Creat membership Creat membership
Sign in

Forgot password?

Confirm
  • Forgot password?
    Sign Up
  • Confirm
    Sign In
home > search

Now showing items 1 - 16 of 113

  • Software as a service scanning system and method for scanning web traffic

    An endpoint computer includes a local client that transmits web traffic to a local proxy that also runs on the endpoint computer. The local proxy obtains a customer identity string that identifies a user of the local client as a paying customer of an SaaS scanning service provided by an SaaS scanning system. The local proxy inserts the customer identity string into the web traffic and thereafter transmits the web traffic to the SaaS scanning system, which authenticates the customer identity string before scanning the web traffic for web threats. The local client transmits the web traffic to the local proxy using a communication protocol and the local proxy can transmit the web traffic to the SaaS scanning system using the same or different communication protocol.
    Download Collect
  • Complex of glucose derivative and proline, crystal, preparation method and use

    Disclosed are a complex of glucose derivative and proline, a crystal, a preparation method and a use. In an X-ray powder diffraction diagram of the eutectic crystal when the diffraction angle is 2θ, characteristic diffraction peaks comprise 4.339, 11.499, 12.835, 13.921, 15.294, 16.212, 16.804, 17.154, 18.335, 19.274, 19.982, 22.710, 23.218, 24.885, 27.940, 29.612 and 30.313, and the 2θ error range is ±0.1. The method comprises: mixing a compound A solution with an L-proline solution, and performing cooling and crystallization. The present invention further provides a of the crystal in medicine preparation. The eutectic crystal in the present invention features high water-solubility, low hygroscopicity and high stability, and is suitable for manufacturing a variety of preparations.
    Download Collect
  • Atomic force microscope tip cleaning by using gratings as micro-washboards

    Bin Shi   Dongxian Zhang   Haijun Zhang and Qing Sang  

    The sharpness of atomic force microscope (AFM) tips is essential for acquiring high quality AFM images. However, AFM tips would easily get contaminated during scanning and storage at ambient condition, which influences image resolution and causes image distortion. Replacing the probe frequently is a solution, but uneconomical. To solve this problem, several tip cleaning methods have been proposed but there is space for further improvement. Therefore, this article developed a method of tip cleaning by using a one-dimensional grating (600 lines/mm) as a micro-washboard to “wash” contaminated tips. We demonstrate that the contaminants can be scrubbed away by rapidly scanning such micro-washboard against the tip in the aids of Z-dithering (10–20 Hz) exerted on the washboard. This method is highly efficient and proved to be superior to traditional ones. Experiments show that AFM images acquired with “washed” tips have higher resolution and less distortion compared with images acquired using contaminated tips, even comparable to those scanned by new ones. Microsc. Res. Tech. 76:1131–1134, 2013.
    Download Collect
  • Observation and analysis of the urban heat island effect on soil in Nanjing, China

    Bin Shi   Chao-Sheng Tang   Lei Gao   Chun Liu   Bao-Jun Wang  

    The heat island effect in urban meteorology has received significant attention in the recent years. In order to investigate the heat island effect on urban soil, two observation stations were built, respectively, in an urban area and a rural area of Nanjing city, China. The temperatures of underground soil (0-300 cm depth) were recorded continuously for 1 year from June 2009 to June 2010. The data show that the urban soil temperature is generally higher than the rural soil temperature, and reveal an obvious heat island effect in urban soil with average intensity of 2.02°C over the 1-year period. The intensity varies between days, months and seasons: the daily urban heat island intensity (UHII) of soil ranges from 0.37°C to 3.98°C; the monthly UHII of soil ranges from 1.34°C (November) to 3.05°C (July); the order of seasonal UHII is summer (2.45°C) > winter (2.03°C) > spring (1.63°C) > autumn (1.53°C). The temperature data indicate that the maximum influence depth of daily synoptic events on the subsurface temperature is approximately 60 cm; the UHII generally increases with increasing depth. In addition to soil temperature, the temporal-spatial variation of soil moisture in a 100 cm profile depth was also investigated in this study. It is found that the moisture content of urban soil is generally lower than that of rural soil, which reveals an obvious dry island effect with average intensity of -7.2% over the 1-year period; the maximum single-day urban dry island intensity (UDII) in soil is -28.0%; the maximum average monthly UDII is -19.1%, observed in July; the seasonal UDII shows a tendency of summer (-13.8%) > spring (-6.3%) > autumn (-5.2%) > winter (-3.7%). In profile, soil moisture content generally increases with increasing depth, and the maximum UDII is -25.8% at 40 cm depth. In addition, the large-scale measurement results of 600 general points also confirm that the heat island and dry island effects are exist in urban soil.
    Download Collect
  • End user authentication using a virtual private network

