Zobrazeno 1 - 10
of 491
pro vyhledávání: '"Kefei Chen"'
Publikováno v:
BMC Cancer, Vol 24, Iss 1, Pp 1-13 (2024)
Abstract Background and aim The association between gallstones/cholecystectomy and cancer remains inconclusive in the current literature. This study aimed to explore the causal connections between gallstones/cholecystectomy and cancer risk by utilizi
Externí odkaz:
https://doaj.org/article/3227cca1f3744902af25f035b6ae2a1f
Publikováno v:
BMC Cancer, Vol 24, Iss 1, Pp 1-11 (2024)
Abstract Background Systemic conversion therapy provides patients with initially unresectable hepatocellular carcinoma (HCC) the chance to salvage radical liver resection and superior survival outcomes, but the optimal conversion strategy is unclear.
Externí odkaz:
https://doaj.org/article/1b826ee9875f4c8da1668e3946b1ebf6
Autor:
Ping He, Chen Jiang, Jianqiang Ni, Xiaoxuan Zhang, Zhifeng Wu, Gengjing Chen, Jin Huang, Zheng Dai, Wei Ji, Lei Li, Kefei Chen, Yachen Shi
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-12 (2024)
Abstract Gut microbiota can regulate the metabolic and immunological aspects of ischemic stroke and modulate the treatment effects. The present study aimed to identify specific changes in gut microbiota in patients with large vessel occlusion (LVO) i
Externí odkaz:
https://doaj.org/article/0ec860660859414d845b40bfdc812103
Autor:
Yachen Shi, Jingyu Deng, Haixia Mao, Yan Han, Qianqian Gao, Siyuan Zeng, Lin Ma, Wei Ji, Yang Li, Guangjun Xi, Lei Li, Yiping You, Junfei Shao, Kefei Chen, Xiangming Fang, Feng Wang
Publikováno v:
ACS Omega, Vol 9, Iss 13, Pp 15339-15349 (2024)
Externí odkaz:
https://doaj.org/article/43ae881409e14f64af6aa4730bb4fa84
Autor:
Wenrui Liu, Hongwei Xu, Haili Zhang, Maodi Xie, Yundi Liu, Li Wang, Xiaoai Wu, Yinrui Feng, Kefei Chen
Publikováno v:
Heliyon, Vol 10, Iss 15, Pp e35502- (2024)
To evaluate the efficacy of the 18F–AlF-NOTA-RGD2 positron emission tomography (PET)/computed tomography (CT) molecular probe for the noninvasive staging of liver fibrosis in mini pigs, a potential alternative to invasive diagnostic methods was rev
Externí odkaz:
https://doaj.org/article/15de0bcf2e5943969a564b1f57687245
Autor:
Yufu Peng, Jing Yu, Fei Liu, Leyi Tang, Bo Li, Wei Zhang, Kefei Chen, Haili Zhang, Yonggang Wei, Xuelei Ma, Hubing Shi
Publikováno v:
MedComm, Vol 5, Iss 3, Pp n/a-n/a (2024)
Abstract Microvascular invasion (MVI) has been widely valued in the field of liver surgery because MVI positivity indicates poor prognosis in hepatocellular carcinoma (HCC) patients. However, the potential molecular mechanism underlying the poor prog
Externí odkaz:
https://doaj.org/article/6d4a6ffc116a4f139773300e747a631f
Publikováno v:
IET Information Security, Vol 2024 (2024)
The convergence of software-defined networking (SDN) and the Internet of Things (IoT) provides a scalable method for handling the considerable volumes of data produced by IoT devices. However, the lack of appropriate security measures can lead to una
Externí odkaz:
https://doaj.org/article/9cff21de61ac488e8ed5d7b739e265d7
Publikováno v:
地球与行星物理论评, Vol 54, Iss 2, Pp 216-230 (2023)
The Tengchong Cenozoic volcano is located near the collision boundary between the Indian and Eurasian plates. The tectonic activity in this area is strong, and the volcano has a potential for eruption. Studying the origin of the Tengchong volcano is
Externí odkaz:
https://doaj.org/article/c2343baeb27d4f7e93a2b98bd70003d5
Autor:
Xu Yan, Bin Lian, Yunhao Yang, Xiaotie Wang, Jialin Cui, Xianghong Zhao, Fuqun Wang, Kefei Chen
Publikováno v:
Symmetry, Vol 16, Iss 6, p 664 (2024)
The secure computation of symmetric encryption schemes using Yao’s garbled circuits, such as AES, allows two parties, where one holds a plaintext block m and the other holds a key k, to compute Enc(k,m) without leaking m and k to one another. Due t
Externí odkaz:
https://doaj.org/article/74d7b902dc244bb895ad0c9b77c9b848
Publikováno v:
IEEE Access, Vol 11, Pp 35232-35242 (2023)
With the continuous and rapid development of Cloud Computing, Big Data and Internet of Things, it is extremely critical to protect data with homomorphism, privacy and integrity. For this, Rezaeibagha et al. proposed a new cryptographic primitive, cal
Externí odkaz:
https://doaj.org/article/070fa8c7eaf344b9acad59609044ca16