123 results on '"Chen, Jinjun"'
Search Results
102. FRI211 - Using bilirubin to define hepatotropic insult in patients with chronic liver disease and acute exacerbation: a prospective multicenter cohort study.
- Author
-
Qiao, Liang, Deng, Guohong, Wang, Xian-Bo, Zheng, Xin, Huang, Yan, Chen, Jinjun, Meng, Zhong-Ji, Gao, Yanhang, Qian, Zhi-Ping, Liu, Feng, Lu, Xiao-Bo, Shi, Yu, Shang, Jia, Liu, Jun Ping, Li, Hai, Wang, Shaoyang, Yin, Shan, Wenyi, Gu, and Zhang, Yan
- Subjects
- *
DISEASE exacerbation , *CHRONICALLY ill , *ACUTE diseases , *COHORT analysis , *CRITICALLY ill - Published
- 2020
- Full Text
- View/download PDF
103. FRI185 - Improving the survival rate of acute-on-chronic liver failure patients complicated with invasive pulmonary aspergillosis.
- Author
-
Chen, Danli, Qian, Zhiping, Su, Haibin, Meng, Zhong-ji, Lv, Jun, Huang, Yan, Gao, Yanhang, Liu, Jingyuan, Zhao, Caiyan, Gao, Hongbo, Chen, Yu, Xia, Jie, PENG, Liang, Han, Tao, Hu, Jinhua, Shi, Yu, and Chen, Jinjun
- Subjects
- *
PULMONARY aspergillosis , *LIVER failure - Published
- 2020
- Full Text
- View/download PDF
104. A Highly Practical Approach toward Achieving Minimum Data Sets Storage Cost in the Cloud.
- Author
-
Yuan, Dong, Yang, Yun, Liu, Xiao, Li, Wenhao, Cui, Lizhen, Xu, Meng, and Chen, Jinjun
- Subjects
- *
CLOUD computing , *BACK up systems , *BENCHMARK testing (Engineering) , *MATHEMATICAL models , *COMPUTER algorithms , *COST effectiveness - Abstract
Massive computation power and storage capacity of cloud computing systems allow scientists to deploy computation and data intensive applications without infrastructure investment, where large application data sets can be stored in the cloud. Based on the pay-as-you-go model, storage strategies and benchmarking approaches have been developed for cost-effectively storing large volume of generated application data sets in the cloud. However, they are either insufficiently cost-effective for the storage or impractical to be used at runtime. In this paper, toward achieving the minimum cost benchmark, we propose a novel highly cost-effective and practical storage strategy that can automatically decide whether a generated data set should be stored or not at runtime in the cloud. The main focus of this strategy is the local-optimization for the tradeoff between computation and storage, while secondarily also taking users' (optional) preferences on storage into consideration. Both theoretical analysis and simulations conducted on general (random) data sets as well as specific real world applications with Amazon's cost model show that the cost-effectiveness of our strategy is close to or even the same as the minimum cost benchmark, and the efficiency is very high for practical runtime utilization in the cloud. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
105. A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud.
- Author
-
Zhang, Xuyun, Liu, Chang, Nepal, Surya, Pandey, Suraj, and Chen, Jinjun
- Subjects
- *
CLOUD computing security measures , *COST effectiveness , *MATHEMATICAL bounds , *BACK up systems , *DATA encryption , *DATA privacy - Abstract
Cloud computing provides massive computation power and storage capacity which enable users to deploy computation and data-intensive applications without infrastructure investment. Along the processing of such applications, a large volume of intermediate data sets will be generated, and often stored to save the cost of recomputing them. However, preserving the privacy of intermediate data sets becomes a challenging problem because adversaries may recover privacy-sensitive information by analyzing multiple intermediate data sets. Encrypting ALL data sets in cloud is widely adopted in existing approaches to address this challenge. But we argue that encrypting all intermediate data sets are neither efficient nor cost-effective because it is very time consuming and costly for data-intensive applications to en/decrypt data sets frequently while performing any operation on them. In this paper, we propose a novel upper bound privacy leakage constraint-based approach to identify which intermediate data sets need to be encrypted and which do not, so that privacy-preserving cost can be saved while the privacy requirements of data holders can still be satisfied. Evaluation results demonstrate that the privacy-preserving cost of intermediate data sets can be significantly reduced with our approach over existing ones where all data sets are encrypted. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
