•  58
    Motivational Externalism and Misdescribing Cases
    American Journal of Bioethics Neuroscience 7 (4): 218-219. 2016.
    Ryan Darby, Judith Edersheim, and Bruce Price (DEP) argue that patients with Behavioral-Variant Frontotemporal Dementia have intact moral knowledge. In effect, they assume a motivational externalist understanding of moral knowledge. We question this by probing the cases they present as evidence for their position.
  •  38
    Precision Security: Integrating Video Surveillance with Surrounding Environment Changes
    with Wenfeng Wang, Guiwei Zhang, Jing Qian, Peng Wei, Boqian Wu, and Hongwei Zheng
    Complexity 2018 1-10. 2018.
    Video surveillance plays a vital role in maintaining the social security although, until now, large uncertainty still exists in danger understanding and recognition, which can be partly attributed to intractable environment changes in the backgrounds. This article presents a brain-inspired computing of attention value of surrounding environment changes with a processes-based cognition model by introducing a ratio valueλof EC-implications within considered periods. Theoretical models for computat…Read more
  •  22
    Altered Basal Ganglia Network Integration in Schizophrenia
    with Mingjun Duan, Hui He, Yuchao Jiang, Sisi Jiang, Qiankun Xie, Yongxiu Lai, Cheng Luo, and Dezhong Yao
    Frontiers in Human Neuroscience 9. 2015.
  •  16
    Pseudorandom Number Generator Based on Three Kinds of Four-Wing Memristive Hyperchaotic System and Its Application in Image Encryption
    with Shuai Qian, Fei Yu, Zinan Zhang, Hui Shen, Yuanyuan Huang, Shuo Cai, Zelin Deng, Yi Li, and Sichun Du
    Complexity 2020 1-17. 2020.
    In this paper, we propose a method to design the pseudorandom number generator using three kinds of four-wing memristive hyperchaotic systems with different dimensions as multientropy sources. The principle of this method is to obtain pseudorandom numbers with good randomness by coupling XOR operation on the three kinds of FWMHSs with different dimensions. In order to prove its potential application in secure communication, the security of PRNG based on this scheme is analyzed from the perspecti…Read more
  •  15
    How to justify a backing’s eligibility for a warrant: the justification of a legal interpretation in a hard case
    with Shiyang Yu
    Artificial Intelligence and Law 31 (2): 239-268. 2023.
    The Toulmin model has been proved useful in law and argumentation theory. This model describes the basic process in justifying a claim, which comprises six elements, i.e., claim (C), data (D), warrant (W), backing (B), qualifier (Q), and rebuttal (R). Specifically, in justifying a claim, one must put forward ‘data’ and a ‘warrant’, whereas the latter is authorized by ‘backing’. The force of the ‘claim’ being justified is represented by the ‘qualifier’, and the condition under which the claim can…Read more
  •  14
    Corrigendum to “Introducing a Chaotic Component in the Control System of Soil Respiration”
    with Peng An, Wen-Feng Wang, Jing Qian, and Yunzhu Pan
    Complexity 2022 1-2. 2022.
  •  12
    This paper constructs a predictive model of student reading literacy based on data from students who participated in the Program for International Student Assessment from four provinces/municipalities of China, i.e., Beijing, Shanghai, Jiangsu and Zhejiang. We calculated the contribution of influencing factors in the model by using eXtreme Gradient Boosting algorithm and sHapley additive exPlanations values, and get the following findings: Factors that have the greatest impact on students’ readi…Read more
  •  11
    Individuals with different levels of education have substantial differences in their willingness to communicate with malicious nodes in a group; thus, the results of evolution of opinions tend to differ significantly. In this study, malicious nodes, driven by the benefits of a game, were added to groups of individuals with different levels of education, and a theoretical model of the game theory of group opinions that introduces malicious nodes was established. The influence of the proportion of…Read more
  •  10
    Reach-Avoid Games with a Time Limit and Detection Range: A Geometric Approach
    with Jianqiao Yu, Kang Niu, and Jiaxun di YangLi
    Complexity 2022 1-24. 2022.
    The reach-avoid game theory is an ideal tool to handle the conflicts among intelligent agents and has been previously studied assuming full state information and no time limits on the players in the past decades. In this article, we extend the problem by requiring the defender to detect the attacker and adding maximum operation time constraints to the attacker. The attacker aims to reach the target region without being captured or reaching its time limit. The defender can employ strategies to in…Read more
  •  9
    Chaos-Based Engineering Applications with a 6D Memristive Multistable Hyperchaotic System and a 2D SF-SIMM Hyperchaotic Map (review)
    with Fei Yu, Shuai Qian, Yuanyuan Huang, Shuo Cai, Jie Jin, and Sichun Du
    Complexity 2021 1-21. 2021.
