33 results on '"Ruoqing-Zhang"'
Search Results
2. Enhancement of Hybrid BCI System Performance Based on Motor Imagery and SSVEP by Transcranial Alternating Current Stimulation
- Author
-
Zhaohui Li, Ruoqing Zhang, Wenjing Li, Meng Li, Xiaogang Chen, and Hongyan Cui
- Subjects
Brain-computer interface ,hybrid brain-computer interface ,motor imagery ,steady-state visually evoked potential ,transcranial alternating current stimulation ,Medical technology ,R855-855.5 ,Therapeutics. Pharmacology ,RM1-950 - Abstract
The hybrid brain-computer interface (BCI) is verified to reduce disadvantages of conventional BCI systems. Transcranial electrical stimulation (tES) can also improve the performance and applicability of BCI. However, enhancement in BCI performance attained solely from the perspective of users or solely from the angle of BCI system design is limited. In this study, a hybrid BCI system combining MI and SSVEP was proposed. Furthermore, transcranial alternating current stimulation (tACS) was utilized to enhance the performance of the proposed hybrid BCI system. The stimulation interface presented a depiction of grabbing a ball with both of hands, with left-hand and right-hand flickering at frequencies of 34 Hz and 35 Hz. Subjects watched the interface and imagined grabbing a ball with either left hand or right hand to perform SSVEP and MI task. The MI and SSVEP signals were processed separately using filter bank common spatial patterns (FBCSP) and filter bank canonical correlation analysis (FBCCA) algorithms, respectively. A fusion method was proposed to fuse the features extracted from MI and SSVEP. Twenty healthy subjects took part in the online experiment and underwent tACS sequentially. The fusion accuracy post-tACS reached 90.25% ± 11.40%, which was significantly different from pre-tACS. The fusion accuracy also surpassed MI accuracy and SSVEP accuracy respectively. These results indicated the superior performance of the hybrid BCI system and tACS would improve the performance of the hybrid BCI system.
- Published
- 2024
- Full Text
- View/download PDF
3. A Calibration-Free Hybrid BCI Speller System Based on High-Frequency SSVEP and sEMG
- Author
-
Ruoqing Zhang, Guoya Dong, Meng Li, Zhihua Tang, Xiaogang Chen, and Hongyan Cui
- Subjects
Brain–computer interface ,steady-state visual evoked potential ,surface electromyography ,filter bank canonical correlation analysis ,Medical technology ,R855-855.5 ,Therapeutics. Pharmacology ,RM1-950 - Abstract
Hybrid brain-computer interface (hBCI) systems that combine steady-state visual evoked potential (SSVEP) and surface electromyography (sEMG) signals have attracted attention of researchers due to the advantage of exhibiting significantly improved system performance. However, almost all existing studies adopt low-frequency SSVEP to build hBCI. It produces much more visual fatigue than high-frequency SSVEP. Therefore, the current study attempts to build a hBCI based on high-frequency SSVEP and sEMG. With these two signals, this study designed and realized a 32-target hBCI speller system. Thirty-two targets were separated from the middle into two groups. Each side contained 16 sets of targets with different high-frequency visual stimuli (i.e., 31-34.75 Hz with an interval of 0.25 Hz). sEMG was utilized to choose the group and SSVEP was adopted to identify intra-group targets. The filter bank canonical correlation analysis (FBCCA) and the root mean square value (RMS) methods were used to identify signals. Therefore, the proposed system allowed users to operate it without system calibration. A total of 12 healthy subjects participated in online experiment, with an average accuracy of 93.52 ± 1.66% and the average information transfer rate (ITR) reached 93.50 ± 3.10 bits/min. Furthermore, 12 participants perfectly completed the free-spelling tasks. These results of the experiments indicated feasibility and practicality of the proposed hybrid BCI speller system.