106. Effect of CrylAb protein on hemocytes of the wolf spider Par do sa pseudoannulata.
- Author
-
Yixing Tian, Ying Zhou, Kaifu Xiao, Wang Zhi, Chen Jinjun, Xiangyang Lu, and Qisheng Song
- Subjects
- *
WOLF spiders , *BLOOD cells , *PHYSIOLOGICAL effects of proteins , *PARDOSA , *APOPTOSIS , *HEMOLYMPH , *CALCIUM ions - Abstract
Studies on the effect of CrylAb protein on hemocytes of the wolf spider Pardosa pseudoannulata revealed that CrylAb protein could accumulate in the four-instar and adult spiders via the food chain from transgenic rice expressing CrylAb protein through its prey brown planthoppers with approximate 20-time enrichment, but could not accumulate in hemolymph of the spider. The accumulated CrylAb had no significant effects on several elements of hemolymph including stored energy, calcium ion concentration and apoptosis rate of the hemocytes, indicating that CrylAb could not affect the hemocytes of P. pseudoannulata. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
107. An evaluation method of outsourcing services for developing an elastic cloud platform.
- Author
-
Dou, Wanchun, Qi, Lianyong, Zhang, Xuyun, and Chen, Jinjun
- Subjects
- *
CLOUD computing , *INFORMATION technology , *INTERNET , *COMPUTER storage capacity , *COMPUTER service industry , *QUALITY of service - Abstract
To gain and retain competitive advantages in a competitive business arena, a business cloud-computing platform should continuously strive to offer new services and remain competitive. Unfortunately, it becomes more and more recognized by the industry that a cloud-computing platform could not cover all aspects of IT layers engaged in infrastructure, platform and application. In practice, end users' requests are nearly unlimited; while the services held by a cloud-computing platform is relatively limited, no matter in service category or in service capacity. In view of this challenge, an elastic cloud platform is investigated by recruited outside services that are absent from the cloud platform. Concretely, through dynamically hiring a qualified service on Internet to replace the absent service inside a cloud platform, an elastic cloud platform could nearly provide unlimited capabilities in an outsourcing service way, e.g., computing power, storage, application functions, etc. At last, the validity of the method is evaluated by a case study. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
108. A QoS-aware composition method supporting cross-platform service invocation in cloud environment
- Author
-
Qi, Lianyong, Dou, Wanchun, Zhang, Xuyun, and Chen, Jinjun
- Subjects
- *
QUALITY of service , *CLOUD computing , *END users (Information technology) , *WEB services , *APPLICATION software , *APPROXIMATION theory , *CROSS-platform software development - Abstract
Abstract: With the increasing popularity of cloud computing technologies, more and more service composition processes are enacted and executed in could environment. Compared with the various and approximately infinite application requirements from end users, the web services held by a cloud platform are usually limited. Therefore, it is often a challenging effort to develop a service composition, in such a situation that only part of the functional qualified candidate services could be found inside a cloud platform. In this situation, the absent services will be invocated in a cross-platform way outside the cloud platform. In view of this challenge, a QoS-aware composition method is investigated for supporting cross-platform service invocation in cloud environment. Furthermore, some experiments are deployed to evaluate the method presented in this paper. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
109. On-demand minimum cost benchmarking for intermediate dataset storage in scientific cloud workflow systems
- Author
-
Yuan, Dong, Yang, Yun, Liu, Xiao, and Chen, Jinjun
- Subjects
- *
COST effectiveness , *COMPUTER storage devices , *WORKFLOW , *ELECTRONIC data processing , *CLOUD computing , *GRAPH theory - Abstract
