Skip to main content

previous disabled Page of 2
and
Your search also matched 66 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Effects of Visual-Vestibular Conflicts Caused by Visual Input on Out-of-Body Experience Induced by Visual-Tactile Stimulation in Virtual Reality

Include preview-only content
  1. Article

    Open Access

    Novel MAXPOWER biological antibacterial liquid for eradicating oral Helicobacter pylori

    Eradication of oral Helicobacter pylori (H. pylori) not only reduces the infection rate from the transmission route but also improves the success rate of intragastric eradication. MAXPOWER Biological Bacteriostat...

    Yongkang Lai, **aoyang Dong, Yingxiao Song, Jiulong Zhao in BMC Infectious Diseases (2024)

  2. Article

    Open Access

    Case report: acute isolated cilioretinal artery occlusion secondary to percutaneous coronary intervention

    This case report aims to describe in detail the acute isolated cilioretinal artery occlusion (CLRAO) secondary to complicated therapeutic percutaneous coronary intervention (PCI).

    Bangtao Yao, Zhaoyang Dong, Yuanfeng Xue, Haoyu Meng in Journal of Cardiothoracic Surgery (2023)

  3. Article

    Open Access

    Nrf2 regulates iron-dependent hippocampal synapses and functional connectivity damage in depression

    Neuronal iron overload contributes to synaptic damage and neuropsychiatric disorders. However, the molecular mechanisms underlying iron deposition in depression remain largely unexplored. Our study aims to inv...

    Ting Zeng, Junjie Li, Lingpeng **e, Zhaoyang Dong in Journal of Neuroinflammation (2023)

  4. Article

    Open Access

    A novel random finite element model for holistically modeling of the frost effects on soils and cold region pavements

    This paper describes the development of a random finite element model (RFEM) that allows holistic simulation of frozen soil behaviors, including the effects of phase transition and the consequent internal stre...

    Shaoyang Dong, Yusheng Jiang, **ong Yu in Journal of Infrastructure Preservation and… (2022)

  5. Chapter and Conference Paper

    Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing

    The Meet-in-the-Middle (MITM) preimage attack is highly effective in breaking the preimage resistance of many hash functions, including but not limited to the full MD5, HAVAL, and Tiger, and reduced SHA-0/1/2. It...

    Zhenzhen Bao, **aoyang Dong, Jian Guo, Zheng Li in Advances in Cryptology – EUROCRYPT 2021 (2021)

  6. Chapter and Conference Paper

    Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories

    At EUROCRYPT 2020, Hosoyamada and Sasaki proposed the first dedicated quantum attack on hash functions—a quantum version of the rebound attack exploiting differentials whose probabilities are too low to be use...

    **aoyang Dong, Siwei Sun, Dan** Shi, Fei Gao in Advances in Cryptology – ASIACRYPT 2020 (2020)

  7. Article

    Open Access

    A day-ahead scheduling framework for thermostatically controlled loads with thermal inertia and thermal comfort model

    This paper proposes a day-ahead dispatch framework of thermostatically controlled loads (TCLs) for system peak load reduction. The proposed day-ahead scheduling framework estimates the user’s indoor thermal co...

    Yingying Chen, Fengji Luo, Zhaoyang Dong in Journal of Modern Power Systems and Clean … (2019)

  8. Article

    Open Access

    Effects of centralized and local PV plant control for voltage regulation in LV feeder based on cyber-physical simulations

    In the modern power system, both local and centralized reactive power control strategies for photovoltaic (PV) plants, are proposed and compared. While local control improves the network security, it lacks the...

    Theis Bo RASMUSSEN, Guangya YANG in Journal of Modern Power Systems and Clean … (2018)

  9. Article

    Open Access

    Blockchain: a secure, decentralized, trusted cyber infrastructure solution for future energy systems

    Modern power systems are rapidly evolving into complex cyber-physical systems. The increasingly complex interaction among different energy entities calls for a secure, efficient, and robust cyber infrastructur...

