Zobrazeno 1 - 10
of 338
pro vyhledávání: '"Chunhua, Su"'
Publikováno v:
Mathematics, Vol 12, Iss 16, p 2587 (2024)
With the development of edge computing and deep learning, intelligent human behavior recognition has spawned extensive applications in smart worlds. However, current edge computing technology faces performance bottlenecks due to limited computing res
Externí odkaz:
https://doaj.org/article/ba56ed43a3354e7eae430d1da680ee87
Autor:
Baobao Feng, Hongjun Bian, Ke Zhang, Chong Meng, Xianwei Gong, Xueqiang Ma, Chunhua Su, Mingxiang Zhou, Jiarui Xu, Wei Zhang, Xingguo Zhang, Yi Zhou, Deya Shang
Publikováno v:
Frontiers in Public Health, Vol 11 (2023)
IntroductionIn the middle of December 2022, the Chinese government adjusted the lockdown policy on coronavirus disease 2019 (COVID-19), a large number of infected patients flooded into the emergency department. The emergency medical staff encountered
Externí odkaz:
https://doaj.org/article/a3384fe324804c8799b5c7b21c5ce1e3
Publikováno v:
Digital Communications and Networks, Vol 9, Iss 2, Pp 337-346 (2023)
Due to mobile Internet technology's rapid popularization, the Industrial Internet of Things (IIoT) can be seen everywhere in our daily lives. While IIoT brings us much convenience, a series of security and scalability issues related to permission ope
Externí odkaz:
https://doaj.org/article/86a566eb70574fc4a406d39b07435168
Autor:
Xin Zhang, Yi Gan, Haoshuai Zhu, Zhihao Liu, Xiaojing Yao, Chao Cheng, Zhenguo Liu, Chunhua Su, Jianyong Zou
Publikováno v:
Frontiers in Cardiovascular Medicine, Vol 10 (2023)
BackgroundImmune checkpoint inhibitor-related myocarditis is the deadliest complication of immunotherapy. However, the underlying pathophysiological mechanisms of its occurrence and development remain unclear. Due to the long-term lack of effective e
Externí odkaz:
https://doaj.org/article/0653e4e1f6bc4b88aa1e08fd206d2e35
Autor:
Haoshuai Zhu, Zhihao Liu, Xiaojing Yao, Jianyong Zou, Bo Zeng, Xin Zhang, Zhenguang Chen, Chunhua Su
Publikováno v:
Frontiers in Surgery, Vol 9 (2022)
BackgroundThe subxiphoid approach has been widely used recently. However, there is little data focusing on neurological outcomes in patients with thymomatous myasthenia gravis (MG) who underwent subxiphoid thoracoscopic thymectomy. The purpose of thi
Externí odkaz:
https://doaj.org/article/ac06b23b763845b2be0d94f109656c58
Publikováno v:
Sensors, Vol 23, Iss 13, p 6033 (2023)
Blockchain has become a well-known, secured, decentralized datastore in many domains, including medical, industrial, and especially the financial field. However, to meet the requirements of different fields, platforms that are built on blockchain tec
Externí odkaz:
https://doaj.org/article/e5ab4cb91ed2455084c70bf6d2953d62
Publikováno v:
Symmetry, Vol 15, Iss 5, p 1059 (2023)
The Internet of Things (IoT) is an emerging paradigm, seamlessly integrating a great quantity of smart objects that are connected to the Internet [...]
Externí odkaz:
https://doaj.org/article/cdc215f4dc6f479db1a7e88f8b0c5e66
Publikováno v:
IEEE Access, Vol 9, Pp 108846-108850 (2021)
Internet of Things (IoT) technology has been widely adopted by the vast majority of businesses and is influencing every aspect of the world. However, the nature of the internet, communication means, embedded OS, and backend recourses make IoT objects
Externí odkaz:
https://doaj.org/article/f079c198445b4376bbbee47a55e6021f
Autor:
Huilan Zeng, Weilin Yang, Bo Xu, Jianyong Zou, Chunhua Su, Beilong Zhong, Haoshuai Zhu, Zhenguang Chen
Publikováno v:
BMC Cancer, Vol 20, Iss 1, Pp 1-10 (2020)
Abstract Background Role of biomarkers for promotion of tumor proliferation (BPTPs) and for promotion of apoptosis (BPAs) in thymic malignant tumors is still unclear. The purpose of this study was to evaluate the relationship between BPTPs and/or BPA
Externí odkaz:
https://doaj.org/article/804969ad002b4522bca23ee9f61434be
Autor:
Bagus Santoso, Chunhua Su
Publikováno v:
Journal of Universal Computer Science, Vol 25, Iss 3, Pp 294-308 (2019)
Recently, in order to guarantee security against quantum adversaries, several identification (ID) schemes based on computational problems which are supposed to be hard even for quantum computers have been proposed. However, their security are only pr
Externí odkaz:
https://doaj.org/article/4202a649cd0446648e5b7e44bc9c9a74