![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessTumor microenvironment-associated lactate metabolism regulates the prognosis and precise checkpoint immunotherapy outcomes of patients with lung adenocarcinoma
Despite the wide clinical application of checkpoint inhibitor immunotherapy in lung adenocarcinoma, its limited benefit to patients remains puzzling to researchers. One of the mechanisms of immunotherapy resis...
-
Article
Open AccessOptimization of ACF-DSR-based joint Doppler shift and SNR estimator for Internet of Vehicle system
Accurate vehicle speed estimation is required for intelligent internet of vehicles, and it can be realized by Doppler shift estimation in mobile communication. In this paper, the ACF-DSR (autocorrelation funct...
-
Article
Open AccessAnalysis and improvement of the three-column spinal theory
Denis and Ferguson et al.’s three-column spinal theory has been widely accepted and applied. However, this three-column theory was proposed based solely on observation and experience without thorough documente...
-
Article
Letter to the Editor concerning “Intraosseous basivertebral nerve ablation for the treatment of chronic low back pain: a prospective randomized double-blind sham-controlled multi-center study” by Fischgrund JS, et al. [Eur Spine J; (2018) 27(5): 1146–1156]
-
Chapter and Conference Paper
Static Environment Perception Based on High-Resolution Automotive Radars
High-resolution radar sensors have the capability to perceive the surroundings around the vehicle very exactly by detecting thousands of reflection points per measurement cycle. To model the static environment...
-
Chapter and Conference Paper
Research of Encodation Schemes Selecting Optimization for Character 2D Barcode
Character 2D barcode is a new type of 2D barcode which is designed based on the theory of traditional 2D barcode. Unlike the traditional 2D barcode image, character 2D barcode represents information encoded wi...
-
Chapter and Conference Paper
Video Deformation Based on ASM
For the edit issues of movement object, facial check and ASM are proposed to extract the feature points of human face. And then model of tracking facial movement object in video sequence is established. In ord...
-
Chapter and Conference Paper
Verification and Analysis for Ethernet Protocols with NuSMV
Verifying the correctness of computer systems is becoming necessary for most of systems, especially safety–critical systems. Symbolic model checking is one of the effective ways to do automatic model checking....
-
Chapter and Conference Paper
Distributed Intrusion Detection System Using Autonomous Agents Based on DCOM
This chapter reports on the design and implementation of a Distributed intrusion detection system using autonomous agents based on Distributed Component Object Model (DCOM). First, we introduce our design of t...