Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Huijuan Tu"'
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-15 (2024)
Abstract Recently in diagnosis of Aortic dissection (AD), the synthesis of contrast enhanced CT (CE-CT) images from non-contrast CT (NC-CT) images is an important topic. Existing methods have achieved some results but are unable to synthesize a conti
Externí odkaz:
https://doaj.org/article/e3b9d89c88aa49919e305cfc21db75d8
Publikováno v:
Frontiers in Oncology, Vol 14 (2024)
Pancreatic tumors are small in size, diverse in shape, and have low contrast and high texture similarity with surrounding tissue. As a result, the segmentation model is easily confused by complex and changeable background information, leading to inac
Externí odkaz:
https://doaj.org/article/ad40869e004c4ad38ceb4c2ad7e06eaf
Publikováno v:
IEEE Access, Vol 12, Pp 77104-77113 (2024)
Cervical cancer is a malignancy that significantly impacts women’s health. Liquid-based thin-layer cytology examination is presently the predominant method for cervical cancer cell detection. Traditional identification of pathological images of cer
Externí odkaz:
https://doaj.org/article/3da70aa400124909baa6686e6d115c61
Autor:
Huijuan Tu, Qiqi Chen, Jianchun Tu, Bingqing Dong, Feng Zhu, Shiyu Wang, Yanmiao Dai, Xu Chen
Publikováno v:
Journal of Computer Assisted Tomography; Sep/Oct2024, Vol. 48 Issue 5, p713-718, 6p
Autor:
Xiaoli, Liu, Long, Dai, Bo, Chen, Nongping, Feng, Qianhui, Wu, Yonghai, Lin, Lan, Zhang, Dong, Tan, Jinhua, Zhang, Huijuan, Tu, Changfeng, Li, Wenjuan, Wang
Publikováno v:
Zhonghua yu fang yi xue za zhi [Chinese journal of preventive medicine]. 50(1)
To evaluate the validity and reliability of Diabetes Self-management Knowledge, Attitude, and Behavior Assessment Scale (DSKAB).We selected 460 patients with diabetes in the community, used the scale which was after two rounds of the Delphi method an
Publikováno v:
Proceedings. 2005 International Conference on Wireless Communications, Networking and Mobile Computing, 2005..
Some wireless sensor networks (WSNs) must transmit the data to users securely and quickly. The sensor nodes just have limited computation, communication and storage capabilities. Moreover adversary can easily eavesdrop in the process of message trans
Publikováno v:
PDCAT
Wireless sensor networks(WSN) are randomly deployed in adversary or dangerous environments so that the security of WSN is extremely important. It is necessary to use encryption system to provide security. However, due to lack of energy and storage, t
Publikováno v:
Proceedings 2005 International Conference on Wireless Communications, Networking & Mobile Computing, 2005; 2005, p1193-1198, 6p