08 December 2014, Volume 32 Issue 34
    

  • Select all
    |
  • XIE Jingjing, ZHAO Rongli, CHEN Hongning, XIE Xiaodong, JIA Lee
    Science & Technology Review. 2014, 32(34): 26-32. https://doi.org/10.3981/j.issn.1000-7857.2014.34.002
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    Circulating tumor cells (CTCs) have great significance in cancer diagnosis, therapy and metastasis prevention, owing to their biological characteristics derived from themselves and primary tumor. However, low concentrations of CTCs in peripheral blood made their detection, isolation and enrichment technically challenging. In this study, we selected colon cancer HT29 cell as a CTC model and took the nanoscale G6 PAMAM dendrimers as scaffolds for multivalent conjugation with antibody against EpCAM to realize the specific capture and activity regulation at HT29 cells in vitro. FTIR, DLS, UV and fluorescence measurements were made to show the physicochemical properties of conjugates. Microscopic analysis was performed to indicate the recognition and capture behaviors to target cells. MTT, fluorescence and flow cytometric analyses were made to demonstrate the regulation on the viability of captured cells. Our results showed that the prepared conjugates were able to specifically recognize and bind the adherent and floating HT29 cells, and down-regulate the activity of captured cells without producing significant cytotoxic effects. The present study may provide promise for capturing and restraining the rare CTCs in patient blood by using nanomaterials multivalently conjugated with targeting antibodies against biomarkers on CTC surface.
  • ZHU Yue, GAO Wanrong
    Science & Technology Review. 2014, 32(34): 33-36. https://doi.org/10.3981/j.issn.1000-7857.2014.34.003
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    Aninterference microscope for ultrahigh-resolution full-field optical coherence tomography (FFOCT) system was developed for imaging of biological media. The experimental setup is based on a Linnik-type interferometer illuminated by a low coherence tungsten halogen lamp and equipped with high numerical aperture microscope objectives. The theoretical resolution of the system is 0.7 μm×0.7 μm(lateral× axial). En-face tomographic images were obtained by a combination of interferometric images recorded by a smart CCD camera and 3-step phase-shifting algorithm. Previous studies usually used 4-step phase-shifting algorithm with less speed of shifting the phase. Three-dimensional images can then be generated from these tomographic images. Compared with fluorescence labeling image, FFOCT has advantages of low cost, no damage, and ultrahighresolution. En-face images of onion surface cellsand liver biopsy tissue cells showed the excellent performance of the system for generating en-face images of biological tissues. Our system is characterized by its high resolution, low cost and simple arrangement for adjustment, providing a practical method for FFOCT imaging.
  • CHEN Chaoliang, GAO Wanrong, LIAO Jiuling
    Science & Technology Review. 2014, 32(34): 37-40. https://doi.org/10.3981/j.issn.1000-7857.2014.34.004
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    A new method is presented forimaging the small blood flow velocities in vessels by a spectral domain optical coherence tomography based on averagingphasedifferences between adjacent and interval A-lines at the same lateral position. The proposed method is theoretically developed and validated by measurements of flowing particles within a glass capillary with known mean velocities. Mean standard deviations of different flow velocities of the particles are determined by the proposed method and compared with those determined by conventional phase-resolved method. In vivo experiments on a mouse ear and the Doppler flow velocity maps are reconstructed by both methods. The experimental results demonstrate that the proposed method can significantly suppress the phase noise caused by phase instabilities, improve the signal-to-noise ratio of phase difference and accuracy of velocity measurement for small blood flow without increasing the time interval between adjacent A-lines.
  • GAO Chao, WANG Bo, BAI Yu, MIAO Jing, ZHU Xi, LI Tianchu, WANG Lijun
    Science & Technology Review. 2014, 32(34): 41-46. https://doi.org/10.3981/j.issn.1000-7857.2014.34.005
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    The continuous, precise time and frequency synchronization system was built on an 80 km single urban fiber link, between Tsinghua University and the National Institute of Metrology. Through precise time and frequency synchronization, the frequency dissemination stability of 7×10-15/s and 5×10-19/d was obtained; with active transfer delaycompensation at the transmitting site, the time synchronization inaccuracy was < 50 ps. For the current fiber based frequency dissemination schemes, the disseminated frequencysignal can only be recovered at specific location. A multiple-access RF dissemination scheme was proposed and demonstrated. Using this method, the stable disseminatedfrequency signal can be recovered at an arbitrary node along theentire fiber pathway, which provides a solution for the time-frequency synchronization network in the future.
  • DONG Xinhua, LI Ruixuan, HE Heng, ZHOU Wanwan, XUE Zhengyuan, WANG Cong
    Science & Technology Review. 2014, 32(34): 47-52. https://doi.org/10.3981/j.issn.1000-7857.2014.34.006
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    Vast amounts of users sensitive data are stored on the big data platform. The sharing of sensitive data will help enterprises to reduce the cost of providing users with personalized service, and achieve value-added services of data. However, the secure sharing of data is an urgent problem. By analyzing the present security situation of sensitive data, this paper proposes a framework for secure sharing of those data on big data platform, including security submission, storage, use and destruction of sensitive data on the semi-trusted big data sharing platform. Relevant key technologies were studied, such as the proxy re-encryption algorithm based on heterogeneous cipher-text transformation and user process protection methods based on the virtual machine monitor, which provides support for the realization of system functions. The framework well protects the security of users sensitive data, and shares these data effectively and safely. At the same time, the data owners have complete control of their own data, which is conducive to foster a sound environment for modern Internet information security.
