Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 136 )

2018 ( 981 )

2017 ( 985 )

2016 ( 891 )

Custom range...

Search Results: 1 - 10 of 59034 matches for " Xingming Yang "
All listed articles are free for downloading (OA Articles)
Page 1 /59034
Display every page Item
Arthroscopy Assisted Lesion Clearance and Bone Graft, Titanium Rod Support Treatment of Early Stage Osteonecrosis of the Femoral Head of the Postoperative Survival Rate Analysis  [PDF]
Xingming Yang, Wei Shi, Yakun Du, Lei Zhang
Surgical Science (SS) , 2017, DOI: 10.4236/ss.2017.81005
Abstract: Objective: To assess the curative effect of the stage II femoral head necrosis treated by arthroscopy assisted lesion clearance, bone graft and titanium rod support. Methods: All the patients (including 58 patients 74 hips) were diagnosed as stage II femoral head necrosis according to the ARCO staging system during 2003-2013. In these patients, 15 hips were stage IIA, 34 hips were stage IIB and 25 hips were stage IIC. Located by C-arm and assisted by arthroscopy, minimally-invasive percutaneous pulp core decompression and lesion clearance within the femoral head were accurately performed, and then, the OAM composite of autologous bone marrow was implanted and the femoral head was supported using the titanium rod. Follow-up including the pain score, the Harris hip score and X-ray observation for disease progression were achieved at 6, 12, 24 and 36 months postoperatively, Kaplan-Meier survival curve was used for the survival analysis. Result: The VAS score and the Harris score after operation were better THRAn THRAt of before the surgery, the difference had statistical significance (p < 0.05). As for the X-ray staging, 5 cases (5 hips) progressed from stage IIB to stage IIC, the femoral head of 6 cases (6 hips) staged IIC collapsed at 24 months after the operation and then underwent THRA after 30 months. In this study, the total improvement rate after the surgery was 79.72% (93.33% for IIA, 82.35% for IIB and 68% for IIC). The total survival rate of these patients was 64.2% (95% CI, 64.2% - 90.1%). Conclusion: Arthroscopy assisted lesion clearance, bone graft and titanium rod support to treat the stage II osteonecrosis of the femoral head are effective and can prevent the femoral head from collapsing. But for stage IIC patients who had a history of the use of hormone, this surgery should be chosen carefully because the outcome is always very poor.
An Excellent Image Data Hiding Algorithm Based on BTC
Nur Mohammad,Xingming Sun,Hengfu Yang
Information Technology Journal , 2011,
Abstract: The Development of modern communication technology, demand for digital image, audio, video and other contents transmission and storage are increasing rapidly. To protect digital product and ensure the secure transfer of the digital items become important issue in home and abroad. The researcher developed many algorithms; these are some specific fields. But cant grantee the whole safety of the contents. The Block Truncation Coding one of the effective and real time application for the hiding data compare with transform domain and other techniques. In a coding technique, a number of bits required to represent an image which needs less data store and less computation. Application of coding in the field of image processing generally concern image data compression for storage and transmission as well as feature extraction for pattern recognition. Most existing BTC-based data hiding algorithms do not fully exploit visual perception of the host images and cannot obtain high hiding capacity and visual quality. For fully exploit visual perception and high hiding capacity, an excellent data hiding scheme based on BTC is proposed. First, the BTC scheme uses a two level (one-bit) nonparametric quantizer that adapts to local properties of the image. Second we employed Human Visual System (HVS) masking characteristics which ensure high visual quality of stego image. At the last, we embedded the data into the modified bitmap of BTC. The experimental results show that the proposed algorithm has good transparency, high hiding capacity and the visual quality of stego-images is very good.
A Semi-Fragile Watermarking Algorithm using Adaptive Least Significant Bit Substitution
Hengfu Yang,Xingming Sun,Guang Sun
Information Technology Journal , 2010,
Abstract: A novel semi-fragile watermarking scheme in image spatial domain is proposed. Each watermark bit is duplicated and embedded into sub-blocks of the host image by adaptive Least Significant Bit (LSB) substitution. The adaptive LSB substitution fully exploits the Human Visual System (HVS) masking characteristics, which ensures high visual quality of watermarked image. The watermark for authentication is extracted by taking a majority vote on the extracted bits. To differentiate attack types effectively, a classification rule for image authentication was developed. Experimental results show that the proposed scheme has good transparency and robustness against admissible signal operations, while it is sensitive to malicious attacks such as heavy noise addition, rotation by large angle, cutting and pasting. In addition, the scheme can localize the tampered region precisely.
Suppression of glutamate synthase genes significantly affects carbon and nitrogen metabolism in rice (Oryza sativa L.)
YongEn Lu,Feng Luo,Meng Yang,XiangHua Li,XingMing Lian
Science China Life Sciences , 2011, DOI: 10.1007/s11427-011-4191-9
Abstract: Rice (Oryza sativa) glutamate synthase (GOGAT, EC enzymes have been proposed to have great potential for improving nitrogen use efficiency, but their functions in vivo and their effects on carbon and nitrogen metabolism have not been systematically explored. In this research, we analyzed transcriptional profiles of rice GOGAT genes using a genome-wide microarray database, and investigated the effects of suppression of glutamate synthase genes on carbon and nitrogen metabolism using GOGAT co-suppressed rice plants. Transcriptional profiles showed that rice GOGAT genes were expressed differently in various tissues and organs, which suggested that they have different roles in vivo. Compared with the wild-type, tiller number, total shoot dry weight, and yield of GOGAT co-suppressed plants were significantly decreased. Physiological and biochemical studies showed that the contents of nitrate, several kinds of free amino acids, chlorophyll, sugars, sugar phosphates, and pyridine nucleotides were significantly decreased in leaves of GOGAT co-suppressed plants, but the contents of free ammonium, 2-oxoglutarate, and isocitrate in leaves were increased. We conclude that GOGATs play essential roles in carbon and nitrogen metabolism, and that they are indispensable for efficient nitrogen assimilation in rice.
