- Advanced Radiotherapy Techniques
- Mobile Agent-Based Network Management
- Advanced Authentication Protocols Security
- Cloud Computing and Resource Management
- Neuroblastoma Research and Treatments
- IPv6, Mobility, Handover, Networks, Security
- Security and Verification in Computing
- Molecular Communication and Nanonetworks
- Pregnancy and Medication Impact
- Advanced Steganography and Watermarking Techniques
- Linguistics, Language Diversity, and Identity
- Microbial Fuel Cells and Bioremediation
- FOXO transcription factor regulation
- Access Control and Trust
- RFID technology advancements
- Opportunistic and Delay-Tolerant Networks
- Security in Wireless Sensor Networks
- Radiation Dose and Imaging
- Medical Imaging Techniques and Applications
- Petri Nets in System Modeling
- Real-Time Systems Scheduling
- Text Readability and Simplification
- Parallel Computing and Optimization Techniques
- Lung Cancer Diagnosis and Treatment
- Digital Media Forensic Detection
Henan Agricultural University
2024
Cornell University
2024
Weifang Medical University
2022-2024
Beijing Children’s Hospital
2023-2024
University of Washington
2023
Capital Medical University
2023
Chinese PLA General Hospital
2022
Chinese People's Liberation Army
2022
Heilongjiang University of Science and Technology
2017
Harbin University of Science and Technology
2017
To introduce an end-to-end automatic segmentation model for organs at risk (OARs) in thoracic CT images based on modified DenseNet, and reduce the workload of radiation oncologists.The computed tomography (CT) 36 lung cancer patients were included this study, which 27 patients' randomly selected as training set, 9 testing set. The validation set was generated by cross 6 from during each epoch autosegmentation task left right lungs, spinal cord, heart, trachea esophagus implemented, whole...
Abstract High‐risk neuroblastoma (HR‐NB) is an aggressive childhood cancer that responds poorly to currently available therapies and associated with only about a 50% 5‐year survival rate. MYCN amplification critical driver of these tumors, but so far there have not been any approved treatments effectively treat HR‐NB by targeting or its downstream effectors. Thus, the identification novel molecular targets therapeutic strategies children diagnosed represents urgent unmet medical need. Here,...
Incorporating uncertainty in data visualizations is critical for users to interpret and reliably draw informed conclusions from the underlying data. However, visualization creators conventionally convey information regarding using visual techniques (e.g., error bars), which disenfranchises screen-reader users, who may be blind or have low vision. In this preliminary exploration, we investigated ways users. Specifically, conducted semi-structured interviews, finding that these prefer obtain...
Nowadays, Radio Frequency Identification (RFID) technology has drawn great attention in industry and military such as the fields of automatic identification data collection. An RFID-based equipment management information system(REMIS) was proposed to aims keeping allocation under control, taking statistics strength inspecting security more efficiently, automatically intelligently. We designed a secure RFID application framework for system using digital certification, described components...
Many large-scale software systems have unprecedented complexity. The basic problem lies in how to construct a complex network topology models that can reflect the complexity of systems. Based on studying theory development and application status networks, rules based component system are proposed, formalized definition model is proposed value prospected. These provide positive theoretical inspiration reference for applying achievements next generation engineering.
Although the existing P2P trust models can provide effective resistance to false recommendation of a single node attack, they general lack means identification and prevention mechanisms collusion attack. In this paper we present conspiracy group detection model based on behaviour similarity. Both malicious success rate normal results show that effectively resist attack by set effectively.
Objective To investigate the feasibility of dose verification helical tomotherapy (HT) using PTW Seven29 2D-ARRAY with Octavius phantom.Methods The 12 patients HT plan were verified combining phantom.The detector array was guided and registered by MVCT imaging,and measured distributions on corresponding planes compared those calculated treatment planning system (TPS).Based several different Gamma criteria,the analysis method utilized to evaluate verification.Results According acceptance...
Objective To compare the differences between planning dose and actual of targets organs at risk (OAR) for head neck cancer patients with helical tomotherapy (HT).Methods 12 HT were enrolled in this study.Prior to each treatment fraction,an MVCT scan was performed.The images first fraction week since second chosen,and distributions recalculated on Planned Adaptive application HT,which fraction.Each single distribution corresponding CT image sent commercial software (MIM5.5),and deformable...
Social integrity deficiency has become the main obstacle and prominent bottleneck to construction of a harmonious society. Under this serious circumstance, paying attention problem finding solution an important issue we are faced with contemporarily. Former studies by some scholars have mainly centered on basis regime education conclusions been made. This paper, from perspective Multi-agent system, analyses behavioral mode social system describes process emergence micro level macro one....
Objective To investigate the feasibility of dose verification intensity modulated planning helical tomotherapy (HT) using three-dimensional semiconductor array (Delta4) and find a more time-consuming accurate method to validate delivery dose.Methods Delta4 detector was used verify HT plan distribution 10 patients.The precise setup guided registered by MVCT imaging.After implementation delivery,the measured distributions on corresponding planes were compared with those calculated treatment...
This paper aims to unite trusted computing techniques with PERSEUS security kernel, it introduces the definition of character, and puts forward kernel layer based on character. method can solve problem data protection, integrality control resource snippet protection by setting character entry points at sensitive position in kernel. Lastly, describes how upgrading sealing technology
Replication is a key technique to provide high dependability, fault tolerance, and desirable performance in distributed intrusion tolerant system. But existing replica control protocols cannot keep the dependability consistency of replicated data at same time, especially when some failure occurs. By virtue concept virtual partition, this paper presents novel, adaptive protocol, which can dynamically adapt changes underline communication topology presence failure, partition failures, so not...