Zobrazeno 1 - 10
of 102
pro vyhledávání: '"Xiao Yuan Yang"'
Publikováno v:
RNA Biology, Vol 21, Iss 1, Pp 1-7 (2024)
Argonaute proteins (Agos) represent a highly conserved family of proteins prevalent in all domains of life and have been implicated in various biological processes. Based on the domain architecture, Agos can be divided into long Agos and short Agos.
Externí odkaz:
https://doaj.org/article/e40f171c7445498f8bf7eea7ebffb7c7
Autor:
Min-Yi Luo, Wen-Ping Chen, Hua-Xian Chen, Xiao-Yuan Yang, Xing-Yang Wan, Guo-Zhong Xiao, Yi-Hui Zheng, Dong-Lin Ren, Hui Peng, Hong-Cheng Lin
Publikováno v:
Asian Journal of Surgery, Vol 47, Iss 4, Pp 1756-1762 (2024)
Background: As an innovative treatment, stapled transperineal rectovaginal fistula repair (STR) for rectovaginal fistula (RVF) has demonstrated effectiveness in preliminary reports. This study aims to compare STR with rectal mucosal advancement flap
Externí odkaz:
https://doaj.org/article/a5d1960b4e39417498cefa43264fa945
Publikováno v:
Jichu yixue yu linchuang, Vol 42, Iss 1, Pp 89-93 (2022)
Objective To investigate the protective effect of serum and glucocorticoid-regulated kinase 1(SGK1) inhibitor GSK650394 on depression-like behaviors and hippocampus neurotrophy in depressive model rats. Methods SD rats were randomly divided into cont
Externí odkaz:
https://doaj.org/article/c9c34478c7b941ab803928fdca547323
Publikováno v:
Pediatrics and Neonatology, Vol 62, Iss 3, Pp 312-320 (2021)
Background: The acute changes in brain function in newborn infants undergoing ET remain unclear. This study aimed to determine whether fully automated simultaneous peripheral arteriovenous ET would influence the brain function. Methods: A retrospecti
Externí odkaz:
https://doaj.org/article/3670f0ba100044098c1d0cfa7c08f395
Publikováno v:
Guoji Yanke Zazhi, Vol 21, Iss 2, Pp 331-334 (2021)
AIM:To assess the efficacy of Ahmed glaucoma valve implantation combined with lens extraction for neovascular glaucoma(NVG)with cataract.METHODS: A retrospective comparative study was designed. 93 patients with NVG were enrolled. All patients receive
Externí odkaz:
https://doaj.org/article/be7ee35d05d84d47b07867a646ec6536
Publikováno v:
IEEE Access, Vol 6, Pp 73009-73022 (2018)
This paper focuses on several theoretical issues and principles in steganography security, and defines four security levels by analyzing the corresponding algorithm instances. In the theoretical analysis, we discuss the differences between steganogra
Externí odkaz:
https://doaj.org/article/a95d0a3e82544bfeafd527519f8462a9
Publikováno v:
Tongxin xuebao, Vol 38, Pp 39-45 (2017)
Based on the Ding-generalized cyclotomy,a new class of generalized cyclotomic sequences with length pm over the finite field of power of odd prime order was constructed,and the sequence was balanced.The linear complexity of the sequences was determin
Externí odkaz:
https://doaj.org/article/99b159c71cbf4c8ca1f67aca6748406b
Autor:
Iao-Fai Lam, Min Huang, Margaret Dah-Tysr Chang, Pei-Wun Yao, Yu-Ting Chou, Sim-Kun Ng, Ying-Lin Tsai, Yu-Chang Lin, Yun-feng Zhang, Xiao-yuan Yang, Yiu-Kay Lai
Publikováno v:
Chinese Medicine, Vol 12, Iss 1, Pp 1-11 (2017)
Abstract Background Herbochip® technology is a high throughput drug screening platform in a reverse screening manner, in which potential chemical leads in herbal extracts are immobilized and drug target proteins can be used as probes for screening p
Externí odkaz:
https://doaj.org/article/d380e632273549f0b29804c326411236
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 15 (2019)
Toward the goal of high security and efficiency for data collection in wireless sensor network, this article proposed an adaptable secure compressive sensing–based data collection scheme for distributed wireless sensor network. It adopted public ke
Externí odkaz:
https://doaj.org/article/bc7788ed686d49b98da663e9e656188f
Publikováno v:
Tongxin xuebao, Vol 37, Pp 224-230 (2016)
In order to enrich the performance of the user's location information and to meet the diverse needs of users,a location privacy protection scheme based on attribute encryption was designed,which provided precise,more accurate,fuzzy and private four m
Externí odkaz:
https://doaj.org/article/80327ae2f0444b48a2e1e3b678f8fde5