Zobrazeno 1 - 10
of 117
pro vyhledávání: '"Yongli TANG"'
Autor:
Zeliang Zeng, Panke Qin, Yue Zhang, Yongli Tang, Shenjie Cheng, Sensen Tu, Yongjie Ding, Zhenlun Gao, Yaxing Liu
Publikováno v:
PeerJ Computer Science, Vol 10, p e2215 (2024)
Arbitrage spread prediction can provide valuable insights into the identification of arbitrage signals and assessing associated risks in algorithmic trading. However, achieving precise forecasts by increasing model complexity remains a challenging ta
Externí odkaz:
https://doaj.org/article/5d0be90281ef4618843f70f69b688839
Publikováno v:
Journal of Health, Population and Nutrition, Vol 42, Iss 1, Pp 1-10 (2023)
Abstract Objective To identify the prevalence of obesity, sarcopenia, sarcopenic obesity in end-stage knee osteoarthritis (KOA) patients and analyze influences of obesity and sarcopenia in the progression of KOA. Methods A cross-sectional study was c
Externí odkaz:
https://doaj.org/article/75bdadcd83ff42a9a5eea07c76d56c4e
Publikováno v:
Entropy, Vol 26, Iss 9, p 793 (2024)
The existing lattice-based cut-and-choose oblivious transfer protocol is constructed based on the learning-with-errors (LWE) problem, which generally has the problem of inefficiency. An efficient cut-and-choose oblivious transfer protocol is proposed
Externí odkaz:
https://doaj.org/article/bf6b7465cc154738bb5cfda80f8c687a
Autor:
Shenjie Cheng, Panke Qin, Baoyun Lu, Jinxia Yu, Yongli Tang, Zeliang Zeng, Sensen Tu, Haoran Qi, Bo Ye, Zhongqi Cai
Publikováno v:
PLoS ONE, Vol 19, Iss 5, p e0303688 (2024)
Deep learning models struggle to effectively capture data features and make accurate predictions because of the strong non-linear characteristics of arbitrage data. Therefore, to fully exploit the model performance, researchers have focused on networ
Externí odkaz:
https://doaj.org/article/5cbb1f1960af4d699864983c34095a3d
Publikováno v:
Heliyon, Vol 10, Iss 1, Pp e23458- (2024)
Technology mining (or tech mining, TM) is an emerging research field in science, technology, and innovation studies. However, due to the rapid increase and widespread application of TM research, accurately capturing research topics and emerging devel
Externí odkaz:
https://doaj.org/article/430c6a7d5ff145e0bbff8405d5031a29
Autor:
Runhan Zhao, Yu Jiang, Jun Zhang, Yanran Huang, Chuang Xiong, Zenghui Zhao, Tianji Huang, Wei Liu, Nian Zhou, Zefang Li, Xiaoji Luo, Yongli Tang
Publikováno v:
Frontiers in Medicine, Vol 10 (2023)
Ewing sarcoma (ES) is the second most common malignant bone tumor in children and has a poor prognosis due to early metastasis and easy recurrence. Necroptosis is a newly discovered cell death method, and its critical role in tumor immunity and thera
Externí odkaz:
https://doaj.org/article/7cd91cd69d5245b6bf9cc5436848c1da
Publikováno v:
IET Communications, Vol 16, Iss 8, Pp 902-914 (2022)
Abstract With the increasing number of fibre access users, P2P file sharing download traffic has gradually become one of the enormous bandwidth consumptions for the access network. Localizing traffic could save bandwidth and reduce latency, but it ca
Externí odkaz:
https://doaj.org/article/b610558e564d467ea6811f534e0bac2b
Publikováno v:
PLoS ONE, Vol 18, Iss 7, p e0279353 (2023)
Plant roots are essential for water and nutrient absorption, anchoring, mechanical support, metabolite storage and interaction with the surrounding soil environment. A comprehensive understanding of root traits provides an opportunity to build ideal
Externí odkaz:
https://doaj.org/article/590fd15b085e4c2ca09dba25a89008a4
Publikováno v:
Entropy, Vol 25, Iss 9, p 1347 (2023)
With the rapid development of edge computing and the Internet of Things, the problem of information resource sharing can be effectively solved through multi-party collaboration, but the risk of data leakage is also increasing. To address the above is
Externí odkaz:
https://doaj.org/article/8f5aa11937a64cef9ca94adb0df09834
Publikováno v:
Applied Sciences, Vol 13, Iss 15, p 9007 (2023)
Federal learning and privacy protection are inseparable. The participants in federated learning need to be the targets of privacy protection. On the other hand, federated learning can also be used as a tool for privacy attacks. Group signature is reg
Externí odkaz:
https://doaj.org/article/65f229f1d6674146877b87e0a620f282