- Advanced Photocatalysis Techniques
- Electrocatalysts for Energy Conversion
- Fuel Cells and Related Materials
- Metal-Organic Frameworks: Synthesis and Applications
- Catalytic C–H Functionalization Methods
- Cyclopropane Reaction Mechanisms
- Catalytic Alkyne Reactions
- Advanced oxidation water treatment
- Electrochemical Analysis and Applications
- Covalent Organic Framework Applications
- Catalytic Processes in Materials Science
- Cryptography and Data Security
- Reproductive System and Pregnancy
- Advanced battery technologies research
- Nanomaterials for catalytic reactions
- IL-33, ST2, and ILC Pathways
- Advanced Data and IoT Technologies
- Physical Unclonable Functions (PUFs) and Hardware Security
- Fractional Differential Equations Solutions
- Organ and Tissue Transplantation Research
- Security in Wireless Sensor Networks
- 2D Materials and Applications
- Cloud Data Security Solutions
- Magnetic Properties and Synthesis of Ferrites
- E-commerce and Technology Innovations
Northeastern University
2023-2024
Beijing University of Posts and Telecommunications
2017-2024
Tianjin Medical University
2022-2023
Zhengzhou University of Light Industry
2020-2023
Qingdao University of Science and Technology
2005-2023
Shenyang Pharmaceutical University
2021-2022
Heilongjiang University of Chinese Medicine
2021
Dongzhimen Hospital Affiliated to Beijing University of Chinese Medicine
2017-2018
Hangzhou Normal University
2012
Rubber Research Institute
2012
An effective, simple, low temperature and environmentally benign supercritical fluid (SCF) route is presented for preparing graphene-supported metal nanoparticles. With the assistance of carbon dioxide (SC CO2), ultrafine PtRu nanoparticles with an average size 2.87 nm were very uniformly distributed on surfaces functionalized graphene sheets (FGSs) by reduction a mixture H2PtCl6 RuCl3 precursors. The catalytic property as-prepared composites methanol oxidation was investigated cyclic...
In this article, certain Hermite–Jensen–Mercer type inequalitie s are proved via Caputo fractional derivatives. We established some new inequalities involving derivatives, such as inequalities, for differentiable mapping <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M1"><mml:mrow><mml:msup><mml:mrow><mml:mi>h</mml:mi></mml:mrow><mml:mrow><mml:mfenced open="(" close=")"...
A Ag(I)/PPh3-catalyzed chelation-controlled cycloisomerization of tryptamine-ynamide was developed to access the spiro[indole-3,4'-piperidine] scaffold in a racemic and diastereoselective manner. The products were achieved by chiron approach. Density functional theory (DFT) calculations indicated that strong non-covalent effects between substrate catalyst/ligand complex stabilized spiroindoleninium intermediate via cation-π-π interactions.
The combustion of fossil fuels as the main source energy supply for human social activities has caused a great impact on global environment.
Functionalization of MoS2was achieved by treatment in a strongly reducing sodium naphthalene solution. Dodecyl was grafted onto MoS2nanosheets using alkyl sulphates as electrophiles to obtain dodecylated MoS2without affecting the MoS2crystalline structure. Superior electrocatalytic properties are obtained for MoS2. The polarisation curve this nanomaterial remained constant even after 1000 consecutive cycles. This route provides new pathway covalent functionalization MoS2and might find...
Abstract Background Endometrial regenerative cells (ERCs) play an important role in attenuation of acute allograft rejection, while their effects are limited. IL-37, a newly discovered immunoregulatory cytokine the IL-1 family, can regulate both innate and adaptive immunity. Whether IL-37 overexpression enhance therapeutic ERCs inhibition cardiac rejection remains unknown will be explored this study. Methods C57BL/6 mice recipients receiving BALB/c mouse heterotopic heart allografts were...
With the growth of Industrial Internet, various types data show explosive growth. Data is being moved from cloud to edge for computing more frequently and becomes an important factor affecting deep application Internet platforms. However, security issue transmission sharing not addressed. Therefore, this paper proposes a scheme based on timed-release, multi-dimensional virtual permutation, proxy re-encryption(PRE), protect confidentiality during transmitter; symmetric cryptography employed...
With the development of Internet, there are more and security incidents in current industrial control network environment. These events often stored log, which play a significant role on early warning mining loophole. The diversity make anomaly detection become complicated. In research, few studies have been focused context information containing normal data as well abnormal. When contains abnormal pattern, will be higher reconstruction error causing false negative rate positive rate. order...
Data fusion always be used to solve the problem of target recognition in wireless sensor networks, and Dempster-Shafer inference have been proven one effective methods. However, high computation complexity D-S evidence combination usually prevent it low ability networks directly, especially may violate requirements for real-time processing synchronization networks. To increase speed a fast data algorithm based on matrix analysis is proposed this paper, which inherits idea theory. The holds...
Industrial internet security is a critical component of cyberspace safety. Furthermore, the encryption protocol security. Due to rapid development industrial and edge computing, increasingly more devices are outsourcing their data cloud servers save costs. Edge should have secure session key reduce communication costs share information. However, most generation storage completed by centralized third-party organization, which carries some risks. In this context, paper will propose lightweight...