Learn More
OBJECTIVES The objective of this study was to prepare a novel asymmetric chitosan guided bone regeneration (GBR) membrane, which is composed of a dense layer isolating the bone defect from the invasion of surrounding connective fibrous tissue and a loose layer which can improve cell adhesion and stabilize blood clots, thus guided bone regeneration. (More)
This article presents cross-sectional investigation results of ophthalmological effects for the occupational exposure to carbon disulfide of workers at a large viscose fibre factory in the middle part of China. The total of 271 exposed subjects (191 males, 80 females) and 133 workers (93 males, 40 females) not exposed to any toxic agent in the working(More)
—Provenance tracing is a very important approach to Advanced Persistent Threat (APT) attack detection and investigation. Existing techniques either suffer from the dependence explosion problem or have non-trivial space and run-time overhead, which hinder their application in practice. We propose ProTracer, a lightweight provenance tracing system that(More)
In this study, thermosensitive poly(N-isopropylacrylamide) (PNIPAAm) was grafted onto gelatin via atom transfer radical polymerization (ATRP). The chemical structure of PNIPAAm-grafted gelatin (Gel-PNIPAAm) was confirmed by XPS, ATR-IR, and (1)H NMR characterizations. Gel-PNIPAAm aqueous solution exhibited sol-to-gel transformation at physiological(More)
Modern software systems are becoming increasingly complex, relying on a lot of third-party library support. Library behaviors are hence an integral part of software behaviors. Analyzing them is as important as analyzing the software itself. However, analyzing libraries is highly challenging due to the lack of source code, implementation in different(More)
Bacterial adhesion and biofilm formation are the primary causes of implant-associated infection, which is difficult to eliminate and may induce failure in dental implants. Chimeric peptides with both binding and antimicrobial motifs may provide a promising alternative to inhibit biofilm formation on titanium surfaces. In this study, chimeric peptides were(More)
Advanced cyber attacks consist of multiple stages aimed at being stealthy and elusive. Such attack patterns leave their footprints spatio-temporally dispersed across <i>many different logs</i> in victim machines. However, existing log-mining intrusion analysis systems typically target only a single type of log to discover evidence of an attack and therefore(More)
OBJECTIVE This cross-sectional study investigates the cardiovascular effects among Chinese workers who were occupationally exposed to carbon disulfide (CS2), and evaluates the protective value of the current Chinese Maximum Allowable Concentration (MAC) of CS2 against cardiovascular effects. METHODS The measurements of exposure were performed by personal(More)
Audit logging is an important approach to cyber attack investigation. However, traditional audit logging either lacks accuracy or requires expensive and complex binary instrumentation. In this paper, we propose a Windows based audit logging technique that features accuracy and low cost. More importantly, it does not require instrumenting the applications,(More)
In addition to providing maneuverability, electrospun nanofibrous meshes can make excellent supports for constructing flexible cell sheets to regulate cell behavior by nanofiber features. With the target of bone regeneration, herein composite nanofibers with two different fiber arrangements (nestlike, random) were electrospun from a blend solution(More)