Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Yu-ting Kuang"'
Publikováno v:
Universe, Vol 10, Iss 1, p 39 (2024)
We study the second-order scalar and density perturbations generated by Gaussian curvature perturbations and primordial gravitational waves in the radiation-dominated era. After presenting all the possible second-order source terms, we obtain the exp
Externí odkaz:
https://doaj.org/article/009a6df9c0b44e889f801aaf78060bbd
Autor:
Xin Hu, Yu-ting Kuang, Mao-ming Sun, Ying-ying Wang, Yu-juan Zhang, Ling-ling Guo, Shou-li Wang
Publikováno v:
Cancer Biology & Medicine, Vol 8, Iss 1, Pp 21-26 (2011)
OBJECTIVE This study aimed to explore the expression and significance of transforming growth factor β1(TGF-β1), extracellular signal-regulated kinases 1/2 (ERK1/2), and K-ras in colorectal cancer (CRC) using tissue microarray technology.METHODS The
Externí odkaz:
https://doaj.org/article/b10a58018f4b43a9bed7e97fdd71787f
Autor:
Yu-Ting Kuang, 鄺郁婷
103
With the advent of social networks, a company can disseminate information and provide timely service to its customers so as to acquire new customers and to promote the corporate image. However, like a double-edged knife, a social network can
With the advent of social networks, a company can disseminate information and provide timely service to its customers so as to acquire new customers and to promote the corporate image. However, like a double-edged knife, a social network can
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/08083747362673628257
Publikováno v:
Molecular and Cellular Biochemistry.
Publikováno v:
Journal of Systems Architecture. 80:85-91
With plenty valuable information, open data are often deemed as great assets to academia or industry. In spite of some de-identification processing that most of data owners will perform before releasing the data, the more datasets are opened to publi
Publikováno v:
Soft Computing. 21:2883-2896
Recognition of cyber threats from open threat intelligence can give advantages to incident response in very early stage. Previous related studies mostly focus on finding general hot terms instead of specific continuously changing targets; as a result
Publikováno v:
2016 International Computer Symposium (ICS).
Several common file synchronization services (such as GoogleDrive, Dropbox and so on) are employed as infrastructure for being used by command and control(C&C) and data exfiltration, saying Man-in-the-Cloud (MITC) attacks. MITC is not easily detected
Publikováno v:
2016 International Computer Symposium (ICS).
Opening data of plenty valuable information as public dataset provides great potential treasure to academy or industry. Despite of de-identification process that most of data owner will take before releasing those data, however, the more datasets are
Autor:
Xu, Wang, Xiao-Bo, Guo, Xiao-Chun, Shen, Hao, Zhou, Dan-Wei, Wan, Xiao-Feng, Xue, Ye, Han, Bin, Yuan, Jin, Zhou, Hong, Zhao, Qiao-Ming, Zhi, Yu-Ting, Kuang
Publikováno v:
International journal of clinical and experimental medicine. 8(2)
Objective: In published studies, Y-box binding protein-1 (YB-1) correlated with the prognosis of patients with breast cancer (BC), but the specific role of YB-1 is still unclear. Our study aimed to evaluate the prognostic value of YB-1 in BC patients