Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Zhihong Rao"'
Autor:
Shuzhen Fang, Kangyi Zhang, Danqing Liu, Yulong Yang, Hu Xi, Wenting Xie, Ke Diao, Zhihong Rao, Dongxu Wang, Wenming Yang
Publikováno v:
Frontiers in Nutrition, Vol 11 (2024)
Polyphenols are a group of naturally occurring compounds that possess a range of biological properties capable of potentially mitigating or preventing the progression of age-related cognitive decline and Alzheimer’s disease (AD). AD is a chronic ne
Externí odkaz:
https://doaj.org/article/db9757eb7d2a4c6cbdde8a276ae9652a
Autor:
Yulong Yang, Gang-Ao Wang, Shuzhen Fang, Xiang Li, Yufeng Ding, Yuqi Song, Wei He, Zhihong Rao, Ke Diao, Xiaolei Zhu, Wenming Yang
Publikováno v:
Frontiers in Neurology, Vol 15 (2024)
ObjectivesWilson disease (WD) is a rare autosomal recessive disorder caused by a mutation in the ATP7B gene. Neurological symptoms are one of the most common symptoms of WD. This study aims to construct a model that can predict the occurrence of neur
Externí odkaz:
https://doaj.org/article/ccf3406495384deba96989a80a5898fb
Publikováno v:
Sensors, Vol 19, Iss 19, p 4125 (2019)
Accurate knowledge of network topology is vital for network monitoring and management. Network tomography can probe the underlying topologies of the intervening networks solely by sending and receiving packets between end hosts: the performance corre
Externí odkaz:
https://doaj.org/article/8140023f609e43f881be6c7c41b2e6e8
Publikováno v:
Computers, Materials & Continua. 73:817-829
Publikováno v:
Personal and Ubiquitous Computing. 26:995-1010
Image super-resolution is widely applied in face recognition, video perception, medical imaging, and many other fields. Although significant progress has been made, existing methods remain limited in reconstructing fine-grained texture details, makin
Publikováno v:
SSRN Electronic Journal.
Publikováno v:
Security and Communication Networks, Vol 2022 (2022)
Shadowsocks(R) is a proxy software based on Socks5, which is the collective name of shadowsocks and shadowsocksR. Shadowsocks(R) is a private protocol without a handshake negotiation mechanism. Peng broke the confidentiality of shadowsocks by exploit
Publikováno v:
Artificial Intelligence and Mobile Services – AIMS 2020 ISBN: 9783030596040
AIMS
AIMS
Trajectory prediction is a hot topic in the field of computer vision and has a wide range of applications. Trajectory prediction refers to predicting the future trajectory of a target based on its past trajectory. This paper proposes a method based o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e8f6407e0197d59e966f1ed59a0ea7f4
https://doi.org/10.1007/978-3-030-59605-7_13
https://doi.org/10.1007/978-3-030-59605-7_13
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030395117
IHSI
IHSI
Network vulnerability mining is an important topic in cyberspace security. Network vulnerabilities enable attackers to obtain sensitive information from computer systems, control computer systems illegally and cause severe damage. More effective vuln
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c70091f55dbe7868cbddc5d98fac251c
https://doi.org/10.1007/978-3-030-39512-4_71
https://doi.org/10.1007/978-3-030-39512-4_71
Publikováno v:
Peer-to-Peer Networking and Applications. 11:592-601
The anonymous communication technology has brought new challenges to traffic analysis since it creates a private network pathway. Clustering analysis has been proved to be efficient in grouping Internet traffic. However, the cluster number of traditi