Yadi Wang

ORCID: 0009-0005-2645-6764
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Radiotherapy Techniques
  • Mobile Agent-Based Network Management
  • Advanced Authentication Protocols Security
  • Cloud Computing and Resource Management
  • Neuroblastoma Research and Treatments
  • IPv6, Mobility, Handover, Networks, Security
  • Security and Verification in Computing
  • Molecular Communication and Nanonetworks
  • Pregnancy and Medication Impact
  • Advanced Steganography and Watermarking Techniques
  • Linguistics, Language Diversity, and Identity
  • Microbial Fuel Cells and Bioremediation
  • FOXO transcription factor regulation
  • Access Control and Trust
  • RFID technology advancements
  • Opportunistic and Delay-Tolerant Networks
  • Security in Wireless Sensor Networks
  • Radiation Dose and Imaging
  • Medical Imaging Techniques and Applications
  • Petri Nets in System Modeling
  • Real-Time Systems Scheduling
  • Text Readability and Simplification
  • Parallel Computing and Optimization Techniques
  • Lung Cancer Diagnosis and Treatment
  • Digital Media Forensic Detection

Henan Agricultural University
2024

Cornell University
2024

Weifang Medical University
2022-2024

Beijing Children’s Hospital
2023-2024

University of Washington
2023

Capital Medical University
2023

Chinese PLA General Hospital
2022

Chinese People's Liberation Army
2022

Heilongjiang University of Science and Technology
2017

Harbin University of Science and Technology
2017

To introduce an end-to-end automatic segmentation model for organs at risk (OARs) in thoracic CT images based on modified DenseNet, and reduce the workload of radiation oncologists.The computed tomography (CT) 36 lung cancer patients were included this study, which 27 patients' randomly selected as training set, 9 testing set. The validation set was generated by cross 6 from during each epoch autosegmentation task left right lungs, spinal cord, heart, trachea esophagus implemented, whole...

10.3389/fonc.2022.861857 article EN cc-by Frontiers in Oncology 2022-03-15

Abstract High‐risk neuroblastoma (HR‐NB) is an aggressive childhood cancer that responds poorly to currently available therapies and associated with only about a 50% 5‐year survival rate. MYCN amplification critical driver of these tumors, but so far there have not been any approved treatments effectively treat HR‐NB by targeting or its downstream effectors. Thus, the identification novel molecular targets therapeutic strategies children diagnosed represents urgent unmet medical need. Here,...

10.1111/cas.15815 article EN cc-by-nc-nd Cancer Science 2023-04-24

Incorporating uncertainty in data visualizations is critical for users to interpret and reliably draw informed conclusions from the underlying data. However, visualization creators conventionally convey information regarding using visual techniques (e.g., error bars), which disenfranchises screen-reader users, who may be blind or have low vision. In this preliminary exploration, we investigated ways users. Specifically, conducted semi-structured interviews, finding that these prefer obtain...

10.1145/3597638.3614502 article EN 2023-10-19

Nowadays, Radio Frequency Identification (RFID) technology has drawn great attention in industry and military such as the fields of automatic identification data collection. An RFID-based equipment management information system(REMIS) was proposed to aims keeping allocation under control, taking statistics strength inspecting security more efficiently, automatically intelligently. We designed a secure RFID application framework for system using digital certification, described components...

10.1109/wicom.2008.705 article EN 2008-10-01

Many large-scale software systems have unprecedented complexity. The basic problem lies in how to construct a complex network topology models that can reflect the complexity of systems. Based on studying theory development and application status networks, rules based component system are proposed, formalized definition model is proposed value prospected. These provide positive theoretical inspiration reference for applying achievements next generation engineering.

10.12785/amis/070346 article EN Applied Mathematics & Information Sciences 2013-04-05

Although the existing P2P trust models can provide effective resistance to false recommendation of a single node attack, they general lack means identification and prevention mechanisms collusion attack. In this paper we present conspiracy group detection model based on behaviour similarity. Both malicious success rate normal results show that effectively resist attack by set effectively.

10.1049/cp.2013.0058 article EN 2013-01-01

Objective To investigate the feasibility of dose verification helical tomotherapy (HT) using PTW Seven29 2D-ARRAY with Octavius phantom.Methods The 12 patients HT plan were verified combining phantom.The detector array was guided and registered by MVCT imaging,and measured distributions on corresponding planes compared those calculated treatment planning system (TPS).Based several different Gamma criteria,the analysis method utilized to evaluate verification.Results According acceptance...

10.3760/cma.j.issn.1004-4221.2014.05.015 article EN Zhonghua fangshe zhongliuxue zazhi 2014-09-15

Objective To compare the differences between planning dose and actual of targets organs at risk (OAR) for head neck cancer patients with helical tomotherapy (HT).Methods 12 HT were enrolled in this study.Prior to each treatment fraction,an MVCT scan was performed.The images first fraction week since second chosen,and distributions recalculated on Planned Adaptive application HT,which fraction.Each single distribution corresponding CT image sent commercial software (MIM5.5),and deformable...

10.3760/cma.j.issn.1004-4221.2014.06.016 article EN Zhonghua fangshe zhongliuxue zazhi 2014-11-15

Social integrity deficiency has become the main obstacle and prominent bottleneck to construction of a harmonious society. Under this serious circumstance, paying attention problem finding solution an important issue we are faced with contemporarily. Former studies by some scholars have mainly centered on basis regime education conclusions been made. This paper, from perspective Multi-agent system, analyses behavioral mode social system describes process emergence micro level macro one....

10.11591/telkomnika.v11i6.2645 article EN TELKOMNIKA Indonesian Journal of Electrical Engineering 2013-05-22

Objective To investigate the feasibility of dose verification intensity modulated planning helical tomotherapy (HT) using three-dimensional semiconductor array (Delta4) and find a more time-consuming accurate method to validate delivery dose.Methods Delta4 detector was used verify HT plan distribution 10 patients.The precise setup guided registered by MVCT imaging.After implementation delivery,the measured distributions on corresponding planes were compared with those calculated treatment...

10.3760/cma.j.issn.1004-4221.2013.04.013 article EN Zhonghua fangshe zhongliuxue zazhi 2013-07-15

10.1007/s11859-010-0309-3 article EN Wuhan University Journal of Natural Sciences 2010-05-12

This paper aims to unite trusted computing techniques with PERSEUS security kernel, it introduces the definition of character, and puts forward kernel layer based on character. method can solve problem data protection, integrality control resource snippet protection by setting character entry points at sensitive position in kernel. Lastly, describes how upgrading sealing technology

10.1109/icinis.2008.51 article EN 2008-11-01

Replication is a key technique to provide high dependability, fault tolerance, and desirable performance in distributed intrusion tolerant system. But existing replica control protocols cannot keep the dependability consistency of replicated data at same time, especially when some failure occurs. By virtue concept virtual partition, this paper presents novel, adaptive protocol, which can dynamically adapt changes underline communication topology presence failure, partition failures, so not...

10.1109/icct.2006.341720 article EN International Conference on Communication Technology 2006-11-01
Coming Soon ...