Search Results - "Song, Yan Y"
-
1
Proteomic Analysis of Trichinella spiralis Adult Worm Excretory-Secretory Proteins Recognized by Sera of Patients with Early Trichinellosis
Published in Frontiers in microbiology (31-05-2017)“…The most commonly used serodiagnostic antigens for trichinellosis are the excretory-secretory (ES) antigens from muscle larvae (ML), but the specific…”
Get full text
Journal Article -
2
The Immune Protection Induced by a Serine Protease Inhibitor From the Foodborne Parasite Trichinella spiralis
Published in Frontiers in microbiology (11-07-2018)“…Serine protease inhibitors (SPI) are a superfamily of the proteins able to suppress serine protease activity, and may exert the major biological function in…”
Get full text
Journal Article -
3
Prime Number Generation Based On Pocklington's Theorem
Published in International journal of computer mathematics (01-01-2002)“…Public-key cryptosystems base their security on well-known number-theoretic problems, such as factorisation of a given number n . Hence, prime number…”
Get full text
Journal Article -
4
Computing Prime Factorization And Discrete Logarithms: From Index Calculus To Xedni Calculus
Published in International journal of computer mathematics (01-05-2003)“…The integer factorization problem (IFP), the finite field discrete logarithm problem (DLP) and the elliptic curve discrete logarithm problem (ECDLP) are…”
Get full text
Journal Article -
5
Computability, Learnability and Breakability in Cryptanalysis
Published in 2008 International Conference on Computational Intelligence for Modelling Control & Automation (01-12-2008)“…Cryptanalysis, the science and art of breaking secret codes, is both a mathematically intensive and a computational intelligence intensive subject. In the…”
Get full text
Conference Proceeding -
6
A simple verification method for the Goldbach conjecture
Published in International journal of mathematical education in science and technology (01-09-1994)“…In class, students are often curious about the fact that any even integer bigger than 4 is the sum of two prime numbers. They usually cannot understand why the…”
Get full text
Journal Article -
7
Study on Photon Dose of Ultra-intense and Ultra-short Laser Facility Based on Fully Monte-Carlo Simulation
Published in Yuanzineng kexue jishu (01-03-2023)“…The possibility of using lasers to achieve previously unobtainable states of matter in the laboratory gained much attention following the demonstration of the…”
Get full text
Journal Article -
8
Simple parallel algorithms for primality testing and integer factorization
Published in International journal of mathematical education in science and technology (01-05-1993)“…Primality testing and integer factorization are two classic problems in number theory and are believed to be computationally intractable. At present, no one…”
Get full text
Journal Article -
9
Study on the glasswares discovered in the underground palace of the Da Bao En Temple in the North Song Dynasty (AD960-ADl127) in Nanjing, China
Published in 中国科学:技术科学英文版 (2012)“…Built by the royal family in the Ming Dynasty,the Da Bao En Temple is known as the greatest temple in ancient Nanjing,whose predecessor is the Chang Gan Temple…”
Get full text
Journal Article -
10
Experimental study on the bank erosion and interaction with near-bank bed evolution due to fluvial hydraulic force
Published in International journal of sediment research (01-03-2015)“…Bank erosion is a typical process of lateral channel migration,which is accompanied by vertical bed evolution.As a main sediment source,the failed bank soil…”
Get full text
Journal Article -
11
Can Integer Factorization be in P?
Published in 2006 International Conference on Computational Inteligence for Modelling Control and Automation and International Conference on Intelligent Agents Web Technologies and International Commerce (CIMCA'06) (01-11-2006)“…Can the integer factorization problem be solved in polynomial time? or is the RSA public-key cryptosystem breakable in polynomial time? Answers to these…”
Get full text
Conference Proceeding -
12
A New K‐Ary Crisp Decision Tree Induction with Continuous Valued Attributes
Published in Chinese Journal of Electronics (01-09-2017)“…The simplicity and interpretability of decision tree induction makes it one of the more widely used machine learning methods for data classification. However,…”
Get full text
Journal Article -
13
Parameter identification and calibration of the Xin'anjiang model using the surrogate modeling approach
Published in 地球科学前沿:英文版 (2014)“…Practical experience has demonstrated that single objective functions, no matter how carefully chosen, prove to be inadequate in providing proper measurements…”
Get full text
Journal Article -
14
Secure Electronic and Mobile Commerce
“…Commerce, particularly electronic commerce and mobile commerce (e/m-commerce for short), and security are related to each other and in fact are inseparable,…”
Get full text
Conference Proceeding -
15
Effect of Zr addition on microstructures and mechanical properties of Ni-46Ti-4Al alloy
Published in Rare metals (01-10-2011)“…The microstructures and mechanical properties of Ni-(46-x)Ti-4Al-xZr (x = 0-8, at.%) alloys have been investigated by scanning electron microscopy (SEM),…”
Get full text
Journal Article -
16
A Novel Verification Approach of Workflow Schema
Published in Wuhan University journal of natural sciences (01-09-2006)“…A workflow schema is an abstract description of the business processed by workflow model, and plays a critical role in analyzing, executing and reorganizing…”
Get full text
Journal Article -
17
Cache-Conscious Index Mechanism for Main-Memory Databases
Published in Wuhan University journal of natural sciences (2006)“…Recent studies have addressed that the cache be havior is important in the design of main memory index structures. Cache-conscious indices such as the…”
Get full text
Journal Article