- Cloud Data Security Solutions
- Privacy-Preserving Technologies in Data
- Higher Education and Teaching Methods
- Blockchain Technology Applications and Security
- IoT and Edge/Fog Computing
- Software Engineering Research
- Artificial Intelligence in Healthcare and Education
- Advanced Decision-Making Techniques
- Cloud Computing and Resource Management
- Software Engineering Techniques and Practices
- Access Control and Trust
- Education and Work Dynamics
- Neural Networks and Applications
- Educational Technology and Pedagogy
- Artificial Intelligence in Healthcare
- Big Data Technologies and Applications
- Diabetes Management and Research
- Grey System Theory Applications
- Technology Assessment and Management
- Ginseng Biological Effects and Applications
- Software Reliability and Analysis Research
- Immune Cell Function and Interaction
- Pharmacological Effects of Natural Compounds
- Sports, Gender, and Society
- Service-Oriented Architecture and Web Services
Yunnan University of Finance And Economics
2016-2025
Beijing Language and Culture University
2025
Yunnan University
2009-2024
Duke University
2023-2024
Suning (China)
2024
China Tobacco
2024
The First Hospital of Changsha
2023
Xiamen University
2021-2023
Guangdong University of Petrochemical Technology
2022-2023
China Pharmaceutical University
2023
In the trend of continuously advancing urban intelligent transport construction, traditional traffic signal control (TSC) struggles to make effective decisions with complex conditions. Although multi-agent deep reinforcement learning (MARL) shows promise in optimizing flow, most existing studies ignore relationships between lights and fail communicate neighbors effectively. Moreover, deterministic strategies generated by Q-learning-based methods struggle be extended large-scale road...
Edge computing is booming as a promising paradigm to extend service provisioning from the centralized cloud network edge. Benefit development of serverless computing, an edge server can be configured carrier limited functions, in way deploying Docker runtime and Kubernetes engine. Meanwhile, application generally takes form directed acyclic graphs (DAGs), where vertices represent dependent functions edges data traffic. The status quo minimizing completion time (a.k.a. makespan) motivates...
Weaning stress decreases the growth performance of piglets and is one main concerns pig industries. Traditional Chinese herbal medicines have been used to reduce adverse effects weaning as both nutritional supplements antibiotic substitutes. This study aimed evaluate a mixture (Kangtaile, which contained Paeonia lactiflora, licorice, dandelion, tea polyphenols) on performances, immune response, antioxidant capacity, intestinal microbiota weaned pigs. A total 400 pigs [Duroc × (Landrace...
Purpose The purpose of this paper is to explore the longitudinal influence gender, age, education level, organizational tenure and emotional intelligence on three dimensions knowledge hiding over time. Design/methodology/approach A study using two-wave data sets 390 employees in Chinese enterprises was conducted build fixed, continuous interacting models for investigating effects individual differences processes Findings This research uncovered changing relationships knowledge-hiding...
In mobile edge computing (MEC) systems, users (MUs) are capable of allocating local resources (CPU frequency and transmission power) offloading tasks to servers in the vicinity order enhance their computation capabilities reduce back-and-forth over backhaul link. Nevertheless, environment makes it hard draw resource allocation decisions under dynamical wireless channel state users' locations. real life, social relationship is also provably a significant factor affecting integral performance...
Compared with incremental innovation, breakthrough innovation is essential to sustaining competitive advantage, but has the characteristics of high standards and strict requirements. As main body foundation enterprises, attitude behavior employees play a vital role in enterprise innovation. Based on positive organizational theory knowledge management theory, purpose this paper investigate relationship between psychological capital we also integrate tacit sharing task interdependence into...
Healthcare data is growing rapidly and sharing becoming increasingly important among hospitals. However, traditional methods are prone to leakage threaten patient privacy. To ensure security realize access control, combining blockchain technology, attribute-based encryption ciphertext policy (CP-ABE) AES symmetric algorithm, this paper proposes a hierarchical algorithm based on master-sidechain (MSC-CP-ABE) collaborative control model with on-chain off-chain (AC-CSS). The encrypts...
Background: According to Vygotsky’s sociocultural theory, private speech functions both as a tool for thought regulation and transitional form between outer inner speech. However, its role in adult second language (L2) learning—and the neural mechanisms supporting it—remains insufficiently understood. This study thus examined whether facilitates L2 oral production investigated underlying mechanisms, including extent which resembles regulatory function nature of Methods: In Experiment 1,...
As an emerging computing mode, urban is mainly used to integrate, analyze and reuse resources by using perceptual computing, data mining intelligent extraction eliminate the phenomenon of islands provide wisdom for people make decisions. But in era big data, security privacy leakage users has become a major obstacle computing. Taking medical as example, this paper analyzed risk collection, transmission, storage, use sharing established indicator system with 4 primary indicators 35 secondary...
Graded diagnosis and treatment, referral, expert consultations between medical institutions all require cross domain access to patient information support doctors' treatment decisions, leading an increase in among various within the consortium. However, is sensitive private, it essential control reduce risk of leakage. Access a continuous long-term process, first requires verification legitimacy user identities, while utilizing policies for selection management. After verifying identity...
The safety of milk and dairy products has always been one the focuses consumers, food industry regulatory agencies. purpose this study was to gain insight into knowledge, attitudes behavior plant workers. A cross-sectional survey performed between May August 2015 in three plants Beijing, northern China. total 194 workers were interviewed collect information on self-reported behavior. showed a sufficient level knowledge (mean score 34 scale from 0-58), perfect 17 0-18), 38 8-40). Only 39%...
Objective: Cancer-associated fibroblasts (CAFs) was associated with tumor progression in the microenvironment (TME). However, their immunosuppressive roles protecting cancer cells from attack by cytotoxic T lymphocytes (CTLs) are not fully clear. In this study, we investigated whether and how CAFs regulate tumor-infiltrating as well role immunosuppression. Methods: Eighty-three cases of ovarian 10 controls were analyzed for CD8+ gene array immunohistochemistry. We evaluated Presenilin 1...
Importance Distress is common among patients with cancer, and evidence of disparities associated distress has been mixed. Head neck cancer (HNC) one the most emotionally distressing cancers also a highly disparate disease. However, it unknown whether there are patient-reported in HNC. Objective To examine racial sociodemographic factors clinically meaningful cohort Design, Setting, Participants This retrospective study analyzed data from single tertiary institution at National Cancer...
Risk can conduce to failure of software project, and make a loss for the enterprise. It is focus topic engineering researchers. Developer turnover risk great at process yet, few scholars pay attention it. We use information entropy measure effectively uniformity each subsystem. In this paper, we provided quantitative model based on developer project. The more uniformly developers influence smaller is. Otherwise, core will huge fluctuation not only have analyzed rationality, but case. And...
As the early design decision-making structure, a software architecture plays key role in final product quality and whole project. In development process, an effective evaluation of trustworthiness can help making scientific reasonable decisions on architecture, which are necessary for construction highly trustworthy software. consideration lacking measurement studies this paper provides one attribute model architecture. Based model, proposes to use Principle Maximum Entropy (POME) Grey...