Survey of Anonymity and Authentication in P2P Networks
Xiaoliang Wang,Lincong Yang,Xingming Sun,Jinsong Han
Information Technology Journal , 2010,
Abstract: Anonymity has received increasing attention in the literature due to the users` awareness of their privacy nowadays. While anonymity related issues have been extensively studied in peer-to-peer (P2P) systems, numerous concerns have been raised about the issue of providing authentic partners in P2P systems. In addition, the network authority requires authentication so that misbehaving entities in the network remain traceable. This study analyzes this problem and reviews related researches. Besides, we also advise some possible methods for this problem.
Steganography in Ms Excel Document using Text-rotation Technique
Bin Yang,Xingming Sun,Lingyun Xiang,Zhiqiang Ruan
Information Technology Journal , 2011,
Abstract: Most text steganographic methods are taken the formatted text documents, such as MS Word, PDF, PPT and etc., as cover carriers to hide secret information. This study concerns on the steganography in MS Excel document and proposes a new steganographic method hiding information efficiently by text-rotation technique. The proposed method is implemented by slightly rotating the angle of the text inside the cell to reduce the visible detection of the embedded information. Measuring the text angle of the cells retrieves the secret information. Experiments for different threshold in the algorithm are presented and the results show the proposed method not only has a good imperceptibility but also achieve high embedding rate while most of cells in Excel document are short in length.
A Secure Steganographic Method via Multiple Choice Questions
Lingyun Xiang,Xingming Sun,Yuling Liu,Hengfu Yang
Information Technology Journal , 2011,
Abstract: In this study, a novel secure steganographic method was proposed by taking advantage of Multiple-Choice Questions (MCQs). Selecting a series of MCQs to automatically generate a stego text could conceal secret information. The proposed method could achieve a considerable embedding bit rate while being able to hide more information by reordering the options of the generated MCQs. The final outputting stego texts were kept the same linguistic and statistic characteristics as normal texts, thus the hidden information had good imperceptibility and could survive under potential steganalysis attacks, which was also demonstrated by experiments. More experimental results showed that the average embedding bit rate achieved more than 1 bit per sentence, which was superior to the bit rate of most existing linguistic steganographic methods.
A Novel Reversible Text Data Hiding Scheme
Bin Yang,Xingming Sun,Jianjun Zhang,Lingyun Xiang
Information Technology Journal , 2012,
Abstract: In many critical application areas, such as military, legal and literature fields, methods of protecting copyright for text data could not cause any distortion in textual content. In this study, we evaluate a novel reversible (lossless) data hiding scheme for MS office 2007 document. The proposed scheme modifies the unnoticeable content and the synonyms of a document to hide information. While in extraction processing, the original content can be recovered without any distortion from the marked textual. Our scheme is achieved by using two common text information hiding methods simultaneously. The secret information is embedded into the cover document by synonym substitution. Original synonyms in the document are mapped into a compressed Synonym Index Table (SIT) and concealed into the MS office 2007 document. Experiments results demonstrated that proposed scheme can not only successfully embed and extract the secret information but also keep the original textual content undistorted.
Invertible Transform-Based Reversible Text Watermarking
Zhijie Liu,Xingming Sun,Yuling Liu,Lincong Yang
Information Technology Journal , 2010,
Abstract: In some critical application areas, it is not allowed to modify the contents of the text, like military, legal and literature fields. Therefore, restoring the original contents of the text becomes a practical and important issue for text watermarking. This study aims to deal with this problem. We firstly present the concept of reversible text watermarking and then bring forth an effective scheme to achieve reversible text watermarking. Based on the synonym substitution method, the proposed algorithm applies an invertible transform to embed watermark, extract watermark and recover the original contents of the text. By using the reversible watermarking scheme, one can not only protect the interests of the author of the text, but also get the original contents of the text, if the receiver has the wish and right to revert the original contents of the text. Moreover, the scheme improves the payload capacity via using high embedding level, compressing the watermark or repeating the algorithm more than one time.
Robust Adaptive Image Watermarking using Visual Models in DWT and DCT Domain
Ahmed A. Abdulfetah,Xingming Sun,Hengfu Yang,Nur Mohammad
Information Technology Journal , 2010,
Abstract: In this study, two image adaptive invisible digital watermarking algorithms based on DWT and DCT are proposed for copyright protection. The first proposed algorithm utilizes Watson’s visual model (JND) to determine the watermarking strength necessary to invisibly embed the watermark in the DCT block coefficients of the cover image by controlling the power of strength of JND. The second proposed technique embeds the watermark by modifying coefficients of the vertical and the horizontal detail sub-bands of wavelet sub-blocks, chosen with a secret key. The visual model is designed to generate a Just Noticeable Difference mask (JND) by analyzing image characteristics such as textures and luminance of the cover image in the DWT based domain. Since, the secret key is required for both embedding and extraction of watermark, it is not possible for an unauthorized user to extract the embedded watermark. The proposed schemes are robust to common image processing distortions like filtering, JPEG compression and noise. Experimental results show that the proposed schemes are efficient, imperceptible and the quality of watermarked image is very well and robust for various image processing distortions.
Page 1 /59034
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.