets can characterize the essential properties of interval-valued fuzzy rough approximation operators.

    Related Articles | Metrics
    Schur factorization and normal matrices factorization of row (column) symmetric matrices
    YUAN Hun-ping
    J4   
    Abstract2147)      PDF(pc) (186KB)(2680)       Save
    The concept of row (column) transposed matrix and row (column) symmetric matrix are given, and their basic properties are also studied. The formula for the Schur factorization and normal matrix factorization of row (column) symmetric matrix are obtained, which all can dramatically reduce the amount of calculation and Schur factorization and normal matrix factorization of row (column) symmetric matrix can save dramatically the CPU time and memory without losing any numerical precision.
    Related Articles | Metrics
    A LBS privacy-preserving method for geo-fencing services
    YANG Song-tao, MA Chun-guang, ZHOU Chang-li, ZHANG Zong-li
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2014, 49 (09): 69-73.   DOI: 10.6040/j.issn.1671-9352.2.2014.065
    Abstract1626)      PDF(pc) (1753KB)(2639)       Save
    Geo-fencing technology is widely used in recommender systems, advertising push and other services. It has serious risk of personal privacy leakage threat. Focus on triggered query in Geo-fencing, the theories of the secure tripartite computation were applied in the research of the LBS privacy-preserving model, which follows the concept of location obfuscation and location k-anonymity and reaches the target of user's identity unlink-ability and location's untraced-ability. Location anonymity hidden problem and secret authentication problem were solved by computational geometry techniques and principles of cryptography in the triggered queries scenario. Theoretical analysis shows the model is security. From the perspective of privacy-preserving, the attackers do not get new knowledge from LBS system. Experiments demonstrate the computational efficiency and communication loads of this medel are superior to the traditional spatial-temporal cloaking methods.
    Reference | Related Articles | Metrics
    Research advances of novel nonlinear optical crystals based on second-order Jahn-Teller effects (SOJT)
    ZHANG Jun-jie, ZHANG Zhong-han, TAO Xu-tang*
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2011, 46 (10): 99-120.  
    Abstract2936)      PDF(pc) (5876KB)(2630)       Save

    Explorations of new inorganic second-order nonlinear optical (NLO) materials is one of the current frontier topics due to their optoelectronics application such as frequency shifting, optical modulating, telecommunications and signal processing. Since 1998, a series of noncentrosymmetric (NCS) and polar oxides containing cations susceptible to second-order Jahn-Teller (SOJT) distortions, specifically, octahedrally coordinated d0 transition metals (TMs: Mo6+,W6+,V5+,Nb5+,etc.) and cations with stereochemically active lone pairs (SCALP, e.g. I5+, Te4+, Se4+, Sn2+, etc.), were successfully synthesized. Many of these materials exhibit large powder second-harmonic generation (SHG) efficiencies (> 400×α-SiO2). This paper reviews the progress on the materials in the past decade, including the search for new materials and crystal growth. The materials are divided into three categories: NCS oxides containing one kind of SOJT cations (d0 or SCALP), NCS oxides containing both kinds of SOJT cations, and NCS oxides containing SOJT cations and other NCS building units such as borate πorbital systems, tetrahedral groups and d10 transition metal cations (Zn2+, Cd2+, Sn4+, etc.).

    Related Articles | Metrics
    Asymptotics for the LASSO estimator for partially linear models
    LI Feng1, LU Yi-qiang2
    J4    2012, 47 (3): 93-97.  
    Abstract1373)      PDF(pc) (908KB)(2588)       Save

     Based on the profile least squares method, the LASSO penalty profile least squares estimator is constructed, and the choices of penalty parameter and bandwidth are also discussed. Because the optimization problem is linear, it can be easily implemented. Under some regular conditions, the consistency and asymptotic normality of the estimator for parameter component are investigated. Finally, Monte Carlo simulation studies are conducted to assess the finite sample performance of the proposed variable selection procedures.