Abstract: Many scientific workflows are data intensive: large volumes of intermediate datasets are generated during their execution. Some valuable intermediate datasets need to be stored for sharing or reuse. Traditionally, they are selectively stored according to the system storage capacity, determined manually. As doing science on clouds has become popular nowadays, more intermediate datasets in scientific cloud workflows can be stored by different storage strategies based on a pay-as-you-go model. In this paper, we build an intermediate data dependency graph (IDG) from the data provenances in scientific workflows. With the IDG, deleted intermediate datasets can be regenerated, and as such we develop a novel algorithm that can find a minimum cost storage strategy for the intermediate datasets in scientific cloud workflow systems. The strategy achieves the best trade-off of computation cost and storage cost by automatically storing the most appropriate intermediate datasets in the cloud storage. This strategy can be utilised on demand as a minimum cost benchmark for all other intermediate dataset storage strategies in the cloud. We utilise Amazon clouds’ cost model and apply the algorithm to general random as well as specific astrophysics pulsar searching scientific workflows for evaluation. The results show that benchmarking effectively demonstrates the cost effectiveness over other representative storage strategies. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
110. Expression, purification and characterization of a group of lectin-like peptides from the spider Ornithoctonus huwena
- Author
-
Jiang, Liping, Peng, Li, Zhang, Yongqun, Chen, Jinjun, Zhang, Dongyi, and Liang, Songping
- Subjects
- *
PEPTIDE fractionation , *GENE expression , *MOLECULAR cloning , *SPIDERS , *COMPLEMENTARY DNA , *AMINO acid sequence - Abstract
Abstract: By sequencing random clones from the venom gland cDNA library of the spider Ornithoctonus huwena, a transcript, named SHL-Ib1, encoding a lectin-like peptide was cloned. The amino acid sequence of the putative mature peptide of SHL-Ib1 is identical, except for seven different residues, with that of SHL-I, a lectin found in the venom of O. huwena. The mature peptides of SHL-Ib1b and SHL-Ib1c are the mutants of SHL-Ib1 with two or three amino acid residues truncated at the C-terminal. The recombinant SHL-Ib1b and SHL-Ib1c were expressed successfully by the yeast expression system and purified by using a combination of ion-exchange and reverse phase high performance liquid chromatography (HPLC). The molecular masses of the two expressed peptides were identified by mass spectrometry, indicating that the C-terminals of the two peptides were not amidated. The two peptides can agglutinate human erythrocytes at minimal concentrations of 0.75 and 1.475mg/ml, respectively. Structure modeling of SHL-Ib1 has given a clue to the low agglutination bioactivities of these recombinant toxins. These lectin-like peptides, due to the small molecular sizes, may have the advantage to investigate the binding mechanism of the lectin and have the potential to be the carrier for drug delivery. [Copyright &y& Elsevier]
- Published
- 2009
- Full Text
- View/download PDF
111. ERK1/2 mitogen-activated protein kinase mediates downregulation of intestinal tight junction proteins in heat stress-induced IBD model in pig.
- Author
-
Yong, Yanhong, Li, Junyu, Gong, Dongliang, Yu, Tianyue, Wu, Lianyun, Hu, Canying, Liu, Xiaoxi, Yu, Zhichao, Ma, Xingbin, Gooneratne, Ravi, El-Aty, A.M.Abd, Chen, Jinjun, and Ju, Xianghong
- Subjects
- *
CLAUDINS , *TIGHT junctions , *MITOGEN-activated protein kinases , *OCCLUDINS , *INTESTINES , *RECEPTOR-interacting proteins , *CELLULAR signal transduction - Abstract