- Published
- 2023
- Full Text
- View/download PDF
4. Beneficial Effects of Endophytic Fungi from the Anoectochilus and Ludisia Species on the Growth and Secondary Metabolism of Anoectochilus roxburghii
- Author
-
Bingzhu Ye, Yanbin Wu, Xin Zhai, Ruoqing Zhang, Jinzhong Wu, Chao Zhang, Khalid Rahman, Luping Qin, Ting Han, and Chengjian Zheng
- Subjects
Chemistry ,QD1-999 - Published
- 2020
- Full Text
- View/download PDF
5. DCN: Detector-Corrector Network Against Evasion Attacks on Deep Neural Networks.
- Author
-
Jing Wen, Lucas C. K. Hui, Siu-Ming Yiu, and Ruoqing Zhang
- Published
- 2018
- Full Text
- View/download PDF
6. A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage.
- Author
-
Zechao Liu, Zoe Lin Jiang, Xuan Wang 0002, Siu-Ming Yiu, Ruoqing Zhang, and Yulin Wu
- Published
- 2018
- Full Text
- View/download PDF
7. Crypt-EHRServer: Protecting Confidentiality with Attribute-Based Encryption and Encrypted Query Processing.
- Author
-
Ruoqing Zhang, Chiling Chow, and Lucas C. K. Hui
- Published
- 2017
- Full Text
- View/download PDF
8. A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation.
- Author
-
Ruoqing Zhang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Xiaoqi Yu, Zechao Liu, and Zoe Lin Jiang
- Published
- 2017
- Full Text
- View/download PDF
9. LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation).
- Author
-
Xiaoqi Yu, Nairen Cao, Gongxian Zeng, Ruoqing Zhang, and Siu-Ming Yiu
- Published
- 2016
- Full Text
- View/download PDF
10. A Revocable Outsourcing Attribute-Based Encryption Scheme.
- Author
-
Zoe Lin Jiang, Ruoqing Zhang, Zechao Liu, Siu-Ming Yiu, Lucas C. K. Hui, Xuan Wang 0002, and Junbin Fang
- Published
- 2016
- Full Text
- View/download PDF
11. F-DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems.
- Author
-
Jingxuan Wang, Lucas C. K. Hui, Siu-Ming Yiu, Gang Zhou, and Ruoqing Zhang
- Published
- 2017
- Full Text
- View/download PDF
12. A Provable Secure Mutual RFID Authentication Protocol Based on Error-Correct Code.
- Author
-
Zehui Li, Ruoqing Zhang, Yatao Yang, and Zichen Li
- Published
- 2014
- Full Text
- View/download PDF
13. A Homomorphic ElGamal Variant Based on BGN's Method.
- Author
-
Zhiwei Chen, Ruoqing Zhang, Yatao Yang, and Zichen Li
- Published
- 2013
- Full Text
- View/download PDF
14. Coupling of environmental factors and growth stages in simulation of maize biomass allocation
- Author
-
Ruoqing Zhang, Danni Yang, Sien Li, Jinliang Chen, Dan Hu, Hui Guo, Chunyu Wang, Yahui Wang, and Xue Cong
- Subjects
Soil Science ,Plant Science - Published
- 2022
- Full Text
- View/download PDF
15. M-shopping service quality dimensions and their effects on customer trust and loyalty: an empirical study
- Author
-
Ruoqing Zhang, Sergio Palacios, and Minjoon Jun
- Subjects
Service quality ,Empirical research ,Strategy and Management ,media_common.quotation_subject ,Loyalty ,Business ,Marketing ,General Business, Management and Accounting ,Structural equation modeling ,Loyalty business model ,media_common - Abstract
PurposeThe present study seeks to identify the salient mobile shopping (m-shopping) service quality dimensions as perceived by mobile shoppers (m-shoppers) and examines the linkages between the derived m-shopping service quality dimensions, customer trust and customer loyalty.Design/methodology/approachThe research instrument is developed based upon the mostly validated measures of prior studies. A pretest of the questionnaire is conducted to assess the content validity of the measurement scales. An online survey is used to collect the required data. We employ structural equation modeling (SEM) to analyze data collected from 286 m-shoppers.FindingsWe identify five key m-shopping service quality dimensions: responsiveness, personalization, ease of use, aesthetics and perceived risk based on an extensive review of relevant literature. The SEM results show that all the five m-shopping service quality dimensions significantly impact, directly and/or indirectly, customer loyalty. Moreover, the results show that trust plays a partial mediating role in the effects of responsiveness and personalization on loyalty; a full mediating role in the effects of aesthetics and perceived risk on loyalty and no mediating role in the effect of ease of use on loyalty.Practical implicationsMobile retailers (m-retailers) can use the quality measurement tool developed in this study to detect service quality weaknesses and strengths. Based on their quality assessment, m-retailers can effectively allocate corporate resources to the important service quality attributes uncovered by this study, thereby improving their overall service quality performance and in turn expanding their loyal customer base.Originality/valuePrior studies have demonstrated that service quality and customer trust play a pivotal role in enhancing customer loyalty in both offline and online settings. Unfortunately, no research has empirically examined the relationships between service quality dimensions, trust and loyalty in the context of m-shopping. Therefore, a major contribution of this study is to address this research gap and add knowledge to the limited body of post-adoption m-shopping research.
