Skip to main content

previous disabled Page of 4
and
  1. No Access

    Article

    Improvement in Machining Stability of Thin-Walled Blades by Tension

    Owing to the thin-walled structure of blade, machining chatter occurs easily in blade machining processes. Moreover, material removal in machining has a non-negligible effect on the modality of the blade and c...

    Junming Hou, Zhengcai Zhao, Yucan Fu in Journal of Vibration Engineering & Technol… (2024)

  2. Article

    Open Access

    Chromosome-scale genome assembly of sweet tea (Lithocarpus polystachyus Rehder)

    Lithocarpus, with >320 species, is the second largest genus of Fagaceae. However, the lack of a reference genome limits the molecular biology and functional study of Lithocarpus species. Here, we report the chrom...

    Hui Liu, Rengang Zhang, Biao-Feng Zhou, Zhao Shen, Xue-Yan Chen, Jie Gao in Scientific Data (2023)

  3. No Access

    Article

    PSMD12 interacts with CDKN3 and facilitates pancreatic cancer progression

    Proteasome 26S subunit, non-ATPase 12 (PSMD12) genes have been implicated in several types of malignancies but the role of PSMD12 in pancreatic cancer (PC) remains elusive. Bioinformatics analysis showed that ...

    Jia Ma, Wenyang Zhou, Yifeng Yuan, Baosheng Wang, **angpeng Meng in Cancer Gene Therapy (2023)

  4. No Access

    Article

    Characteristics of chip formation and its effects on cutting force and tool wear/damage in milling Ti-25 V-15Cr (Ti40) beta titanium alloy

    Ti40 burn-resistant titanium alloy is one kind of beta-phase titanium alloy. There exists complex cutting deformation, high cutting temperature, high cutting force and fluctuations, and serious tool wear and d...

    Dongsheng Lv, Baosheng Wang, Junming Hou in The International Journal of Advanced Manu… (2023)

  5. No Access

    Chapter and Conference Paper

    Enhancing Children’s Cultural Empowerment Through Participatory Game Design Based on Hometown Ceramic Culture

    Nowadays many local communities lose their voice in the development of local culture and are in a state of disempowerment, children as inheritors and builders of local culture, need to be nurtured in ways that...

    **anhe Zhang, Baosheng Wang in HCI in Games (2023)

  6. No Access

    Chapter and Conference Paper

    AgroEdu Through Co-crafting: Incorporating Minecraft into Co-design Activities for Agricultural Education

    Although agriculture is no longer a main source of income and employment in modern society, it is still a key factor for sustainable development. With the development of urbanization, people, especially the yo...

    **nliu Li, Baosheng Wang in Learning and Collaboration Technologies (2023)

  7. No Access

    Article

    Asymmetric subversion attacks on signature and identification schemes

    Studies of subversion attack against cryptosystem could be dated to several decades ago, while the Snowden revelation in 2013 has set off a new wave of exploring possible approaches to protect or subvert crypt...

    Yi Wang, Rongmao Chen, Chi Liu, Baosheng Wang in Personal and Ubiquitous Computing (2022)

  8. Article

    Open Access

    Phylogenomic analyses highlight innovation and introgression in the continental radiations of Fagaceae across the Northern Hemisphere

    Northern Hemisphere forests changed drastically in the early Eocene with the diversification of the oak family (Fagaceae). Cooling climates over the next 20 million years fostered the spread of temperate biome...

    Biao-Feng Zhou, Shuai Yuan, Andrew A. Crowl, Yi-Ye Liang, Yong Shi in Nature Communications (2022)

  9. No Access

    Chapter and Conference Paper

    Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination with Whole-System Replay

    With the widespread deployment of Internet of Things (IoT) devices, firmware vulnerabilities can result in considerable damage. However, existing firmware fuzzing methods, which rely on program exception signa...

    Runhao Liu, Bo Yu, Baosheng Wang, Jianbin Ye in Information Security (2022)

  10. No Access

    Chapter and Conference Paper

    Substitution Attacks Against Sigma Protocols

    Inspired by the Snowden revelations, Bellare, Paterson, and Rogaway proposed the notion of Algorithm Substitution Attack (ASA) where the attacker could subvert cryptographic algorithms to leak secret informati...

