Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    Enhancing supply chain management in the physical internet: a hybrid SAGA approach

    This paper introduces an advanced inventory replenishment optimization approach tailored for the Physical Internet (PI), addressing the dynamic and complex nature of this environment. We propose a hybrid Simul...

    Weiqi Yan, Nan Li, **n Zhang in Scientific Reports (2023)

  2. Article

    Open Access

    Chitosan oligosaccharide suppresses osteosarcoma malignancy by inhibiting CEMIP via the PI3K/AKT/mTOR pathway

    Osteosarcoma is a malignant bone tumor that is prone to metastasize early and primarily affects children and adolescents. Cell migration-inducing protein (CEMIP) plays a crucial role in the progression and mal...

    Il** Sim, WonGyom Choe, **Ju Ri, Hang Su, Safwat Adel Abdo Moqbel in Medical Oncology (2023)

  3. No Access

    Article

    Increased emergency cases for out-of-hospital cardiac arrest due to cold spells in Shenzhen, China

    Cold spells have been associated with specific diseases. However, there is insufficient scientific evidence on the effects of cold spells on out-of-hospital cardiac arrest (OHCA). Data on OHCA cases and on met...

    Mengyi Dai, Siyi Chen, Suli Huang, **g Hu in Environmental Science and Pollution Resear… (2023)

  4. Article

    Open Access

    Aloin induced apoptosis by enhancing autophagic flux through the PI3K/AKT axis in osteosarcoma

    Osteosarcoma is a malignant tumor of bone and soft tissue in adolescents. Due to its tumor biological behavior pattern, osteosarcoma usually generates poor prognosis. Autophagy is an important self-defense mec...

    Jiaming He, Wenkan Zhang, **aozhong Zhou, Weiqi Yan, Zhan Wang in Chinese Medicine (2021)

  5. Article

    Open Access

    PARK2 inhibits osteosarcoma cell growth through the JAK2/STAT3/VEGF signaling pathway

    Osteosarcoma (OS) is the most common primary malignant bone tumor mainly occurring in children and adolescents. In past decades, studies revealed that PARK2 was a vital tumor suppressor gene in many malignant sol...

    Zhong Lei, Huijie Duan, Tengfei Zhao, Yuxiang Zhang, Guoqi Li in Cell Death & Disease (2018)

  6. No Access

    Chapter and Conference Paper

    An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion

    In traditional visual cryptography scheme (VCS), each pixel of secret image is encrypted into m( \( \geqslant 1 \) ...

    Wen Wang, Feng Liu, Weiqi Yan, Gang Shen, Teng Guo in Digital-Forensics and Watermarking (2016)

  7. No Access

    Article

    Cartilage repair using mesenchymal stem cell (MSC) sheet and MSCs-loaded bilayer PLGA scaffold in a rabbit model

    The integration of regenerated cartilage with surrounding native cartilage is a major challenge for the success of cartilage tissue-engineering strategies. The purpose of this study is to investigate whether i...

    Yiying Qi, Yi Du, Weixu Li, Xuesong Dai in Knee Surgery, Sports Traumatology, Arthros… (2014)

  8. No Access

    Book

  9. No Access

    Article

    The application of super paramagnetic iron oxide-labeled mesenchymal stem cells in cell-based therapy

    Mesenchymal stem cell (MSC)-based therapy has great potential for tissue regeneration. However, being able to monitor the in vivo behavior of implanted MSCs and understand the fate of these cells is necessary ...

    Yiying Qi, Gang Feng, Zhongming Huang, Weiqi Yan in Molecular Biology Reports (2013)

  10. No Access

    Chapter

    Surveillance Privacy Protection

    Surveillance Privacy Protection (SPP) is a realistic issue in the world we are living in today. Due to the massive progress in technologies and systems, surveillance is becoming quite impossible to avoid. More...

