Search Results - "Shi, Dong"

Refine Results
  1. 1

    f(Q, T) gravity by Xu, Yixin, Li, Guangjie, Harko, Tiberiu, Liang, Shi-Dong

    “…We propose an extension of the symmetric teleparallel gravity, in which the gravitational action L is given by an arbitrary function f of the non-metricity Q…”
    Get full text
    Journal Article
  2. 2

    Weyl type f(Q, T) gravity, and its cosmological implications by Xu, Yixin, Harko, Tiberiu, Shahidi, Shahab, Liang, Shi-Dong

    “…We consider an f ( Q ,  T ) type gravity model in which the scalar non-metricity Q α μ ν of the space-time is expressed in its standard Weyl form, and it is…”
    Get full text
    Journal Article
  3. 3

    Palatini formulation of f(R, T) gravity theory, and its cosmological implications by Wu, Jimin, Li, Guangjie, Harko, Tiberiu, Liang, Shi-Dong

    “…We consider the Palatini formulation of f ( R ,  T ) gravity theory, in which a non-minimal coupling between the Ricci scalar and the trace of the…”
    Get full text
    Journal Article
  4. 4

    Geodesic deviation, Raychaudhuri equation, Newtonian limit, and tidal forces in Weyl-type f(Q, T) gravity by Yang, Jin-Zhao, Shahidi, Shahab, Harko, Tiberiu, Liang, Shi-Dong

    “…We consider the geodesic deviation equation, describing the relative accelerations of nearby particles, and the Raychaudhuri equation, giving the evolution of…”
    Get full text
    Journal Article
  5. 5

    Energy-dependent noncommutative quantum mechanics by Harko, Tiberiu, Liang, Shi-Dong

    “…We propose a model of dynamical noncommutative quantum mechanics in which the noncommutative strengths, describing the properties of the commutation relations…”
    Get full text
    Journal Article
  6. 6

    DDoS Attack Detection Method Based on Improved KNN With the Degree of DDoS Attack in Software-Defined Networks by Dong, Shi, Sarem, Mudar

    Published in IEEE access (2020)
    “…The Distributed Denial of Service (DDoS) attack has seriously impaired network availability for decades and still there is no effective defense mechanism…”
    Get full text
    Journal Article
  7. 7

    Improved label propagation algorithm for overlapping community detection by Dong, Shi

    Published in Computing (01-10-2020)
    “…Community detection plays an important role in the analysis of complex networks. However, overlapping community detection in real networks is still a…”
    Get full text
    Journal Article
  8. 8

    Predictable maternal separation confers adult stress resilience via the medial prefrontal cortex oxytocin signaling pathway in rats by Shi, Dong-Dong, Zhang, Ying-Dan, Ren, Yan-Yan, Peng, Shi-Yu, Yuan, Ti-Fei, Wang, Zhen

    Published in Molecular psychiatry (01-12-2021)
    “…Early-life stress is normally thought of as a major risk for psychiatric disorders, but many researchers have revealed that adversity early in life may enhance…”
    Get full text
    Journal Article
  9. 9

    Berberine ameliorates depression-like behaviors in mice via inhibiting NLRP3 inflammasome-mediated neuroinflammation and preventing neuroplasticity disruption by Qin, Zongshi, Shi, Dong-Dong, Li, Wenqi, Cheng, Dan, Zhang, Ying-Dan, Zhang, Sen, Tsoi, Bun, Zhao, Jia, Wang, Zhen, Zhang, Zhang-Jin

    Published in Journal of neuroinflammation (01-03-2023)
    “…Neuroinflammation has been suggested that affects the processing of depression. There is renewed interest in berberine owing to its anti-inflammatory effects…”
    Get full text
    Journal Article
  10. 10

    Network Abnormal Traffic Detection Model Based on Semi-Supervised Deep Reinforcement Learning by Dong, Shi, Xia, Yuanjun, Peng, Tao

    “…The rapid development of Internet technology has brought great convenience to our production life, and the ensuing security problems have become increasingly…”
    Get full text
    Journal Article
  11. 11

