-
Dec 28, 2024 |
mdpi.com | Zheng Wang
1. IntroductionCamouflaged object segmentation (COS) [1] is the task of extracting objects that are harmoniously blended with their ambient surroundings. Camouflaged objects are ubiquitous in nature and human society, including polyps in the medical field [2,3,4,5], defects in the industrial field [6,7], objects blurred by bad weather or light in the transportation field [8], and artistic creation objects in the entertainment and art fields [9].
-
Dec 13, 2024 |
mdpi.com | Zheng Wang
1. IntroductionBreast cancer (BC) is one of the most prevalent cancers worldwide, representing the second leading cause of cancer-related mortality among women globally [1].
-
Nov 26, 2024 |
tandfonline.com | Zheng Wang
AbstractCommunity engagement in China is mostly understood as absent, tokenistic and characterised by the state’s carrot and stick model of compensation and repression. Drawing on Shanghai Lingang and by looking beyond the process of resettlement, I demonstrate instances where residents can bargain and force concessions from the state and influence development outcomes. To ensure social stability, Lingang’s resettled residents are offered compensation.
-
Nov 12, 2024 |
mdpi.com | Zheng Wang
-
Nov 1, 2024 |
science.org | Spencer Shelton |Megan Cole |Mengjie Zhang |Zheng Wang
AbstractHarnessing the immunogenic potential of senescent tumor cells provides an opportunity to remodel tumor microenvironment (TME) and boost antitumor immunity. However, this potential needs to be sophisticatedly wielded to avoid additional immunosuppressive capacity of senescent cells.
-
Oct 2, 2024 |
mdpi.com | Yue Yang |Yumin Wang |Chunqing He |Zheng Wang
All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess.
-
Sep 27, 2024 |
dialnet.unirioja.es | Zheng Wang
Ayuda Buscar en la ayuda Buscar en la ayuda Personality as a factor affecting the use of language learning strategies. Jakub Przybył & Mirosław Pawlak (2023). Cham(Switzerland), Springer Nature Switzerland AG. ISBN 978-3-031-25254-9 Wang, Zheng [1] [1] Xiamen University Tan Kah Kee College Localización: Porta Linguarum: revista internacional de didáctica de las lenguas extranjeras, ISSN 1697-7467, Nº.
-
Aug 23, 2024 |
mdpi.com | Yiming Bai |Yiqi Wang |Zheng Wang |Kai Zheng
1. IntroductionIn recent years, the continuous improvement in living standards has led to an increase in water-based industrial and recreational activities. This has led to a corresponding annual rise in the incidence of water-related accidents. According to data from the China Maritime Search and Rescue Center, the number of coordinated search and rescue operations from 2015 to 2023 was 1887, 1996, 2053, 1925, 1918, 1745, 1924, and 2112, respectively.
-
Aug 23, 2024 |
mdpi.com | Lili Wang |Xiaofan Lv |Zheng Wang |Huachun Xiang
All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess.
-
Aug 19, 2024 |
mdpi.com | Zheng Wang |Lin Zhong |Yujue Wang |Liutao Zhao
1. IntroductionSecuring data trading [1,2,3,4,5,6] is of paramount importance in today’s interconnected digital landscape. As the volume of data exchanged across platforms and borders continues to escalate, the potential vulnerabilities and threats to data integrity and privacy also increase. Effective security measures in data trading not only protect sensitive information from unauthorized access and cyber threats but also ensure the maintenance of trust between trading partners.