![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessAlantolactone enhances the sensitivity of melanoma to MAPK pathway inhibitors by targeting inhibition of STAT3 activation and down-regulating stem cell markers
Mitogen-activated protein kinase inhibitors (MAPKi) were the first line drugs for advanced melanoma patients with BRAF mutation. Targeted therapies have significant therapeutic effects; however, drug resistanc...
-
Article
Open AccessOne-pot synthesis of stable antioxidant metal-ornamented polyphenol supramolecular assemblies for material engineering
Natural polyphenols (NPPs) are of widespread interest in material engineering; however, only a small fraction of NPPs have been utilized in biomedical applications because of their poor solubility and instabil...
-
Article
Open AccessAssociation of vitamin D receptor gene polymorphisms with gestational diabetes mellitus-a case control study in Wuhan, China
Gestational diabetes mellitus (GDM) increased risk of perinatal complications for both the women and the fetuses. The association between the vitamin D receptor (VDR) gene polymorphism and GDM has not been tho...
-
Chapter and Conference Paper
Multi-order Proximity Graph Structure Embedding
Graph embedding methods convert the flexible graph structure into low-dimensional representations while maintaining the graph structure information. Most existing methods focus on learning low- or high-order g...
-
Chapter and Conference Paper
Discriminative Representation Learning for Cross-Domain Sentiment Classification
Cross-domain sentiment classification aims to solve the lack of labeled data in the target domain by using the knowledge of the source domain. Most existing approaches mainly focus on learning transferable fea...
-
Chapter and Conference Paper
HEAM: Heterogeneous Network Embedding with Automatic Meta-path Construction
Heterogeneous information network (HIN) embedding is widely used in many real-world applications. Meta-path used in HINs can effectively extract semantic information among objects. However, the meta-path faces...
-
Chapter and Conference Paper
An Interactive Two-Pass Decoding Network for Joint Intent Detection and Slot Filling
Intent detection and slot filling are two closely related tasks for building a spoken language understanding (SLU) system. The joint methods for the two tasks focus on modeling the semantic correlations betwee...
-
Chapter and Conference Paper
Category-Level Adversarial Network for Cross-Domain Sentiment Classification
Cross-domain sentiment classification utilizes useful information in the source domain to improve the sentiment classification accuracy in the target domain which has few or no labeled data. Most existing meth...
-
Chapter and Conference Paper
Improving Transformer with Sequential Context Representations for Abstractive Text Summarization
Recent dominant approaches for abstractive text summarization are mainly RNN-based encoder-decoder framework, these methods usually suffer from the poor semantic representations for long sequences. In this pap...
-
Chapter and Conference Paper
High Performance Regular Expression Matching on FPGA
Deep Packet Inspection (DPI) technology has been widely deployed in Network Intrusion Detection System (NIDS) to detect attacks and viruses. State-of-the-art NIDS uses Deterministic Finite Automata (DFA) to pe...
-
Chapter and Conference Paper
Password Recovery for ZIP Files Based on ARM-FPGA Cluster
Password recovery of ZIP encrypted files is an important problem in computer forensics. The encryption is based on standard cryptographic algorithms as SHA1, HMAC and AES. The traditional methods such as dicti...
-
Chapter and Conference Paper
An FPGA-Based Algorithm to Accelerate Regular Expression Matching
State-of-the-art Network Intrusion Detection Systems (NIDSs) use regular expressions (REs) to detect attacks or vulnerabilities. In order to keep up with the ever-increasing speed, more and more NIDSs need to ...
-
Article
KRAS polymorphisms are associated with survival of CRC in Chinese population
rs12245, rs12587, rs9266, rs1137282, rs61764370, and rs712 of KRAS oncogene are characterized in the 3′UTR. The study highlights the important role of these polymorphisms playing in the susceptibility, oxalipl...
-
Chapter and Conference Paper
Triple-Bit Quantization with Asymmetric Distance for Nearest Neighbor Search
Binary embedding is an effective way for nearest neighbor (NN) search as binary code is storage efficient and fast to compute. It tries to convert real-value signatures into binary codes while preserving simi...
-
Article
Open AccessTime trends and risk factor associated with premature birth and infants deaths due to prematurity in Hubei Province, China from 2001 to 2012
The nutrition and epidemiologic transition has been associated with an increasing incidence of preterm birth in develo** countries, but data from large observational studies in China have been limited. Our s...
-
Article
Fast approximate matching of binary codes with distinctive bits
Although the distance between binary codes can be computed fast in Hamming space, linear search is not practical for large scale datasets. Therefore attention has been paid to the efficiency of performing appr...
-
Article
Open AccessTrajectories of length, weight, and bone mineral density among preterm infants during the first 12 months of corrected age in China
Limited evidence has been provided on the trajectories of length, weight, and bone mineral density (BMD) among preterm infants in early life in Asian countries.
-
Article
Application of Visible Hyperspectral Imaging for Prediction of Springiness of Fresh Chicken Meat
Springiness is an important quality characteristic of chicken meat, related with muscle structure and contents of biochemical components, and has great influence on eating quality of chicken meat. Traditional ...
-
Chapter and Conference Paper
Enhancing Security and Robustness of P2P Caching System
At present, P2P caching system is widely used to reduce P2P traffic, but the security is always ignored. In this paper, we discuss three potential security issues: content poison, illegal files diffusion and m...
-
Chapter and Conference Paper
RICS-DFA: Reduced Input Character Set DFA for Memory-Efficient Regular Expression Matching
Regular expression matching as a core component of deep packet inspection (DPI) is widely used in various kinds of modern network intrusion detection system (NIDS), traffic classification system and network mo...