Advanced search    

Search: authors:"Chao Feng"

68 papers found.
Use AND, OR, NOT, +word, -word, "long phrase", (parentheses) to fine-tune your search.

The downregulation of lncRNA EMX2OS might independently predict shorter recurrence-free survival of classical papillary thyroid cancer

) Author Contributions Conceptualization: Yi Gu. Data curation: Yi Gu, Lan Yang. Formal analysis: Yi Gu, Chao Feng, Lan Yang. Methodology: Yi Gu, Bowei Zhang, Lan Yang. Project administration: Yi Gu ... . Software: Chao Feng, Tong Liu. Validation: Yi Gu, Tong Liu, Lan Yang. Writing ? original draft: Yi Gu, Chao Feng, Bowei Zhang, Lan Yang. Writing ? review & editing: Bowei Zhang, Lan Yang. 10 / 12 11 / 12

Nonlinear Dynamics of a Vibratory Cone Crusher with Hysteretic Force and Clearances

Based on the analysis on crushing process and hysteresis of material layers, a hysteretic model with symmetrical clearances is presented. The mechanical model of two-degree of freedom with bilinear hysteresis and its dynamical equations of system are proposed. In order to further investigate the dynamic characteristics of the novel vibratory cone crusher, the system is also...

Nonlinear Dynamics of a Vibratory Cone Crusher with Hysteretic Force and Clearances

Based on the analysis on crushing process and hysteresis of material layers, a hysteretic model with symmetrical clearances is presented. The mechanical model of two-degree of freedom with bilinear hysteresis and its dynamical equations of system are proposed. In order to further investigate the dynamic characteristics of the novel vibratory cone crusher, the system is also...

Large herbivores influence plant litter decomposition by altering soil properties and plant quality in a meadow steppe

Large herbivores act as a major driver of plant litter decomposition in grasslands. The modifications of soil biotic and abiotic properties, as well as the changes in quality (C/N ratio) of plant litter, are two key pathways by which large herbivores can affect litter decomposition. Yet we know little about the relative role of these two mechanisms in mediating decomposition...

Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning

Buffer overflow vulnerability is a kind of consequence in which programmers’ intentions are not implemented correctly. In this paper, a static analysis method based on machine learning is proposed to assist in auditing buffer overflow vulnerabilities. First, an extended code property graph is constructed from the source code to extract seven kinds of static attributes, which are...

Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning

of Defense Technology (NUDT), Changsha, Hunan, China Correspondence should be addressed to Chao Feng; nc.ude.tdun@gnefoahc Received 1 July 2017; Revised 10 October 2017; Accepted 27 November 2017

A Storage Ring Based Free-Electron Laser for Generating Ultrashort Coherent EUV and X-ray Radiation

Generation of ultrashort coherent radiation pulses in the extreme ultraviolet (EUV) and x-ray regime is of remarkable interest in the synchrotron radiation user community. In this work, a novel technique is proposed for directly imprinting strong coherent microbunching on the electron beam with very small laser-induced energy spread. Theoretical analysis and numerical simulations...

A model-guided symbolic execution approach for network protocol implementations and vulnerability detection

. Visualization: Shameng Wen. Writing ± original draft: Shameng Wen. Writing ± review & editing: Shameng Wen, Qingkun Meng, Chao Feng, Chaojing Tang. 11 / 13 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23

Protocol vulnerability detection based on network traffic analysis and binary reverse engineering

Wen. Resources: Shameng Wen, Qingkun Meng. Software: Shameng Wen. Supervision: Shameng Wen, Chao Feng, Chaojing Tang. Validation: Shameng Wen. Visualization: Shameng Wen. Writing ± original draft

Probing into the Mechanism of Alkaline Citrus Extract Promoted Apoptosis in Pulmonary Fibroblasts of Bleomycin-Induced Pulmonary Fibrosis Mice

We extracted the primary pulmonary fibroblasts of the normal and bleomycin-induced pulmonary fibrosis mice and investigated the functioning mechanism of citrus alkaline extract (CAE) in the induction of pulmonary fibroblast apoptosis. The expression intensity of vimentin of the pulmonary fibroblasts in the model mice was higher than that in the normal mice. Meanwhile, the...

Polymorphisms at microRNA binding sites of Ara-C and anthracyclines-metabolic pathway genes are associated with outcome of acute myeloid leukemia patients

Gene polymorphisms at microRNA-binding sites (poly-miRTS) may affect gene transcription and expression through miRNA regulation, which is associated with cancer susceptibility, sensitivity to chemotherapy and prognosis. This study investigated the association between poly-miRTS of Ara-C/anthracycline metabolic pathways genes and the outcome of acute myeloid leukemia (AML) in...

The Influence of Shaft’s Bending on the Coupling Vibration of a Flexible Blade-Rotor System

, Northeastern University, Shenyang, Liaoning 110819, China Correspondence should be addressed to Chao-feng Li; moc.liamg@il.foahc Received 28 May 2016; Revised 14 December 2016; Accepted 16 February 2017 ... ; Published 19 March 2017 Academic Editor: Dane Quinn Copyright © 2017 Chao-feng Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits

The Influence of Shaft’s Bending on the Coupling Vibration of a Flexible Blade-Rotor System

, Northeastern University, Shenyang, Liaoning 110819, China Correspondence should be addressed to Chao-feng Li; moc.liamg@il.foahc Received 28 May 2016; Revised 14 December 2016; Accepted 16 February 2017 ... ; Published 19 March 2017 Academic Editor: Dane Quinn Copyright © 2017 Chao-feng Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits

Memory Vulnerability Diagnosis for Binary Program

Vulnerability diagnosis is important for program security analysis. It is a further step to understand the vulnerability after it is detected, as well as a preparatory step for vulnerability repair or exploitation. This paper mainly analyses the inner theories of major memory vulnerabilities and the threats of them. And then suggests some methods to diagnose several types of...

Malware Classification Based on the Behavior Analysis and Back Propagation Neural Network

With the development of the Internet, malwares have also been expanded on the network systems rapidly. In order to deal with the diversity and amount of the variants, a number of automated behavior analysis tools have emerged as the time requires. Yet these tools produce detailed behavior reports of the malwares, it still needs to specify its category and judge its criticality...

Memory Vulnerability Diagnosis for Binary Program

Vulnerability diagnosis is important for program security analysis. It is a further step to understand the vulnerability after it is detected, as well as a preparatory step for vulnerability repair or exploitation. This paper mainly analyses the inner theories of major memory vulnerabilities and the threats of them. And then suggests some methods to diagnose several types of...

Memory Vulnerability Diagnosis for Binary Program

Vulnerability diagnosis is important for program security analysis. It is a further step to understand the vulnerability after it is detected, as well as a preparatory step for vulnerability repair or exploitation. This paper mainly analyses the inner theories of major memory vulnerabilities and the threats of them. And then suggests some methods to diagnose several types of...

Malware Classification Based on the Behavior Analysis and Back Propagation Neural Network

With the development of the Internet, malwares have also been expanded on the network systems rapidly. In order to deal with the diversity and amount of the variants, a number of automated behavior analysis tools have emerged as the time requires. Yet these tools produce detailed behavior reports of the malwares, it still needs to specify its category and judge its criticality...

Isolation and Characterization of an Aluminum-resistant Mutant in Rice

Background Aluminum (Al) toxicity represents a major constraint for crop production on acid soils. Rice is a high Al-resistant plant species among small-grain cereals, but its molecular mechanisms of Al resistance are not fully understood. We adopted a forward genetic screen strategy to uncover the Al-resistance mechanisms in rice. In this study, we screened an ethylmethylsulfone...