In many mammalian species, including pigs, heat stress (HS) detrimentally leads to epithelium damage and increases intestinal permeability. However, the underlying molecular mechanisms are not thoroughly investigated yet. This study aimed to examine the RIP1/RIP3-ERK1/2 signaling pathway that regulates the expression of tight junction proteins in HS-treated pigs. In in vitro cultured intestinal porcine epithelial cells (IPEC-J2), HS induced the expression of tight junction proteins, ZO-1, claudin-1, and claudin-4, that are regulated by the ERK1/2-MAPK signaling pathway. Further, high expression of HSP70 in IPEC-J2 cells induced a significant decrease in receptor-interacting protein 1/3 (RIP1/3), phosphorylated ERK, and tight junction protein claudin-1 (P < 0.05). Necrostatin-1 (A selective inhibitor of RIPK1) suppressed the upregulation of phosphorylated ERK1/2 induced by HS, indicating that the RIP1/RIP3 regulates ERK1/2 phosphorylation in IPEC-J2 under heat stress. In addition, HS significantly damaged the intestinal morphology characterized by reduction of villus length and crypt depth in in vivo porcine model. Moreover, the expression of tight junction, ZO-1, and claudin-4 were downregulated, whereas phosphorylated p38 and ERK1/2 were upregulated in the duodenum of heat-stressed pigs. Interestingly, a decrease in ZO-1 and claudin-1 was observed in the colon, where phosphorylated ERK1/2 was similar to that in the duodenum. Our results demonstrate that RIP1/RIP3-ERK1/2 signaling pathway regulates the expression of tight junction proteins in HS-pigs. This finding further advances the intestinal barrier function's underlying mechanisms associated with signaling regulation. • A heat stress induced porcine inflammatory bowel disease model was constructed successfully. • Heat stress induced down – regulation of tight junction proteins play a vital role in the development inflammatory bowel disease in pigs. • Heat stress induced down-regulation of tight junction proteins was via ERK1/2 signaling pathway. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
112. PS-104-Prognosis assessment of acute-on-chronic liver failure in patients with hepatitis B virus-related cirrhosis requires specific criteria.
- Author
-
Wenyi, Gu, Deng, Guohong, Zheng, Xin, Chen, Jinjun, Wang, Xian-bo, Huang, Yan, Gao, Yanhang, Meng, Zhong-ji, Qian, Zhiping, Liu, Feng, Lu, Xiao-bo, Shang, Jia, Li, Hai, Wang, Shaoyang, Yin, Shan, Sun, Shuning, xiong, yan, li, beiling, Hou, Yixin, and Chen, Jun
- Subjects
- *
CHRONIC hepatitis B , *HEPATITIS B , *LIVER failure , *CIRRHOSIS of the liver , *MILITARY hospitals , *TECHNICAL specifications - Published
- 2019
- Full Text
- View/download PDF
113. A hybrid recommendation system with many-objective evolutionary algorithm.
- Author
-
Cai, Xingjuan, Hu, Zhaoming, Zhao, Peng, Zhang, WenSheng, and Chen, Jinjun
- Subjects
- *
RECOMMENDER systems , *HYBRID systems , *EVOLUTIONARY algorithms , *EVOLUTIONARY computation - Abstract
• Recommend the more and novel items based on accurate and diverse recommendations. • Mixing multiple recommendation technologies to improve recommendation performance. • The system is based on rating, which makes the recommendation more objective. • Clustering strategies are used to reduce recommended consumption. Recommendation system (RS) is a technology that provides accurate recommendations to users. However, it is not comprehensive to only consider the accuracy of the recommendation because users have different requirements. To improve the comprehensive performance, this paper presents a hybrid recommendation model based on many-objective optimization, which can simultaneously optimize the accuracy, diversity, novelty and coverage of recommendation. This model enhances the robustness of recommendations by mixing three different basic recommendation technologies. Additionally, we solve it with many-objective evolutionary algorithm (MaOEA) and test it extensively. Experimental results demonstrate the effectiveness of the presented model, which can provide the recommendations with more and novel items on the basis of accurate and diverse. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
114. Bioremediation of di-(2-ethylhexyl) phthalate contaminated red soil by Gordonia terrae RL-JC02: Characterization, metabolic pathway and kinetics.