- Published
- 2021
- Full Text
- View/download PDF
16. ASL-BIDS Example Datasets
- Author
-
Yang, Leon, Vos, Sjoerd, Jiang, Jiyang, Pham, William, Clement, Patricia, Thomas, David L., Engen, Haakon, Castellaro, Marco, Achten, Eric, Woods, Joseph G, Petr, Jan, Mutsaerts, Henk JMM, Ruoqing, Zhang, Okell, Thomas W., and Chappell, Michael A
- Subjects
ComputingMilieux_COMPUTERSANDSOCIETY - Abstract
Publicly available example datasets converted to BIDS to exemplify ASL cases.
- Published
- 2022
- Full Text
- View/download PDF
17. Drip irrigation improves spring wheat water productivity by reducing leaf area while increasing yield
- Author
-
Danni Yang, Sien Li, Mousong Wu, Hanbo Yang, Wenxin Zhang, Ji Chen, Chunyu Wang, Siyu Huang, Ruoqing Zhang, and Yunxuan Zhang
- Subjects
Root water uptake ,Water productivity ,Drip irrigation ,Soil Science ,Carbon allocation ,Energy balance ,Plant Science ,Agronomy and Crop Science - Abstract
To mitigate the climate change-induced water shortage and realize the sustainable development of agriculture, drip irrigation, a more efficient water-saving irrigation method, has been intensively implemented in most arid agricultural regions in the world. However, compared to traditional border irrigation, how drip irrigation affects the biophysical conditions in the cropland and how crops physiologically respond to changes in biophysical conditions in terms of water, heat and carbon exchange remain largely unknown. In view of the above situation, to reveal the mechanism of drip irrigation in improving spring wheat water productivity, paired field experiments based on drip irrigation and border irrigation were conducted to extensively monitor water and heat fluxes at a typical spring wheat field (Triticum aestivum L.) in Northwest China during 2017–2020. The results showed that drip irrigation improved yield by 10.3 % and crop water productivity (i.e., yield-to-evapotranspiration-ratio) by 15.6 %, but reduced LAI by 16.9 % in contrast with border irrigation. Under drip irrigation, the lateral development of spring wheat roots was promoted by higher soil temperature combined with frequent dry-wet alternation in the shallow soil layer (0–20 cm), which was the basis for efficient absorption of water and fertilizer, as well as efficient formation of photosynthate. Meanwhile, drip irrigation increased net radiation and decreased latent heat flux by inhibiting leaf growth, thereby increased sensible heat, causing a higher soil temperature (+1.10 ℃) and canopy temperature (+1.11 ℃). Further analysis proved that soil temperature was the key factor affecting yield formation. Based on the above conditions, the decrease in leaf distribution coefficient (−0.030) led to the decrease in evapotranspiration (−5.7 %) and the increase in ear distribution coefficient (+0.029). Therefore, drip irrigation emphasized the role of soil moisture in the soil-plant-atmosphere continuum, enhanced crop activity by increasing field temperature, especially soil temperature, and finally improved yield and water productivity via carbon reallocation. The study revealed the mechanism of drip irrigation for improving spring wheat yield, and would contribute to improving Earth system models in representing agricultural cropland ecosystems with drip irrigation and predicting the subsequent biophysical and biogeochemical feedbacks to climate change.
