•  1
    Exploiting variability for energy optimization of parallel programs
    with W. Lavrijsen, C. Iancu, Jong W. De, and K. Schwan
    Copyright © 2016 is held by owner/author.In this paper we present optimizations that use DVFS mechanisms to reduce the total energy usage in scientific applications. Our main insight is that noise is intrinsic to large scale parallel executions and it appears whenever shared resources are contended. The presence of noise allows us to identify and manipulate any program regions amenable to DVFS. When compared to previous energy optimizations that make per core decisions using predictions of the r…Read more
  •  3
    Knowledge of three-dimensional structures of each individual particles of asymmetric and flexible proteins is essential in understanding those proteins' functions; but their structures are difficult to determine. Electron tomography provides a tool for imaging a single and unique biological object from a series of tilted angles, but it is challenging to image a single protein for three-dimensional reconstruction due to the imperfect mechanical control capability of the specimen goniometer under …Read more
  • The Yr5 gene confers resistance to all races of the wheat stripe rust pathogen [Puccinia striiformis Westend. f. sp. tritici Eriks. ] identified so far in the USA. Cosegregating resistance gene analog polymorphism markers for Yr5 are available but their use requires skills in polyacrylamide gel electrophoresis and may not be polymorphic across various varieties. To develop better markers to be used in marker-assisted selection for the Yr5 resistance, sequence tagged site primers were designed on…Read more
  •  6
    © 2015 Macmillan Publishers Limited All rights reserved. Genome-wide gene expression measurements have enabled comprehensive studies that integrate the changes of gene expression and phenotypic information to uncover their novel associations. Here we reported the association analysis between psychophysical phenotypes and genome-wide gene expression changes in human adaptation to one of the most extreme climates on Earth, the Antarctic Dome Argus. Dome A is the highest ice feature in Antarctica, …Read more
  •  1
    © 2014 Li et al. Aedes albopictus is a very invasive and aggressive insect vector that causes outbreaks of dengue fever, chikungunya disease, and yellow fever in many countries. Vector ecology and disease epidemiology are strongly affected by environmental changes. Urbanization is a worldwide trend and is one of the most ecologically modifying phenomena. The purpose of this study is to determine how environmental changes due to urbanization affect the ecology of Aedes albopictus. Aquatic habitat…Read more
  •  25
    Dc-bias-field-induced dielectric relaxation and ac conduction in CaCu3Ti4O12ceramics
    with L. Liu, H. Fan, L. Wang, and P. Fang
    Philosophical Magazine 88 (4): 537-545. 2008.
  •  66
    Toward a Confucian Family-Oriented Health Care System for the Future of China
    with Y. Cao and R. Fan
    Journal of Medicine and Philosophy 36 (5): 452-465. 2011.
    Recently implemented Chinese health insurance schemes have failed to achieve a Chinese health care system that is family-oriented, family-based, family-friendly, or even financially sustainable. With this diagnosis in hand, the authors argue that a financially and morally sustainable Chinese health care system should have as its core family health savings accounts supplemented by appropriate health insurance plans. This essay’s arguments are set in the context of Confucian moral commitments that…Read more
  •  73
    NF-B mediates amyloid beta peptide-stimulated activity of the human apolipoprotein E gene promoter in human astroglial cells
    with Y. Du, X. Wei, K. R. Bales, D. T. Berg, S. M. Paul, M. R. Farlow, B. Maloney, Y. W. Ge, and D. K. Lahiri
    Brain Res Mol Brain Res 136 177-88. 2005.
    The apolipoprotein E gene plays an important role in the pathogenesis of Alzheimer's disease , and amyloid plaque comprised mostly of the amyloid-beta peptide ) is one of the major hallmarks of AD. However, the relationship between these two important molecules is poorly understood. We examined how A treatment affects APOE expression in cultured cells and tested the role of the transcription factor NF-B in APOE gene regulation. To delineate NF-B's role, we have characterized a 1098 nucleotide se…Read more
  •  3
    Providing compassionate care via eHealth
    with Jing Jing Su, Jonathan Bayuo, Rose S. Y. Lin, Ladislav Batalik, Hammoda Abu-Odah, and Engle Angela Chan
    Nursing Ethics. forthcoming.