- Author
-
Zhang, Hongyan, Lin, Zhong, Liu, Bin, Wang, Guan, Weng, Liyun, Zhou, Junliang, Hu, Hanqiao, He, Hong, Huang, Yongxiang, Chen, Jinjun, Ruth, Nahurira, Li, Chengyong, and Ren, Lei
- Abstract
Di-(2-ethylhexyl) phthalate (DEHP) is the most widely used plasticizer and a representative endocrine disrupting chemical. The toxicological effects of DEHP on environmental and human health have been widely investigated. In this study, the DEHP-degrading bacterial strain RL-JC02 was isolated from red soil with long-term usage of plastic mulch, and it was identified as Gordonia terrae by 16S rRNA gene analysis coupled with physiological and biochemical characterization. The biodegrading capacity of different phthalic acid esters and related intermediates was investigated as well as the performance of strain RL-JC02 under different environmental conditions, such as temperature, pH, salinity and DEHP concentration. Specifically, strain RL-JC02 showed good tolerance to low pH, with 86.6% of DEHP degraded under the initial pH of 5.0 within 72 h. The metabolic pathway of DEHP was examined by metabolic intermediate identification via a high-performance liquid chromatography coupled with mass spectrometry (HPLC-MS) analysis in which DEHP was hydrolyzed into phthalic acid (PA) and 2-ethylhexanol (2-EH) via mono (2-ethylhexyl) phthalate (MEHP). PA and 2-EH were further utilized through the protocatechuic acid metabolic pathway and β-oxidation via protocatechuic acid and 2-ethylhexanoic acid, respectively. The application potential of strain RL-JC02 was confirmed through the bioremediation of artificial DEHP-contaminated red soil showing 91.8% DEHP degradation by strain RL-JC02 within 30 d. The kinetics analysis of DEHP degradation by strain RL-JC02 in soil demonstrated that the process followed the modified Gompertz model. Meanwhile, the cell concentration monitoring of strain RL-JC02 in soil with absolute quantification polymerase chain reaction (qPCR) suggested that strain RL-JC02 survived well during bioremediation. This study provides sufficient evidence of a robust degrader for the bioremediation of PAE-contaminated red soil. Unlabelled Image • One DEHP degrading bacterial strain RL-JC02 was isolated from red soil. • DEHP was degraded via the typical de-esterification pathway. • Bioremediation could accelerate the elimination of DEHP in red soil. • The kinetics of bioremediation fitted with the modified Gompertz model. • Strain RL-JC02 survived well during bioremediation. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
115. Investigating the composition and distribution of microplastics surface biofilms in coral areas.
- Author
-
Feng, Limin, He, Lei, Jiang, Shiqi, Chen, Jinjun, Zhou, Chunxia, Qian, Zhong-Ji, Hong, Pengzhi, Sun, Shengli, and Li, Chengyong
- Subjects
- *
BIOFILMS , *CORAL bleaching , *MARINE pollution , *CORALS , *SCLERACTINIA , *CLIMATE change , *MARINE ecology , *CORAL diseases - Abstract
In recent years, global climate change and pollution of the marine environment have caused large-scale coral deaths and severe damages to coral reef ecosystems. Numerous studies have shown that coral diseases are closely related to microorganisms. And microplastics (MPs) are a potential threat to corals. In marine ecosystems, MPs are an emerging contaminant. MPs have a strong adsorption effect on pollutants in the water environment, and they are very easily colonized by microorganisms to form biofilms. Biofilms may accumulate many pathogens, increasing the probability of coral disease. However, there is no report about the composition of biofilms on the surface of microplastics in coral growth areas. In this study, nine kinds of MPs were chosen in the experiments, which are commonly found in the ocean. Four stakeout points were selected in the coral area. Biofilms were cultivated in natural environment. The composition and distribution of biofilms on the surface of the MPs were analyzed by 16 S rRNA sequencing. The characteristics of biofilms were observed by scanning electron microscopy (SEM). The experimental results show that the species composition and abundance distribution of the biofilm on the MP surface are significantly different from the surrounding seawater. The type of MPs and the stake out point are important factors affecting the structure of the biofilm bacterial community. Compared to seawater samples, MPs are enriched with certain dominant bacteria such as Vibrionaceae , Rhodobacteraceae , Flavobacteraceae , Microtrichaceae and Sphingomonadaceae. Among them, Vibrionaceae , Rhodobacteraceae and Flavobacteraceae are closely related to the tissue damage of stony corals, and Vibrios are also the main pathogens of coral albinism. In addition, Pseudomonas and Bbellvibrio cholerae are also detected on the MPs biofilm. SEM graphs of the MPs after culture could clearly observe rod-shaped bacteria and Streptococci. This study can provide a new direction for the study of coral toxicology by MPs and provide basic data for the toxicology research of MPs. • It is the first to study the structure of microplastic surface biofilms in coral areas. • This study used natural culture methods to cultivate biofilms. • The structure of the biofilms obviously different from the seawater. • The biofilms are closely related to the environment and the type of microplastics. • Vibrio and Rhodobacter are the predominant bacteria of biofilms. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