- Published
- 2023
- Full Text
- View/download PDF
18. Examining the Impact of Social Media Following on Player Salary in the National Basketball Association: A Multivariate Statistical Analysis.
- Author
-
Lee, C. Christopher, Ruoqing Zhang, Lomotey, Restinel, Watkins, Jordan, and Yuxin Huang
- Subjects
BASKETBALL ,MULTIVARIATE analysis ,SOCIAL media ,STATISTICAL association ,BASKETBALL players - Abstract
The National Basketball Association (NBA) has the highest average player salary of any professional sports league that exists. In previous studies, it has been found that on-court performance statistics, such as points per game and rebounds per game, are key determinants of NBA players' salaries. This study contributes to the literature by examining the effects of other on-court performance statistics such as real plus minus, field goal percentage, and free throw percentage. In addition, we test the relationship between NBA players' social media following and their salaries. The multivariate analyses in our study show that points per game, real plus minus, and social media following are the most essential three factors determining NBA players' salaries. The implications for NBA research and practice are discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
19. Attribute based encryption for health data sharing
- Author
-
Ruoqing Zhang
- Published
- 2020
- Full Text
- View/download PDF
20. Beneficial Effects of Endophytic Fungi from the
- Author
-
Bingzhu, Ye, Yanbin, Wu, Xin, Zhai, Ruoqing, Zhang, Jinzhong, Wu, Chao, Zhang, Khalid, Rahman, Luping, Qin, Ting, Han, and Chengjian, Zheng
- Subjects
fungi ,food and beverages ,Article - Abstract
Endophytic fungi possess favorable effects on their host plants, including disease-resistance improvement, secondary metabolite induction, and growth promotion. It is therefore a promising and sustainable strategy to utilize endophytic fungi for the quality improvement of medicinal herbs or important crops. In our study, a collection of 277 strains of endophytic fungi were isolated from Anoectochilus and Ludisia orchids. Two strains J162 and J211 can be symbiotically cocultured with the tissue culture seedlings of Anoectochilus roxburghii, a popular medicinal and edible plant in southern China. Both strains can significantly enhance the biomass of A. roxburghii and induce the biosynthesis and accumulation of its active ingredients, including flavonoids, kinsenoside, and polysaccharides. J162 and J211 were further identified as Chaetomium globosum and Colletotrichum gloeosporioides based on multilocus phylogenetic analysis. Immunocytochemical staining indicated that J162 and J211 mainly colonized the intercellular gap of xylem parenchyma cells of A. roxburghii roots without obvious harm. In addition, quantitative real-time polymerase chain reaction showed that the expression of three growth-related genes, namely, uracil phosphoribosyl transferase, amino acid transmembrane transporter, and maturase K, were significantly altered in A. roxburghii plants when treated with J162 and J211. In conclusion, the two strains are highly beneficial microbial resources for the growth and accumulation of active ingredients of A. roxburghii in agricultural cultivation.
