Zobrazeno 1 - 10
of 1 299
pro vyhledávání: '"Liu Zhibo"'
Autor:
LIU Zhikai, CHENG Weishi, WU Wangsuo, LIANG Tianjiao, XING Qingzi, ZHANG Zizhu, LIU Zhibo, LIU Yuanhao, PAN Jianji, ZHU Shaihong, LI Qingnuan, ZHANG Fuquan, QIU Jie, HUO Li
Publikováno v:
Xiehe Yixue Zazhi, Vol 14, Iss 4, Pp 698-705 (2023)
Boron neutron capture therapy (BNCT) is an advanced radiation therapy technique that is rapidly developing in the field of cancer treatment. This technique, an atomic-level binary targeted therapy, kills cancer cells by causing a 10B(n, α)7Li nuclea
Externí odkaz:
https://doaj.org/article/75e462f428eb48969d0346c7cd79470e
Preserving Privacy in Software Composition Analysis: A Study of Technical Solutions and Enhancements
Software composition analysis (SCA) denotes the process of identifying open-source software components in an input software application. SCA has been extensively developed and adopted by academia and industry. However, we notice that the modern SCA t
Externí odkaz:
http://arxiv.org/abs/2412.00898
Rydberg excitons in transition metal dichalcogenides (TMDs) have emerged as a promising platform for investigating the properties of open quantum systems, thanks to their large binding energies(hundreds of meV). However, the study of Rydberg excitons
Externí odkaz:
http://arxiv.org/abs/2410.05976
Publikováno v:
Dizhi lixue xuebao, Vol 27, Iss 3, Pp 339-349 (2021)
In this study, a gradient boosting decision tree (GBDT)-based lithologic mapping method constituted by field survey and machine learning is introduced. The Duolong mineral district, Tibet, China is currently chosen for model test. During the practica
Externí odkaz:
https://doaj.org/article/19ff5b87096e48fda970cc09bfe84a9e
Autor:
Wong, Wai Kin, Wang, Huaijin, Li, Zongjie, Liu, Zhibo, Wang, Shuai, Tang, Qiyi, Nie, Sen, Wu, Shi
A C decompiler converts an executable into source code. The recovered C source code, once re-compiled, is expected to produce an executable with the same functionality as the original executable. With over twenty years of development, C decompilers h
Externí odkaz:
http://arxiv.org/abs/2310.06530
Compiled Models, Built-In Exploits: Uncovering Pervasive Bit-Flip Attack Surfaces in DNN Executables
Bit-flip attacks (BFAs) can manipulate deep neural networks (DNNs). For high-level DNN models running on deep learning (DL) frameworks like PyTorch, extensive BFAs have been used to flip bits in model weights and shown effective. Defenses have also b
Externí odkaz:
http://arxiv.org/abs/2309.06223
A physical simulation engine (PSE) is a software system that simulates physical environments and objects. Modern PSEs feature both forward and backward simulations, where the forward phase predicts the behavior of a simulated system, and the backward
Externí odkaz:
http://arxiv.org/abs/2307.10818
We investigate the elastic photon-proton and photon-photon scattering in a holographic QCD model, focusing on the Regge regime. Considering contributions of the Pomeron and Reggeon exchange, the total and differential cross sections are calculated. W
Externí odkaz:
http://arxiv.org/abs/2306.12890
Autor:
Liu, Zhibo, Watanabe, Akira
The elastic pion-proton and pion-pion scattering are studied in a holographic QCD model, focusing on the Regge regime. Taking into account the Pomeron and Reggeon exchange, which are described by the Reggeized $2^{++}$ glueball and vector meson propa
Externí odkaz:
http://arxiv.org/abs/2306.00564
The total and differential cross sections of the elastic proton-neutron and antiproton-neutron scattering are studied in a holographic QCD model, focusing on the Regge regime. Taking into account the Pomeron and Reggeon exchange, which are described
Externí odkaz:
http://arxiv.org/abs/2305.06700