Zobrazeno 1 - 10
of 1 689
pro vyhledávání: '"LIAO Yong"'
Autor:
FANG Huan, WANG Jielian, TANG Manmei, WANG Juexin, SU Junzhi, HU Xiaojun, LIAO Yong, LEI Qiong
Publikováno v:
Zhongguo shipin weisheng zazhi, Vol 36, Iss 4, Pp 471-477 (2024)
ObjectiveTo provide scientific basis for rational clinical use and traceability of outbreaks of foodborne Salmonellosis, the drug resistance and molecular typing characteristics of foodborne Salmonella in Ganzhou City was understood, and a databa
Externí odkaz:
https://doaj.org/article/3ae11d9b507f401ca816d9dc886bf9ed
Autor:
Wei Jia-Xing, Li Chao-Yi, Chen Wei-Ya, Cong Yi-Jun, Liu Chun-Yu, Yang Fei-Fei, Liao Yong-Hong
Publikováno v:
Biomedicine & Pharmacotherapy, Vol 160, Iss , Pp 114335- (2023)
Background: Re-Du-Ning injection (RDN) is a renowned heat-clearing traditional Chinese medicine for the treatment of respiratory diseases owing to its anti-inflammatory effects. However, very little is known about the pulmonary distribution and lung
Externí odkaz:
https://doaj.org/article/1c0948d9db734d1895b6a98b0bacb534
Publikováno v:
Biomedicine & Pharmacotherapy, Vol 156, Iss , Pp 113892- (2022)
Background: Chuankezhi injection (CKZ) is a traditional Chinese medicine for the treatment of respiratory diseases and has been often used off-label as a nebulization therapy. However, little is known about the aerosolization performance and pulmonar
Externí odkaz:
https://doaj.org/article/e71b9c4b3fe94244b0c6574cb5a0b0bd
The latest advancements in large language models (LLMs) have sparked interest in their potential for software vulnerability detection. However, there is currently a lack of research specifically focused on vulnerabilities in the PHP language, and cha
Externí odkaz:
http://arxiv.org/abs/2410.07573
Cooperative Multi-Agent Reinforcement Learning (CMARL) strategies are well known to be vulnerable to adversarial perturbations. Previous works on adversarial attacks have primarily focused on white-box attacks that directly perturb the states or acti
Externí odkaz:
http://arxiv.org/abs/2406.17425
In many RFID-enabled applications, objects are classified into different categories, and the information associated with each object's category (called category information) is written into the attached tag, allowing the reader to access it later. Th
Externí odkaz:
http://arxiv.org/abs/2406.10347
Retrieval-Augmented Generation (RAG) is an effective solution to supplement necessary knowledge to large language models (LLMs). Targeting its bottleneck of retriever performance, "generate-then-read" pipeline is proposed to replace the retrieval sta
Externí odkaz:
http://arxiv.org/abs/2406.03963
Publikováno v:
Fayixue Zazhi, Vol 35, Iss 3, Pp 319-323 (2019)
Objective To investigate the application of the comprehensive use of multiple genetic markers in full and half sibling relationship testing through the identification of a case of suspected sibling relationship. Methods Genomic DNA were extracted fro
Externí odkaz:
https://doaj.org/article/0837642d4d6d4996907d5e6880d18312
Recent advancements in social bot detection have been driven by the adoption of Graph Neural Networks. The social graph, constructed from social network interactions, contains benign and bot accounts that influence each other. However, previous graph
Externí odkaz:
http://arxiv.org/abs/2405.11225
Autor:
He, Buyun, Yang, Yingguang, Wu, Qi, Liu, Hao, Yang, Renyu, Peng, Hao, Wang, Xiang, Liao, Yong, Zhou, Pengyuan
Detecting social bots has evolved into a pivotal yet intricate task, aimed at combating the dissemination of misinformation and preserving the authenticity of online interactions. While earlier graph-based approaches, which leverage topological struc
Externí odkaz:
http://arxiv.org/abs/2404.15070