    Related Articles | Metrics
    Algorithms of finite difference domain decomposition for two-heat equation
    LI Wan-shan, WANG Wen-qia*
    J4    2011, 46 (12): 1-5.  
    Abstract1235)      PDF(pc) (1316KB)(2556)       Save

    Considering algorithms of finite difference domain decomposition for twodimensional heat equation, a new kind of explicitimplicit difference schemes which is of unconditional stability is developed. The corresponding schemes consist of one explicit difference schemes at the interface point and fully implicit schemes in the subdomains. The stability and error estimates of the schemes are derived. Finally, the numerical experiment is presented which confirm the results and conclusions.

    Related Articles | Metrics
    Nanoporous metals: a new class of nanostructured energy materials
    DING Yi1,2
    J4    2011, 46 (10): 121-133.  
    Abstract2534)      PDF(pc) (4701KB)(2502)       Save

     Dealloyed nanoporous metals (NPMs) represent a new class of functional materials with unique structural properties such as high surface area, low density, high permeability, high electrical and thermal conductivity, and tunable structural features, which make them very attractive for important applications including catalysis, separation, and energy and environmental technologies. This article tends to provide an overview of the recent advances in this area, regarding their preparation, structure and interfacial properties. In particular, we will address their great potential as next generation electrode materials for new energy technologies.

    Related Articles | Metrics
    A method of personalized privacy preservation based on K-anonymization
    KANG Hai-yan, YANG Kong-yu, CHEN Jian-ming
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2014, 49 (09): 142-149.   DOI: 10.6040/j.issn.1671-9352.2.2014.320
    Abstract1394)      PDF(pc) (3365KB)(2487)       Save
    Aiming at the shortcomings of the global and local algorithms of the privacy preserving in data publishing, a method of top-down personalized generalization backtracking algorithm and its expansion algorithm based on the K-anonymous were proposed. The method combines the L-diversity and (s, d)-anonymization and dynamically build generalization tree structure, by which users can customize the privacy security levels and separate the similar level of safety as far as possible, so as to guarantee the availability and security of the information, which can effectively prevent homogeneity attack and background knowledge attack. Based on the above thinking. A system of personalized privacy preservation based on K-anonymization was developed on J2SE platform. The comprehensive experimental data shows that the algorithm can improves security and guarantee the availability of information effectively.
    Reference | Related Articles | Metrics
    Analysis on new word detection and sentiment orientation in Micro-blog
    TANG Bo, CHEN Guang, WANG Xing-ya, WANG Fei, CHEN Xiao-hui
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2015, 50 (01): 20-25.   DOI: 10.6040/j.issn.1671-9352.3.2014.024
    Abstract2004)      PDF(pc) (1195KB)(2479)       Save
    Due to popularity and flexibility of social media, more increasingly created words were used to express people's feelings and attitudes. New word detection and sentiment orientation has become a hot issue in Micro-blog analysis. The methods and techniques used in Task 3 of COAE 2014 were introduced. Generalized suffix tree was employed in string extraction, which was determined as new words with metrics like left-right-flexibility of words etc. Then, with pattern-based and statistic-based methods combined with multiple lexicons, sentiment orientation of new words was decided. Search engine was also used to optimize result as a supplement from semantic perspective. Results have shown our methods effective in new word detection and sentiment orientation analysis.
    Reference | Related Articles | Metrics
    First principles study of structure and thermodynamic properties of MgH2
    LIU Fu-ti1,2, CHENG Xiao-hong2, ZHANG Shu-hua3
    J4    2012, 47 (1): 39-43.  
    Abstract1660)      PDF(pc) (2282KB)(2472)       Save

    Based on the first principles electronic structure and thermodynamic properties of tetragonal MgH2 with pressures up 100GPa and temperatures up to 600K were studied with a quasi-harmonic Debye model. The volumes, equilibrium lattice parameter, energy gap were obtained, and the bulk modulus, heat capacity and entropy, Debye temperature and volume thermal expansion coefficient under different pressures and temperatures were successfully calculated.