    In recent years, the research of chaos theory has developed from simple cognition and analysis to practical engineering application. In particular, hyperchaotic systems with more complex and changeable chaotic characteristics are more sensitive and unpredictable, so they are widely used in more fields. In this paper, two important engineering applications based on hyperchaos pseudorandom number generator and image encryption are studied. Firstly, the coupling 6D memristive hyperchaotic system an…Read more
  •  9
    The Effect of Physical Activity on Drug Cravings of Drug Addicts With AIDS: The Dual Mediating Effect of Internal Inhibition
    with Tingran Zhang, Kun Wang, Meichen Qu, Haonan Jiang, and Jiong Luo
    Frontiers in Psychology 11. 2020.
  •  8
    Information-sharing behavior is affected by identity recognition perception. The current study aims to delve into the impact of familiarity and anonymity on information-sharing behavior, and the mediating role of intrinsic motivations on WeChat Moments. We hypothesized a mediator role of intrinsic motivations in the relationship between an individual’s perceptions and information sharing. Based on the self-determination theory, a model was created and tested using a sample of 531 frequent users.…Read more
  •  8
    Xin shi dai wen hua yi shu si xiang yan jiu bao gao ji (edited book)
    Wen hua yi shu chu ban she. 2021.
  •  7
    Negative Emotion Arousal and Altruism Promoting of Online Public Stigmatization on COVID-19 Pandemic
    with Chenli Huang, Hongyun Wang, Weiming Wang, Xiangli Ni, and Yujie Li
    Frontiers in Psychology 12 652140. 2021.
    The outbreak of COVID-19 is a public health crisis that has had a profound impact on society. Stigma is a common phenomenon in the prevalence and spread of infectious diseases. In the crisis caused by the pandemic, widespread public stigma has influenced social groups. This study explores the negative emotions arousal effect from online public stigmatization during the COVID-19 pandemic and the impact on social cooperation. We constructed a model based on the literature and tested it on a sample…Read more
  •  6
    Neuronal Morphological Model-Driven Image Registration for Serial Electron Microscopy Sections
    with Fangxu Zhou, Bohao Chen, and Hua Han
    Frontiers in Human Neuroscience 16. 2022.
    Registration of a series of the two-dimensional electron microscope images of the brain tissue into volumetric form is an important technique that can be used for neuronal circuit reconstruction. However, complex appearance changes of neuronal morphology in adjacent sections bring difficulty in finding correct correspondences, making serial section neural image registration challenging. To solve this problem, we consider whether there are such stable "markers" in the neural images to alleviate r…Read more
  •  6
    One heated argument in recent years concerns whether requiring real names supervision on social media will inhibit users' participation in discoursing online speech. The current study explores the impact of identification, perceived anonymity, perceived risk, and information credibility on participating in discussions on moral/ethical violations event on social network sites (SNS) in China. In this study, we constructed a model based on the literature and tested it on a sample of 218 frequent SN…Read more
  •  5
    Origins of Informal Coercion in China
    Politics and Society 45 (1): 67-89. 2017.
    Informal coercive tactics play an important role in maintaining political and social order in authoritarian regimes today, a fact variously attributed to the state’s incapacity to monopolize coercive force and to the strategic concealment of repression from international society. Studying the coercive tactics used by the Chinese government, this article directs attention to how state institutions and strategies create incentives for state agents to delegate coercion to third parties. In particul…Read more
  •  5
    A survey of ethical sensitivity among nursing students and its influencing factors
    with Juan Hu, Kaveh Khoshnood, Esther Luo, Taeko Muramatsu, and Min Yang
    Nursing Ethics. forthcoming.
    Background Nurses frequently experience ethical issues in their area of practice. In the challenging reality of today’s healthcare environment, nursing students need to be prepared to deal with ethical issues in their future roles. Nevertheless, Chinese nursing students’ ethical sensitivity status and the factors influencing it have not been described. Objective This study aims to explore the level of ethical sensitivity and its influencing factors among Chinese nursing students. Research design…Read more
  •  3
    Providing compassionate care via eHealth
    with Jing Jing Su, Jonathan Bayuo, Rose S. Y. Lin, Ladislav Batalik, Hammoda Abu-Odah, and Engle Angela Chan
    Nursing Ethics. forthcoming.
    Background eHealth was widely used during the COVID-19 pandemic. Much attention was given to the technical aspects of eHealth, such as infrastructure and cost, while the soft skill of compassion remained underexplored. The wide belief in compassionate care is more compatible with in-person interactions but difficult to deliver via e-platforms where personal and environmental clues were lacking urges studying this topic. Purpose to explore the experience of delivering compassionate care via an eH…Read more
  •  3
    Previous studies have found the effect of cognitive skills on reading ability, but the role of different reading-related skills in acquisition of Chinese as a second/foreign language remains unexplored. Prior meta-analyses on the relationship between cognitive skills and reading have been conducted primarily in native English-speaking or Mandarin-speaking children. The purpose of the present meta-analysis was to examine the relationship between Chinese reading-related skills and Chinese word rea…Read more
  • Xi Chen explores the question of why there has been a dramatic rise in and routinization of social protests in China since the early 1990s. Drawing on case studies, in-depth interviews and a unique data set of about 1,000 government records of collective petitions, this book examines how the political structure in Reform China has encouraged Chinese farmers, workers, pensioners, disabled people and demobilized soldiers to pursue their interests and claim their rights by staging collective protes…Read more