    Background eHealth was widely used during the COVID-19 pandemic. Much attention was given to the technical aspects of eHealth, such as infrastructure and cost, while the soft skill of compassion remained underexplored. The wide belief in compassionate care is more compatible with in-person interactions but difficult to deliver via e-platforms where personal and environmental clues were lacking urges studying this topic. Purpose to explore the experience of delivering compassionate care via an eH…Read more
  •  9
    A survey of ethical sensitivity among nursing students and its influencing factors
    with Juan Hu, Kaveh Khoshnood, Esther Luo, Taeko Muramatsu, and Min Yang
    Nursing Ethics. forthcoming.
    Background Nurses frequently experience ethical issues in their area of practice. In the challenging reality of today’s healthcare environment, nursing students need to be prepared to deal with ethical issues in their future roles. Nevertheless, Chinese nursing students’ ethical sensitivity status and the factors influencing it have not been described. Objective This study aims to explore the level of ethical sensitivity and its influencing factors among Chinese nursing students. Research design…Read more
  •  24
    Pseudorandom Number Generator Based on Three Kinds of Four-Wing Memristive Hyperchaotic System and Its Application in Image Encryption
    with Shuai Qian, Fei Yu, Zinan Zhang, Hui Shen, Yuanyuan Huang, Shuo Cai, Zelin Deng, Yi Li, and Sichun Du
    Complexity 2020 1-17. 2020.
    In this paper, we propose a method to design the pseudorandom number generator using three kinds of four-wing memristive hyperchaotic systems with different dimensions as multientropy sources. The principle of this method is to obtain pseudorandom numbers with good randomness by coupling XOR operation on the three kinds of FWMHSs with different dimensions. In order to prove its potential application in secure communication, the security of PRNG based on this scheme is analyzed from the perspecti…Read more
  •  74
    Motivational Externalism and Misdescribing Cases
    American Journal of Bioethics Neuroscience 7 (4): 218-219. 2016.
    Ryan Darby, Judith Edersheim, and Bruce Price (DEP) argue that patients with Behavioral-Variant Frontotemporal Dementia have intact moral knowledge. In effect, they assume a motivational externalist understanding of moral knowledge. We question this by probing the cases they present as evidence for their position.
  •  100
    This essay illustrates what the Chinese family-based and harmony-oriented model of medical decision making is like as well as how it differs from the modern Western individual-based and autonomy-oriented model in health care practice. The essay discloses the roots of the Chinese model in the Confucian account of the family and the Confucian view of harmony. By responding to a series of questions posed to the Chinese model by modern Western scholars in terms of the basic individualist concerns an…Read more
  •  11
    Xin shi dai wen hua yi shu si xiang yan jiu bao gao ji (edited book)
    Wen hua yi shu chu ban she. 2021.
  •  12
    Reach-Avoid Games with a Time Limit and Detection Range: A Geometric Approach
    with Jianqiao Yu, Kang Niu, and Jiaxun di YangLi
    Complexity 2022 1-24. 2022.
    The reach-avoid game theory is an ideal tool to handle the conflicts among intelligent agents and has been previously studied assuming full state information and no time limits on the players in the past decades. In this article, we extend the problem by requiring the defender to detect the attacker and adding maximum operation time constraints to the attacker. The attacker aims to reach the target region without being captured or reaching its time limit. The defender can employ strategies to in…Read more
  •  13
    This paper constructs a predictive model of student reading literacy based on data from students who participated in the Program for International Student Assessment from four provinces/municipalities of China, i.e., Beijing, Shanghai, Jiangsu and Zhejiang. We calculated the contribution of influencing factors in the model by using eXtreme Gradient Boosting algorithm and sHapley additive exPlanations values, and get the following findings: Factors that have the greatest impact on students’ readi…Read more
  •  10
    Neuronal Morphological Model-Driven Image Registration for Serial Electron Microscopy Sections
    with Fangxu Zhou, Bohao Chen, and Hua Han
    Frontiers in Human Neuroscience 16. 2022.
