Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Jiayin TONG"'
Autor:
Zhenzhong MA, Yadan SHENG, Kai YANG, Liyu HE, Tingting HAN, Jiayin TONG, Jingping ZHANG, Chenwang JIN
Publikováno v:
CT Lilun yu yingyong yanjiu, Vol 33, Iss 4, Pp 497-502 (2024)
Objective: To evaluate high-resolution computed tomography (HRCT) features of dermatomyositis-/polymyositis- associated interstitial lung disease (DM/PM-ILD). Methods: We retrospectively reviewed the HRCT images of 148 patients with DM/PM-ILD at the
Externí odkaz:
https://doaj.org/article/ee7ec59e449e4aa1857a28200ce44697
Autor:
Jingping Zhang, Liyu He, Tingting Han, Jiayin Tong, Jialiang Ren, Jiantao Pu, Ming Zhang, Youmin Guo, Chenwang Jin
Publikováno v:
Heliyon, Vol 10, Iss 11, Pp e31510- (2024)
Background: Acute exacerbation of idiopathic inflammatory myopathies-associated interstitial lung disease (AE-IIM-ILD) is a significant event associated with increased morbidity and mortality. However, few studies investigated the potential prognosti
Externí odkaz:
https://doaj.org/article/b637f845b86c4a3fb766d7b7ee9db2bc
Autor:
Haikun TANG, Fanghui YANG, Yanmei ZHANG, Lifei XIA, Yunnan SUN, Guo DENG, Jun ZHANG, Jiayin TONG
Publikováno v:
Shipin gongye ke-ji, Vol 44, Iss 7, Pp 260-268 (2023)
In order to reveal the aroma components of sun-dried black tea and explore the suitable varieties of sun-dried black tea, the aroma components of 10 tea varieties were analyzed by HS-SPME-GC-MS, and determined the main volatile aroma components of ea
Externí odkaz:
https://doaj.org/article/057a904d29784864b7e2eaecba6d8a05
Publikováno v:
BMC Cancer, Vol 22, Iss 1, Pp 1-7 (2022)
Abstract Background The aim of this study was to analyze the level of CD33 expression in patients with newly diagnosed AML and determine its correlation with clinical characteristics. Methods Samples were collected for analysis from AML patients at d
Externí odkaz:
https://doaj.org/article/5651465645354b79aff16c764b3f3e83
Publikováno v:
Web Technologies and Applications ISBN: 9783319111186
APWeb Workshophs
APWeb Workshophs
It has a long history to launch attacks using vulnerability in the network protocols. More and more researchers are attracted to the attack and defenses of network protocols. It will mitigate the severe consequences that attacks may lead to by malici
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::72cb661d9ca7509cb4c0da51d101bf1d
https://doi.org/10.1007/978-3-319-11119-3_23
https://doi.org/10.1007/978-3-319-11119-3_23
Publikováno v:
2013 8th International Conference on Communications and Networking in China (CHINACOM).
P2P-structure networks attract lots of users due to the large capacity and good performance. However, vulnerabilities in the protocols may be exploited maliciously by attackers to launch network attacks. In this paper, we first give an overview of se
Publikováno v:
2013 8th International Conference on Communications & Networking in China (CHINACOM); 2013, p405-409, 5p