Xiuqing Chen

ORCID: 0000-0003-0430-7264
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Mathematical Modeling in Engineering
  • Advanced Authentication Protocols Security
  • RFID technology advancements
  • User Authentication and Security Systems
  • Nonlinear Partial Differential Equations
  • Stability and Controllability of Differential Equations
  • Mathematical Biology Tumor Growth
  • Differential Equations and Numerical Methods
  • Navier-Stokes equation solutions
  • Mathematical and Theoretical Epidemiology and Ecology Models
  • Advanced Sensor and Control Systems
  • Geometric Analysis and Curvature Flows
  • Numerical methods in inverse problems
  • Gas Dynamics and Kinetic Theory
  • Advanced Mathematical Physics Problems
  • Software System Performance and Reliability
  • Advanced Algorithms and Applications
  • Anomaly Detection Techniques and Applications
  • Network Security and Intrusion Detection
  • Geometry and complex manifolds
  • Pluripotent Stem Cells Research
  • ECG Monitoring and Analysis
  • Service-Oriented Architecture and Web Services
  • Time Series Analysis and Forecasting
  • Biometric Identification and Security

Guangzhou University
2023

Xuzhou Medical College
2015-2022

Wuhan University
2020-2022

Beijing University of Posts and Telecommunications
2007-2018

Zhejiang Hospital
2017

Hunan Railway Professional Technology College
2017

China University of Mining and Technology
2010-2016

Duke University
2012-2014

Kailuan General Hospital
2013

Central South University
2009

10.1007/s10440-013-9858-8 article EN Acta Applicandae Mathematicae 2013-11-21

In bacteria, glycogen plays important roles in carbon and energy storage. Its structure has recently been linked with bacterial environmental durability. Among the essential genes for metabolism, glgB-encoded branching enzyme GBE an role forming α-1,6-glycosidic points, determines unique patterns glycogen. Previously, evolutionary analysis of a small sets GBEs based on their N-terminal domain organization revealed that two types might exist: (1) Type 1 both N1 N2 (also known as CBM48)...

10.3389/fmicb.2018.03354 article EN cc-by Frontiers in Microbiology 2019-01-14

The uniqueness of bounded weak solutions to strongly coupled parabolic equations in a domain with no-flux boundary conditions is shown. include cross-diffusion and drift terms are self-consistently the Poisson equation. model class contains special cases Maxwell–Stefan for gas mixtures, generalized Shigesada–Kawasaki–Teramoto population dynamics, volume-filling models ion transport. proof based on combination $$H^{-1}$$ technique entropy method Gajewski.

10.1007/s00028-017-0420-4 article EN cc-by Journal of Evolution Equations 2017-11-30

The proliferation of physiological signals acquisition and monitoring system, has led to an explosion in data. Additionally, RFID systems, blockchain technologies, the fog computing mechanisms have significantly increased availability signal information through big data research. driver for development hybrid systems is continuing effort making health-care services more efficient sustainable. Implantable medical devices (IMD) are therapeutic that surgically implanted into patients' body...

10.1155/2020/2452683 article EN Journal of Healthcare Engineering 2020-01-01

The weak–strong uniqueness for renormalized solutions to reaction–cross-diffusion systems in a bounded domain with no-flux boundary conditions is proved. system generalizes the Shigesada–Kawasaki–Teramoto population model an arbitrary number of species. diffusion matrix neither symmetric nor positive definite, but possesses formal gradient-flow or entropy structure. No growth on source terms are imposed. It shown that any solution coincides strong same initial data, as long exists. proof...

10.1142/s0218202519500088 article EN Mathematical Models and Methods in Applied Sciences 2018-12-17

Quality of Service (QoS) prediction is a hot topic in services computing, which has been extensively investigated the past decade. Many approaches have proposed to predict unknown QoS values Web according their historical invocation records. These methods usually analyze each individual data as basic unit while ignoring intrinsic characteristics these time-series data. In an extremely dynamic environment, how capture and time-varying from finer-grained perspective becomes essential issue...

