Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Zhizhong, Qiao"'
Autor:
Kangwei Xu, Jing Li, Xu Lu, Xiaoqin Ge, Kaiqin Wang, Jiahao Wang, Zhizhong Qiao, Yaru Quan, Changgui Li
Publikováno v:
Vaccines, Vol 12, Iss 1, p 60 (2024)
The continuous evolution and mutation of SARS-CoV-2 have highlighted the need for more effective vaccines. In this study, CpG, MF59-like, and Alum adjuvant Delta strain inactivated SARS-CoV-2 vaccines were prepared, and the immunogenicity of these va
Externí odkaz:
https://doaj.org/article/9bb1d71728cc4d7aa8b16cd7291037d1
Publikováno v:
Vaccines, Vol 11, Iss 5, p 1002 (2023)
Developing variant vaccines or multivalent vaccines is a feasible way to address the epidemic as the SARS-CoV-2 variants of concern (VOCs) posed an increased risk to global public health. The spike protein of the SARS-CoV-2 virus was usually used as
Externí odkaz:
https://doaj.org/article/cb1f6d90f44340d589fe3aca908f1292
Publikováno v:
Security with Intelligent Computing and Big-data Services ISBN: 9783030169459
The transient security control aims to effectively improve the stability of the grid system and prevent large-scale blackouts in the system. In this paper, based on the actual and effective grid data filtered from the EMS system, a transient grid sec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::60f72e9babe0ed4af6d61db41710143e
https://doi.org/10.1007/978-3-030-16946-6_29
https://doi.org/10.1007/978-3-030-16946-6_29
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030146795
In order to deal with the problem that the confidential information in the intranet is easily leaked, the method based on file filter driver is used for mobile storage monitoring to solve such problem. Through the close relationship between the file
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::74771e65bc0c30ea047114005853a6c4
https://doi.org/10.1007/978-3-030-14680-1_22
https://doi.org/10.1007/978-3-030-14680-1_22
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030146795
With the development of power networks, automated verification of security baselines has become increasingly important. Traditional verification methods have disadvantages such as low efficiency, inability to centralize management, and difficulty in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::be72cfa09173082dfd78998297324725
https://doi.org/10.1007/978-3-030-14680-1_102
https://doi.org/10.1007/978-3-030-14680-1_102
Autor:
Zhizhong, Qiao (AUTHOR)
Publikováno v:
Chinese Studies in History. 2016, Vol. 49 Issue 1, p3-18. 16p.
Publikováno v:
Cloud Computing and Security ISBN: 9783030000080
ICCCS (2)
ICCCS (2)
In this paper, a network illegal access detection method based on PSO-SVM algorithm in the power monitoring system is proposed, where the particle swarm optimization (PSO) algorithm is used to optimize the parameters of support vector machine (SVM).
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b29e470acab4d61b9e57769727f3c8b6
https://doi.org/10.1007/978-3-030-00009-7_41
https://doi.org/10.1007/978-3-030-00009-7_41
Autor:
Zhizhong Qiao
Publikováno v:
Journal of Historiography / Shixueshi Yanjiu; 2009, Issue 2, p38-119, 9p