  • CHEN Ang, SUI Xin, LIAO Wengen, DUAN Hao, TAO Jie
    Science & Technology Review. 2014, 32(34): 53-57. https://doi.org/10.3981/j.issn.1000-7857.2014.34.007
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    This paper discusses the necessity of construction of a water information data sharing system in China and identifies the difficulties and challenges for construction of the data sharing platform by analyzing the practice of Chinas water resources informatization. The main problems are decentralization of the early information management, the narrow scope of various water information departments, and ununified storage standards. On this basis, the future direction for construction of Chinas water information sharing system is proposed. The premise if overall planning of such resources as infrastructures and water resources applications based on integration of basic resources. A unified data storage standard and data security are key factors and foundations to guarantee a successful and well-operated data sharing system.
  • WEN Tianzhu, XU Aiqiang, CHEN Yuliang
    Science & Technology Review. 2014, 32(34): 58-61. https://doi.org/10.3981/j.issn.1000-7857.2014.34.008
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    This paper proposes a multi-fault diagnosis algorithm combining SOM network with extension theory to meet the requirement that multi-fault modes should be similar and do not contain the standard fault output when SOM network is used for multi-fault diagnosis. First, the training samples are clustered by SOM network, and the fault modes and these clustering centers can be obtained. Second, the dependent function of each feature for each fault mode is set up where the maximum value can be obtained at the clustering center. Next, the evaluation index of multi-fault modes is designed for multi-fault diagnosis, which is based on the dependent function values of features. Finally, the spectrum data of vibration signal of steam turbine generator unit is adopted to verify the algorithm. The results show that both single-fault mode and multi-fault modes can be correctly distinguished by this method, so the algorithm is feasible.
  • PU Wei, LI Xiong, WU Chenghai
    Science & Technology Review. 2014, 32(34): 62-68. https://doi.org/10.3981/j.issn.1000-7857.2014.34.009
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    This paper proposes an optimization method of thread mode for OSG/Qt framework and a generating algorithm for military standard symbol display using off-screen render to texture technology based on frame buffer object, to improve the display efficiency and human-computer interaction of three-dimensional battlefield situation display and plotting. The basic concept of battlefield situation information was summarized, and the military demand of display and plotting and OSG/Qt architecture were analyzed. On this basis, the software module of three-dimensional battlefield situation display and plotting was designed and tested to verify the plotting efficiency and the human-computer interactiveness of the solution and key technology.
  • DAI Jie, QU Jun, QIAO Jiangang, QIN Fengjiang
    Science & Technology Review. 2014, 32(34): 69-77. https://doi.org/10.3981/j.issn.1000-7857.2014.34.010
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    According to the structural characteristics of the cable-stayed bridge with hybrid girder, an active set method is proposed to determine the reasonable completion state for the cable-stayed bridge with hybrid girder. A quadratic programming model is built, with the total bending and axial energy of the girder and the pylon as the objective function, and the vertical displacement of the steel box girder, the horizontal displacement of the pylon, the normal stress in the concrete girder and pylon, the cable force and their distributional uniformity as the constraint conditions. The active set method is employed to optimize the completion state of the cablestayed bridge with hybrid girder. The optimization and comparison results show that under the condition of the completion state obtained through the method proposed in this paper, a smooth shape of the whole structure is obtained, with the vertical displacement of the main girder in the range of -22-8 mm, with the top of the pylon having a horizontal pre-deviation of 20 mm to the main span, and with the internal force and the normal stress in the whole structure all similar with what obtained from the unconstraint minimum bending energy method. The normal stresses in the steel girder and the steel pylon are in the range of -84.43-16.38 MPa, and the normal stresses in the concrete girder and the concrete pylon are in the range of -16.31-0.003 MPa, and the cable force is in the range of 2061-2457 kN, which are in a more uniform distribution than that obtained from the unconstraint minimum bending energy method, with the side piers having a more pressure reservation. Thus, the results show the great effectiveness and superiority of the method.
  • WANG Hongzhi
    Science & Technology Review. 2014, 32(34): 78-84. https://doi.org/10.3981/j.issn.1000-7857.2014.34.011
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    Big data have wide applications. Since the quality of big data plays a crucial role in these data-centric applications, data quality management techniques for big data are in demand. Although some theories and techniques for data quality management have been proposed, due to the volume, variety and velocity of big data, current methods could hardly be applied to data management for big data. This paper discusses the problems and challenges for error detection, error repair and query processing of dirty data in big data management, and identifies intractability, mixed errors and the lack of knowledge as three new challenges to data quality management. The progress of big data quality management in these three aspects is reviewed and open problems for future research are proposed.