    Nikki Gulzar, Basra Abbasi, Eddie Wu, Anil Ozbal in Intelligent Multimedia Surveillance (2013)

  11. No Access

    Chapter and Conference Paper

    A Novel Agent-Based Framework in Bridge-Mode Hypervisors of Cloud Security

    Cloud computing has been introduced as a tool for improving IT proficiency and business responsiveness for organizations as it delivers flexible hardware and software services as well as providing an array of ...

    Maziar Janbeglou, WeiQi Yan in 7th International Conference on Knowledge … (2013)

  12. No Access

    Article

    Mesenchymal stem cell-based treatment for cartilage defects in osteoarthritis

    Osteoarthritis (OA) is a common disorder and the restoration of the diseased articular cartilage in patients with OA is still a challenge for researchers and clinicians. Currently, a variety of experimental st...

    Yiying Qi, Gang Feng, Weiqi Yan in Molecular Biology Reports (2012)

  13. No Access

    Article

    The restoration of full-thickness cartilage defects with mesenchymal stem cells (MSCs) loaded and cross-linked bilayer collagen scaffolds on rabbit model

    Cartilage has a limited self-repair capability and the repair of large cartilage defects remains a challenge in clinic. This study aimed to investigate the effect of mesenchymal stem cells (MSCs) loaded three-...

    Yiying Qi, Tengfei Zhao, Ke Xu, Tianyang Dai, Weiqi Yan in Molecular Biology Reports (2012)

  14. No Access

    Chapter and Conference Paper

    Authenticating Visual Cryptography Shares Using 2D Barcodes

    One of the problems pertinent with many visual cryptography (VC) schemes is that of authentication. VC provides a way of sharing secrets between a number of participants. The secrets are in the form of an imag...

    Jonathan Weir, WeiQi Yan in Digital Forensics and Watermarking (2012)

  15. No Access

    Article

    A comprehensive study of visual event computing

    This paper contains a survey on aspects of visual event computing. We start by presenting events and their classifications, and continue with discussing the problem of capturing events in terms of photographs,...

    WeiQi Yan, Declan F. Kieran, Setareh Rafatirad in Multimedia Tools and Applications (2011)

  16. No Access

    Article

    Fine-search for image copy detection based on local affine-invariant descriptor and spatial dependent matching

    Copies are somehow a subset of near-duplicates, but the approaches extensively employed in near-duplicate retrieval only obtain rough and imprecise query results. Therefore a fine-search scheme is proposed to ...

    Hefei Ling, Liyun Wang, Fuhao Zou, Weiqi Yan in Multimedia Tools and Applications (2011)

  17. No Access

    Chapter and Conference Paper

    Plane Transform Visual Cryptography

    Plane transformation visual cryptography takes a unique approach to some of the current shortcomings of current visual cryptography techniques. Typically, the direction and placement of the encrypted shares is...

    Jonathan Weir, WeiQi Yan in Digital Watermarking (2011)

  18. No Access

    Chapter and Conference Paper

    A Novel Collusion Attack Strategy for Digital Fingerprinting

    Digital fingerprinting is a technology which aims to embed unique marks with traceability in order to identify users who use their multimedia content for unintended purpose. A cost-efficient attack against dig...

    Hefei Ling, Hui Feng, Fuhao Zou, Weiqi Yan, Zhengding Lu in Digital Watermarking (2011)

  19. No Access

    Chapter

    Partial Palmprint Matching Using Invariant Local Minutiae Descriptors

    In forensic investigations, it is common for forensic investigators to obtain a photograph of evidence left at the scene of crimes to aid them catch the culprit(s). Although, fingerprints are the most popular ...

    Moussadek Laadjel, Ahmed Bouridane in Transactions on Data Hiding and Multimedia… (2010)

  20. No Access

    Chapter

    A Comprehensive Study of Visual Cryptography

    Visual cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. VC takes a binary image (the secret) and divides i...

    Jonathan Weir, WeiQi Yan in Transactions on Data Hiding and Multimedia Security V (2010)

previous disabled Page of 2