Skip to main content

and
  1. No Access

    Article

    ANXA3, associated with YAP1 regulation, participates in the proliferation and chemoresistance of cervical cancer cells

    Cervical cancer, as one of the most common cancers in women, remains a major health threat worldwide. Annexin A3 (ANXA3), a component of the annexin family, is upregulated in numerous cancers, with no explicit...

    Jiazhen Huang, Wei Wei, Fuli Kang, Shuang Tan, Yibing Li, **aohang Lu in Genes & Genomics (2023)

  2. No Access

    Article

    Multi-Scale Pixel-Attention Feedback Link Network for Single Image Super-Resolution

    In recent years, deep learning methods have been widely used in single image super-resolution. However, as the network model increase in depth and complexity, the high-frequency information is lost during the ...

    Yanliang Ge, Shuang Tan, Hongbo Bi, **aoxiao Sun in Pattern Recognition and Image Analysis (2022)

  3. Article

    Open Access

    Low-concentration iron promotes Klebsiella pneumoniae biofilm formation by suppressing succinic acid

    Klebsiella pneumoniae is widely distributed in water and plays a major role in both human and poultry infections. Many K. pneumoniae strains form biofilms on various surfaces, enhancing their pathogenicity and re...

    Kexin Liu, Shuang Tan, Weiyuan Ye, Limin Hou, Binghu Fang in BMC Microbiology (2022)

  4. No Access

    Chapter and Conference Paper

    Electro-Mechanical Co-Simulation of a 6-DOF Parallel Robot

    Parallel robot has the advantages of high precision, high stiffness, fast speed and strong bearing capacity. When applied in 3D printing, it can avoid the defects caused by the vertical direction layer by laye...

    Fengchao Liang, Shuang Tan, Long Chen, Zhe Lin in Mechanical Engineering and Materials (2021)

  5. No Access

    Chapter and Conference Paper

    Redactable Blockchain Technology Based on Distributed Key Management and Trusted Execution Environment

    Proponents view the blockchain technology as transformative because its emergence has solved many security problems in the open environment. However, it is necessary to study redactable blockchain in specific ...

    Lisha Liu, Lin Tan, Jun Liu, **g **ao, Haibo Yin in Blockchain and Trustworthy Systems (2021)

  6. No Access

    Chapter and Conference Paper

    A Data Integrity Verification Scheme Based on Blockchain and Blind Homomorphic Tags

    With the advent of big data, users’ data is usually outsourced to the cloud. However, users will lose the absolute control over the data and its integrity is hard to be guaranteed. Currently, the most effectiv...

    Shuai Huang, **g **ao, Hong-liang Mao, Mu-ran Su in Blockchain and Trustworthy Systems (2020)

  7. No Access

    Article

    A method for achieving provable data integrity in cloud computing

    By storing data files in the cloud, users can make use of cloud computing techniques, thereby reducing hardware investment and simplifying data management. However, ensuring data integrity when using unreliabl...

    Ai** Li, Shuang Tan, Yan Jia in The Journal of Supercomputing (2019)

  8. No Access

    Chapter and Conference Paper

    Gas-Kinetic Scheme for Multiscale Turbulence Simulation

    Based on the extended BGK equation, the gas-kinetic scheme (GKS) is developed for fine simulation of high-Reynolds-number turbulence. With the help of existing hybrid RANS/LES models to approximate the effecti...

    Shuang Tan, Qibing Li, Song Fu in Progress in Hybrid RANS-LES Modelling (2018)

  9. No Access

    Article

    A high-resolution gas-kinetic scheme with minimized dispersion and controllable dissipation reconstruction

    In order to simulate multiscale problems such as turbulent flows effectively, the high-order accurate reconstruction based on mini- mized dispersion and controllable dissipation (MDCD) is implemented in the se...

    Shuang Tan, QiBing Li in Science China Physics, Mechanics & Astronomy (2017)

  10. No Access

    Article

    Enhanced genome editing in mammalian cells with a modified dual-fluorescent surrogate system

    Programmable DNA nucleases such as TALENs and CRISPR/Cas9 are emerging as powerful tools for genome editing. Dual-fluorescent surrogate systems have been demonstrated by several studies to recapitulate DNA nuc...

    Yan Zhou, Yong Liu, Dianna Hussmann, Peter Brøgger in Cellular and Molecular Life Sciences (2016)

  11. Article

    Open Access

    Mesenchymal stem cells derived from human induced pluripotent stem cells retain adequate osteogenicity and chondrogenicity but less adipogenicity

    Previously, we established a simple method for deriving mesenchymal stem cells (MSCs) from human induced pluripotent stem cells (iPSC-MSCs). These iPSC-MSCs were capable of forming osteogenic structures in sca...

    Ran Kang, Yan Zhou, Shuang Tan, Guangqian Zhou in Stem Cell Research & Therapy (2015)

  12. No Access

    Article

    A new fragment re-allocation strategy for NoSQL database systems

    NoSQL databases are famed for the characteristics of high scalability, high availability, and high fault-tolerance. So NoSQL databases are used in a lot of applications. The data partitioning strategy and frag...

    Zhikun Chen, Shuqiang Yang, Shuang Tan, Li He, Hong Yin in Frontiers of Computer Science (2015)

  13. No Access

    Article

    NaEPASC: a novel and efficient public auditing scheme for cloud data

    Cloud computing is deemed the next-generation information technology (IT) platform, in which a data center is crucial for providing a large amount of computing and storage resources for various service applica...

    Shuang Tan, Yan Jia in Journal of Zhejiang University SCIENCE C (2014)

  14. No Access

    Article

    Construction and application of the vectors to identify genes encoding exported proteins of Escherichia coli

    In order to clone genes having signal sequences of Escherichia coli, four vectors with or without Lac or Ara promoter were constructed using a leaderless β-lactamase as reporter. Fragments of tetracycline resista...

    Dong Niu, Qinfang Shen, Junli Zhu, Jiangmei Liu, Jiajie Yuan in Molecular Biology Reports (2013)

  15. No Access

    Article

    Topology awareness algorithm for virtual network map**

    Network virtualization is recognized as an effective way to overcome the ossification of the Internet. However, the virtual network map** problem (VNMP) is a critical challenge, focusing on how to map the vi...

    **ao-ling Li, Huai-min Wang, Chang-guo Guo in Journal of Zhejiang University SCIENCE C (2012)