![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
ANXA3, associated with YAP1 regulation, participates in the proliferation and chemoresistance of cervical cancer cells
Cervical cancer, as one of the most common cancers in women, remains a major health threat worldwide. Annexin A3 (ANXA3), a component of the annexin family, is upregulated in numerous cancers, with no explicit...
-
Article
Multi-Scale Pixel-Attention Feedback Link Network for Single Image Super-Resolution
In recent years, deep learning methods have been widely used in single image super-resolution. However, as the network model increase in depth and complexity, the high-frequency information is lost during the ...
-
Article
Open AccessLow-concentration iron promotes Klebsiella pneumoniae biofilm formation by suppressing succinic acid
Klebsiella pneumoniae is widely distributed in water and plays a major role in both human and poultry infections. Many K. pneumoniae strains form biofilms on various surfaces, enhancing their pathogenicity and re...
-
Chapter and Conference Paper
Electro-Mechanical Co-Simulation of a 6-DOF Parallel Robot
Parallel robot has the advantages of high precision, high stiffness, fast speed and strong bearing capacity. When applied in 3D printing, it can avoid the defects caused by the vertical direction layer by laye...
-
Chapter and Conference Paper
Redactable Blockchain Technology Based on Distributed Key Management and Trusted Execution Environment
Proponents view the blockchain technology as transformative because its emergence has solved many security problems in the open environment. However, it is necessary to study redactable blockchain in specific ...
-
Chapter and Conference Paper
A Data Integrity Verification Scheme Based on Blockchain and Blind Homomorphic Tags
With the advent of big data, users’ data is usually outsourced to the cloud. However, users will lose the absolute control over the data and its integrity is hard to be guaranteed. Currently, the most effectiv...
-
Article
A method for achieving provable data integrity in cloud computing
By storing data files in the cloud, users can make use of cloud computing techniques, thereby reducing hardware investment and simplifying data management. However, ensuring data integrity when using unreliabl...
-
Chapter and Conference Paper
Gas-Kinetic Scheme for Multiscale Turbulence Simulation
Based on the extended BGK equation, the gas-kinetic scheme (GKS) is developed for fine simulation of high-Reynolds-number turbulence. With the help of existing hybrid RANS/LES models to approximate the effecti...
-
Article
A high-resolution gas-kinetic scheme with minimized dispersion and controllable dissipation reconstruction
In order to simulate multiscale problems such as turbulent flows effectively, the high-order accurate reconstruction based on mini- mized dispersion and controllable dissipation (MDCD) is implemented in the se...
-
Article
Enhanced genome editing in mammalian cells with a modified dual-fluorescent surrogate system
Programmable DNA nucleases such as TALENs and CRISPR/Cas9 are emerging as powerful tools for genome editing. Dual-fluorescent surrogate systems have been demonstrated by several studies to recapitulate DNA nuc...
-
Article
Open AccessMesenchymal stem cells derived from human induced pluripotent stem cells retain adequate osteogenicity and chondrogenicity but less adipogenicity
Previously, we established a simple method for deriving mesenchymal stem cells (MSCs) from human induced pluripotent stem cells (iPSC-MSCs). These iPSC-MSCs were capable of forming osteogenic structures in sca...
-
Article
A new fragment re-allocation strategy for NoSQL database systems
NoSQL databases are famed for the characteristics of high scalability, high availability, and high fault-tolerance. So NoSQL databases are used in a lot of applications. The data partitioning strategy and frag...
-
Article
NaEPASC: a novel and efficient public auditing scheme for cloud data
Cloud computing is deemed the next-generation information technology (IT) platform, in which a data center is crucial for providing a large amount of computing and storage resources for various service applica...
-
Article
Construction and application of the vectors to identify genes encoding exported proteins of Escherichia coli
In order to clone genes having signal sequences of Escherichia coli, four vectors with or without Lac or Ara promoter were constructed using a leaderless β-lactamase as reporter. Fragments of tetracycline resista...
-
Article
Topology awareness algorithm for virtual network map**
Network virtualization is recognized as an effective way to overcome the ossification of the Internet. However, the virtual network map** problem (VNMP) is a critical challenge, focusing on how to map the vi...