116. In situ surface-enhanced Raman spectroscopy for detecting microplastics and nanoplastics in aquatic environments.
- Author
-
Lv, Lulu, He, Lei, Jiang, Shiqi, Chen, Jinjun, Zhou, Chunxia, Qu, Junhao, Lu, Yuqin, Hong, Pengzhi, Sun, Shengli, and Li, Chengyong
- Abstract
The detection of microplastics and nanoplastics in the environment, especially plastic particles in aquatic environments in situ, still faces challenges due to the limitations of current methods, instruments and size of plastic particles. This paper evaluates the potential of surface-enhanced Raman spectroscopy for the analysis of microplastics and nanoplastics. The condition of different tests including the volume ratio of sample to silver colloid, the concentrations of NaCl, and the concentrations of the samples, are assessed for the study of microplastics and nanoplastics (polystyrene (PS), polyethylene (PE) and polypropylene (PP)) in pure water and seawater. A method based on SERS, that uses silver colloid as the active substrate, is developed for the qualitative analysis of microplastics and nanoplastics in aquatic environments. The particle sizes of microplastics and nanoplastics include 100 nm, 500 nm and 10 μm. The Raman signals of microplastics and nanoplastics in pure water and seawater both show good enhancement efficiency. The optimal enhancement factor is 4 × 104. The SERS-based detection method overcomes the limitations of microplastics and nanoplastics in liquids and can detect 100 nm plastics down to 40 μg/mL. It provides more possibility for the rapid detection of microplastics and nanoplastics in aquatic environments in the future. Unlabelled Image • A method for detecting micro/nanoplastics in water environment was developed. • Plastic particles in the size range from nanometers to microns can be detected. • Effective identification of different types of plastic particles. • Capable of detecting 100 nm plastic particles down to 40 μg/mL. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
117. Longitudinal Change of Body Mass Index Is Associated With Alanine Aminotransferase Elevation After Complete Viral Suppression in Chronic Hepatitis B Patients.
- Author
-
Wang, Kaifeng, Lin, Weiyin, Kuang, Zhe, Fan, Rong, Liang, Xieer, Peng, Jie, Guo, Yabing, Chen, Jinjun, Liu, Zhihong, Hu, Xiaoyun, Wu, Yaobo, Shen, Sheng, Sun, Jian, and Hou, Jinlin
- Abstract
Background: Little is known about cause and intervention for alanine aminotransferase (ALT) elevation after complete viral suppression in patients with chronic hepatitis B (CHB).Methods: In this prospective cohort study, patients with CHB who were treated with nucleos(t)ide analogs and maintained undetectable levels of hepatitis B virus (HBV) deoxyribonucleic acid (DNA) for at least 6 months were enrolled. Patients were followed up at 6-month intervals, and anthropometric, biochemical, and virological assessments were performed.Results: Of 1965 patients with median follow-up of 18.36 months, one third of patients experienced ALT elevation. Baseline high body mass index ([BMI] defined as ≥25 kg/m2), younger age, and liver cirrhosis independently increased the risk of longitudinal ALT elevation. At the end of follow-up, 89 (4.8%) patients reverted to low BMI, and 92 (5.0%) developed to high BMI. Compared with persistent high BMI, reversion to low BMI reduced the risk of ALT elevation (adjusted odds ratio [aOR], 0.38; 95% confidence interval [CI], 0.19-0.77); compared with persistent low BMI, onset of high BMI increased the risk of ALT elevation (aOR, 1.78; 95% CI, 1.02-3.11).Conclusions: High BMI is an independent predictor for ALT elevation after complete HBV DNA suppression. Improvement of BMI may have a beneficial effect on ALT normalization and even long-term outcomes. [ABSTRACT FROM AUTHOR]- Published
- 2019
- Full Text
- View/download PDF
118. THU-234-High body-mass index is associated with increased risk of alanine aminotransferase elevation and hepatocellular carcinoma in chronic hepatitis B patients with sustained viral control.
