![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Methods of incorporating common element characteristics for law article prediction
Law article prediction is a task of predicting the relevant laws and regulations involved in a case according to the description text of the case, and it has broad application prospects in improving judicial e...
-
Article
Open AccessAssembling Au8 clusters on surfaces of bifunctional nanoimmunomodulators for synergistically enhanced low dose radiotherapy of metastatic tumor
Radiotherapy is one of the mainstays of cancer therapy and has been used for treating 65–75% of patients with solid tumors. However, radiotherapy of tumors has two limitations: high-dose X-rays damage adjacent...
-
Chapter and Conference Paper
Analyzing the Chain of Trust Model Based on Entity Dependence
This paper provides a chain of trust model in line with the TCG trust concepts. This model gives a formal definition and proof of trust state, trust root and trust measurement and chain of trust by the concept...
-
Article
Comparison of 10- and 20-min hepatobiliary phase images on Gd-EOB-DTPA-enhanced MRI T1 map** for liver function assessment in clinic
To compare hepatobiliary phase (HBP) images obtained 10 and 20 min after Gd-EOB-DTPA-enhanced MRI for liver function assessment in clinic on 3.0 T MR imaging.
-
Article
Open AccessEvaluating segmental liver function using T1 map** on Gd-EOB-DTPA-enhanced MRI with a 3.0 Tesla
Assessing the liver function provides valuable information to evaluate surgical risk and plan accordingly. Current studies focus on whole liver function evaluation. However, assessment of segmental liver funct...
-
Article
Cryptanalyzing image encryption using chaotic logistic map
Chaotic behavior arises from very simple non-linear dynamical equation of logistic map which makes it was used often in designing chaotic image encryption schemes. However, some properties of chaotic maps can ...
-
Chapter and Conference Paper
CFCC: A Covert Flows Confinement Mechanism for Virtual Machine Coalitions
Normally, virtualization technology is adopted to construct the infrastructure of cloud computing environment. Resources are managed and organized dynamically through virtual machine (VM) coalitions in accorda...
-
Article
Preparation of Chitosan Derivatives. Synthesis of N-Schiff Base Type and N-Secondary Amino Type Chitosan-Crown Ethers