Zobrazeno 1 - 10
of 63
pro vyhledávání: '"Guangming Tang"'
Publikováno v:
Discover Oncology, Vol 15, Iss 1, Pp 1-11 (2024)
Abstract Colon adenocarcinoma (COAD) is one of the most common types of cancer. The interconnection between non-apoptotic cell death and COAD has not been adequately addressed. In our study, an integrative bioinformatics analysis was performed to exp
Externí odkaz:
https://doaj.org/article/885a4a32c49748ea846eeaf50a1021ac
Publikováno v:
Buildings, Vol 14, Iss 7, p 2185 (2024)
In this study, compound regeneration of SBS-modified bitumen (SMB) was carried out by a composite rejuvenator composed of furfural extraction oil (FEO) and 1,6-hexanediol diglycidyl ether (HDDGE) in the presence of catalyst triethanolamine (TEOA). SM
Externí odkaz:
https://doaj.org/article/6a7fa6fabb9d4fd991af3a8d3c47232e
Publikováno v:
Plant, Soil and Environment, Vol 69, Iss 2, Pp 45-54 (2023)
Biochar is a carbonaceous material derived from the pyrolysis of carbon-rich biomass that has attracted increasing research and attention because of its ability to enhance soil carbon storage, increase soil fertility, fix and transform pollutants in
Externí odkaz:
https://doaj.org/article/ffbcc729a5054cf588f1c68ab675bf82
Publikováno v:
网络与信息安全学报, Vol 8, Pp 73-87 (2022)
Due to thelack of strict access control, identity authentication and abnormal call detection, attackers may develop malicious applications easily and then it leads to theabuse of the northbound interface API (application programming interface) accord
Externí odkaz:
https://doaj.org/article/e411f40fa46d460393906ed541289076
Autor:
Enqiang Chen, Lichun Wang, Guangming Tang, Menglan Wang, Yachao Tao, Ping Feng, Hong Tang, Haijuan Wang
Publikováno v:
Infectious Diseases & Immunity, Vol 2, Iss 3, Pp 210-212 (2022)
Abstract. Severe acute respiratory syndrome Coronavirus 2 (SARS-CoV-2) currently has spread all over the world. However, the dynamic characteristics of SARS-CoV-2 infections have not previously been described in detail. Here, we report a cured patien
Externí odkaz:
https://doaj.org/article/28427257e5434756947026af2f1d56e3
Publikováno v:
网络与信息安全学报, Vol 6, Pp 59-65 (2020)
In order to make the research of digital steganography model develop synchronously with steganography research,three digital steganography models from general to specific are proposed,and each model was formalized.Through study on digital model,the e
Externí odkaz:
https://doaj.org/article/8c469729a008464e9c0e3ee8a6321be5
Publikováno v:
Tongxin xuebao, Vol 41, Pp 97-111 (2020)
In view of the problem that the existing honeypots often fail to resist the penetration attack due to the lack of confidentiality,an active deception defense method based on dynamic camouflage network (DCN) was presented.The definition of DCN was giv
Externí odkaz:
https://doaj.org/article/d4d9905221d54cf09a7e84ae970b9faa
Publikováno v:
IEEE Access, Vol 8, Pp 35792-35804 (2020)
Traditional deception-based cyber defenses (DCD) often adopt the static deployment policy that places the deception resources in some fixed positions in the target network. Unfortunately, the effectiveness of these deception resources has been greatl
Externí odkaz:
https://doaj.org/article/a669a58632524b8bba11fc3ecd221be8
Publikováno v:
Entropy, Vol 24, Iss 8, p 1121 (2022)
Deep-learning techniques have significantly improved object detection performance, especially with binocular images in 3D scenarios. To supervise the depth information in stereo 3D object detection, reconstructing the 3D dense depth of LiDAR point cl
Externí odkaz:
https://doaj.org/article/bb88f56231334516819aedc622628c07
Publikováno v:
网络与信息安全学报, Vol 5, Pp 80-90 (2019)
Aiming at the shortcomings of the existing link flooding attack defense methods,a multi-dimensional index detection algorithm is proposed,which performs multi-dimensional detection on the abnormal forwarding links through the five-dimensional element
Externí odkaz:
https://doaj.org/article/e50b3576e45f4c7d9c27fd44cb095ad6