- Cryptography and Data Security
- Cloud Data Security Solutions
- Statistical Methods and Inference
- Access Control and Trust
- Wireless Communication Networks Research
- Millimeter-Wave Propagation and Modeling
- Advanced MIMO Systems Optimization
- Telecommunications and Broadcasting Technologies
- Privacy-Preserving Technologies in Data
- Bayesian Methods and Mixture Models
- Advanced Statistical Methods and Models
- Statistical Methods and Bayesian Inference
- Wireless Networks and Protocols
- Fatty Acid Research and Health
- Microwave Engineering and Waveguides
- Advanced Authentication Protocols Security
- Advanced Wireless Network Optimization
- Computational Drug Discovery Methods
- Genetic Mapping and Diversity in Plants and Animals
- Parallel Computing and Optimization Techniques
- Cloud Computing and Resource Management
- Distributed and Parallel Computing Systems
- Antenna Design and Analysis
- Soil Geostatistics and Mapping
- Recommender Systems and Techniques
Guilin Medical University
2024
Panzhihua University
2024
Texas A&M University
2013-2023
Wuhan Polytechnic University
2022
Beijing University of Posts and Telecommunications
2020
China University of Petroleum, Beijing
2017
Pioneer Hi-Bred
2017
Macquarie University
2011-2016
Shanghai Institute of Planned Parenthood Research
2016
Persian Gulf University
2015
With the rapid developments occurring in cloud computing and services, there has been a growing trend to use for large-scale data storage. This raised important security issue of how control prevent unauthorized access stored cloud. One well known model is role-based (RBAC), which provides flexible controls management by having two mappings, users roles privileges on objects. In this paper, we propose encryption (RBE) scheme that integrates cryptographic techniques with RBAC. Our RBE allows...
Statistical tables are an important component of data analysis and reports in biological sciences. However, the traditional manual processes for computation presentation statistically significant results using a letter-based algorithm tedious prone to errors.Based on R language, we present two web-based software individual summary data, freely available online, at http://shiny.stat.tamu.edu:3838/hassaad/Table_report1/ http://shiny.stat.tamu.edu:3838/hassaad/SumAOV1/, respectively. The...
Cloud data storage has provided significant benefits by allowing users to store massive amount of on demand in a cost-effective manner. To protect the privacy stored cloud, cryptographic role-based access control (RBAC) schemes have been developed ensure that can only be accessed those who are allowed policies. However, these approaches do not address issues trust. In this paper, we propose trust models reason about and improve security for cloud systems use RBAC schemes. The provide an...
In recent times, there has been increasing interest in storing data securely the cloud environment. To provide owners of stored with flexible control over access to their by other users, we propose a role-based encryption (RBE) scheme for secure storage. Our allows owner store it an encrypted form and grant that users specific roles. The specifies set roles which are assigned, each role having permissions. can encrypt such way only decrypt data. Anyone else, including providers themselves,...
Statistical tables are an essential component of scientific papers and reports in biomedical agricultural sciences. Measurements these summarized as mean ± SEM for each treatment group. Results from pairwise-comparison tests often included using letter displays, which means that not significantly different, followed by a common letter. However, the traditional manual processes computation presentation statistically significant outcomes MS Word letter-based algorithm tedious prone to errors....
Cloud Computing has become a well-known primitive nowadays; many researchers and companies are embracing this fascinating technology with feverish haste. In the meantime, security privacy challenges brought forward while number of cloud storage user increases expeditiously. work, we conduct an in-depth survey on recent research activities in association computing. After overview system its problem, focus key requirement triad, i.e., data integrity, confidentiality, availability. For each...
Hierarchical functional data are widely seen in complex studies where subunits nested within units, which turn treatment groups. We propose a general framework of mixed effects model for such data: within-unit and within-subunit variations modeled through two separate sets principal components; the subunit level functions allowed to be correlated. Penalized splines used both mean components functions, roughness penalties regularize spline fit. An expectation–maximization (EM) algorithm is...
