- Land Use and Ecosystem Services
- Conservation, Biodiversity, and Resource Management
- Advanced Malware Detection Techniques
- Urban Green Space and Health
- Remote Sensing in Agriculture
- Forest Management and Policy
- Remote Sensing and LiDAR Applications
- Atmospheric aerosols and clouds
- Synthesis and characterization of novel inorganic/organometallic compounds
- Web Application Security Vulnerabilities
- Ferrocene Chemistry and Applications
- Security and Verification in Computing
- Software Testing and Debugging Techniques
- Environmental Conservation and Management
- Hydrology and Watershed Management Studies
- Game Theory and Voting Systems
- Forest, Soil, and Plant Ecology in China
- Atmospheric chemistry and aerosols
- Organometallic Compounds Synthesis and Characterization
- Bioactive natural compounds
- Environmental Changes in China
- Atmospheric Ozone and Climate
- Environmental and Agricultural Sciences
- Software Reliability and Analysis Research
- Complexity and Algorithms in Graphs
Aerospace Information Research Institute
2020-2025
Chinese Academy of Sciences
2010-2025
Beijing Institute of Big Data Research
2025
University of Arizona
2024
China Geological Survey
2024
Beijing Normal University
2023
Jilin Agricultural University
2023
Institute of Information Engineering
2022
University of Chinese Academy of Sciences
2019-2022
Inner Mongolia Autonomous Region Meteorological Bureau
2021
Abstract Background Inflammatory responses in the CNS mediated by activated glial cells play an important role host-defense but are also involved development of neurodegenerative diseases. Resveratrol is a natural polyphenolic compound that has cardioprotective, anticancer and anti-inflammatory properties. We investigated capacity resveratrol to protect microglia astrocyte from inflammatory insults explored mechanisms underlying different inhibitory effects on astrocytes. Methods A murine...
Agricultural greenhouses (AGs) are an important facility for the development of modern agriculture. Accurately and effectively detecting AGs is a necessity strategic planning With advent deep learning algorithms, various convolutional neural network (CNN)-based models have been proposed object detection with high spatial resolution images. In this paper, we conducted comparative assessment three well-established CNN-based models, which Faster R-CNN, You Look Only Once-v3 (YOLO v3), Single...
The Sanjiang Plain (SJP) in Northeast China, a crucial black soil region, serves as quintessential example of high-intensity agricultural development zone and stands China’s largest commercial grain production base. In the context global climate change, pronounced warming increased vegetation greening are expected to significantly impact water resource supply its alignment with crop requirements SJP. This study assesses how change affect supply–demand relationship SJP, addressing critical...
Ecological engineering is a widely used strategy to address environmental degradation and enhance human well-being. A quantitative assessment of the impacts ecological on ecosystem services (ESs) prerequisite for designing inclusive sustainable programs. In order strengthen national security, Chinese government has implemented world’s largest project since 1999, Grain Green Program (GFGP). We professional model evaluate key ESs in Lvliang City. Scenario analysis was quantify contribution...
Desertification constitutes a grave threat to the environmental and socio-economic stability of desertification frontline states in Northern Nigeria. From 2003 2020, this research comprehensively analyzes vulnerability, integrating parameters such as NDVI, LST, TVDI, MSAVI, Albedo. Key factors contributing land degradation are identified, along with spatial patterns trends over two-decade period. The consequences profound, Nigeria's ecosystem experiencing steady decline vegetation cover....
A shipborne micro-pulse lidar (Sigma Space Mini-MPL) was used to measure aerosol extinction coefficient over the northern region of South China Sea from 9 August 7 September 2016, first time a mini-MPL for observation cruise region. The goal experiment investigate if compact and affordable usable this measurements were calculate vertical profiles volume coefficient, depolarization ratio, atmospheric boundary layer height. Aerosol optical depth (AOD) lower southwest side region, compared...
Wetlands have been degrading and reducing under the influences of human activity climate change. Landsat long-term observations can help us better track changing evidences wetland habitats that would be valuable for guiding restoration conservation wetland. In this study, we demonstrated results tracking evidence using from 1984 to 2017 through case study Baiyangdian in China. We extracted open water classified collected 190 scenes observations. As a result, found yearly variations present...
The natural ecological lands, such as forest land, grassland, wetland, etc., constitute the most important factor for maintaining and preserving earth’s ecosystem, which must be well concerned in regional function-oriented planning sustainability of human economic development. We analyzed evaluated change land regions where we applied major zones introduced a new concept China. Using land-use data from 2009 to 2018 that were produced by National Land Use Survey, re-classified types into...
Nowadays, attackers are increasingly using Use-After-Free(UAF) vulnerabilities to create threats against software security. Existing static approaches for UAF detection capable of finding potential bugs in the large code base. In most cases, analysts perform manual inspections verify whether warnings detected by analysis real vulnerabilities. However, due complex constraints constructing vulnerability, it is very time and cost-intensive screen all warnings. fact, many should be discarded...
In the title mol-ecule, [Fe(C(5)H(5))(C(18)H(17)Si)], distances of Fe atom from centroids unsubstituted and substituted cyclo-penta-dienyl (Cp) rings are 1.651 (1) 1.646 Å, respectively. The dihedral angle between two Cp is 3.20 (17)°. crystal packing mainly stabilized by van der Waals forces.
In the title mol-ecule, [Fe(2)(C(5)H(5))(2)(C(17)H(16)Si)], cyclo-penta-dienyl rings linked to same Fe atom are approximately eclipsed and inter-planar angles 1.8 (2) 3.4 (2)°. The is slightly closer substituted ring.
A general decrease of wetland is observed at a global due to climate change and human activity socio-economic developments. Landsat has been giving us the long record Earth's surface in moderate spatial resolution using multispectral sensor, which can help better analyze attribute changes wetland. This study use multi-temporal observing data since 1979 from reveal evaluate time studying area Baiyangdian China surrounded by farmland rural residents. The results could understand varying...
The classical cake cutting problem studies how to find fair allocations of a heterogeneous and divisible resource among multiple agents. Two the most commonly studied fairness concepts in are proportionality envy-freeness. It is well known that proportional allocation $n$ agents can be found efficiently via simple protocols [16]. For envy-freeness, recent breakthrough, Aziz Mackenzie [5] proposed discrete bounded envy-free protocol for any number players. However, suffers from high...
<p>             After years of development, Mie lidar has become an important technical means to explore aerosol particles in the atmosphere, and been widely used optical physical properties aerosols atmosphere. By Using backscatter signal collecting by lidar, characteristics can be qualitatively analyzed. However, order get...
Directed symbolic execution is an effective technique that tests specific parts of programs. It widely used in various security tasks, for instance, patch testing, bug reproduction, and static report verification. However, existing works perform at the source level, while few focus on binary level as codes security-critical program are not always available. In addition, current techniques migrating to introduce excessive overhead, thus exacerbating scalability issues inherent execution. this...
Memory vulnerability is one of the most harmful software vulnerabilities. The attackers can tamper/leak memory data or take complete control over program by exploiting these It critical to detect comprehensively. Unfortunately, type-based detections hardly achieve comprehensive detection due inexhaustible vul-nerability types, and general usually are heuristic, causing high false negatives. Therefore, there a lack effective methods for detection. This paper presents new Vulnerability...