![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessEnsemble species distribution modeling and multilocus phylogeography provide insight into the spatial genetic patterns and distribution dynamics of a keystone forest species, Quercus glauca
Forests are essential for maintaining species diversity, stabilizing local and global climate, and providing ecosystem services. Exploring the impact of paleogeographic events and climate change on the genetic...
-
Chapter and Conference Paper
Malware Detection Based on Image Conversion
Due to different malware and their variants appear every year, it is difficult to identify the virus. In traditional malware analysis methods, both static analysis methods and dynamic analysis methods may be l...
-
Chapter and Conference Paper
A Progressive Secret Image Sharing Scheme Based on GEMD Data Hiding
With the development of the Internet, people spread digital information through the Internet. However, the Internet is a public channel. Avoiding digital information be tampered with to keep the security of da...
-
Chapter and Conference Paper
Study on Security Enhancing of Generalized Exploiting Modification Directions in Data Hiding
In 2017, Liu et al. proposed the high capacity GEMD scheme which increases the capacity of GEMD by divides n adjacent pixels into multiple groups. The dividing modes among the image are the same in their sche...
-
Article
Open AccessSpironolactone ameliorates endothelial dysfunction through inhibition of the AGE/RAGE axis in a chronic renal failure rat model
Spironolactone can improve endothelial dysfunction in the setting of heart failure and diabetes models. However, its beneficial effect in the cardiovascular system is not clear in the setting of non-diabetic r...
-
Article
A high capacity data hiding scheme based on re-adjusted GEMD
Steganography is a useful technology to protect secret data traveling through the Internet. Recently, Kuo and Wang proposed a useful data hiding scheme based on GEMD(Generalized Exploiting Modification Directi...
-
Article
Open AccessElectronegative low-density lipoprotein increases the risk of ischemic lower-extremity peripheral artery disease in uremia patients on maintenance hemodialysis
Electronegative low-density lipoprotein (LDL) has been shown to increase coronary artery disease risk in hemodialysis patients, but its effect on the risk of peripheral artery disease (PAD) remains unclear. We...
-
Article
Open AccessSkin autofluorescence is associated with inappropriate left ventricular mass and diastolic dysfunction in subjects at risk for cardiovascular disease
Enhanced advanced glycation end products deposition within myocardial tissue may cause diastolic dysfunction. However, whether this is related to left ventricular hypertrophy or inappropriate left ventricular ...
-
Chapter and Conference Paper
On the Security of a Privacy Authentication Scheme Based on Cloud for Medical Environment
Recently, Chiou et al. proposed a secure authentication scheme which not only ensures message confidentiality and patient anonymity but also provides real telemedicine system implementation. However, in this p...
-
Article
Secure multi-group data hiding based on gemd map
Numerous data hiding schemes have been recently proposed based on section-wise strategy. The purpose of these approaches is to enhance security by using a unique key to generate a table. But these approaches a...
-
Article
A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System
To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been propo...
-
Chapter and Conference Paper
Reversible Shared Data Hiding Based on Modified Signed Digit EMD
The reversible data hiding schemes not only extract the embedded secret data from the stego-image but also recover the original cover image. This can be extended for use with multiple parties where the embedde...
-
Chapter and Conference Paper
Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud Environments
With the growing popularity of network technologies, cloud-based health care applications are becoming an essential part of telecare medical information systems have been widely studied in recent years. To pro...
-
Article
A Non-Mainstream Viewpoint on Apparent Superluminal Phenomena in AGN Jet
The group velocity of light in material around the AGN jet is acquiescently one (c as a unit), but this is only a hypothesis. Here, we re-derive apparent superluminal and Doppler formulas for the general case (it...
-
Article
Role of rotational state-selected for nonadiabatic alignment: OCS molecules in femtosecond laser fields
Nonadiabatic alignment by intense nonresonant laser fields is a versatile technique to manipulate the spatial direction of molecules. By solving the time-dependent Schrödinger equation numerically the degree o...