Search

Your search keyword '"Xiao-yuan Yang"' showing total 102 results

Search Constraints

Start Over You searched for: Author "Xiao-yuan Yang" Remove constraint Author: "Xiao-yuan Yang"
102 results on '"Xiao-yuan Yang"'

Search Results

1. Stapled transperineal rectovaginal fistula repair for low- and mid-level rectovaginal fistulas: A comparison study with rectal mucosal advancement flap repair

2. Fully automated simultaneous peripheral arteriovenous exchange transfusion not seen to aggravate brain function and the disorder of the internal environment in neonates with severe hyperbilirubinemia

3. Efficacy and safety of Ahmed glaucoma valve implantation with lens extraction in neovascular glaucoma with cataract

4. Steganography Security: Principle and Practice

5. Identification of anti-HBV activities in Paeonia suffruticosa Andr. using GRP78 as a drug target on Herbochip®

6. A compressive sensing–based adaptable secure data collection scheme for distributed wireless sensor networks

7. Hypoxia-Inducible Factor-1α Dependent Pathways Mediate the Renoprotective Role of Acetazolamide Against Renal Ischemia-Reperfusion Injury

8. Salvianolic Acid B Ameliorates Lipopolysaccharide-Induced Albumin Leakage from Rat Mesenteric Venules through Src-Regulated Transcelluar Pathway and Paracellular Pathway.

9. catena-Poly[[dibromidomercury(II)]-μ-3,6-bis(2-pyridylsulfanyl)pyridazine-κ2N3:N6]

12. Fully automated simultaneous peripheral arteriovenous exchange transfusion not seen to aggravate brain function and the disorder of the internal environment in neonates with severe hyperbilirubinemia

14. Text Messaging for Parents of School-Aged Children in Controlling Myopia: A 1-Year, Randomized Controlled Trial and Additional 3-Years Follow Up

15. Effect of Global Warming on Chloride Ion Erosion Risks for Offshore RC Bridges in China

16. Identification of anti-HBV activities in Paeonia suffruticosa Andr. using GRP78 as a drug target on Herbochip®

17. A compressive sensing–based adaptable secure data collection scheme for distributed wireless sensor networks

18. A Signcryption Scheme Based Learning with Errors over Rings Without Trapdoor

19. Experimental Study on the Wet Electrostatic Precipitator for Purifying Biomass Fuel Gas

20. Cost efficiency of electric grid utilities in China: A comparison of estimates from SFA–MLE, SFA–Bayes and StoNED–CNLS

21. Sleep Duration, Bedtime, and Myopia Progression in a 4-Year Follow-up of Chinese Children: The Anyang Childhood Eye Study

22. Secure Testing for Genetic Diseases on Encrypted Genomes with Homomorphic Encryption Scheme

23. Grey Relational Analysis and its C# Program in Analysis of Rigid Polyurethane Foam

24. Peripheral refraction in 7- and 14-year-old children in central China: the Anyang Childhood Eye Study

25. An efficient and practical public key cryptosystem with CCA-security on standard model

26. The Introduction of the Chemical Composition in IF Steel Control

27. RELATIONSHIP BETWEEN PHENOLOGY, PRODUCTIVITY, AND METEOROLOGICAL FACTORS IN RECENT 15 YEARS IN THE PASTORAL AREA OF QINGHAI, CHINA

28. Image Complexity Analysis Based on HVS and Its Application in Steganography

29. An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption

30. Rumor Spreading Model with Trust Mechanism in Complex Social Networks

31. What Is the Optimum Cover Factor?

32. A Watermarking Scheme Based on NSCT Using Computer-Generated Hologram

33. A New Algorithm to Exposing Image Forgeries by Detecting Ambient Illumination Consistency

34. An Efficient Video Steganography Algorithm Based on Sub-Macroblock Partition for H.264/AVC

35. An Image Forensics Algorithm for Blur Detection Based on Properties of Sharp Edge Points

36. Interesting Copper(I) and Mercury(II) 1D Coordination Polymers Based on 3,6-Bis(2-pyridylthio)pyridazine Ligand: Syntheses, Structures and Properties

37. YASS Steganalysis Based on Local Randomness

38. Measuring the turnover rates of Arabidopsis proteins using deuterium oxide: an auxin signaling case study

39. Distribution of ocular biometry in 7- and 14-year-old Chinese children

40. Properties of two-layer FHE and their applications

42. Public Verifiable Key Encapsulation Mechanism under Factoring

43. Mental poker protocol without trusted third party

44. Research on generating good key sequence based on chaos

45. Research on the Model of the Survivable Storage System (SSS) and Its Architecture

46. A study on dependencies between DCT coefficients for JPEG image steganalysis

47. Video steganography using motion vector and linear block codes

48. A self-renewal hash chain scheme based on fair exchange idea(SRHC-FEI)

49. Hierarchical access control scheme based on the semi-trusted center

50. A New Group Key Management Protocol in WSNs Based on Secret Sharing

Catalog

Books, media, physical & digital resources