- Cloud Computing and Remote Desktop Technologies
- IoT and Edge/Fog Computing
- Cloud Computing and Resource Management
- Caching and Content Delivery
- Distributed and Parallel Computing Systems
- Blockchain Technology Applications and Security
- Wastewater Treatment and Nitrogen Removal
- Advanced Computational Techniques and Applications
- Industrial Technology and Control Systems
- Parallel Computing and Optimization Techniques
- Recommender Systems and Techniques
- Data Mining Algorithms and Applications
- Advanced Sensor Technologies Research
- Simulation and Modeling Applications
- Advanced Database Systems and Queries
- Sensor Technology and Measurement Systems
- Service-Oriented Architecture and Web Services
- Wireless Networks and Protocols
- Risk Perception and Management
- Protist diversity and phylogeny
- Radiation Effects in Electronics
- Cryptography and Residue Arithmetic
- Cancer-related molecular mechanisms research
- Power Systems and Technologies
- IPv6, Mobility, Handover, Networks, Security
Hunan University of Humanities, Science and Technology
2017-2024
China Academy of Launch Vehicle Technology
2023
Central South University
1998-2020
ZTE (China)
2020
China Mobile (China)
2020
Army Medical University
2007-2011
Shanxi Datong University
2009
Liaoning University of Technology
2006
Broadcom (United States)
2002
Sichuan Agricultural University
2002
Epstein-Barr virus (EBV) is a tumorigenic that can cause various human malignancies such as nasopharyngeal carcinoma (NPC) and gastric cancer (GC). EBV encodes 44 mature micro (mi)RNAs, mostly exhibiting oncogenic properties promoting progression. However, we have previously found one EBV-encoded miRNA, namely EBV-miR-BART6-3p, acts tumor suppressor by inhibiting metastasis invasion. Here, report EBV-miR-BART6-3p inhibits the proliferation of EBV-associated cancers, NPC, GC, targeting...
In recent years, the outbreak of numerous environmental risk incidents aroused widespread public concern about amplification mechanism in China. However, few studies have investigated influence path perception on behavioral responses Chinese context from a micro perspective. this article, we develop multidimensional model to responses, which aims investigate how public’s its different including radical behavior, behavior and protection behavior. A survey data General Social Survey 2013...
The edge computing service mode has entered the federation stage, where comprehensive resources are supported to collaborate between vertical cloud-edge and horizontal nodes. massive data processing poses a severe challenge traditional storage mechanism. In this paper, we propose an efficient resource collaboration model that leverages selection of collaborative nodes allocation among nodes, which can provide balanced services solutions. Specifically, selecting is multi-objective integer...
Quantum machine learning stands out as one of the most promising applications quantum computing, widely believed to possess potential advantages. In era noisy intermediate-scale quantum, scale and quality computers are limited, algorithms based on fault-tolerant computing paradigms cannot be experimentally verified in short term. The variational algorithm design paradigm can better adapt practical characteristics hardware is currently solutions. However, algorithms, due their highly...
The Internet of Things (IoT) has received a lot attention, especially in industrial scenarios. One the typical applications is intelligent mine, which actually constructs Six-Hedge underground systems with IoT platforms. Based on case study Six Systems metal this paper summarizes main challenges from aspects heterogeneity devices and resources, security, reliability, deployment maintenance costs. Then, novel resource service model for based Transparent Computing (TC) presented, supports...
Systems that integrate distributed databases and existing blockchain platforms have recently emerged, which conveniently leverage their respective strengths to build efficient, secure, usable data sharing collaboration environments for different organizations. However, the performance of such systems can be limited by native due high latency transactions. In this paper, we present CoralDB, a bottom-up fully redesigned hybrid system database, aimed at enabling untrusted organizations...
Wildlife re-identification (Re-ID) techniques are key to animal tracking and preservation. However, the performance of current deep learning methods is unsatisfactory in cross-camera scenarios, especially terms mean average precision (mAP). This work introduces ReDeformTR, a novel model designed for wildlife Re-ID tasks, particularly focusing on identification individual animals' images captured by different cameras. ReDeformTR integrates lightweight deformable transformer architecture...
Remembering software library components and mastering their application programming interfaces (APIs) is a daunting task for programmers, due to the sheer volume of available libraries. API completion tools, which predict subsequent APIs based on code context, are essential improving development efficiency. Existing techniques, however, face specific weaknesses that limit performance. Pattern-based methods rely statistical information excel in extracting common usage patterns sequences....
Formal verification techniques attract great attention from industry because of their ability to discover subtle design errors where simulation fails. However, due the state explosion problem, formal usually cannot handle large designs. This paper introduces a semi-formal methodology in which and are tightly coupled. In this methodology, we apply verify few "difficult" block level The verified properties valid traces carried over random based system validation. These legal not only can new...
In recent years, social networking services and e-commerce have been developing rapidly. The research of recommending in service mainly focused on using the collaborative filtering algorithm. But algorithm had limitations data sparsity cold start. This paper presents a model TagIEA expert degree metrics context services, where tag information are integrated into comprehensive recommendation based can effectively mitigate problems start sparsity. Finally, this verifies effectiveness improved...
The performance bottleneck of transparent computing (TC) is on the server side. Caching one key factors server-side performance. count disk input/output (I/O) can be reduced if multiple data blocks that are correlated with block currently accessed prefetched in advance. As a result, service and user experience quality TC improved. In this study, we propose caching strategy for side based relevance, which called correlation pattern-based (CPCS). method, adjust model frequent pattern tree...
In recent years, social networking services and e-commerce have been developing rapidly. The research of recommending in service mainly focused on using the collaborative filtering algorithm. But algorithm had limitations data sparsity cold start. This paper presents a model TagIEA expert degree metrics context services, where tag information are integrated into comprehensive recommendation based can effectively mitigate problems start sparsity. Finally, this verifies effectiveness improved...
The further integration of telecommunications and industry has been considerable is expected to bring significant benefits society economics. It also leads some evolution trends for next-generation communication systems, including rises in machine-type communications (MTC), uplink-dominated decentralized structures. However, the existing access protocols are not friendly these trends. This paper analyzes problems provides novel technologies solve them. These include contention-based NOMA,...
In recent years, the maturity of cloud computing technology has greatly promoted wide application smart home. As key function home system, device management can not meet user's efficient and secure requirements only relying on platform. Therefore, this paper applies idea edge to field home, takes gateway near side as server, basis, constructs corresponding mechanism. The main work includes construction data centric discovery mechanism plug-in control mechanism, which provides an effective...