-
Article
Open AccessIdentification of significant m6A regulators and immune microenvironment characterization in ischemic stroke
The role of m6A modification in the regulation of the immune microenvironment (IME) of ischemic stroke (IS) is barely known. Thus, we aim to investigate the impact of m6A modification on the IME of IS and its ...
-
Article
Open AccessMechanical and electrical responses of natural-cooled high-temperature granite of different grain sizes
In order to understand the effect of grain size on the mechanical and electrical responses of natural-cooled high-temperature granite, uniaxial compression tests were carried out on natural cooled coarse- and ...
-
Article
Open AccessPPM1K mediates metabolic disorder of branched-chain amino acid and regulates cerebral ischemia-reperfusion injury by activating ferroptosis in neurons
Ischemic stroke is a neurological disorder caused by vascular stenosis or occlusion, accounting for approximately 87% of strokes. Clinically, the most effective therapy for ischemic stroke is vascular recanali...
-
Article
Ioversol Induced Microglia Proinflammatory Activation and Oxidative Stress in Rats
Contrast-induced encephalopathy (CIE) following angiography, though not often and reversible, can in some cases lead to permanent neurological dysfunction. To identify how neuroinflammation is involved in CIE,...
-
Article
Metformin treatment and acute ischemic stroke outcomes in patients with type 2 diabetes: a retrospective cohort study
Preclinical studies have shown that metformin has neuroprotective actions in stroke. However, the optimal treatment timing and duration remain unknown. Herein, we examined the efficacy of metformin treatment o...
-
Article
Open AccessPeripheral immune cell profiling of double-hit lymphoma by mass cytometry
Double-hit or Triple-hit lymphoma (DHL/THL) is a subset of high-grade B cell lymphoma harboring rearrangements of MYC and BCL2 and/or BCL6, and usually associate with aggressive profile, while current therapies t...
-
Article
Model Uncertainty Based Annotation Error Fixing for Web Attack Detection
Deep learning (DL) techniques have been widely used in web attack detection domain. With the stronger ability to fit data, DL models are also more sensitive to the training data, annotation errors can mislead ...
-
Chapter and Conference Paper
Resisting Adversarial Examples via Wavelet Extension and Denoising
It is well known that Deep Neural Networks are vulnerable to adversarial examples. An adversary can inject carefully-crafted perturbations on clean input to manipulate the model output. In this paper, we propo...
-
Chapter and Conference Paper
On the Profit-Maximizing for Transaction Platforms in Crowd Sensing
Crowd sensing is a novel sensing paradigm, in which a challenging task is to balance benefits of various participants, i.e., data requesters, data providers and transaction platforms for attracting sufficient par...
-
Chapter and Conference Paper
The Implementation of a Fully Integrated Scheme of self-Configuration and self-Organization (FISCO) on Imote2
Wireless Sensor networks are gaining a role of importance in the research community. In this paper, we choose Imote2 to establish our testbed according to the analysis and the comparison of the hardware capabi...
-
Chapter and Conference Paper
Range Adjustment for Broadcast Protocols with a Realistic Radio Transceiver Energy Model in Short-Range Wireless Networks
Broadcasting in short-range wireless ad hoc networks is a key issue. Currently, these networks can be formed not only by computer hosts with full PC functionalities, but also by small communicating objects. He...