- Gestational Diabetes Research and Management
- Cooperative Communication and Network Coding
- Advanced Neural Network Applications
- Birth, Development, and Health
- Advanced MIMO Systems Optimization
- Robotics and Sensor-Based Localization
- Maternal Mental Health During Pregnancy and Postpartum
- 3D Surveying and Cultural Heritage
- Energy Efficient Wireless Sensor Networks
- Child and Adolescent Psychosocial and Emotional Development
- Energy Harvesting in Wireless Networks
- Pregnancy and preeclampsia studies
- Breastfeeding Practices and Influences
- Advanced Malware Detection Techniques
- Image Processing Techniques and Applications
- Graph Theory and Algorithms
- Advanced Vision and Imaging
- Advanced Graph Neural Networks
- Optical measurement and interference techniques
- Mobile Ad Hoc Networks
- Remote Sensing and LiDAR Applications
- Digital Communication and Language
- Cognitive Radio Networks and Spectrum Sensing
- Network Security and Intrusion Detection
- Advanced Measurement and Detection Methods
Beijing University of Technology
2014-2024
Guangdong Pharmaceutical University
2024
Chinese Academy of Medical Sciences & Peking Union Medical College
2019-2024
Zhengzhou University of Light Industry
2024
Peking Union Medical College Hospital
2023
First People's Hospital of Chongqing
2023
Guiyang Medical University
2023
Ningxia Normal University
2023
Qujiang People's Hospital
2022
Southwest University
2017-2020
The potential effects of pre-pregnancy body mass (BMI) and gestational weight gain (GWG) on pregnancy outcomes remain unclear. Thus, we investigated socio-demographic characteristics that affect BMIs GWG the BMI Chinese maternal infant complications.3172 women were enrolled in Pregnant Women Cohort Study-Peking Union Medical College from July 25, 2017 to 24, 2018, whose babies delivered before December 31, 2018. Regression analysis was employed evaluate affecting values their adverse...
Abstract Distributed denial-of-service attack, also known as DDoS is one of the most common network attacks at present. With rapid development computer and communication technology, harm attack becoming more serious. Therefore, research on detection becomes important. Nowadays, some related work has been done progress made. However, due to diversity modes variable size traffic, there not yet a method with satisfactory accuracy In view this, this paper proposes based machine learning, which...
This study aims to explore the relationships between pre-pregnancy body mass index (BMI), gestational weight gain (GWG), rate of GWG during second and third trimesters (GWGrate) birth among Chinese women.Women were enrolled by 24 hospitals in 15 different provinces mainland China from July 25th, 2017 26 November 2018. Pre-pregnancy BMI, GWGrate calculated divided groups. The multinomial logistic regression model restrictive cubic spline used relationships.Of 3585 participants, women who...
Graph neural networks (GNN) have achieved state-of-the-art performance on various industrial tasks. However, the poor efficiency of GNN inference and frequent Out-of-Memory (OOM) problem limit successful application edge computing platforms. To tackle these problems, a feature decomposition approach is proposed for memory optimization inference. The could achieve outstanding models, covering wide range datasets, which speeds up by to 3×. Furthermore, significantly reduce peak usage (up 5× in...
Conventional designs on two-way relay networks mainly focus the spectral efficiency (SE) rather than energy (EE). In this paper, we consider a system where two source nodes communicate with each other via an amplify-and-forward (AF) node and study power allocation schemes to maximize EE while ensuring certain data rate. We propose optimal energy-efficient algorithm based iterative search technique. addition, closed-form suboptimal solution is derived reduced complexity negligible performance...
We propose a new routing algorithm for wireless sensor networks post-disaster road monitoring in this paper which the nodes are arranged linear manner. It thus becomes necessary design of more efficient algorithms such types applications. Our includes route establishment, packet forwarding and maintenance by considering special characteristics node placement data transmission to make effective than general-purpose protocols.
With the development of information technology, computer technology is also gradually applied to teaching activities art education, and use multimedia assist music has become one hot research areas in universities. In order better cultivate university students' musical exploration ability creativity, a note feature recognition model based on Hidden Markov Model (HMM) algorithm studied optimized universities by using genetic HMM algorithm. The this article combines signal processing theory,...
Previous camera self-calibration methods have exhibited certain notable shortcomings. On the one hand, they either exclusively emphasized scene cues or solely focused on vehicle-related cues, resulting in a lack of adaptability to diverse scenarios and limited number effective features. Furthermore, these utilized geometric features within traffic scenes extracted semantic information, failing comprehensively consider both aspects. This comprehensive feature extraction from scenes,...
Interpersonal responsibility is an indigenous Chinese personality construct, which regarded to have positive social functions. Two studies were designed explore the relationship among interpersonal responsibility, proposal allocation ratio, and responders' hostile decisions in ultimatum game. Study 1 was a scenario study using hypothetical game with valid sample of 551 high school students. 2 experimental recruited 54 undergraduate students play incentivized online. The results two showed...
Abstract Objective To investigate recommendations for appropriate gestational weight gain (GWG) of Chinese females. Methods In total 3,172 eligible women in the first trimester were recruited into Pregnant Women Cohort Study (CPWCS) project. Pregnancy complications and outcomes collated using hospital medical records system. The method occurrence participants with adverse pregnancy (Occurrence Method) was conducted to calculate recommended GWG each participant’s pre-pregnancy BMI. Occurrence...
Abstract In ad hoc networks, CSMA/CA is a widely used MAC layer protocol. There has been considerable work on the performance evaluation of this But most confined to saturation single‐hop networks. paper, we employ linear feedback model evaluate for according Poisson distributed traffic in both and multi‐hop To best our knowledge, first attempt analytically protocol under general assumption about traffic. This paper also gives analytical results, showing impact RTS/CTS. Although RTS/CTS do...
To investigate the association of dietary patterns with gestational depression and sleep disturbance.
This paper first analyzes the delay and energy consumption mechanism of SMAC. Then it proposes an improved DC-SMAC protocol by replacing fixed duty with adaptive cycle mechanism, which adopts a priority discriminant function to make node more packets have access channel. The simulation results show that proposed can effectively reduce network delay, increase throughput, improve efficiency node, enhance performance in coordination contention window adjustment mechanism.
An efficient resource allocation scheme is presented to maximise energy efficiency for multiuser orthogonal frequency division multiple systems with proportional rate constraints. For a determined subchannel assignment, an optimal energy‐efficient power algorithm has been derived through bisection search method.
Choroid neovascularization (CNV) is important adverse pathological changes that contributes to the aggravation of hypoxic-ischemic eye diseases, and our preliminary work evidences thrombospondin-1 (TSP-1) synthetic polypeptide VR-10 may be candidate therapeutic agent for treatment CNV, but its detailed effects molecular mechanisms are not fully delineated. In this study, CNV models in BN rats were established by using laser photocoagulation method, which further subjected peptide treatment....
Abstract People who experience childhood trauma are prone to developing psychiatric disorders and addictive behaviors. However, the relationship between specific types of internet use (e.g., social media) has not been exactly proven. This study aims explain networking websites addiction by testing possible mediating role insecure attachment moderating basic psychological need satisfaction. A sample 1281 Chinese college students was tested using a series self-report questionnaires on trauma,...