![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
GPU-based butterfly counting
When dealing with large bipartite graphs, butterfly counting is a crucial and time-consuming operation. Graphics processing units (GPUs) are widely used parallel heterogeneous devices that can significantly bo...
-
Article
Open AccessPurines enrich root-associated Pseudomonas and improve wild soybean growth under salt stress
The root-associated microbiota plays an important role in the response to environmental stress. However, the underlying mechanisms controlling the interaction between salt-stressed plants and microbiota are po...
-
Article
Open AccessIntegrated transcriptome and metabolome analysis revealed that HaMYB1 modulates anthocyanin accumulation to deepen sunflower flower color
HanMYB1 was found to play positive roles in the modulation of anthocyanins metabolism based on the integrative analysis of different color cultivars and the related molecular genetic analyses.
-
Article
Pancreas segmentation in CT based on RC-3DUNet with SOM
Deep learning-based automatic and accurate 3D pancreas segmentation plays a significant role in medical diagnosis and disease treatment, which has received a lot of attention from the medical image processing ...
-
Chapter and Conference Paper
A Domain Knowledge-Based Semi-supervised Pancreas Segmentation Approach
The five-year survival rate of pancreatic cancer is extremely low, and the survival time of patients can be extended by timely detection and treatment. Deep learning-based methods have been used to assist radi...
-
Article
Open AccessImpacts of the COVID-19 economic slowdown on soybean crop yields in the United States
It is without question that the COVID-19 pandemic has taken its toll on the U.S. economy. Stay-at-home orders led to reduced vehicular traffic and widespread declines in anthropogenic emissions (e.g., nitrogen...
-
Article
Open AccessLncRNA WEE2-AS1 is a diagnostic biomarker that predicts poor prognoses in patients with glioma
Glioma is characterized by high morbidity, high mortality, and poor prognosis. Despite tremendous advances in the treatment of glioma, the prognosis of patients with glioma is still unsatisfactory. There is an...
-
Article
Open AccessNeighborhood Emission Map** Operation (NEMO): A 1-km anthropogenic emission dataset in the United States
We present an unprecedented effort to map anthropogenic emissions of air pollutants at 1 km spatial resolution in the contiguous United States (CONUS). This new dataset, Neighborhood Emission Map** Operation...
-
Article
Bio-physiological-signals-based VR cybersickness detection
With the gradual maturity of virtual reality (VR) technology in recent years, VR industry is in a trend of rapid growth, providing new possibilities for content design. Although VR technology has been able to ...
-
Chapter and Conference Paper
Vulnerability Detection Using Deep Learning Based Function Classification
Software vulnerabilities are becoming increasingly severe problems, which can pose great risks of information leakage, denial of service, or even system crashes. However, their detection is still formidable, d...
-
Article
Open AccessIntelligent designs in nanophotonics: from optimization towards inverse creation
Applying intelligence algorithms to conceive nanoscale meta-devices becomes a flourishing and extremely active scientific topic over the past few years. Inverse design of functional nanostructures is at the he...
-
Article
Improvement on a batch authenticated key agreement scheme
-
Chapter and Conference Paper
SparrowHawk: Memory Safety Flaw Detection via Data-Driven Source Code Annotation
Detecting code flaws in programs is a vital aspect of software maintenance and security. Classic code flaw detection techniques rely on program analysis to check whether the code logic violates certain pre-def...
-
Chapter and Conference Paper
IMShell-Dec: Pay More Attention to External Links in PowerShell
Windows proposes the PowerShell shell command line to substitute the traditional CMD. However, it is often utilized by the attacker to invade the victim because of its versatile functionality. In this paper, we i...
-
Chapter and Conference Paper
Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features
The public key cryptographic algorithm SM2 is now widely used in electronic authentication systems, key management systems, and e-commercial applications systems. As an asymmetric cryptographic algorithm is ba...
-
Article
Identification of viruses infecting sweet potato in southern China by small RNA deep sequencing and PCR detection
Sweet potato is one of the most important food crops worldwide, and viral diseases can cause very severe yield loss and quality decline of this crop. To track the prevalence of viral diseases of sweet potato i...
-
Chapter and Conference Paper
Finding Flaws from Password Authentication Code in Android Apps
-
Article
Regional Characteristics and Causes of Haze Events in Northeast China
Northeast China experiences severe atmospheric pollution, with an increasing occurrence of heavy haze episodes. However, the underlying forces driving haze formation during different seasons are poorly underst...
-
Article
Open AccessNeuroendoscopic treatment of multiple intracranial arachnoid cysts: a case report
Multiple arachnoid cysts are very rare within the central nervous system. The cysts will sometimes increase in size with age, lead to the mass effect or cerebrospinal fluid (CSF) flow obstruction, and cause so...
-
Article
Characteristics and cause analysis of heavy haze in Changchun City in Northeast China
Northeast China has been reported as having serious air pollution in China with increasing occurrences of severe haze episodes. Changchun City, as the center of Northeast China, has longstanding industry and i...