- Neuroblastoma Research and Treatments
- Soil Geostatistics and Mapping
- Geochemistry and Geologic Mapping
- Cancer therapeutics and mechanisms
- Image Processing and 3D Reconstruction
- Mineral Processing and Grinding
- Advanced Computational Techniques and Applications
- Cancer, Hypoxia, and Metabolism
- Geological Modeling and Analysis
- Geographic Information Systems Studies
- Advanced Algorithms and Applications
- Renal and related cancers
- Tumors and Oncological Cases
- Advanced Decision-Making Techniques
- Lung Cancer Research Studies
- Mining Techniques and Economics
- Spatial and Panel Data Analysis
- Sarcoma Diagnosis and Treatment
- User Authentication and Security Systems
- Remote Sensing and Land Use
- Bartonella species infections research
- Biometric Identification and Security
- Insurance and Financial Risk Management
- Data-Driven Disease Surveillance
- Teratomas and Epidermoid Cysts
China University of Geosciences
2010-2024
Bureau of Geology and Mineral Exploration and Development of Guizhou Province
2024
Ministry of Natural Resources
2024
University of Science and Technology of China
2024
Tianjin Medical University Cancer Institute and Hospital
2010-2023
National Clinical Research
2023
Tianjin Medical University
2005-2023
Sun Yat-sen University
2023
Fifth Affiliated Hospital of Sun Yat-sen University
2023
Sany (China)
2022
The study explored the relationships among instructional leadership, professional learning community components, and teacher self-efficacy in context of mainland China. Study subjects were 1082 elementary school teachers participating a questionnaire survey. results showed that leadership had significant effects on five four which, collaborative activity, collective focus student learning, de-privatized practice, reflective dialogue, positively predicted self-efficacy. Analysis dialogue...
Abstract Many geoscience problems involve predicting attributes of interest at un-sampled locations. Inverse distance weighting (IDW) is a standard solution to such problems. However, IDW generally not able produce favorable results in the presence clustered data, which commonly used geospatial data process. To address this concern, paper presents novel interpolation approach (DIDW) that integrates data-to-data correlation with conventional and reformulates it within geostatistical framework...
Neuroblastomas have shed light on the differentiation disorder that is associated with spontaneous regression or in same tumor at time. Long noncoding RNAs (lncRNAs) actively participate a broad spectrum of biological processes. However, detailed molecular mechanisms underlying lncRNA regulation neuroblastomas remain largely unknown. Here, we sequenced clinical samples ganglioneuroma, ganglioneuroblastoma, and neuroblastoma. We compared transcription profiles neuroblastoma cells, ganglion...
<title>Abstract</title> Logging data play an important role in resource exploration, but actual production, the logging attributes are often distorted or missing, which affects geological work based on data. In this paper, a multivariate feature fusion model is proposed to address problem of insufficient extraction intrinsic correlation between traditional curve reconstruction method. Analogous method extracting texture features images, Gray-Level Co-occurrence Matrices (GLCM) and Gradient...
Background: The characteristics and roles of microbes in the occurrence development pulmonary nodules are still unclear. Methods: We retrospectively analyzed microbial mNGS results BALF from 229 patients with before surgery, performed a comparative analysis lung flora between cancer benign according to postoperative pathology. also focused on investigating microbiota adenocarcinomas varying histopathology. Results: There were differences nodules. Bacterial diversity was lower than Four...
As a typical spatial interpolation method in geoscience and geographic data processing, inverse distance weighting (IDW) has long-time standing problem which is how to choose the best power value while calculating. For issue, this text proposes an alternative way based on enumeration cross validation. By orderly analyzing estimating effectiveness of every possible through cross-validation, can intelligently find proper value. Additionally, practical application procedure with real dataset by...
Objective: This study aimed to analyze the efficacy of autologous peripheral blood stem cell transplantation for high-risk neuroblastoma in China. Methods: The data 90 patients treated with CCCG-NB 2015 regimen were reviewed. baseline clinicopathological characteristics and prognosis analyzed compared. In addition, prognoses tandem single groups Results: results survival analysis showed that based on this pretreatment significantly improved children group. 3-year event-free (EFS) overall...
Background The clinical relevance of differentiating between mTICI (modified Thrombolysis In Cerebral Infarction) 2b and 3 in patients with vertebrobasilar artery occlusion (VBAO) remains unclear. This study aimed to investigate whether improves functional outcomes compared VBAO this improvement differs according extent ischemic damage. Methods retrospective enrolled within 24 hours the estimated time at 65 stroke centers a nationwide registration China. primary outcome was favorable Rankin...
One of the most common models used to define OK neighborhood, a search ellipsoid, has some shortcoming. For instance, it can determine values resulting estimates but itself is strongly dependent on user's knowledge extent. This paper presents smart ellipsoid (SSE) model improve reliability estimates. By constructing an evaluation criteria mainly consisted kriging variance and interpolation variance, participant sample set within (CSE) be refined intelligently by genetic algorithm process. In...
Pervasive computing, with its focus on users, has the potential to fundamentally change way people use computers, which challenges traditional human-machine interaction mode and requires more natural interactive between human computers. The requirement for speech in pervasive computing environment was discussed. And a system designed implemented meet of an intelligent office environment, practical solution given. By this solution, transmit convert server embedded handheld device were...
The information security for mobile computer is different from PC, usually has low computing ability, especially low-cost system like RFID (radio frequency identification). How to solve the in those computers a hot problem. This paper introduces dynamic key establishment algorithm based on mutual learning between TPM (tree parity machine) neural networks, and promotes new attack method this algorithm. Simulation showed it can KKK-double-chaotic effectively.
Equivariant function with respect to symmetries of the wallpaper group is constructed by trigonometric functions.A proper transformation established between Euclidean plane and hyperbolic spaces.With resulting transformation, patterns on Poincaré Klein models are generated means dynamic systems.This method can be utilized produce infinity beautiful pattern automatically.
Operating complexity, especially in the determination of cut-off values and associated spatial variation, has been a long time standing problem for indicator kriging (IK) mineral reserves estimation method.In order to solve this problem, text proposes an alternative method implement IK computer software.In solution, threshold are dynamically selected according participant samples.Additionally, it considers sharp corresponding variograms can be represented by median variogram.Thus,...