- Advanced Steganography and Watermarking Techniques
- Digital Media Forensic Detection
- Quantum Information and Cryptography
- Quantum Computing Algorithms and Architecture
- Quantum and electron transport phenomena
- Quantum Mechanics and Applications
- Chaos-based Image/Signal Encryption
- Traumatic Brain Injury and Neurovascular Disturbances
- User Authentication and Security Systems
- Digital Rights Management and Security
- Respiratory Support and Mechanisms
- IoT and Edge/Fog Computing
- Cerebrospinal fluid and hydrocephalus
- Cerebral Palsy and Movement Disorders
- Simulation and Modeling Applications
- Heart Failure Treatment and Management
- Cognitive Computing and Networks
- 3D Surveying and Cultural Heritage
- Optical measurement and interference techniques
- RNA regulation and disease
- Privacy-Preserving Technologies in Data
- Acute Myocardial Infarction Research
- Cardiovascular Function and Risk Factors
- Context-Aware Activity Recognition Systems
- Industrial Vision Systems and Defect Detection
Sir Run Run Shaw Hospital
2025
Zhejiang University
2025
Beijing Hospital of Traditional Chinese Medicine
2024
Capital Medical University
2024
Second Affiliated Hospital of Nanjing Medical University
2021-2023
Xinyang Normal University
2023
Changchun University
2021
Zhejiang University of Science and Technology
2015-2016
China National Petroleum Corporation (China)
2012-2013
Jingchu University of Technology
2009
Prion disease is a rapidly progressing and invariably fatal neurodegenerative disorder with no approved treatment. The caused by the self-templated misfolding of prion protein (PrP) into toxic species, ultimately leading to neurodegeneration death. We evaluated novel epigenetic regulation approach using Zinc Finger Repressors (ZFRs) ablate PrP expression at transcriptional level. When delivered adeno-associated virus (AAV), ZFRs potently specifically reduced mRNA >95% in vitro near...
A simple reversible watermarking scheme for 2D vector maps is presented in this paper. When embedding data, the proposed applies an integer transform a pair of coordinate values to embed 1-bit watermark and makes sum unchanged. extracting embedded gets bit recovers original data by using invariant value parities difference value. The not are shifted. In decoder, marked pairs can be determined from unmarked ranges that their differences fall into. Hence, does need compress location map....
We present a generic unraveling scheme for detailed-balance-preserved quantum master equation applicable stochastic point processes in mesoscopic transport. It enables us to investigate continuous measurement of qubit on the level single trajectories, where essential correlations between inherent dynamics and detector current fluctuations are revealed. Based this scheme, feedback control charge is implemented achieve desired pure state presence detailed-balance condition. With sufficient...
Cerebral palsy is a group of persistent central movement and postural developmental disorders, restricted activity syndromes. This syndrome caused by non-progressive brain damage to the developing fetus or infants. Cer... | Find, read cite all research you need on Tech Science Press
Lung rehabilitation is safe and feasible, it has positive benefits in weaning the machine as soon possible, shortening time of hospitalization improving prognosis children with mechanical ventilation. However, at present, traditional medical concept deep-rooted, doctors' understanding early inadequate. It necessary to make in-depth exploration relevant guidelines expert consensus formulate standardized diagnosis treatment procedures standards for mechanically ventilated children. In paper, a...
We present a reversible watermarking algorithm for 2D vector maps using difference expansion and companding technique in this paper. To efficiently compress the location map that records expanded positions non-expanded positions, we introduce technique. By technique, larger values of differences become to smaller ones. Thus, map, number 1s is much more than 0s. Then, compressed into shorter bit-stream by arithmetic encoder. Accordingly, consumes less embedding space capacity increased....
Abstract The line structured light vision has better robustness and higher measurement accuracy as an active method, which is widely used in the of component size shape tolerance. calibration a key technology measurement. not only affected by algorithm, but parameters hardware equipment also have important impact on final accuracy. Based analysis this paper conducts theoretical selection main parameters, uses orthogonal experiment method to determine relationship between In experiments,...
Digital image passive blind forensic techniques aim to examine the authenticity and sources of digital images without relying on any pre-extraction or pre-embedded information. While is tampered, in order eliminate visual edge distortion caused by splicing, some post-processing operations are usually employed tampering traces. Among them, blurring operation one most commonly used approaches. In this paper, a novel method which can detect manual tampered proposed. Firstly, model high...
We propose to continuously monitor a charge qubit by utilizing T-shaped double quantum dot detector, in which the and are arranged such unique way that detector turns out be particularly susceptible states of qubit. Special attention is paid regime where acquisition information backaction upon measured system exhibit nontrivial correlation. The intrinsic dynamics gives rise dynamical blockade tunneling events through resulting super-Poissonian noise. However, pronounced enhancement...
In the context of a charge qubit under continuous monitoring by single electron transistor, we propose an unraveling generalized quantum Markovian master equation into ensemble individual trajectories for stochastic point process. A suboptimal feedback algorism is implemented to protect desired pure state. Coherent oscillations could be maintained in principle arbitrarily long time case sufficient strength. The effectiveness control also reflected detector's noise spectrum. signal-to-noise...
In music information retrieval (MIR), deep learning (DL) can use its powerful feature extraction ability to extract more effective features from data.The traditional MIR method can't effectively deal with the diversity, dynamics, heterogeneity and real-time characteristics of Internet Things (IoT) data.This article proposes a DL-based IoT recommendation system, aiming at providing accurate efficient computer-aided services.In order evaluate performance system based on different algorithms,...
Craniocerebral injury is a common surgical emergency in children. It has the highest mortality and disability rate, second incidence rate. Accidental injuries due to falls, sports traffic accidents are main causes of craniocerebral injury. In recent years, rate children continued rise, which stretches out limited medical resources. Moreover, it very difficult deal with complex trauma hospital county town, not rich resources because lack experienced doctors nurses. addition, some mild go...
The day surgery management mode is mainly decentralized management, with clinical departments as the unit, and reference to experience of inter project operation in benchmark hospitals, empirical implemented. With development surgery, extensive has been unable meet needs current situation. At first, paper carefully analyzes existing problems process ward Children’s Hospital Nanjing Medical University. And then, concerns doctors, nurses, anesthesiologists other hospital staff ward, children...