- Published
- 2019
21. Exploring the Behavioral Intention to Use Collaborative Commerce: A Case of Uber.
- Author
-
Lee, Christopher, Ruane, Sinéad G., Hyoun Sook Lim, Ruoqing Zhang, and Heechang Shin
- Subjects
COLLABORATIVE commerce ,COLLABORATIVE consumption ,INTENTION ,SHARING economy ,EXPECTATION (Philosophy) - Abstract
The goal of our research study is to develop a hybrid instrument built on the revised Unified Theory of Acceptance and Use of Technology (UTAUT2) framework, which is reliable in predicting the behavioral intention to use and subsequent use of the Uber ridesharing app. It focuses on extending the UTAUT2 in the area of collaborative consumption, particularly from a consumer and ridesharing-app perspective. Our proposed framework, UTAUT-CC, preserves existing UTAUT2 constructs - performance expectancy, effort expectancy, social expectancy, and facilitating conditions. It also retains demographic moderating variables of age and gender, while maintaining some of the key integral relationships depicted in those models. We integrated three new constructs deemed relevant in linking to collaborative consumption and a sharing economy - price, trust, and convenience. We incorporated elements of online services and offline services (O2O) together from respective perspectives of mobile technology and ridesharing. Our overall model explained 70.5% of the variance of behavioral intention of Uber. We conclude the paper by exploring actionable implications for practitioners and scholars. [ABSTRACT FROM AUTHOR]
- Published
- 2021
22. Quantum Storytelling Network Analysis of Supply Chain Management: A Case Study
- Author
-
Wenkai Zhou and Ruoqing Zhang
- Subjects
Knowledge management ,Supply chain management ,Product design ,business.industry ,Supply chain ,Ontology ,The Internet ,business ,Competitive advantage ,Storytelling ,Network analysis - Abstract
The objective of this chapter is to interpret a supply chain as an ontological entity with being-in-the-world of spacetimemattering. A case study approach is adopted to reveal the strategies undertaken by one of China’s fastest growing Internet companies – Xiaomi Inc. – to create competitive advantage through its management of product design and supply chain integration. Utilizing publicly available data, we analyze the company with quantum storytelling and network analysis techniques. Our analysis concludes that Xiaomi’s success originates from two aspects. First, Xiaomi is a good storyteller, who makes stories appealing to customers by involving them into product design and branding. Second, Xiaomi’s parsimonious supply chain substantially improves its market responsiveness and reduces disruption risks; more importantly, it helps to offer products of great value to customers.
- Published
- 2018
- Full Text
- View/download PDF
23. A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage
- Author
-
Xuan Wang, Yulin Wu, Ruoqing Zhang, Zoe Lin Jiang, Zechao Liu, and S. M. Yiu
- Subjects
Scheme (programming language) ,Service (systems architecture) ,Computer science ,business.industry ,Distributed computing ,Access control ,02 engineering and technology ,Encryption ,020202 computer hardware & architecture ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Attribute-based encryption ,Time domain ,business ,computer ,Cloud storage ,computer.programming_language ,Access structure - Abstract
Cloud storage service allows data owners to store their (encrypted) data in a remote and may be untrusted cloud server. Attribute-Based Encryption (ABE) provides an excellent and flexible solution for data access control. As more and more applications evolved, ABE schemes may not handle all scenarios, in particular, if the access control has a time and location constraint. Time and location attributes are not as static as other general attributes. Existing ABE schemes cannot efficiently handle the continuous range of an attribute making it impractical for temporal and spatial constraints that are changing dynamically. In this paper, we propose a novel temporal and spatial constrained attribute-based access control (TSC-ABAC) scheme to solve this problem. Our system adopts a redesigned access structure and makes use of multi-dimensional range derivation function to match the time domain. This is the first ABE scheme that can efficiently handle time and location elements simultaneously. We further propose an extended TSC-ABAC scheme, which aims at reducing the decryption cost imposed on user. A thorough security and performance analysis shows that our design is secure and efficient. The result of our work could provide a feasible and practical data access control scheme for cloud storage services.
- Published
- 2018
- Full Text
- View/download PDF
24. DCN: Detector-Corrector Network Against Evasion Attacks on Deep Neural Networks
- Author
-
Ruoqing Zhang, Jing Wen, Siu-Ming Yiu, and Lucas C. K. Hui
- Subjects
Artificial neural network ,Contextual image classification ,Computer science ,business.industry ,Deep learning ,Evasion (network security) ,020206 networking & telecommunications ,02 engineering and technology ,010501 environmental sciences ,Machine learning ,computer.software_genre ,01 natural sciences ,Electronic mail ,Binary classification ,0202 electrical engineering, electronic engineering, information engineering ,Probability distribution ,Artificial intelligence ,business ,computer ,MNIST database ,0105 earth and related environmental sciences - Abstract
Deep neural networks are extensively used in image recognition. However, its integrity is compromised by evasion attacks. Attackers can easily craft adversarial examples that make DNNs unknowingly output the labels they want rather than the right labels. In a recent study, it was shown that existing detection methods are not effective in identifying these adversarial examples, i.e., it is a realistic threat to existing systems. Unlike the previous detection methods, we observe that the classification probability distributions of adversarial examples and those of untampered examples exhibit a big difference, which can be easily identified based on the output of a DNN without getting into the complicated DNN internal structure. Based on this new insight, we propose a new light-weight detection method by transforming the detection of adversarial examples into a binary classification problem. The detector we train achieves almost 100% accuracy on adversarial examples. Moreover, we propose a detector-corrector network that effectively reduces successful rate of existing state-of-the-art evasion attacks under three commonly used distance metrics. In particular, for the common L2 attack, DCN mitigates 99% adversarial examples on MNIST and 95% on CIFAR-10. Our evaluation demonstrates that DCN is significantly more effective and efficient against various evasion attacks than existing methods.