    Related Articles | Metrics
    Personalized ranking of Micro-blogging forwarders
    KUANG Chong, LIU Zhi-yuan, SUN Mao-song
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2014, 49 (11): 31-36.   DOI: 10.6040/j.issn.1671-9352.3.2014.305
    Abstract1288)      PDF(pc) (1411KB)(2463)       Save
    The repost action is the main way for information spreading in Micro-blogging platform. Nowadays, many works have been done focusing on the repost behaviors' analysis and prediction. However, the problem about how to find the users who are the most likely to repost a given Micro-blog remains unsolved. In this paper, a general predictor, which combines Bayesian Personalized Ranking optimization criterion with Factorization Machines was presented to predict the reposter of a microblog. Furthermore, factors which affect a user to be a reposter were analyzed in details. With these facts, prediction of the reposters over large-scale real datasets was conducted. The experiment proves that this method can improve the effect of the prediction obviously. Meanwhile, method based on pair-wise and feature-related can solve the prediction problem more efficiently.
    Reference | Related Articles | Metrics
    An endogenous growth model of knowledge-based R&D economy
    ZHANG Yan-gang,RONG Xiao-xia,WANG Feng
    J4   
    Abstract1240)      PDF(pc) (261KB)(2456)       Save

    The element of human capital was introduced into the Romer endogenous growth model, and then technical progress and human capital were considered as endogenous at one time. The optimal balanced growth path of R&D knowledge economy was deduced. Based on the analysis of the optimal path and several factors’ contribution, it was demonstrated that technological advances and human capital play a dominantrole in promoting economic growth. Some policy recommendations were presented.

    Related Articles | Metrics
    Chaos particle swarm optimization based on the adaptive inertia weight
    ZHOU Yan1,2, LIU Pei-yu 1,2, ZHAO Jing1,2, WANG Qian-long1,2
    J4    2012, 47 (3): 27-32.  
    Abstract1424)      PDF(pc) (1570KB)(2453)       Save

    Aiming at the premature convergence problem which the particle swarm optimization algorithm suffers from, a chaos particle swarm optimization based on adaptive inertia weight is proposed. Firstly, chaotic sequence generated by cube map is used to initiate individual position, which strengthens the diversity of global searching. Secondly, adaptive inertia weight is adopted to improve the convergence rate. Furthermore, chaos perturbation is utilized to avoid the premature convergence. The results of the simulation experiment show that the convergence rate and the precision of the improved algorithm are obviously enhanced, and the algorithm can effectively avoid the premature convergence problem.

    Related Articles | Metrics
    Security analysis of fast public key cryptosystem on matrix ring
    GU Chun-sheng1,2, WU Fang-sheng2, JING Zheng-jun2,3, YU Zhi-min2
    J4    2013, 48 (09): 22-28.  
    Abstract973)      PDF(pc) (750KB)(2434)       Save

    It is very important to analyze the security of fast public key cryptosystem suitable for computing devices with limited resources. By applying lattice reduction algorithm, it is not more difficult than the integer factorization problem to break the fast public key cryptosystem based on matrix ring. That is, given an oracle of factoring integers, there exists a polynomial time algorithm which solves the secret key from the public key. The correctness of security analysis is demonstrated by computational experiments.

    Related Articles | Metrics
    Research of the text clustering based on LDA using in network public opinion analysis
    WANG Shao-peng, PENG Yan, WANG Jie
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2014, 49 (09): 129-134.   DOI: 10.6040/j.issn.1671-9352.2.2014.327
    Abstract2193)      PDF(pc) (1460KB)(2413)       Save
    For the problem that hidden information of the text may be ignored by the traditional text clustering algorithm based on words, a kind of text clustering algorithm based on the latent dirichlet allocation(LDA) topic model was proposed. The algorithm uses the TF-IDF algorithm and LDA topic model to calculate text similarity, through the cost function to determine the fusion coefficient of text similarity, through linear combination to get the similarity between texts and uses the F-measure value to evaluate the clustering result. In the constructing of the LDA model, the algorithm uses Gibbs sampling to estimate the parameter, and through the Bias statistical standard method to determine the optimal number of topics. Viewing from the accuracy and stability of clustering results, the simulation results show that the proposed algorithm has a better effect than the traditional text clustering algorithm.
    Reference | Related Articles | Metrics
    Progress in basic and technological research of enzyme system for lignocellulosics biodegradation
    QU Yin-bo
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2011, 46 (10): 160-170.  
    Abstract1186)      PDF(pc) (875KB)(2310)       Save