    A Survey on Distributed Denial of Service (DDoS) Attacks in SDN and Cloud Computing Environments by Dong, Shi, Abbas, Khushnood, Jain, Raj

    Published in IEEE access (2019)
    “…Recently, software defined networks (SDNs) and cloud computing have been widely adopted by researchers and industry. However, widespread acceptance of these…”
    Get full text
    Journal Article
  12. 12

    Activation of silent biosynthetic gene clusters using transcription factor decoys by Wang, Bin, Guo, Fang, Dong, Shi-Hui, Zhao, Huimin

    Published in Nature chemical biology (01-02-2019)
    “…Here we report a transcription factor decoy strategy for targeted activation of eight large silent polyketide synthase and non-ribosomal peptide synthetase…”
    Get full text
    Journal Article
  13. 13

    Assessment of mechanical properties and fatigue performance of a selective laser melted nickel-base superalloy Inconel 718 by Pei, Changhao, Shi, Dong, Yuan, Huang, Li, Huaixue

    “…In the present work a nickel-base superalloy Inconel 718 manufactured by selective laser melting (SLM) was investigated with focus on microstructure,…”
    Get full text
    Journal Article
  14. 14

    Quantum information entropies of multiple quantum well systems in fractional Schrödinger equations by Solaimani, M., Dong, Shi‐Hai

    Published in International journal of quantum chemistry (01-03-2020)
    “…In this work, we study the position and momentum information entropies of multiple quantum well systems in fractional Schrödinger equations, which, to the best…”
    Get full text
    Journal Article
  15. 15

    Deformed Hamilton Mechanics in Noncommutative Phase Space by Liang, Shi-Dong

    “…Based on the correspondence between operator commutative relations and Poisson brackets, we develop a framework of deformed Hamilton, Lagrange and Euler…”
    Get full text
    Journal Article
  16. 16

    Global brain inflammation in stroke by Shi, Kaibin, Tian, De-Cai, Li, Zhi-Guo, Ducruet, Andrew F, Lawton, Michael T, Shi, Fu-Dong

    Published in Lancet neurology (01-11-2019)
    “…Stroke, including acute ischaemic stroke and intracerebral haemorrhage, results in neuronal cell death and the release of factors such as damage-associated…”
    Get full text
    Journal Article
  17. 17

    Betulinic acid in the treatment of tumour diseases: Application and research progress by Jiang, Wenkai, Li, Xin, Dong, Shi, Zhou, Wence

    Published in Biomedicine & pharmacotherapy (01-10-2021)
    “…Betulinic acid (BA) is a pentacyclic triterpene compound that can be obtained by separation, chemical synthesis and biotransformation from birch. BA has…”
    Get full text
    Journal Article
  18. 18

    Quercetin and aconitine synergistically induces the human cervical carcinoma HeLa cell apoptosis via endoplasmic reticulum (ER) stress pathway by Li, Xiu-Mei, Liu, Jing, Pan, Fang-Fang, Shi, Dong-Dong, Wen, Zhi-Guo, Yang, Pei-Long

    Published in PloS one (01-01-2018)
    “…Up till now, studies have not been conducted on how the combination of Quercetin (Q), Aconitine (A) and apoptosis induction affects human cervical carcinoma…”
    Get full text
    Journal Article
  19. 19

    Quantum Particle Swarm Optimization for Task Offloading in Mobile Edge Computing by Dong, Shi, Xia, Yuanjun, Kamruzzaman, Joarder

    “…Mobile Edge Computing (MEC) deploys servers on the edge of the mobile network to reduce the data transmission delay between servers and mobile devices, and can…”
    Get full text
    Journal Article
  20. 20

    Network Abnormal Traffic Detection Framework Based on Deep Reinforcement Learning by Dong, Shi, Xia, Yuanjun, Wang, Tao

    Published in IEEE wireless communications (01-06-2024)
    “…Because wireless communication network attacks continue to evolve, cyber security is becoming more and more important, requiring network security solutions to…”
    Get full text
    Journal Article