![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Improvement in Machining Stability of Thin-Walled Blades by Tension
Owing to the thin-walled structure of blade, machining chatter occurs easily in blade machining processes. Moreover, material removal in machining has a non-negligible effect on the modality of the blade and c...
-
Article
Open AccessChromosome-scale genome assembly of sweet tea (Lithocarpus polystachyus Rehder)
Lithocarpus, with >320 species, is the second largest genus of Fagaceae. However, the lack of a reference genome limits the molecular biology and functional study of Lithocarpus species. Here, we report the chrom...
-
Article
PSMD12 interacts with CDKN3 and facilitates pancreatic cancer progression
Proteasome 26S subunit, non-ATPase 12 (PSMD12) genes have been implicated in several types of malignancies but the role of PSMD12 in pancreatic cancer (PC) remains elusive. Bioinformatics analysis showed that ...
-
Article
Characteristics of chip formation and its effects on cutting force and tool wear/damage in milling Ti-25 V-15Cr (Ti40) beta titanium alloy
Ti40 burn-resistant titanium alloy is one kind of beta-phase titanium alloy. There exists complex cutting deformation, high cutting temperature, high cutting force and fluctuations, and serious tool wear and d...
-
Chapter and Conference Paper
Enhancing Children’s Cultural Empowerment Through Participatory Game Design Based on Hometown Ceramic Culture
Nowadays many local communities lose their voice in the development of local culture and are in a state of disempowerment, children as inheritors and builders of local culture, need to be nurtured in ways that...
-
Chapter and Conference Paper
AgroEdu Through Co-crafting: Incorporating Minecraft into Co-design Activities for Agricultural Education
Although agriculture is no longer a main source of income and employment in modern society, it is still a key factor for sustainable development. With the development of urbanization, people, especially the yo...
-
Article
Asymmetric subversion attacks on signature and identification schemes
Studies of subversion attack against cryptosystem could be dated to several decades ago, while the Snowden revelation in 2013 has set off a new wave of exploring possible approaches to protect or subvert crypt...
-
Article
Open AccessPhylogenomic analyses highlight innovation and introgression in the continental radiations of Fagaceae across the Northern Hemisphere
Northern Hemisphere forests changed drastically in the early Eocene with the diversification of the oak family (Fagaceae). Cooling climates over the next 20 million years fostered the spread of temperate biome...
-
Chapter and Conference Paper
Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination with Whole-System Replay
With the widespread deployment of Internet of Things (IoT) devices, firmware vulnerabilities can result in considerable damage. However, existing firmware fuzzing methods, which rely on program exception signa...
-
Chapter and Conference Paper
Substitution Attacks Against Sigma Protocols
Inspired by the Snowden revelations, Bellare, Paterson, and Rogaway proposed the notion of Algorithm Substitution Attack (ASA) where the attacker could subvert cryptographic algorithms to leak secret informati...
-
Article
Ecological factors influence balancing selection on leaf chemical profiles of a wildflower
Balancing selection is frequently invoked as a mechanism that maintains variation within and across populations. However, there are few examples of balancing selection operating on loci underpinning complex tr...
-
Chapter and Conference Paper
CO-BPG: A Centralized Optimizer for Routing in BGP-Based Data Center Networks
Load-balancing routing is an important and challenging issue in data center networks. Traditional internet routing protocols like OSPF and BGP cannot provide satisfiable network throughput because they are tra...
-
Chapter and Conference Paper
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure IBE
Our context is anonymous encryption schemes hiding their receiver, but in a setting which allows authorities to reveal the receiver when needed. While anonymous Identity-Based Encryption (IBE) is a natural can...
-
Chapter and Conference Paper
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved
In this work we resolve the open problem raised by Prabhakaran and Rosulek at CRYPTO 2007, and present the first anonymous, rerandomizable, Replayable-CCA (RCCA) secure public-key encryption scheme. This solution...
-
Article
Metabolic engineering of Escherichia coli for polyamides monomer δ-valerolactam production from feedstock lysine
Nylon 5 and nylon 6,5 are recently explored as new commercial polyamides, of which the monomer includes δ-valerolactam. In this study, a novel catalytic activity of lysine 2-monooxygenase (DavB) was explored t...
-
Article
A cylindrical profile measurement method for cylindricity and coaxiality of stepped shaft
The cylindricity and coaxiality of the stepped shaft are important parameters reflecting the vibration characteristics of the rotating machines system. In order to evaluate the cylindricity and coaxiality of t...
-
Article
Long non-coding RNA OIP5-AS1 promotes pancreatic cancer cell growth through sponging miR-342-3p via AKT/ERK signaling pathway
Opa-interacting protein 5 antisense RNA 1 (OIP5-AS1), a long non-coding RNA (lncRNA), has been reported to link with the progression of some cancers. However, its biological functions and underlying molecular ...
-
Article
Controlled synchronization of prolactin/STAT5 and AKT1/mTOR in bovine mammary epithelial cells
The prolactin/STAT5 and AKT1/mTOR pathways play a key role in milk protein transcription and translation, respectively. However, the correlation between them in bovine mammary epithelial cells remains unclear....
-
Chapter and Conference Paper
Analysis of Tool Wear and Wear Mechanism in Dry Forming Milling for Rail Milling Train
Milling tools of the rail milling train have to face severe weariness due to the uneven surface hardness, inconsistent cutting rate and uncertain status of the rail itself as well as the vibration caused by th...
-
Chapter and Conference Paper
Image Processing Method of 3D Scattered Point Cloud
For 3D scattered point cloud, before surface reconstruction, preprocessing such as quantity reduction and surface denoising is needed. In this paper, a fast point cloud reduction algorithm based on farthest po...