Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Gaofei Wu"'
Publikováno v:
Micromachines, Vol 15, Iss 7, p 855 (2024)
When using traditional 3D printing equipment to manufacture overhang models, it is often necessary to generate support structures to assist in the printing of parts. The post-processing operation of removing the support structures after printing is t
Externí odkaz:
https://doaj.org/article/c3b4f5157b9847d3b4a8b3a82ad97b02
Publikováno v:
Actuators, Vol 13, Iss 7, p 249 (2024)
The research on additive manufacturing (AM) path planning mainly focuses on the traditional three-axis AM path planning and five-degree-of-freedom (DOF) AM path planning, while there is less research on six-DOF AM path planning. In the traditional AM
Externí odkaz:
https://doaj.org/article/c94c775080fb4682b27b11f550620c11
Autor:
Yuanyuan Chen, Kai Liu, Kangjie Song, Changtai Fang, Lianghua Zhu, Gaofei Wu, Junjing Zha, Jiaan Zha
Publikováno v:
Journal of International Medical Research, Vol 51 (2023)
Perinatal spontaneous hepatic haemorrhage is a very rare disease affecting pregnant women, particularly those on long-term dialysis, that has a high maternal and infant mortality rate. Most patients experience preeclampsia with haemolysis, elevated l
Externí odkaz:
https://doaj.org/article/a56b63fb16f5496a91d13ab592d51d67
Publikováno v:
IEEE Access, Vol 6, Pp 31525-31540 (2018)
Top-k queries can retrieve the most relevant tuples from massive datasets and have wide implementations, such as PageRank, healthcare analytics, and decision making. The increasing demands of outsourcing large datasets to public clouds with privacy c
Externí odkaz:
https://doaj.org/article/7466d690037344599b7ee0e56e222052
Publikováno v:
Medicine; 10/4/2024, Vol. 103 Issue 40, p1-7, 7p
Publikováno v:
IEEE Transactions on Information Theory. 69:4035-4044
Autor:
Gaofei Wu1 362795022@qq.com
Publikováno v:
Revista Argentina de Clínica Psicológica. Feb2020, Vol. 29 Issue 2, p393-399. 7p.
Publikováno v:
2022 IEEE International Conference on Blockchain (Blockchain).
Publikováno v:
Chinese Journal of Electronics. 29:106-113
Ciphertext-policy Attribute-based encryption (CP-ABE) is a promising tool for implementing finegrained cryptographic access control. While the uniqueness of generating private keys brings extra security issues. The key escrow is inherent in CP-ABE sy
Publikováno v:
Security and Communication Networks.
Deep neural networks (DNN) with incomparably advanced performance have been extensively applied in diverse fields (e.g., image recognition, natural language processing, and speech recognition). Training a high-performance DNN model requires a lot of