- Published
- 2018
- Full Text
- View/download PDF
25. A Study on Green Consumption from the Perspective of Social Comparison
- Author
-
Haiquan Chen, Li Liu, and Ruoqing Zhang
- Subjects
Social comparison theory ,media_common.quotation_subject ,05 social sciences ,Perspective (graphical) ,Face (sociological concept) ,050109 social psychology ,Advertising ,Microeconomics ,Identification (information) ,Order (exchange) ,0502 economics and business ,Herd mentality ,Green consumption ,Conceptual model ,Economics ,0501 psychology and cognitive sciences ,050203 business & management ,media_common - Abstract
The study finds that green consumption is the tradeoff that consumers are forced to make between collective interests and personal interests. In reality, consumers think that green consumption is a kind of fashion, and they tend to use herd mentality to choose green consumption, or in order to show their uniqueness that are almost not affected by the influence of the negative features such as high price of green products. This paper explores the relationship between social comparison orientation and green consumption, and examines the mediating effects of in-group identification and the moderating effects of face consciousness, thereby building the conceptual model of this study.
- Published
- 2016
- Full Text
- View/download PDF
26. The Construction of Path of lDouble-First Rater -Taking Employment Quality Evaluation as a Core and Feedback and Prediction as Basic Points
- Author
-
Ruoqing Zhang
- Subjects
Core (optical fiber) ,Computer science ,media_common.quotation_subject ,Path (graph theory) ,Quality (business) ,Industrial engineering ,media_common - Published
- 2018
- Full Text
- View/download PDF
27. A Review of Service Supply Chain and Future Prospects
- Author
-
Ruoqing Zhang and Haiquan Chen
- Subjects
Service (systems architecture) ,Knowledge management ,Supply chain management ,Web of science ,business.industry ,Supply chain ,business ,Competitive advantage ,Statistic ,Field (computer science) - Abstract
Service supply chain, the new research tendency of supply chain management, is considered to be the most effective tool for enterprises to retain competitive advantages. It has attracted the attention of scholars and practitioners in the field of different disciplines. Based on bibliometric methods and the data of CNKI and Web of Science™ from 2000 to 2014, the paper makes a statistic analysis on service supply chain from the amount, subjects and methods. It also makes a summary of the subjects (definition, modeling, service capability, the relationship between management and performance, application, measurement, and coordination mechanism), providing references for the further study.
- Published
- 2015
- Full Text
- View/download PDF
28. A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation
- Author
-
Zechao Liu, Xiaoqi Yu, Lucas C. K. Hui, Sm Yiu, Ruoqing Zhang, and Zoe Lin Jiang
- Subjects
Revocation ,business.industry ,Computer science ,Distributed computing ,020206 networking & telecommunications ,Cloud computing ,Cryptography ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Computer security ,computer.software_genre ,Encryption ,Electronic mail ,Outsourcing ,Random oracle ,Ciphertext ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,computer - Abstract
Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a useful cryptographic scheme and is being considered for cloud application as more and more users leverage cloud platforms to store and process their data. However, existing CP-ABE schemes still have a number of limitations that make it not effective to be used in a practical application. Firstly, the size of the ciphertext and the time for decryption grow with the complexity of the access formula. This efficiency issue becomes a problem when using a cloudplatform and mobile devices with limited processing capacity. Secondly, in reality, the attributes of users may be changed from time to time, or some users may eventually leave the system due to resignation. This practical concern requires a scheme with flexible and fine-grained revocation optionsupporting attribute-level changes. Lastly, traceability is also an important feature to track potential traitors who leak the partial decryption keys if ABE is used in a real scenario. None of the existing CP-ABE schemes are able to satisfy these three properties simultaneously. In this paper, we propose apractical CP-ABE that can achieve all three requirements. Our system adopts techniques on secure outsourcing of pairings to support efficient outsourcing computation and makes use of a subset cover algorithm to meet the requirements of revocation and traceability. Our scheme is proved to be a selectively replayable chosen-ciphertext attack (RCCA) secure in random oracle model. The result of our work could provide a feasible, reliable and practical CP-ABE scheme for the realistic application.
