Zobrazeno 1 - 10
of 64 393
pro vyhledávání: '"yang yu"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Xu J; Department of Cardiology, Affiliated Hospital of Nanjing University of Chinese Medicine, Nanjing, 210029, China. Electronic address: xujunyao313@163.com., Sun Z; Department of Cardiology, Affiliated Hospital of Nanjing University of Chinese Medicine, Nanjing, 210029, China. Electronic address: szqdoct@163.com., Li J; Department of Cardiology, Affiliated Hospital of Nanjing University of Chinese Medicine, Nanjing, 210029, China. Electronic address: jellylee8803@126.com., Li Y; College of Pharmacy, Nanjing University of Chinese Medicine, Nanjing, 210029, China. Electronic address: 503983139@qq.com., Huang H; Department of Cardiology, Affiliated Hospital of Nanjing University of Chinese Medicine, Nanjing, 210029, China. Electronic address: 455907607@qq.com., Yuan F; Department of Cardiology, Affiliated Hospital of Nanjing University of Chinese Medicine, Nanjing, 210029, China. Electronic address: 764393011@qq.com., Liu M; Department of Cardiology, Affiliated Hospital of Nanjing University of Chinese Medicine, Nanjing, 210029, China; Institute of Hypertension, Affiliated Hospital of Nanjing University of Chinese Medicine, Nanjing, 210029, China. Electronic address: liuming@njucm.edu.cn., Fang Z; Institute of Hypertension, Affiliated Hospital of Nanjing University of Chinese Medicine, Nanjing, 210029, China. Electronic address: fangzhuyuan@njucm.edu.cn.
Publikováno v:
Journal of ethnopharmacology [J Ethnopharmacol] 2024 Sep 13; Vol. 337 (Pt 1), pp. 118820. Date of Electronic Publication: 2024 Sep 13.
Autor:
Ma, Siqi, Xu, Junyao, Zheng, Yawei, Li, Yin, Wang, Yixuan, Li, Haitao, Fang, Zhuyuan, Li, Jie
Publikováno v:
In Journal of Ethnopharmacology 10 February 2023 302 Part A
Publikováno v:
In Journal of Ethnopharmacology 12 June 2020 255
Autor:
Lichao Qian, Shuai Ren, Zhongchi Xu, Yawei Zheng, Lihua Wu, Ying Yang, Yixuan Wang, Jie Li, Shihai Yan, Zhuyuan Fang
Publikováno v:
Frontiers in Pharmacology, Vol 12 (2021)
Protection against hypoxia injury is an important therapeutic strategy for treating hypertensive nephropathy. In this study, the effects of Qian Yang Yu Yin granule (QYYY) on spontaneously hypertensive rats fed with high salt diet and HEK293T cells e
Externí odkaz:
https://doaj.org/article/dc374d18766e453eb5810feabf001c45
We study offline off-dynamics reinforcement learning (RL) to utilize data from an easily accessible source domain to enhance policy learning in a target domain with limited data. Our approach centers on return-conditioned supervised learning (RCSL),
Externí odkaz:
http://arxiv.org/abs/2410.23450
Background: The primary goal of studying isospin dynamics via heavy-ion reactions is to explore the isospin dependence of effective interactions within the nuclear equation of state (EOS). Purpose: This work aims to investigate the effects of nuclear
Externí odkaz:
http://arxiv.org/abs/2410.18569
Autor:
Lin, Haoran, Yu, Xianzhi, Zhao, Kang, Hou, Lu, Zhan, Zongyuan, Kamenev, Stanislav, Bao, Han, Hu, Ting, Wang, Mingkai, Chang, Qixin, Sui, Siyue, Sun, Weihao, Hu, Jiaxin, Yao, Jun, Yin, Zekun, Qian, Cheng, Zhang, Ying, Pan, Yinfei, Yang, Yu, Liu, Weiguo
FlashAttention series has been widely applied in the inference of large language models (LLMs). However, FlashAttention series only supports the high-level GPU architectures, e.g., Ampere and Hopper. At present, FlashAttention series is not easily tr
Externí odkaz:
http://arxiv.org/abs/2410.16663
The cold start problem in recommender systems remains a critical challenge. Current solutions often train hybrid models on auxiliary data for both cold and warm users/items, potentially degrading the experience for the latter. This drawback limits th
Externí odkaz:
http://arxiv.org/abs/2410.14241
Existing works have established multiple benchmarks to highlight the security risks associated with Code GenAI. These risks are primarily reflected in two areas: a model potential to generate insecure code (insecure coding) and its utility in cyberat
Externí odkaz:
http://arxiv.org/abs/2410.11096