    Registration of a series of the two-dimensional electron microscope images of the brain tissue into volumetric form is an important technique that can be used for neuronal circuit reconstruction. However, complex appearance changes of neuronal morphology in adjacent sections bring difficulty in finding correct correspondences, making serial section neural image registration challenging. To solve this problem, we consider whether there are such stable "markers" in the neural images to alleviate r…Read more
  •  23
    Corrigendum to “Introducing a Chaotic Component in the Control System of Soil Respiration”
    with Peng An, Wen-Feng Wang, Jing Qian, and Yunzhu Pan
    Complexity 2022 1-2. 2022.
  •  8
    Previous studies have found the effect of cognitive skills on reading ability, but the role of different reading-related skills in acquisition of Chinese as a second/foreign language remains unexplored. Prior meta-analyses on the relationship between cognitive skills and reading have been conducted primarily in native English-speaking or Mandarin-speaking children. The purpose of the present meta-analysis was to examine the relationship between Chinese reading-related skills and Chinese word rea…Read more
  •  17
    How to justify a backing’s eligibility for a warrant: the justification of a legal interpretation in a hard case
    with Shiyang Yu
    Artificial Intelligence and Law 31 (2): 239-268. 2023.
    The Toulmin model has been proved useful in law and argumentation theory. This model describes the basic process in justifying a claim, which comprises six elements, i.e., claim (C), data (D), warrant (W), backing (B), qualifier (Q), and rebuttal (R). Specifically, in justifying a claim, one must put forward ‘data’ and a ‘warrant’, whereas the latter is authorized by ‘backing’. The force of the ‘claim’ being justified is represented by the ‘qualifier’, and the condition under which the claim can…Read more
  •  13
    Negative Emotion Arousal and Altruism Promoting of Online Public Stigmatization on COVID-19 Pandemic
    with Chenli Huang, Hongyun Wang, Weiming Wang, Xiangli Ni, and Yujie Li
    Frontiers in Psychology 12 652140. 2021.
    The outbreak of COVID-19 is a public health crisis that has had a profound impact on society. Stigma is a common phenomenon in the prevalence and spread of infectious diseases. In the crisis caused by the pandemic, widespread public stigma has influenced social groups. This study explores the negative emotions arousal effect from online public stigmatization during the COVID-19 pandemic and the impact on social cooperation. We constructed a model based on the literature and tested it on a sample…Read more
  •  13
    Individuals with different levels of education have substantial differences in their willingness to communicate with malicious nodes in a group; thus, the results of evolution of opinions tend to differ significantly. In this study, malicious nodes, driven by the benefits of a game, were added to groups of individuals with different levels of education, and a theoretical model of the game theory of group opinions that introduces malicious nodes was established. The influence of the proportion of…Read more
  •  15
    Chaos-Based Engineering Applications with a 6D Memristive Multistable Hyperchaotic System and a 2D SF-SIMM Hyperchaotic Map (review)
    with Fei Yu, Shuai Qian, Yuanyuan Huang, Shuo Cai, Jie Jin, and Sichun Du
    Complexity 2021 1-21. 2021.
    In recent years, the research of chaos theory has developed from simple cognition and analysis to practical engineering application. In particular, hyperchaotic systems with more complex and changeable chaotic characteristics are more sensitive and unpredictable, so they are widely used in more fields. In this paper, two important engineering applications based on hyperchaos pseudorandom number generator and image encryption are studied. Firstly, the coupling 6D memristive hyperchaotic system an…Read more
  •  7
    Origins of Informal Coercion in China
    Politics and Society 45 (1): 67-89. 2017.
    Informal coercive tactics play an important role in maintaining political and social order in authoritarian regimes today, a fact variously attributed to the state’s incapacity to monopolize coercive force and to the strategic concealment of repression from international society. Studying the coercive tactics used by the Chinese government, this article directs attention to how state institutions and strategies create incentives for state agents to delegate coercion to third parties. In particul…Read more
  •  10
    One heated argument in recent years concerns whether requiring real names supervision on social media will inhibit users' participation in discoursing online speech. The current study explores the impact of identification, perceived anonymity, perceived risk, and information credibility on participating in discussions on moral/ethical violations event on social network sites (SNS) in China. In this study, we constructed a model based on the literature and tested it on a sample of 218 frequent SN…Read more