-
Article
Open AccessBlocklength Allocation and Power Control in UAV-Assisted URLLC System via Multi-agent Deep Reinforcement Learning
Integration of unmanned aerial vehicles (UAVs) with ultra-reliable and low-latency communication (URLLC) systems can improve the real-time communication performance for various industrial internet of things (I...
-
Article
Open AccessSafety and efficacy of intravenous thrombolysis before mechanical thrombectomy in patients with atrial fibrillation
Intravenous thrombolysis (IVT) before endovascular thrombectomy (EVT) is the standard treatment for patients with acute ischemic stroke caused by large vessel occlusion (AIS-LVO). However, the efficacy and saf...
-
Article
Multiple-image encryption algorithm based on the stereo Zigzag transformation
With the rise of emerging technologies, the information security becomes particularly important. Digital images play an important role in network transmission. To prevent the image information about being stol...
-
Article
Steady-State Responses of a Suspension Vibration Isolator with Diagonal Inerters
The present work attempts to propose a suspension vibration isolator with both diagonal dampers and inerters and investigates analytically its dynamic characteristics, laying the foundation for its engineering...
-
Article
Intelligent mine safety risk based on knowledge graph: hotspots and frontiers
The safety of mining has always been a concern. The occurrence of safety accidents not only endangers human health, but also causes serious damage to the ecological environment. With the continuous upgrade and...
-
Article
TextFormer: A Query-based End-to-end Text Spotter with Mixed Supervision
End-to-end text spotting is a vital computer vision task that aims to integrate scene text detection and recognition into a unified framework. Typical methods heavily rely on region-of-interest (RoI) operation...
-
Article
Quantitative 3D simulation analysis of debris flow impact effect based on SPH
The debris flow is a multiphase mixture. The traditional numerical model based on Bingham and Herschel–Bulkley–Papanastasiou (HBP) constitutive relations cannot simultaneously represent the viscous and elastic...
-
Article
Multiple-image encryption algorithm based on 3D-LWT and dynamic stereo S-box
Digital image is transmitted more and more frequently through the network. To protect the security of batch images in an open network, a multiple-image encryption algorithm is proposed. Firstly, multiple image...
-
Article
Open AccessVitamin D-mediated tsRNA-07804 triggers mitochondrial dysfunction and suppresses non-small cell lung cancer progression by targeting CRKL
tRNA-derived small RNAs (tsRNAs) are novel non-coding RNAs with various functions in multiple cancers. Nevertheless, whether vitamin D executes its function in mitochondrial dysfunction and non-small cell lung...
-
Chapter and Conference Paper
Windage Characteristics Investigate of Centrifugal Impeller Rear Cavity
This study aims to investigate the windage characteristics of the centrifugal impeller rear cavity using experimental and numerical simulation methods. The effects of various flow parameters such as flow coeff...
-
Chapter and Conference Paper
Infrared Identification and Detection of Internal Water Defects in Navigable Aircraft Composite Materials
Composite materials are widely used in many parts of navigable aircraft. The defects of composite materials will seriously affect flight safety. In this paper, it is proved by simulation that the minimum diame...
-
Article
Fast color image encryption algorithm based on FCSM and pre-storage Arnold transform
Image encryption is an important multimedia security technology to protect the image content during network transmission. Chaotic systems are widely used in the field of image encryption due to their pseudo-ra...
-
Article
Image encryption algorithm based on the Matryoshka transform and modular-inverse matrix
The transmission of digital image in Internet is convenient, but at the same time the great risk of information leakage is existed. To meet the requirements of image content security and real-time communicatio...
-
Article
Color image encryption algorithm based on novel 2D hyper-chaotic system and DNA crossover and mutation
As the quick advancement of multimedia technology, images are employed extensively in the domains of medicine, military, and transportation. In the meantime, image security has become an increasingly prominent...
-
Article
Study on slope stability analysis and large deformation characteristics of failure based on SPH method
Slope instability failure is a large deformation problem. Traditional numerical methods and limit equilibrium methods are difficult to characterize the whole process of failure, resulting in unclear analysis o...
-
Article
Seepage Evolution Law and Deformation Failure Characteristics of Porous Media Based on Smoothed Particle Hydrodynamics
It is difficult to characterize the whole process of seepage movement by traditional numerical methods, which leads to the unclear mechanism of stress-strain change in soil. Therefore, the meshless method smoo...
-
Article
Research on the fire extinguishing performance of new gel foam for preventing and controlling the spontaneous combustion of coal gangue
Coal gangue, as an associated product of coal mining, can cause a large number of piles to undergo slow oxidation and spontaneous combustion, resulting in the production of toxic and harmful gases, leading to ...
-
Article
A review of recent advances in robotic belt grinding of superalloys
Superalloys are widely used in aerospace and energy fields by virtue of superior physical properties, especially in high-temperature environments. However, superalloys have poor machinability and are typical d...
-
Article
Open AccessRemimazolam-remifentanil causes less postoperative nausea and vomiting than remimazolam-alfentanil during hysteroscopy: a single-centre randomized controlled trial
Although the operation time of hysteroscopy is short, the incidence of postoperative nausea and vomiting is high. The aim of this study was to compare the incidence of postoperative nausea and vomiting in hyst...
-
Article
Multiple-image encryption algorithm based on the bit plane and superpixel
Image security is becoming more and more important in recently years. To improve the efficiency and security, this paper defines the concepts of the superpixel and super image, and proposes a multiple-image en...