    A user is provisioned for a Web service by supplying a user name and password. A digital certificate and VPN identifier are generated and downloaded to the user's computer. The VPN identifier and user identifier are stored into a database. The user accesses the Web service and establishes a VPN using the certificate and VPN identifier. A user identifier, user name or user password is not required. A gateway computer uses the VPN identifier to access the database previously established during the provisioning session to retrieve the user identifier. Retrieval of the user identifier validates that the computing device is authorized to use the Web service. The gateway computer stores the client IP address and a mapping to the user identifier into a database. A proxy server retrieves the user identifier from the database using the IP address and includes the user identifier in Web traffic for a remote computer.
    Download Collect
  • A distributed service composition method based on service association

    Bin Shi   Haiyang Wang   Lizhen Cui   Yuliang Shi  

    In this paper, a Web service composition architecture based on structured P2P network is proposed. Semantics is used to achieve service accurately matching and user personality customization. Through Web service virtual mapping(WVM) association the fast computing of distributed service composition based on the service function is also implemented. The Web service composition architecture and distributed service composition algorithm proposed in this paper solve a series of existent problems in service discovery and composition in distributed environment, and provide a service composition result meeting user personality requirement. At the same time, they improve the efficiency of service composition calculation.
    Download Collect
  • Preferred surgical procedure for posterior mediastinal neurogenic tumor

    Zhenrong Zhang   Deruo Liu   Yongqing Guo   Bin Shi   Yanchu Tian   Zhiyi Song and Chaoyang Liang  

    Aim: To compare the outcomes of video-assisted thoracoscopic surgery (VATS) with those of thoracotomy for the removal of posterior mediastinal neurogenic tumors.
    Download Collect
  • PepT1 Mediates Colon Damage by Transporting fMLP in Rats with Bowel Resection

    Bin Shi   Desheng Song   Hua Xue   Ning Li   Jieshou Li  

    Background. The intestinal oligopeptide transporter (PepT1) is responsible for the absorption of nutrient di-tripeptide and mediates the transportation of bacterial product N-formylmethionylleucyl-phenylalanine (fMLP) that induces intestinal inflammation. PepT1 is absent from normal colon epithelia but is abnormally expressed in the colon of patients with inflammatory bowel diseases. This study was designed to investigate the role of PepT1 in colonic inflammation and its relation with fMLP.Materials and methods. PepT1 mRNA expression was analyzed by RT-PCR and oligopeptide transportation was quantified by the luminal perfusion with cephalexin in rats following 80% small bowel resection. The inflammatory effects of PepT1-mediated fMLP transport were also investigated by the measurement of myeloperoxidase (MPO) activity, histological analysis, and the use of Gly-Gly (Glycine-Glycine, a competitive PepT1 blocker).Results. The overexpression of PepT1 was observed, peaking at 2 weeks post-operation, with its levels declining to 12% at week 4. The ability of oligopeptide transport was correlated with the PepT1 levels. The fMLP perfusion into the colon of rats with bowel resection resulted in an increased MPO activity and mucosal inflammation at week 2, but not at week 4 post-operation. The administration of Gly-Gly (50 mm) competitively inhibited PepT1, reducing the fMLP-associated MPO activation and colonic mucosal damage.Conclusions. The colonic PepT1 overexpression induced by bowel resection increases the transport of bacterial product fMLP and hence causes colonic inflammation, which may serve as a previously unrecognized pathway resulting in colon mucosa damage. (c) 2006 Elsevier Inc. All rights reserved.
    Download Collect
  • Finding Significant Web Pages with Lower Ranks by Pseudo-Clique Search

    Yoshiaki Okubo, Makoto Haraguchi   Bin Shi  

    In this paper, we discuss a method of finding useful clusters of web pages which are significant in the sense that their contents are similar or closely related to ones of higher-ranked pages. Since we are usually careless of pages with lower ranks, they are unconditionally discarded even if their contents are similar to some pages with high ranks. We try to extract such hidden pages together with significant higher-ranked pages as a cluster.
    Download Collect
  • Virtual extensible local area network performance routing

    A tunnel endpoint of a virtual network monitors the flows between the tunnel endpoint and at least one other tunnel endpoint. The virtual network spans a physical network. A flow identifier for each flow is determined based on packet headers of packets in each respective flow. A path identifier for each flow is also determined based on the packet headers of the packets in each respective flow. Each path identifier indicates a route that the respective flow takes in the physical network to reach the respective destination tunnel endpoint. The path identifier and the flow identifier of the respective flows are then transmitted to a controller of the virtual network.
    Download Collect
  • Ontology Based Hybrid Access Control for Automatic Interoperation

