![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Design and Analysis of Service Resource Allocation Scheme Based on Mobile Edge Computing
With the rapid development of communication technology, the scale of user data grows exponentially. In the diversified service scenarios, the data processing speed is required more strictly in order to guarant...
-
Article
Diagnostic and Prognostic Value of CPZ in Patients with Gastric Cancer by Integrated Analysis
-
Article
Increased Expression of POSTN Predicts Poor Prognosis: a Potential Therapeutic Target for Gastric Cancer
Periostin (POSTN) is involved in many biological processes and is associated with the occurrence and development of several cancers, while its role in gastric cancer is not clear. We aimed to demonstrate the r...
-
Article
Is single tract jejunal interposition better than double tract reconstruction after proximal gastrectomy?
Double tract reconstruction (DTR) is the main digestive tract reconstruction method after proximal gastrectomy (PG). Single tract jejunal interposition (STJI) derived from the double tract reconstruction is al...
-
Article
Prognostic and Predictive Model of the Log Odds of the Negative Lymph Node/T Stage Ratio in Resectable Gastric Adenocarcinoma Patients
There are few reports on disease-specific survival (DSS) prediction systems for resected gastric cancer (GC) patients. The aim of this study was to create a nomogram based on the log odds of the negative lymph...
-
Chapter and Conference Paper
Automatic Classification of Medicinal Plants of Leaf Images Based on Convolutional Neural Network
Plants are the basis of all living things on earth, supplying us with oxygen, food, shelter, medicine, and preserving the planet from dam-ages that could face climate changes. Concerning their medicinal abilit...
-
Chapter and Conference Paper
A Deep Learning Method to Detect Web Attacks Using a Specially Designed CNN
With the increasing information sharing and other activities conducted on the World Wide Web, the Web has become the main venue for attackers to make troubles. The effective methods to detect Web attacks are c...