- Spam and Phishing Detection
- Misinformation and Its Impacts
- Fermentation and Sensory Analysis
- Hydrocarbon exploration and reservoir analysis
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Advanced Chemical Sensor Technologies
- Horticultural and Viticultural Research
- Plant Gene Expression Analysis
- Sentiment Analysis and Opinion Mining
- Physical Unclonable Functions (PUFs) and Hardware Security
- Cloud Computing and Resource Management
- Water Treatment and Disinfection
- Caching and Content Delivery
- Seismic Imaging and Inversion Techniques
- Face and Expression Recognition
- Fungal and yeast genetics research
- Ideological and Political Education
- Ginseng Biological Effects and Applications
- Optical Systems and Laser Technology
- Face recognition and analysis
- Wireless Signal Modulation Classification
- Internet Traffic Analysis and Secure E-voting
- Natural product bioactivities and synthesis
- Sparse and Compressive Sensing Techniques
Zhejiang Gongshang University
2022-2024
Xi'an University of Architecture and Technology
2024
Army Medical University
2023
Ministry of Agriculture and Rural Affairs
2023
Beijing University of Agriculture
2023
Beijing Technology and Business University
2023
Southwest Hospital
2023
Zhejiang University
2023
Air Force Medical University
2023
Shantou University
2021
In this study Illumina MiSeq was performed to investigate microbial diversity in soil, leaves, grape, grape juice and wine. A total of 1,043,102 fungal Internal Transcribed Spacer (ITS) reads 2,422,188 high quality bacterial 16S rDNA sequences were used for taxonomic classification, revealed five eight phyla. At the genus level, dominant fungi Ascomycota, Sordariales, Tetracladium Geomyces Aureobasidium Pleosporaceae grapes juice. The bacteria Kaistobacter, Arthrobacter, Skermanella...
Phishing attacks have always been a security issue that has attracted great attention in the cyber community. Recently, famous pre-trained models is being used as an anti-phishing solution. However, existing studies either simply transfer on text to phishing detection task, or pre-train using only extremely small samples. In this paper, we propose PhishBERT, veritable pretrained deep transformer network model for URL detection. Using tailor pre-training objective, PhishBERT obtained general...
Phishing poses a significant threat to the financial and privacy security of internet users often serves as starting point for cyberattacks. Many machine-learning-based methods detecting phishing websites rely on URL analysis, offering simplicity efficiency. However, these approaches are not always effective due following reasons: (1) highly concealed may employ tactics such masquerading addresses deceive machine learning models, (2) attackers frequently change their website URLs evade...
Panax notoginseng (Burk) F. H. Chen is a traditional Chinese medicinal and edible plant. However, flower (PNF) rarely used. Therefore, the purpose of this study was to explore main saponins anti-inflammatory bioactivity PNF (PNFS). We explored regulation cyclooxygenase 2 (COX-2), key mediator inflammatory pathways, in human keratinocyte cells treated with PNFS. A cell model UVB-irradiation-induced inflammation established determine influence PNFS on factors their relationship LL-37...
Introduction Sea buckthorn ( Hippophae rhamnoides ) seed oil is rich in unsaturated fatty acids, and thus susceptible to oxidation rancidity. Microencapsulation technology allows the effective protection of active substances, thereby prolonging deterioration time shelf life. Methods In this study, H. microcapsules were prepared using a spray-drying method, microencapsulation parameters optimized. The morphological characteristics, structural parameters, stability determined scanning electron...
The microbial diversity of soil, grape leaves and fruits from three wine-growing areas in Xinjiang, China were analysed using high-throughput sequencing. Results show that five fungal phyla 237 genera, as well eight bacterial 314 genera detected 27 samples. For both fungi bacteria, the was most complex followed by fruit. In soil samples, Ascomycota, Sordariales, Tetracladium Geomyces dominant genus, while Arthrobacter, Kaistobacter Skermanella genus. With regard fruit, Aureobasidium,...
Network Function Virtualization (NFV) enables flexible deployment of middleboxes as Virtual Machines (VMs) running on general hardware. Different types have the potential to either increase or decrease volume processed traffic. In this paper, we investigate traffic changing effects middleboxes, and study efficient NFV in Software-Defined Networks (SDNs). To begin with, formulate Traffic-Aware Middlebox Placement (TAMP) problem a graph optimization problem, show that it is NP-hard when there...
The property of fault sealing is a critical controlling factor for hydrocarbon transportation. To date, the complex system in Lishui West Sag still not clear, meaning it essential to study regional transportation and reservoir formation. In this study, we use an integrated method quantitatively analyze characterize several important index parameters that affect faults based on logs seismic data. We calculated shale smear (SSF), gouge ratio (SGR), clay potential (CSP) lateral main covered...
Ti6Al4V is a widely used orthopedic implant material in clinics. Due to its poor antibacterial properties, surface modification required prevent peri-implantation infection. However, chemical linkers for have generally been reported detrimental effects on cell growth. In this work, by optimizing parameters related electrodeposition, composite structural coating with graphene oxide (GO) compact films the inner layer and 35 nm diameter strontium (Sr) nanoparticles outer was constructed of...
Weathering crust reservoirs have obvious vertical zonation, which is the focus of weathering reservoir research, but there a lack quantitative characterization indexes. To achieve granite and provide basis for oil exploration buried hill reservoir, in this paper, zonation quantitatively divided by testing analyzing uniaxial compressive strength (UCS), magnetic susceptibility (MS), permeability, chemical index alteration (CIA) Mesozoic coastal area eastern Fujian. The results show that can be...
In the past few years, with continuous breakthrough of technology in various fields, artificial intelligence has been considered as a revolutionary technology. One most important and useful applications is face detection. The outbreak COVID-19 promoted development noncontact identity authentication system. Face detection also one key techniques this kind However, current real-time computationally expensive which hinders application recognition. To address issue, we propose verification...
Adversarial attacks induce misclassification by introducing subtle perturbations. Recently, diffusion models are applied to the image classifiers improve adversarial robustness through training or purifying noise. However, diffusion-based often encounters convergence challenges and high computational expenses. Additionally, purification inevitably causes data shift is deemed susceptible stronger adaptive attacks. To tackle these issues, we propose Truth Maximization Diffusion Classifier...
Numerous reservoirs encounter challenges related to taste and odor issues, often attributed odorous compounds such as geosmin (GSM) 2-methylisoborneol (2-MIB). In this study, two large located in northern southern China were investigated. The Jinpen (JP) reservoir had 45.99% Actinomycetes 14.82% Cyanobacteria, while the Xikeng (XK) contained 37.55% 48.27% Cyanobacteria. Most of 2-MIB produced surface layers summer originated from most winter bottom water Actinomycetes. Mic gene abundance XK...
In recent years, with the exploration and development of granite buried-hill oil gas reservoirs, petrophysics research has played an important role in study reservoir characteristics fluid identification. Through analysis relationship between fluid-bearing petrophysical parameters reservoir, seismic response changes caused by can be determined. Mesozoic granites coastal area Fujian Province eastern China were investigated as object this project. The mineral composition, density, porosity,...
In order to evaluate the cyberspace security of smart city, a new evaluation model city is proposed, which based on big data and classified protection technology.The key performance indicator analysis algorithm provided quantify so that effective information can be extracted from large amount data, situation evaluated.