    Yuqing Sun, Peng Pan, Ho-fung Leung   Bin Shi  

    Semantic interoperation and service sharing have been accepted as efficient means to facilitate collaboration among heterogonous system applications. However, extensibility and complexity are still crucial problems in supporting multi-level automatic collaborations across dynamically changed domains. In this paper, we propose the ontology based hybrid access control model. It introduces the concept of Industry Coalition, which defines the common ontology and servers as the portal of an application domain for public. By mapping local authorizations to the common ontology, an enterprise can efficiently tackle the problems of automatic interoperation across heterogonous systems in the Coalition, as well as of the general requests from dynamically changed exterior collaborators not belonging to the Coalition. Several algorithms are also proposed to generate authorization mappings and maintain security constraints consistent. To illustrate our model, an example of property right exchange is given and experiment results are discussed.
    Download Collect
  • Job scheduling using expected server performance information

    A job scheduler that schedules ready tasks amongst a cluster of servers. Each job might be managed by one scheduler. In that case, there are multiple job schedulers which conduct scheduling for different jobs concurrently. To identify a suitable server for a given task, the job scheduler uses expected server performance information received from multiple servers. For instance, the server performance information might include expected performance parameters for tasks of particular categories if assigned to the server. The job management component then identifies a particular task category for a given task, determines which of the servers can perform the task by a suitable estimated completion time, and then assigns based on the estimated completion time. The job management component also uses cluster-level information in order to determine which server to assign a task to.
    Download Collect
  • Distributed fiber optic monitoring and stability analysis of a model slope under surcharge loading

    Hong-Hu Zhu   Bin Shi   Jie Zhang   Jun-Fan Yan…  

    In the discipline of geotechnical engineering, fiber optic sensor based distributed monitoring has played an increasingly important role over the past few decades. Compared with conventional sensors, fiber optic sensors have a variety of exclusive advantages, such as smaller size, higher precision, and better corrosion resistance. These innovative monitoring technologies have been successfully applied for performance monitoring of geo-structures and early warning of potential geohazards around the world. In order to investigate their ability to monitor slope stability problems, a medium-sized model of soil nailed slope has been constructed in laboratory. The fully distributed Brillouin optical time-domain analysis (BOTDA) sensing technology was employed to measure the horizontal strain distributions inside the model slope. During model construction, a specially designed strain sensing fiber was buried in the soil mass. Afterward, the surcharge loading was applied on the slope crest in stages using hydraulic jacks and a reaction frame. During testing, an NBX-6050 BOTDA sensing interrogator was used to collect the fiber optic sensing data. The test results have been analyzed in detail, which shows that the fiber optic sensors can capture the progressive deformation and failure pattern of the model slope. The limit equilibrium analyses were also conducted to obtain the factors of safety of the slope under different surface loadings. It is found that the characteristic maximum strains can reflect the stability of the model slope and an empirical relationship was obtained. This study verified the effectiveness of the distributed BOTDA sensing technology in performance monitoring of slope.
    Download Collect
  • Effect of antler extract on corticosteroid-induced avascular necrosis of the femoral head in rats

    Bin Shi   Gang Li   Ping Wang   Wu Yin   Guodong Sun   Qingbo Wu   Gongchang Yu  

    Download Collect
  • Engineering geological characteristics of expansive soils in China

    Bin Shi   Hongtao Jiang   Zhibin Liu   H.Y Fang  

    Download Collect
  • Expression profiles of micro RNA in proliferating and differentiating 32D murine myeloid cells

    Bin Shi   Marco Prisco   George Calin   Chang-gong Liu   Giuseppe Russo   Antonio Giordano   Renato Baserga  

    Abstract 32D cells are murine myeloid cells that grow indefinitely in Interleukin-3 (IL-3). In these cells, the type 1 insulin-like growth factor (IGF-I) and granulocytic-colony stimulating factor (G-CSF) induce differentiation to granulocytes. 32D cells do not express insulin receptor substrate-1 (IRS-1) or IRS-2, docking proteins of the IGF-I receptor. Ectopic expression of IRS-1 in these cells inhibits differentiation, the cells become IL-3 independent and IGF-1 dependent and can form tumors in mice. 32D and 32D-derived cells offer a good model in which to study the expression profiles of Micro Rna (miR) related to sustained proliferation or differentiation. We present here the data obtained with miR micro-arrays and identify the miR that are regulated by IGF-1 or G-CSF and are associated with either differentiation or indefinite cell proliferation of 32D murine myeloid cells. © 2006 Wiley-Liss, Inc.
    Download Collect
1 2 3 4 5 6 7 8

Contact

If you have any feedback, Please follow the official account to submit feedback.

Turn on your phone and scan

Submit Feedback