- Published
- 2017
- Full Text
- View/download PDF
29. Crypt-EHRServer: Protecting Confidentiality with Attribute-Based Encryption and Encrypted Query Processing
- Author
-
Lucas C. K. Hui, Ruoqing Zhang, and Chiling Chow
- Subjects
SQL ,020205 medical informatics ,business.industry ,Computer science ,Cloud computing ,Cryptography ,Plaintext ,02 engineering and technology ,Computer security ,computer.software_genre ,Encryption ,openEHR ,Ciphertext ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Attribute-based encryption ,business ,computer ,computer.programming_language - Abstract
OpenEHR is an open standard specification for developing flexible electronic health record (EHR) management system. It defines the standard service models and APIs, and offers a whole lifetime data storage method to the patient's record. As an important OpenEHR system component, EHRServer plays the role of back-end services repository for data storage and query. It complies with the openEHR specifications and adopts MySQL database. However, current EHRServer has many limitations. For example, its official requirement stresses that one organization cannot access the EHR owned by other organizations. The original EHRServer database is in plaintext format. It can lead to the risk of electronic record leakage. Encryption is one common protection method, but the current EHRServer APIs do not support encrypted data query. That restricts building EHRServer on the cloud. What's more, the inconvenience of information sharing among different organizations may also hinder the extension of OpenEHR coverage to more domains and countries. To solve the above open problems, in this paper, we explore two approaches which guarantee the security and flexibility of sharing EHR on the cloud and thus propose a new architecture called Crypt-EHRServer. Firstly, we use attribute-based encryption to realize flexible EHR access authority for different authorized organizations. Secondly, we learn from an efficient ciphertext query model, CryptDB, and adopt their onion encryption approach to support standard SQL queries on the encrypted EHR. The result of our work could provide a flexible, scalable and secure EHR system. Crypt-EHRServer will benefit OpenEHR's widespread adoption in the world, and will also arouse people's awareness about incorporating security criteria into the design of electronic health records management systems.
- Published
- 2017
- Full Text
- View/download PDF
30. General Self-Assembly Route toward Sparsely Studded Noble-Metal Nanocrystals inside Graphene Hollow Sphere Network for Ultrastable Electrocatalyst Utilization
- Author
-
Ping Wu, Xinyuan Lou, Anping Zhang, Yawen Tang, and Ruoqing Zhang
- Subjects
Materials science ,Graphene ,Nanotechnology ,engineering.material ,Electrocatalyst ,law.invention ,Catalysis ,Template ,Nanocrystal ,law ,engineering ,General Materials Science ,Noble metal ,Self-assembly - Abstract
Herein, we rationally design and construct a novel type of sparsely studded noble-metal nanocrystals inside graphene hollow sphere network (abbreviated as noble-metal@G HSN) through an electrostatic-attraction-directed self-assembly approach. The formation of Pt@G and Pd@G hollow sphere networks have been illustrated as examples using SiO2 spheres as templates. Moreover, the electrocatalytic performance of the Pt@G HSN for methanol oxidation reaction has been examined as a proof-of-concept demonstration of the compositional and structural superiorities of noble-metal@G HSN toward electrocatalyst utilization. The as-prepared Pt@G HSN manifests higher catalytic activity and markedly enhanced long-term durability in comparison with commercial Pt/C catalyst.
