Yi Tang
YOU?
Author Swipe
View article: Flexibility-Engineered Nb2O5 Carbon Nanofiber Film Anodes: Concentration-Dependent Optimization for Mechanically Robust and Stable Sodium Storage
Flexibility-Engineered Nb2O5 Carbon Nanofiber Film Anodes: Concentration-Dependent Optimization for Mechanically Robust and Stable Sodium Storage Open
This study systematically investigates the correlation between the concentration of niobium oxide (Nb2O5) in carbon nanofibers (CNFs) and the microstructural characteristics and electrochemical performance of the composites. Through ration…
View article: Research on the Application of Surrealism in the Art Design of the Film an Andalu Dog
Research on the Application of Surrealism in the Art Design of the Film an Andalu Dog Open
View article: A Look-Ahead Dispatch Method Via Evolution Strategies Embedded with Domain Knowledge
A Look-Ahead Dispatch Method Via Evolution Strategies Embedded with Domain Knowledge Open
View article: Development of a nomogram for predicting overall survival in patients with urinary bladder carcinoma in situ based on SEER database analysis
Development of a nomogram for predicting overall survival in patients with urinary bladder carcinoma in situ based on SEER database analysis Open
View article: Underwater Image Enhancement by Transformer-based Diffusion Model with Non-uniform Sampling for Skip Strategy
Underwater Image Enhancement by Transformer-based Diffusion Model with Non-uniform Sampling for Skip Strategy Open
In this paper, we present an approach to image enhancement with diffusion model in underwater scenes. Our method adapts conditional denoising diffusion probabilistic models to generate the corresponding enhanced images by using the underwa…
View article: Periodic Intermittent Adaptive Control with Saturation for Pinning Quasi-Consensus of Heterogeneous Multi-Agent Systems with External Disturbances
Periodic Intermittent Adaptive Control with Saturation for Pinning Quasi-Consensus of Heterogeneous Multi-Agent Systems with External Disturbances Open
A periodic intermittent adaptive control method with saturation is proposed to pin the quasi-consensus of nonlinear heterogeneous multi-agent systems with external disturbances in this paper. A new periodic intermittent adaptive control pr…
View article: EEG decoding for effects of visual joint attention training on ASD patients with interpretable and lightweight convolutional neural network
EEG decoding for effects of visual joint attention training on ASD patients with interpretable and lightweight convolutional neural network Open
Visual joint attention, the ability to track gaze and recognize intent, plays a key role in the development of social and language skills in health humans, which is performed abnormally hard in autism spectrum disorder (ASD). The tradition…
View article: Fetish, Shaman and Root Seeking — Evgeny Antufiev’s Maze
Fetish, Shaman and Root Seeking — Evgeny Antufiev’s Maze Open
This essay is mainly about Evgeny Antufiev’s solo exhibition: “Twelve, wood, dolphin, knife, bowl, mask, crystal, marble and bones — fusion. Exploring material”. Analyzing his motivation and final presentation, aiming to grasp the unique n…
View article: Analysis of the Application of Blockchain in the Military Supply Chain
Analysis of the Application of Blockchain in the Military Supply Chain Open
The military manufacturing is a complex and huge industry. With the rapid development of economic globalization and the deepening of industrial division of labor, issues such as trust management between enterprises, privacy protection duri…
View article: Website fingerprinting on early QUIC traffic
Website fingerprinting on early QUIC traffic Open
View article: Continuous LWE
Continuous LWE Open
We introduce a continuous analogue of the Learning with Errors (LWE) problem, which we name CLWE. We give a polynomial-time quantum reduction from worst-case lattice problems to CLWE, showing that CLWE enjoys similar hardness guarantees to…
View article: Research on Network Security Risk Assessment Model Based on Grey Language Variables
Research on Network Security Risk Assessment Model Based on Grey Language Variables Open
In order to realize effective network security risk assessment, in the process of quantifying qualitative assessment, in order to eliminate the fuzziness of qualitative assessment and the uncertainty caused by lack of information, this pap…
View article: Canvass: A Crowd-Sourced, Natural Product Screening Library for Exploring Biological Space
Canvass: A Crowd-Sourced, Natural Product Screening Library for Exploring Biological Space Open
Natural products and their derivatives continue to be wellsprings of nascent therapeutic potential. However, many laboratories have limited resources for biological evaluation, leaving their previously isolated or synthesized compounds lar…
View article: A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT
A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT Open
As a method for increasing throughput and improving reliability of routing, network coding has been widely used in decentralized IoT systems. When files are shared in the system, network coding signature techniques can help authenticate wh…
View article: Study on Charging Management in Colleges and Universities
Study on Charging Management in Colleges and Universities Open
In this paper, taking the charging management in colleges and universities as the research object, the problems existing in college charging work has been analyzed deeply, and the improvement measure have been proposed to solve the problem…
View article: Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection
Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection Open
With the wide deployment of cloud computing, many security challenges have arisen, such as data and storage integrity and virtualization security. The crisis of trust caused by these security issues has become one of the important factors …
View article: An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain
An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain Open
Identity-based cryptosystems mean that public keys can be directly derived from user identifiers, such as telephone numbers, email addresses, and social insurance number, and so on. So they can simplify key management procedures of certifi…