    Zhaoyang DONG, Fengji LUO, Gaoqi LIANG in Journal of Modern Power Systems and Clean Energy (2018)

  10. Article

    Open Access

    Optimal operation of electricity, natural gas and heat systems considering integrated demand responses and diversified storage devices

    In recent years, the increasing penetration level of renewable generation and combined heat and power (CHP) technology in power systems is leading to significant changes in energy production and consumption pa...

    Linna NI, Weijia LIU, Fushuan WEN in Journal of Modern Power Systems and Clean … (2018)

  11. Chapter and Conference Paper

    A Key-Recovery Attack on 855-round Trivium

    In this paper, we propose a key-recovery attack on Trivium reduced to 855 rounds. As the output is a complex Boolean polynomial over secret key and IV bits and it is hard to find the solution of the secret key...

    **ming Fu, **aoyun Wang, **aoyang Dong, Willi Meier in Advances in Cryptology – CRYPTO 2018 (2018)

  12. Article

    Open Access

    Rolling horizon optimization for real-time operation of thermostatically controlled load aggregator

    Thermostatically controlled loads (TCLs) have great potentials to participate in the demand response programs due to their flexibility in storing thermal energy. The two-way communication infrastructure of sma...

    Fengji LUO, Gianluca RANZI, Zhaoyang DONG in Journal of Modern Power Systems and Clean … (2017)

  13. Article

    Open Access

    Coordinated expansion co-planning of integrated gas and power systems

    As a significant clean energy source, natural gas plays an important role in modern energy context. The growing utilization of natural gas brings uncertainties into the power system, which requires an integrat...

    Dongxiao WANG, **g QIU, Ke MENG in Journal of Modern Power Systems and Clean … (2017)

  14. Chapter and Conference Paper

    Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method

    Conditional cube attack is an efficient key-recovery attack on Keccak keyed modes proposed by Huang et al. at EUROCRYPT 2017. By assigning bit conditions, the diffusion of a conditional cube variable is reduced. ...

    Zheng Li, Wenquan Bi, **aoyang Dong in Advances in Cryptology – ASIACRYPT 2017 (2017)

  15. Article

    Open Access

    Optimal air-conditioning load control in distribution network with intermittent renewables

    The coordinated operation of controllable loads, such as air-conditioning load, and distributed generation sources in a smart grid environment has drawn significant attention in recent years. To improve the wi...

    Dongxiao WANG, Ke MENG, **aodan GAO in Journal of Modern Power Systems and Clean … (2017)

  16. Article

    Open Access

    Optimal integration of mobile battery energy storage in distribution system with renewables

    An optimal sizing method is proposed in this paper for mobile battery energy storage system (MBESS) in the distribution system with renewables. The optimization is formulated as a bi-objective problem, consid...

    Yu ZHENG, Zhaoyang DONG, Shilin HUANG in Journal of Modern Power Systems and Clean … (2015)

  17. Article

    Open Access

    Expansion co-planning for shale gas integration in a combined energy market

    Shale gas resources have the potential to significantly contribute to worldwide energy portfolio. A great number shale gas reserves have been identified in many countries. Connections of newly found gas reserv...

    **g QIU, Zhaoyang DONG, Junhua ZHAO in Journal of Modern Power Systems and Clean … (2015)

  18. Article

    Open Access

    A low-carbon oriented probabilistic approach for transmission expansion planning

    Following the deregulation of the power industry, transmission expansion planning (TEP) has become more complicated due to the presence of uncertainties and conflicting objectives in a market environment. Als...

    **g QIU, Zhaoyang DONG, Junhua ZHAO in Journal of Modern Power Systems and Clean … (2015)

  19. Chapter and Conference Paper

    Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia

    As one of the generalizations of differential cryptanalysis, the truncated differential cryptanalysis has become a powerful toolkit to evaluate the security of block ciphers. In this article, taking advantage ...

    Leibo Li, Keting Jia, **aoyun Wang, **aoyang Dong in Fast Software Encryption (2015)

  20. Article

    Open Access

    Primary energy congestion of power systems

    Primary energy has the potential to bring challenges to the reliability, economic, and eco-friendliness of global electric power systems. The concept of electric power security are proposed, including many fac...

    Yusheng Xue, Bin Cai, Geoffrey James in Journal of Modern Power Systems and Clean … (2014)

previous disabled Page of 2