10.1109/icws49710.2020.00015 article EN 2020-10-01

Acute lung injury (ALI) is an inflammatory disorder. Semen Cassiae has potent anti-inflammatory activities. The aim of our study was to investigate whether plays a protective effect on lipopolysaccharide (LPS)-induced ALI and, if so, elucidate its potential mechanism. Male Sprague–Dawley rat lungs were injured by intratracheal instillation LPS. Rats treated with or vehicle 3 h after LPS challenge. Samples harvested 24 post-LPS administration. We also investigated the effects stimulation in...

10.1186/s12906-017-1747-7 article EN cc-by BMC Complementary and Alternative Medicine 2017-04-28

10.1016/j.aml.2012.06.012 article EN publisher-specific-oa Applied Mathematics Letters 2012-06-19

A retrospective cohort study was conducted to analyze the application value of Python programming in general education and comprehensive quality improvement medical students.A analysis made on classroom students from September 2020 July 2021 by undergraduate majoring anesthesia grade 2020, imaging 2019, clinical laboratory sciences our university. hundred who used class were divided into group control group. The teaching satisfaction, knowledge lifelong learning ability, skills, service...

10.1155/2022/4043992 article EN Journal of Healthcare Engineering 2022-04-21

In order to prevent campus theft incidents, intelligent security was put forward solve problems. At present, most systems in are mainly video surveillance. cases, some measures just as later view tool. of the above problems, is selected main research object. On basis in-depth analysis Internet things technology, this paper makes innovative and exploratory on RFID tag chip GSM communication keyboard input LCD display. The results show that new design can effectively safety accidents. Based...

10.1109/icris.2017.28 article EN 2017-10-01

With the development of Radio frequency identification (RFID) technologies, theoretical study on protocol's design promotes increasing reality applications this product. The protocol designers attach significance to untraceability analysis key-update RFID authentication protocols. This paper analyzes two protocols in terms forward and backward untraceability, which are necessary conditions for ownership transfer introduces impersonation attacks as well desynchronization presents enhanced...

10.1049/cje.2016.08.013 article EN Chinese Journal of Electronics 2016-09-01

Strong compactness results for families of functions in seminormed nonnegative cones the spirit Aubin-Lions-Dubinski\u{\i} lemma are proven, refining some recent literature. The first theorem sharpens slightly a result Dubinski\u{\i} (1965) cones. second applies to piecewise constant time and Dreher J\"ungel (2012) Chen Liu (2012). An application is given, which useful study porous-medium or fast-diffusion type equations.

10.48550/arxiv.1305.6235 preprint EN other-oa arXiv (Cornell University) 2013-01-01

The radio frequency identification (RFID) protocols are vulnerable to various attacks from an active or passive adversary.We shed light upon some existing security flaws in these delegation protocols.It is useful mitigate many weaknesses such promote the acceptance of RFID tags.We propose that a scalable protocol will be against traceability with stateful variant so it provides claimed requirements.Compared previous schemes, we emphasize three critical distinctions our protocol.First, reader...

10.12785/amis/080450 article EN Applied Mathematics & Information Sciences 2014-02-13

Dynamic ID-based authentication schemes based on password and smart card are widely used to provide two-factor user anonymity.However, these have one or the other possible security weaknesses.In this paper, we analyze of Li et al. Wang published in recent years.After analysis, demonstrates that al.'s vulnerable off-line guessing attack if user's identity is compromised, scheme cannot withstand impersonation linkability attack, resist attacker steals a card, fail forward security.Our result...

10.14257/ijsia.2015.9.1.37 article EN International Journal of Security and Its Applications 2015-01-31

10.1016/j.jmaa.2008.01.015 article EN Journal of Mathematical Analysis and Applications 2008-01-16
Coming Soon ...