    Research on cellulose biodegradation has been carried out for more than 50 years in Shandong University. Based on the mechanism studies on microbial degradation of lignocellulosics, a Penicillium decumbens strain, which can hydrolyze lignocellulose efficiently, was isolated from natural samples, and several catabolite repressionresistant mutants were obtained. Genome sequencing of the strains were carried out, and the composition of their enzyme system and the mechanism for regulation of enzyme synthesis were studied by systems biotechnological methods. The cellulase-overproducing mutants has been used for cellulase production in industrial scale, and for cellulosic ethanol production in biorefinery of corncobs.

    Related Articles | Metrics
    Characterization and structural control of metalbased nanomaterials
    YANG Jun
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2013, 48 (1): 1-22.   DOI: 10.6040/j.issn.1671-9352.9.2012.001
    Abstract1387)      PDF(pc) (6800KB)(2289)       Save

    The common analytical and characteristic techniques including UV-visible spectroscopy, X-ray diffraction (XRD), X-ray photoelectron spectroscopy (XPS), transmission electron microscopy (TEM), and scanning transmission electron microscopy (STEM) are briefly introduced in this review article. In addition, in wetchemistry based syntheses, the approaches used to tune the structure of metal-based nanomaterials are categorized and discussed.

    Related Articles | Metrics
    Existence of positive solutions of the m-point boundary value problem with p-Laplace operator on time scales
    FAN Jin-jun, ZHANG Xue-ling, LIU Yan-sheng
    J4    2012, 47 (6): 16-19.  
    Abstract1159)      PDF(pc) (616KB)(2260)       Save

    The existence of positive solutions of the m-point boundary value problem with p-Laplace operator on time scales are considered. By using the LeggetWilliams fixed point theorem, the existence of three positive solutions is obtained. As an application, an example verified our results.

    Related Articles | Metrics
    The finite spectrum of SturmLiouville problems on time scales
    ZHAO Na
    J4    2013, 48 (09): 96-102.  
    Abstract1002)      PDF(pc) (706KB)(2256)       Save

    In this paper, we partition the bounded time scale such that the coefficients of Sturm-Liouville problems satisfy some certain conditions on adjacent subintervals. In this case, we can construct a kind of Sturm-Liouville problems with finite spectrum on bounded time scales, and it is the extension of classical SturmLiouville problems defined on continuous intervals.

    Related Articles | Metrics
    A user-centric identity management and authentication system for mobile Internet
    WANG Juan1,2, HE Qi1, YAN Fei1,2, JIANG Wan-wei1, YANG Ming1, WANG Yan1
    J4    2012, 47 (11): 12-17.  
    Abstract1167)      PDF(pc) (1194KB)(2238)       Save

    Based on the current research of user-centric identity management mechanism and technology, a new user-centric identity authentication system on mobile Internet platform named ID-Vcard was proposed and implemented on the Android platform. In the system of ID-Vcard, user can manage and use own identity information in the form of virtual card. In the process of authentication, it takes the advantage of the user’s and IdP’s digital certificates to authenticate users on RP. ID-Vcard has good usability in mobile platform because users can manage their identity information by virtual cards. In addition, it tries to reduce and eliminate the username/password authentication method.

    Related Articles | Metrics
    A new method of solving the assignment problem based on the permissible-edge algorithm of minimum cost flow problem
    XIONG De-guo, HU Yong-wen
    J4    2012, 47 (3): 103-109.  
    Abstract1196)      PDF(pc) (2190KB)(2202)       Save

     A new algorithm of the assignment problem is proposed by constructing its minimum cost maximum flow model and applying the permissible-edge algorithm based on the principle of duality to the model. The new algorithm gradually expands the permissible network in the capacity-cost network by means of modifying the potential of labeled nodes subject to complementary slackness condition, and then augments flows on the permissible network, which proceeds until the minimum cost maximum flow of the original capacity-cost network is obtained. The non-zero edge of this maximum flow corresponds to the optimal solution of the assignment problem. During the iterating process, successive iteration will fully use the information of previous ones, which effectively reduces the computation. For non-standard assignment problems, this algorithm can be directly applied without converting the problem to the standard form.

