- Chaos-based Image/Signal Encryption
- Advanced Steganography and Watermarking Techniques
- Indoor and Outdoor Localization Technologies
- Hepatitis B Virus Studies
- Liver Disease Diagnosis and Treatment
- Reproductive Biology and Fertility
- Underwater Vehicles and Communication Systems
- Esophageal Cancer Research and Treatment
- Blockchain Technology Applications and Security
- Energy Efficient Wireless Sensor Networks
- Speech and Audio Processing
- Circular RNAs in diseases
- Video Surveillance and Tracking Methods
- Extracellular vesicles in disease
- Cancer-related molecular mechanisms research
- Immune cells in cancer
- Single-cell and spatial transcriptomics
- Cancer Immunotherapy and Biomarkers
- Epigenetics and DNA Methylation
- Oral microbiology and periodontitis research
- Sparse and Compressive Sensing Techniques
- Lung Cancer Treatments and Mutations
- Radiomics and Machine Learning in Medical Imaging
- Acute Lymphoblastic Leukemia research
- Gastric Cancer Management and Outcomes
Zhejiang University
2018-2025
Jinhua Central Hospital
2023-2024
Henan Provincial People's Hospital
2024
Zhengzhou University
2024
National University of Defense Technology
2023-2024
China Medical University
2010-2024
Hunan Cancer Hospital
2024
Central South University
2024
Shanghai Jiao Tong University
2010-2024
Henan University of Science and Technology
2009-2024
Abstract Cancer immunotherapies have shown clinical success in various types of tumors but the patient response rate is low, particularly breast cancer. Here we report that malignant cancer cells can transfer active TGF-β type II receptor (TβRII) via tumor-derived extracellular vesicles (TEV) and thereby stimulate signaling recipient cells. Up-take vesicle-TβRII (EV-TβRII) low-grade tumor initiates epithelial-to-mesenchymal transition (EMT), thus reinforcing stemness increasing metastasis...
This paper proposes an image encryption algorithm based on a chaotic map and information entropy. Unlike Fridrich’s structure, the proposed method contains permutation, modulation, diffusion (PMD) operations. avoids shortcoming in traditional schemes of strictly shuffling pixel positions before encryption. Information entropy is employed to influence generation keystream. The initial keys used permutation stages interact with each other. As result, acts as indivisible entity enhance...
Color, as a notable and stable attribute of vehicles, can serve useful reliable cue in variety applications intelligent transportation systems. Therefore, vehicle color recognition natural scenes has become an important research topic this area. In paper, we propose deep-learning-based algorithm for automatic recognition. Different from conventional methods, which usually adopt manually designed features, the proposed is able to adaptively learn representation that more effective task...
Vehicle information recognition is a key component of intelligent transportation systems. Color plays an important role in vehicle identification. As has its inner structure, the main challenge color to select region interest (ROI) for recognizing dominant color. In this paper, we propose method implicitly ROI recognition. Preprocessing performed overcome influence image quality degradation. Then, images selected by assigning subregions with different weights that are learned classifier...
Herein, an asymmetric image encryption algorithm based on RSA cryptosystem and a fractional-order chaotic system is proposed. Its security depends algorithm. First, pair of public private keys generated by Subsequently, random message shown as plaintext key information encrypted the to achieve ciphertext information. Next, new transformation map established generate initial according substituted into fractional hyperchaotic equation calculate keystream. Finally, permutation diffusion...
In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of drawbacks, namely, fixed key low sensitivity, some current algorithms, work tries to solve these two problems includes contributions: <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M1"><mml:mo stretchy="false">(</mml:mo><mml:mn...
Abstract Image encryption algorithm is an important telecommunication technology for protecting personal security. In this article, we propose a novel multi‐image visual based on compressive sensing (CS) and Schur decomposition. First, multiple images are sparsed by discrete wavelet transform, the compressed obtained zigzag confusion CS. Second, these combined according to random sequences scrambled again obtain secret image. Third, carrier image subjected two‐level lifting transform where...
