- Advanced Mathematical Modeling in Engineering
- Advanced Authentication Protocols Security
- RFID technology advancements
- User Authentication and Security Systems
- Nonlinear Partial Differential Equations
- Stability and Controllability of Differential Equations
- Mathematical Biology Tumor Growth
- Differential Equations and Numerical Methods
- Navier-Stokes equation solutions
- Mathematical and Theoretical Epidemiology and Ecology Models
- Advanced Sensor and Control Systems
- Geometric Analysis and Curvature Flows
- Numerical methods in inverse problems
- Gas Dynamics and Kinetic Theory
- Advanced Mathematical Physics Problems
- Software System Performance and Reliability
- Advanced Algorithms and Applications
- Anomaly Detection Techniques and Applications
- Network Security and Intrusion Detection
- Geometry and complex manifolds
- Pluripotent Stem Cells Research
- ECG Monitoring and Analysis
- Service-Oriented Architecture and Web Services
- Time Series Analysis and Forecasting
- Biometric Identification and Security
Guangzhou University
2023
Xuzhou Medical College
2015-2022
Wuhan University
2020-2022
Beijing University of Posts and Telecommunications
2007-2018
Zhejiang Hospital
2017
Hunan Railway Professional Technology College
2017
China University of Mining and Technology
2010-2016
Duke University
2012-2014
Kailuan General Hospital
2013
Central South University
2009
In bacteria, glycogen plays important roles in carbon and energy storage. Its structure has recently been linked with bacterial environmental durability. Among the essential genes for metabolism, glgB-encoded branching enzyme GBE an role forming α-1,6-glycosidic points, determines unique patterns glycogen. Previously, evolutionary analysis of a small sets GBEs based on their N-terminal domain organization revealed that two types might exist: (1) Type 1 both N1 N2 (also known as CBM48)...
The uniqueness of bounded weak solutions to strongly coupled parabolic equations in a domain with no-flux boundary conditions is shown. include cross-diffusion and drift terms are self-consistently the Poisson equation. model class contains special cases Maxwell–Stefan for gas mixtures, generalized Shigesada–Kawasaki–Teramoto population dynamics, volume-filling models ion transport. proof based on combination $$H^{-1}$$ technique entropy method Gajewski.
The proliferation of physiological signals acquisition and monitoring system, has led to an explosion in data. Additionally, RFID systems, blockchain technologies, the fog computing mechanisms have significantly increased availability signal information through big data research. driver for development hybrid systems is continuing effort making health-care services more efficient sustainable. Implantable medical devices (IMD) are therapeutic that surgically implanted into patients' body...
The weak–strong uniqueness for renormalized solutions to reaction–cross-diffusion systems in a bounded domain with no-flux boundary conditions is proved. system generalizes the Shigesada–Kawasaki–Teramoto population model an arbitrary number of species. diffusion matrix neither symmetric nor positive definite, but possesses formal gradient-flow or entropy structure. No growth on source terms are imposed. It shown that any solution coincides strong same initial data, as long exists. proof...
Quality of Service (QoS) prediction is a hot topic in services computing, which has been extensively investigated the past decade. Many approaches have proposed to predict unknown QoS values Web according their historical invocation records. These methods usually analyze each individual data as basic unit while ignoring intrinsic characteristics these time-series data. In an extremely dynamic environment, how capture and time-varying from finer-grained perspective becomes essential issue...
Acute lung injury (ALI) is an inflammatory disorder. Semen Cassiae has potent anti-inflammatory activities. The aim of our study was to investigate whether plays a protective effect on lipopolysaccharide (LPS)-induced ALI and, if so, elucidate its potential mechanism. Male Sprague–Dawley rat lungs were injured by intratracheal instillation LPS. Rats treated with or vehicle 3 h after LPS challenge. Samples harvested 24 post-LPS administration. We also investigated the effects stimulation in...
A retrospective cohort study was conducted to analyze the application value of Python programming in general education and comprehensive quality improvement medical students.A analysis made on classroom students from September 2020 July 2021 by undergraduate majoring anesthesia grade 2020, imaging 2019, clinical laboratory sciences our university. hundred who used class were divided into group control group. The teaching satisfaction, knowledge lifelong learning ability, skills, service...
In order to prevent campus theft incidents, intelligent security was put forward solve problems. At present, most systems in are mainly video surveillance. cases, some measures just as later view tool. of the above problems, is selected main research object. On basis in-depth analysis Internet things technology, this paper makes innovative and exploratory on RFID tag chip GSM communication keyboard input LCD display. The results show that new design can effectively safety accidents. Based...
With the development of Radio frequency identification (RFID) technologies, theoretical study on protocol's design promotes increasing reality applications this product. The protocol designers attach significance to untraceability analysis key-update RFID authentication protocols. This paper analyzes two protocols in terms forward and backward untraceability, which are necessary conditions for ownership transfer introduces impersonation attacks as well desynchronization presents enhanced...
Strong compactness results for families of functions in seminormed nonnegative cones the spirit Aubin-Lions-Dubinski\u{\i} lemma are proven, refining some recent literature. The first theorem sharpens slightly a result Dubinski\u{\i} (1965) cones. second applies to piecewise constant time and Dreher J\"ungel (2012) Chen Liu (2012). An application is given, which useful study porous-medium or fast-diffusion type equations.
The radio frequency identification (RFID) protocols are vulnerable to various attacks from an active or passive adversary.We shed light upon some existing security flaws in these delegation protocols.It is useful mitigate many weaknesses such promote the acceptance of RFID tags.We propose that a scalable protocol will be against traceability with stateful variant so it provides claimed requirements.Compared previous schemes, we emphasize three critical distinctions our protocol.First, reader...
Dynamic ID-based authentication schemes based on password and smart card are widely used to provide two-factor user anonymity.However, these have one or the other possible security weaknesses.In this paper, we analyze of Li et al. Wang published in recent years.After analysis, demonstrates that al.'s vulnerable off-line guessing attack if user's identity is compromised, scheme cannot withstand impersonation linkability attack, resist attacker steals a card, fail forward security.Our result...