    Related Articles | Metrics
    The instance of new drug research and development: novel anti-cancer lead compounds of 4-thiazolidinones
    LIU Xiao-jun1, YAN Bing2*
    J4    2010, 45 (5): 1-5.  
    Abstract1840)      PDF(pc) (1165KB)(2126)       Save

    Taking thiazolidinone compounds as an example, we discuss the processes leading to the discovery of anti-cancer lead compounds. Using combinatorial chemistry and high throughput screening approaches, we discovered potent compounds against drugresistant cancer cells. Mechanistic studies indicated that these compounds inhibited microtubule formation, caused G2/M arrest in cell cycle, and induced apoptosis and autophagy. The anticancer activity did not depend on the status of P-gp in cells. These compounds had superb membrane permeability and inhibited tumor growth in vivo. Screening them against 60 human cancer cell lines demonstrated broad anti-cancer activities indicating that they will play a significant role in the future of our fight against cancer.
     

    Related Articles | Metrics
    Global exponential robust stability of stochastic interval cellularneural networks with S-type distributed delays
    ZHANG Wei-wei1, WANG Lin-shan2*
    J4    2012, 47 (3): 87-92.  
    Abstract1113)      PDF(pc) (1296KB)(2123)       Save

    By applying the Lyapunov stability theory and stochastic analysis approaches, some algebraic criteria are derived to ensure the globally robustly stochastically exponentially stability in the mean square for the addressed system, and the almost sure exponential stability is also studied. An example is given to illustrate the effectiveness and improvement over existing results.

    Related Articles | Metrics
    Improved certificateless aggregate signature scheme
    HOU Hong-xia1,2, ZHANG Xue-feng2, DONG Xiao-li2
    J4    2013, 48 (09): 29-34.  
    Abstract1095)      PDF(pc) (693KB)(2093)       Save

    Recently, the aggregate signature is a hot topic concerned. An improved cerificateless aggregate signature scheme is constructed based on the certificateless cryptography. Compared with the existing schemes, the scheme has constant pairing computations, and the verification algorithm only requires three pairing computations, which greatly improves the efficiency of the signature verification. The improved scheme can resist the attack of TypeⅠand TypeⅡadversary in certificateless adversary model,and it is existentially unforgeable under the computational DiffieHellman assumption.The security proof of the improved scheme is given in the random oracle model.

    Related Articles | Metrics
    Research advances on structure and function of animal hemoglobin
    FAN Tingjun, XU Bin, JING Zhao, ZHANG Yanan
    J4    2011, 46 (7): 1-6.  
    Abstract1106)      PDF(pc) (437KB)(2072)       Save

    Animal Hb plays important roles not only in transportation and storage of oxygen but also in regulation of pH value, control of nitric oxide levels, participation in immune responses, binding and transportion of sulfide and other biological functions, which has attracted research interests of scholars because it is an ideal molecule with which to study biological multifunctions of proteins. In the present paper, we review the molecular structure and biological function of animal Hb base on recent research advances and a large number of academic literature in this field.

    Related Articles | Metrics
    A grey bilevel linear multi-objective programming problem and its algorithm
    LIU Bing-bing
    J4    2012, 47 (5): 122-126.  
    Abstract1144)      PDF(pc) (836KB)(2062)       Save

     Based on the bilevel linear multi-objective programming problem with multiple objectives at the lower level and the characteristic of the grey system, a grey bilevel linear multi-objective programming problem is put forward, and its model and theorem are given. Under the assumption of the constraint region of the proposed model nonempty and compactness, it is  shown that the optimal solution of the drifting grey bilevel linear multi-objective programming problem can be reached on the extreme point of the constraint region. Finally, an algorithm based on the k-th best method is developed and its global convergence is proven. Numerical examples show that the proposed algorithm is effective.

    Related Articles | Metrics