- Advanced X-ray and CT Imaging
- Medical Imaging Techniques and Applications
- Medical Image Segmentation Techniques
- Radiation Dose and Imaging
- Medical Research and Treatments
- Advanced Algorithms and Applications
- GaN-based semiconductor devices and materials
- Simulation and Modeling Applications
- Radiomics and Machine Learning in Medical Imaging
- Fetal and Pediatric Neurological Disorders
- Advanced Sensor and Control Systems
- Image Processing Techniques and Applications
- Advanced Manufacturing and Logistics Optimization
- High-Voltage Power Transmission Systems
- Advanced Computational Techniques and Applications
- Network Security and Intrusion Detection
- Data Mining Algorithms and Applications
- Blockchain Technology Applications and Security
- Advanced Image Processing Techniques
- Advanced Malware Detection Techniques
- Cancer Research and Treatments
- Smart Grid and Power Systems
- Scheduling and Optimization Algorithms
- Rough Sets and Fuzzy Logic
- Advanced Steganography and Watermarking Techniques
North University of China
2016-2025
State Power Investment Corporation (China)
2024-2025
South China University of Technology
2009-2025
Wuhan Donghu University
2025
Wuhan University
2007-2025
Beijing Jiaotong University
2005-2024
Minzu University of China
2024
State Grid Corporation of China (China)
2024
Fudan University
2024
Henan University
2024
Blockchain technology has received great attention in recent years. However, the data volume of blockchain grows continuously due to features that cannot be deleted and can only added. Currently, total size Bitcoin ledger reached 200GB. Its high demand for storage space bandwidth synchronize with network prevents many nodes from joining network.This is not conducive expansion this decentralized network, but also becomes bottleneck development technology. This paper proposes an IPFS-based...
Blockchain technology has the characteristics of decentralization, security and non-modifiable. The consensus algorithm is core blockchain framework, which solves problem mutual trust among nodes in distributed network. Selecting appropriate or not directly affects performance blockchain. However, existing private platform lacks theory data support for analysis algorithm. This paper proposes a method to evaluate platforms Ethereum Hyperledger Fabric. Through quantitative latency throughput,...
Tactile sensors with multimode sensing ability are cornerstones of artificial skin for applications in humanoid robotics and smart prosthetics. However, the intuitive interference-free reading multiple tactile signals without involving complex algorithms calculations remains a challenge. Herein pressure–temperature bimodal sensor any interference is demonstrated by combining fundamentally different mechanisms optics electronics, enabling simultaneous independent pressure temperature...
Segmentation of fetal left ventricle (LV) in echocardiographic sequences is important for further quantitative analysis cardiac function. However, image gross inhomogeneities and random movements make the segmentation a challenging problem. In this paper, dynamic convolutional neural networks (CNN) based on multiscale information fine-tuning proposed LV segmentation. The CNN pretrained by amount labeled training data. segmentation, first frame each sequence delineated manually. fine-tuned...
There are several approaches that can be used for the pre-treatment identification of malnutrition in oncology populations including Patient-Generated Subjective Global Assessment (PG-SGA), 2015 consensus statement by European Society Clinical Nutrition and Metabolism (ESPEN 2015) Leadership Initiative on Malnutrition (GLIM).
The aim of the present study was to examine whether hypoxia preconditioning could improve therapeutic effects adipose derived mesenchymal stem cells (AMSCs) for diabetes induced erectile dysfunction (DED). AMSCs were pretreated with normoxia (20% O2, N-AMSCs) or sub-lethal (1% H-AMSCs). exposure up-regulated expression several angiogenesis and neuroprotection related cytokines in AMSCs, including vascular endothelial growth factor (VEGF) its receptor FIK-1, angiotensin (Ang-1), basic...
The Internet of Things (IoT) is widely applied in modern human life, e.g., smart home and intelligent transportation. However, it vulnerable to malicious attacks, the current existing security mechanisms cannot completely protect IoT. As a technology, intrusion detection can defend IoT devices from most attacks. unfortunately traditional models have defects terms time efficiency efficiency. Therefore, this paper, we propose an improved linear discriminant analysis (LDA)-based extreme...
In the Internet of Things environment, secure transmission digital images has attracted much attention. To improve confidentiality, we propose an image cryptosystem adopting a quantum chaotic map and certain security-enhanced mechanisms. Firstly, use good random characteristics sequences to enhance security performance. Then, introduce plaintext correlation mechanism diffusion-permutation-diffusion structure in cryptosystem. Finally, verify on common communication platform. The theoretical...
Abstract We recently identified CD46 as a novel prostate cancer cell surface antigen that shows lineage independent expression in both adenocarcinoma and small neuroendocrine subtypes of metastatic castration resistant (mCRPC), discovered an internalizing human monoclonal antibody YS5 binds to tumor selective epitope, developed microtubule inhibitor-based drug conjugate is multi-center phase I trial for mCRPC (NCT03575819). Here we report the development CD46-targeted alpha therapy based on...
Bone formation is linked with osteogenic differentiation of mesenchymal stem cells (MSCs) in the bone marrow. Microgravity spaceflight known to reduce formation. In this study, we used a real microgravity environment SJ-10 Recoverable Scientific Satellite examine effects space on human marrow-derived (hMSCs). hMSCs were induced toward for 2 and 7 d cell culture device mounted satellite. The satellite returned Earth after going through experiments orbit 12 d, samples harvested analyzed...
Objective.Sparse-view computed tomography (SVCT), which can reduce the radiation doses administered to patients and hasten data acquisition, has become an area of particular interest researchers. Most existing deep learning-based image reconstruction methods are based on convolutional neural networks (CNNs). Due locality convolution continuous sampling operations, approaches cannot fully model global context feature dependencies, makes CNN-based less efficient in modeling (CT) images with...
Numerous privacy-preserving issues have emerged along with the fast development of Internet Things. In addressing privacy protection problems in Wireless Sensor Networks (WSN), secure multi-party computation is considered vital, where obtaining Euclidian distance between two nodes no disclosure either side's secrets has become focus location-privacy-related applications. This paper proposes a novel Privacy-Preserving Scalar Product Protocol (PPSPP) for wireless sensor networks. Based on...
Recent findings suggest the feasibility of cardiac repair by transplantation bone marrow mesenchymal stem cell (MSCs). However, it remains controversial regarding which type is best source for transplanting into ischemic heart because lack well-defined markers. In this study, we investigated in vitro and vivo effects novel multipotent cells (MMSCs) from human marrow. Pluripotent markers (Oct4, Bmi1, Abcg2) vascular endothelial growth factor (VEGF) were detected RT-PCR immunofluorescence...
Interest in developing tissue-engineered cornea has increased with the decrease supply of donor tissue. The aim present study was to investigate feasibility and method reconstructing corneal equivalents porcine acellular matrix as scaffold a dynamic culturing system. Applying detergent Triton X-100 (1%) freeze-drying process, corneas were decellularized prepared scaffold, hematoxylin-eosin staining scanning electron microscopy showed no cells stroma. In order measure vivo biocompatibility,...
The staggering increase of malware families and their diversity poses a significant threat creates compelling need for automatic classification techniques. In this paper, we first analyze the role network behavior as powerful technique to automatically classify polymorphic variants. Afterwards, present framework efficiently by modeling different behaviors (such HTTP, SMTP, UDP, TCP). We propose protocol-aware state-space schemes extract features from behaviors. applicability various...