In order to understand the hydrological process of expansive soil slopes, simulated rainfall experiments were conducted study effects slope gradient and initial moisture content on runoff infiltration for slopes located in south China. The field program consisted four neighboring (70%, 47%, 32%, 21%) instrumented by a collection system sensors (EC-5). Results from monitored tests indicate that there was delay response surface runoff. initiation time decreased with water increasing gradient....
Abstract Dysregulated cell cycle progression has a critical role in tumorigenesis. Cell division 27 (CDC27) is core subunit of the anaphase-promoting complex/cyclosome, although specific CDC27 cancer remains unknown. In our study, we explored biological and clinical significance colorectal (CRC) growth investigated underlying molecular mechanisms. Results showed that expression significantly correlated with tumor poor patient survival. Functional assays demonstrated overexpression promoted...
The underlying mechanisms of bright light therapy (BLT) in the prevention individuals with subthreshold depression symptoms are yet to be elucidated. goal study was assess correlation between midbrain monoamine-producing nuclei treatment-related functional connectivity (FC) changes and depressive symptom improvements depression. This double-blind, randomized, placebo-controlled clinical trial conducted March 2020 June 2022. A total 74 young adults were randomly assigned receive 8-week BLT (
This study attempts to develop a novel apoptosis-related predictive model for cervical cancer. Differentially expressed genes were identified using TCGA, GEO, and MSigDB databases. A 13-gene prognostic was constructed multiple regression analyses. The low-risk group exhibited low tumor purity high ESTIMATE immune scores. Most of the checkpoints in at higher levels than those high-risk group. also had relatively more infiltrating cells. An independent pertaining cell apoptosis has been built...
Current single-cell RNA-seq approaches are hindered by preamplification bias, loss of strand origin information, and the inability to observe small-RNA mRNA dual transcriptomes. Here, we introduce a holo-transcriptome sequencing (Holo-Seq) that overcomes all three hurdles. Holo-Seq has same quantitative accuracy uniform coverage with complete information as bulk RNA-seq. Most importantly, can simultaneously small RNAs mRNAs in single cell. Furthermore, acquire RNA transcriptomes 32 human...
Harmful bacteria have seriously threatened human health and wealth for a long time. Herein, multifunctional drug delivery system based on UiO-66 was fabricated, it showed potent synergistic antibacterial effects when used in conjunction with photodynamic therapy chemotherapy. First, UiO-66-NH2 prepared via facile solvothermal method. Then, carboxylic zinc phthalocyanine, broad-spectrum photosensitizer, connected to by amidation. Next, chemical antibiotic linezolid loaded the pores, lysozyme...
This paper proposes a new image compression-encryption algorithm based on meaningful encryption framework. In block compressed sensing, the plain is divided into blocks, and subsequently, each rendered sparse. The zigzag scrambling method used to scramble pixel positions in all dimension reduction undertaken via compressive sensing. To ensure robustness security of our convenience subsequent embedding operations, merged, quantized, disturbed again obtain secret image. particular, landscape...
A plethora of prognostic biomarkers for esophageal squamous cell carcinoma (ESCC) that have hitherto been reported are challenged with low reproducibility due to high molecular heterogeneity ESCC. The purpose this study was identify the optimal ESCC using machine learning algorithms.Biomarkers related clinical survival, recurrence or therapeutic response patients were determined through literature database searching. Forty-eight linked prognosis used construct a interaction network based on...
Wi-Fi fingerprinting is widely used in indoor localization due to the ubiquitous availability of infrastructure environments. The basic assumption that received signal strength indicator (RSSI) distance consistent with location distance. However, fluctuation signals environments, nearest neighbors selected using RSSI may not be those whose corresponding locations are target, which could lead a large error. In this paper, we propose novel method for by transforming raw into features learned...