Abstract. We consider marginal semiparametric partially linear models for longitudinal/clustered data and propose an estimation procedure based on a spline approximation of the non‐parametric part model extension parametric generalized estimating equations (GEE). Our estimates both have properties parallel to those GEE, that is, are efficient if covariance structure is correctly specified they still consistent asymptotically normal even misspecified. By showing our estimate achieves...
Both fish oil (FO) and curcumin have potential as anti-tumour anti-inflammatory agents. To further explore their combined effects on dextran sodium sulphate (DSS)-induced colitis, C57BL/6 mice were randomised to four diets (2 × 2 design) differing in fatty acid content with or without supplementation (FO, FO+2 % curcumin, maize (control, MO) MO+2 curcumin). Mice exposed one two cycles of DSS the drinking-water induce either acute chronic intestinal inflammation, respectively. FO-fed...
The distribution and prevalence of zoonotic pathogens infecting ixodid ticks in Western Europe have been extensively examined. However, data on tick-borne Eastern Europe, particularly Ukraine are scarce. objective the current study was, therefore, to investigate Anaplasma phagocytophilum, Anaplasmataceae, Rickettsia spp., Babesia Bartonella Borrelia burgdorferi sensu lato engorged questing collected from five administrative regions (oblasts) Ukraine, namely Chernivtsi, Khmelnytskyi, Kyiv,...
This article presents and compares two approaches of principal component (PC) analysis for two-dimensional functional data on a possibly irregular domain. The first approach applies the singular value decomposition matrix obtained from fine discretization functions. When functions are only observed at discrete points that sparse may differ function to function, this incorporates an initial smoothing step prior decomposition. second employs mixed effects model specifies PC as bivariate...
We consider efficient estimation of the Euclidean parameters in a generalized partially linear additive models for longitudinal/clustered data when multiple covariates need to be modeled nonparametrically, and propose an procedure based on spline approximation nonparametric part model estimating equations (GEE). Although consideration is natural useful many practical applications, literature this very limited because challenges dealing with dependent models. show that proposed estimators are...
The biological significance of phosphatidylcholine‐specific phospholipase C (PC‐PLC) in hepatocarcinogenesis and the proliferation differentiation rat liver cancer cells was investigated. Ca 2+ ‐dependent activities PC‐PLC gradually increased during N‐nitrosodiethylamine (DEN)‐induced peaked at weeks 18–20 when tumour formed. There a close relationship between cellular DNA content, membranous γ‐glutamyltranspeptidase (γ‐GT), tyrosine protein kinase. In contrast, ‐independent decreased...
There has been a recent trend in storing data cloud due to the increasing amount of users' and associated benefits such as on-demand access scalability. Role-based control (RBAC) provides flexible way for owners manage share their cloud. To enforce policies cloud, cryptographic RBAC schemes have developed, which combine techniques protect privacy an outsourced environment. Using these schemes, owner can encrypt that only users with appropriate roles specified by role-based policy decrypt...
A detailed characterization of the chemical composition complex substances, such as products petroleum refining and environmental mixtures, is greatly needed in exposure assessment manufacturing. The inherent complexity variability substances obfuscate choices for their analytical characterization. Yet, lieu exact evaluation degree similarity a sensible path toward decision-making health regulations. Grouping similar challenge that can be addressed via advanced methods streamlined data...
The kinetics of recovery for innate immune effectors following antiretroviral therapy are unknown.Multiple sequential cryopreserved samples (viremic and ART-suppressed) from 66 patients enrolled in the Women's Interagency HIV Study or Multicenter AIDS Cohort cohorts (median follow-up, 700 days) were analyzed to determine natural killer, dendritic T-cell changes by flow cytometry. Functional parameters also measured a subset samples. Changes over time mixed-effect modeling based on linear...
Recently, the study of protein structures using angular representations has attracted much attention among structural biologists. The main challenge is how to efficiently model continuous conformational space based on differences and similarities between different Ramachandran plots. Despite presence statistical methods for modeling data proteins, there still a substantial need more sophisticated faster tools large-scale circular datasets. To address this need, we have developed...