- Published
- 2015
31. An Efficient Massive Evidence Storage and Retrieval Scheme in Encrypted Database
- Author
-
Zichen-Li, Yatao-Yang, Ruoqing-Zhang, and Zehui-Li
- Subjects
Database ,Initialization vector ,Computer science ,business.industry ,Plaintext ,Cloud computing ,computer.software_genre ,Encryption ,Digital evidence ,Data redundancy ,Ciphertext ,business ,computer ,Database model - Abstract
In this paper, the problem is described which of storing massive digital evidence and preventing potential information leaks in forensics. The strategy of cloud encrypted database is therefore to be proposed. Existing encrypted database frameworks and solutions do not provide a satisfactory result to solve the problem. They either cause potential information leaks or have unacceptable data redundancy. We propose an efficient encrypted database model adopting initialization vector transfer and numerical order replacement. Experimental results show that the ciphertext retrieval speed can be significantly matched with what of plaintext.
- Published
- 2013
- Full Text
- View/download PDF
32. An efficient scheme for log integrity check in security monitoring system
- Author
-
Yatao Yang, Zhiwei Chen, Ruoqing Zhang, and Zichen Li
- Subjects
Scheme (programming language) ,Security monitoring ,Computer science ,Hash function ,Login ,Computer security ,computer.software_genre ,Group testing ,Integrity check ,Computer engineering ,Transversal design ,Overhead (computing) ,computer ,computer.programming_language - Abstract
In this paper, we describe the problem of checking the integrity of log in monitoring system for forensics investigation. Existing frameworks and solutions do not provide a satisfactory result to solve the problem. They either require a mass amount of storage overhead to store the hash values of the events or may not be able to match the situation in an effective way if some events have been modified. We propose an efficient hashing scheme with Shifted Transversal Design Group Testing algorithm to calculate hash values for all events in a log file as the integrity proof and precisely locate the events which have been corrupted. Experimental results show that the storage overhead can be significantly decreased by adopting the scheme.
- Published
- 2013
- Full Text
- View/download PDF
33. Beneficial Effects of Endophytic Fungi from the Anoectochilus and Ludisia Species on the Growth and Secondary Metabolism of Anoectochilus roxburghii
- Author
-
Lu-Ping Qin, Khalid Rahman, Ruoqing Zhang, Jin-Zhong Wu, Cheng-Jian Zheng, Yan-Bin Wu, Ting Han, Bing-zhu Ye, Chao Zhang, and Xin Zhai
- Subjects
RM ,Chaetomium globosum ,ved/biology ,General Chemical Engineering ,ved/biology.organism_classification_rank.species ,fungi ,Xylem ,food and beverages ,RV ,General Chemistry ,Biology ,Secondary metabolite ,biology.organism_classification ,Anoectochilus ,Plant use of endophytic fungi in defense ,Chemistry ,Tissue culture ,Botany ,medicine ,Maturase K ,Secondary metabolism ,QD1-999 ,medicine.drug - Abstract
Endophytic fungi possess favorable effects on their host plants, including disease-resistance improvement, secondary metabolite induction, and growth promotion. It is therefore a promising and sustainable strategy to utilize endophytic fungi for the quality improvement of medicinal herbs or important crops. In our study, a collection of 277 strains of endophytic fungi were isolated from Anoectochilus and Ludisia orchids. Two strains J162 and J211 can be symbiotically cocultured with the tissue culture seedlings of Anoectochilus roxburghii, a popular medicinal and edible plant in southern China. Both strains can significantly enhance the biomass of A. roxburghii and induce the biosynthesis and accumulation of its active ingredients, including flavonoids, kinsenoside, and polysaccharides. J162 and J211 were further identified as Chaetomium globosum and Colletotrichum gloeosporioides based on multilocus phylogenetic analysis. Immunocytochemical staining indicated that J162 and J211 mainly colonized the intercellular gap of xylem parenchyma cells of A. roxburghii roots without obvious harm. In addition, quantitative real-time polymerase chain reaction showed that the expression of three growth-related genes, namely, uracil phosphoribosyl transferase, amino acid transmembrane transporter, and maturase K, were significantly altered in A. roxburghii plants when treated with J162 and J211. In conclusion, the two strains are highly beneficial microbial resources for the growth and accumulation of active ingredients of A. roxburghii in agricultural cultivation.
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.