Zobrazeno 1 - 10
of 743
pro vyhledávání: '"ZHU Yanming"'
Autor:
SHANG Fuhua, MIAO Ke, ZHU Yanming, WANG Meng, TANG Xin, WANG Yang, GAO Haitao, FENG Guangjun, MI Wentian
Publikováno v:
Meitan kexue jishu, Vol 51, Iss 2, Pp 269-282 (2023)
With the continuous exploration and development of shale gas in China, the complex structure area has become an important direction for further exploration. The Longmaxi shale samples collected from complex structure area in Northeast Chongqing were
Externí odkaz:
https://doaj.org/article/7e6b86d1c3bc48a2b993e610ba25c678
Autor:
Ali Inayat Mallano, Zaib-un Nisa, Binish Khaliq, Naila Ali, Qurban Ali, Chen Chao, Zhu Yanming
Publikováno v:
Scientific Reports, Vol 12, Iss 1, Pp 1-10 (2022)
Abstract The ubiquitination pathway is involved in the posttranslational modification of cellular proteins. However, the role of E3 ubiquitin ligase family proteins under abiotic stress conditions remains unclear, particularly in soybean. The core ob
Externí odkaz:
https://doaj.org/article/ace7d484d0704ae6bb3a1fec98e70fd7
Publikováno v:
IEEE Open Journal of the Computer Society, 2022
Recent studies have demonstrated that smart grids are vulnerable to stealthy false data injection attacks (SFDIAs), as SFDIAs can bypass residual-based bad data detection mechanisms. The SFDIA detection has become one of the focuses of smart grid res
Externí odkaz:
http://arxiv.org/abs/2207.10805
Latent fingerprints are important for identifying criminal suspects. However, recognizing a latent fingerprint in a collection of reference fingerprints remains a challenge. Most, if not all, of existing methods would extract representation features
Externí odkaz:
http://arxiv.org/abs/2207.00587
Latent fingerprint enhancement is an essential pre-processing step for latent fingerprint identification. Most latent fingerprint enhancement methods try to restore corrupted gray ridges/valleys. In this paper, we propose a new method that formulates
Externí odkaz:
http://arxiv.org/abs/2206.12885
Publikováno v:
IEEE Internet of Things Journal, 2022
Fingerprint authentication techniques have been employed in various Internet of Things (IoT) applications for access control to protect private data, but raw fingerprint template leakage in unprotected IoT applications may render the authentication s
Externí odkaz:
http://arxiv.org/abs/2206.12864
Publikováno v:
In Journal of Analytical and Applied Pyrolysis August 2024 181
Autor:
Chen, QiaoYuan, Zhu, YanMing, Zhang, JiaJia, Tong, YiRan, Liu, Hong, Rensing, Christopher, Feng, RenWei
Publikováno v:
In Plant Physiology and Biochemistry November 2024 216
Publikováno v:
In Marine and Petroleum Geology May 2024 163
Publikováno v:
In Structures March 2024 61