    Yuliang Lin, Rongmao Chen, Yi Wang, Baosheng Wang in Cyberspace Safety and Security (2022)

  11. No Access

    Article

    Ecological factors influence balancing selection on leaf chemical profiles of a wildflower

    Balancing selection is frequently invoked as a mechanism that maintains variation within and across populations. However, there are few examples of balancing selection operating on loci underpinning complex tr...

    Lauren N. Carley, Julius P. Mojica, Baosheng Wang in Nature Ecology & Evolution (2021)

  12. No Access

    Chapter and Conference Paper

    CO-BPG: A Centralized Optimizer for Routing in BGP-Based Data Center Networks

    Load-balancing routing is an important and challenging issue in data center networks. Traditional internet routing protocols like OSPF and BGP cannot provide satisfiable network throughput because they are tra...

    Chen Duan, Wei Peng, Baosheng Wang in Advanced Information Networking and Applications (2021)

  13. No Access

    Chapter and Conference Paper

    Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure IBE

    Our context is anonymous encryption schemes hiding their receiver, but in a setting which allows authorities to reveal the receiver when needed. While anonymous Identity-Based Encryption (IBE) is a natural can...

    Yi Wang, Rongmao Chen, **nyi Huang in Advances in Cryptology – ASIACRYPT 2021 (2021)

  14. No Access

    Chapter and Conference Paper

    Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved

    In this work we resolve the open problem raised by Prabhakaran and Rosulek at CRYPTO 2007, and present the first anonymous, rerandomizable, Replayable-CCA (RCCA) secure public-key encryption scheme. This solution...

    Yi Wang, Rongmao Chen, Guomin Yang, **nyi Huang in Advances in Cryptology – CRYPTO 2021 (2021)

  15. No Access

    Article

    Metabolic engineering of Escherichia coli for polyamides monomer δ-valerolactam production from feedstock lysine

    Nylon 5 and nylon 6,5 are recently explored as new commercial polyamides, of which the monomer includes δ-valerolactam. In this study, a novel catalytic activity of lysine 2-monooxygenase (DavB) was explored t...

    Yanqin Xu, Dan Zhou, Ruoshi Luo, **zhi Yang in Applied Microbiology and Biotechnology (2020)

  16. No Access

    Article

    A cylindrical profile measurement method for cylindricity and coaxiality of stepped shaft

    The cylindricity and coaxiality of the stepped shaft are important parameters reflecting the vibration characteristics of the rotating machines system. In order to evaluate the cylindricity and coaxiality of t...

    Chuanzhi Sun, Hongye Wang, Yongmeng Liu in The International Journal of Advanced Manu… (2020)

  17. No Access

    Article

    Long non-coding RNA OIP5-AS1 promotes pancreatic cancer cell growth through sponging miR-342-3p via AKT/ERK signaling pathway

    Opa-interacting protein 5 antisense RNA 1 (OIP5-AS1), a long non-coding RNA (lncRNA), has been reported to link with the progression of some cancers. However, its biological functions and underlying molecular ...

    **angpeng Meng, Jia Ma, Baosheng Wang, **n Wu in Journal of Physiology and Biochemistry (2020)

  18. No Access

    Article

    Controlled synchronization of prolactin/STAT5 and AKT1/mTOR in bovine mammary epithelial cells

    The prolactin/STAT5 and AKT1/mTOR pathways play a key role in milk protein transcription and translation, respectively. However, the correlation between them in bovine mammary epithelial cells remains unclear....

    Baosheng Wang, Linlin Shi, **g**g Men in In Vitro Cellular & Developmental Biology … (2020)

  19. No Access

    Chapter and Conference Paper

    Analysis of Tool Wear and Wear Mechanism in Dry Forming Milling for Rail Milling Train

    Milling tools of the rail milling train have to face severe weariness due to the uneven surface hardness, inconsistent cutting rate and uncertain status of the rail itself as well as the vibration caused by th...

    Chao Pan, **aoshan Gu, Mulan Wang, Baosheng Wang in Advances in Mechanical Design (2020)

  20. No Access

    Chapter and Conference Paper

    Image Processing Method of 3D Scattered Point Cloud

    For 3D scattered point cloud, before surface reconstruction, preprocessing such as quantity reduction and surface denoising is needed. In this paper, a fast point cloud reduction algorithm based on farthest po...

    Hao Zhu, Baosheng Wang, Kaiyun Xu in Artificial Intelligence and Security (2020)

previous disabled Page of 4