- Author
-
Sun, Jian, Lin, Weiyin, Wang, Kaifeng, Fan, Rong, Liang, Xieer, Peng, Jie, Guo, Yabing, Chen, Jinjun, Liu, Zhihong, Hu, Xiaoyun, and Hou, Jinlin
- Subjects
- *
CHRONIC hepatitis B , *ALANINE aminotransferase , *HEPATOCELLULAR carcinoma - Published
- 2019
- Full Text
- View/download PDF
119. The cloning, recombinant expression and antimicrobial activities of defensins from a folk toxic plant Macleaya cordata leaf.
- Author
-
Shao, Jie, Song, Nan, Li, Qian, Liu, Yisong, Zhang, Xuewen, and Chen, Jinjun
- Subjects
- *
ANTI-infective agents , *CLONING , *POISONOUS plants , *DEFENSINS , *EXPRESSED sequence tag (Genetics) - Published
- 2019
- Full Text
- View/download PDF
120. Molecular diversity of cysteine-rich peptides (CPRS) from the venom gland of Chinese spider heteropoda venatoria and evolutionary trend of spider CRPS.
- Author
-
Qu, Fang, Shao, Jie, Song, Nan, Li, Qian, and Chen, Jinjun
- Subjects
- *
PEPTIDES , *CYSTEINE , *VENOM glands , *HETEROPODA , *SPIDER venom , *BIOLOGICAL evolution - Published
- 2019
- Full Text
- View/download PDF
121. A Multi-Objective DV-Hop Localization Algorithm Based on NSGA-II in Internet of Things.
- Author
-
Wang, Penghong, Xue, Fei, Li, Hangjuan, Cui, Zhihua, Xie, Liping, and Chen, Jinjun
- Subjects
- *
SYSTEMS on a chip , *INTERNET of things , *WIRELESS sensor networks , *ALGORITHMS - Abstract
Locating node technology, as the most fundamental component of wireless sensor networks (WSNs) and internet of things (IoT), is a pivotal problem. Distance vector-hop technique (DV-Hop) is frequently used for location node estimation in WSN, but it has a poor estimation precision. In this paper, a multi-objective DV-Hop localization algorithm based on NSGA-II is designed, called NSGA-II-DV-Hop. In NSGA-II-DV-Hop, a new multi-objective model is constructed, and an enhanced constraint strategy is adopted based on all beacon nodes to enhance the DV-Hop positioning estimation precision, and test four new complex network topologies. Simulation results demonstrate that the precision performance of NSGA-II-DV-Hop significantly outperforms than other algorithms, such as CS-DV-Hop, OCS-LC-DV-Hop, and MODE-DV-Hop algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
122. A Novel Bat Algorithm with Multiple Strategies Coupling for Numerical Optimization.
- Author
-
Wang, Yechuang, Wang, Penghong, Zhang, Jiangjiang, Cui, Zhihua, Cai, Xingjuan, Zhang, Wensheng, and Chen, Jinjun
- Subjects
- *
METAHEURISTIC algorithms , *BAT behavior , *GLOBAL optimization , *HEURISTIC algorithms , *BATS , *ALGORITHMS - Abstract
A bat algorithm (BA) is a heuristic algorithm that operates by imitating the echolocation behavior of bats to perform global optimization. The BA is widely used in various optimization problems because of its excellent performance. In the bat algorithm, the global search capability is determined by the parameter loudness and frequency. However, experiments show that each operator in the algorithm can only improve the performance of the algorithm at a certain time. In this paper, a novel bat algorithm with multiple strategies coupling (mixBA) is proposed to solve this problem. To prove the effectiveness of the algorithm, we compared it with CEC2013 benchmarks test suits. Furthermore, the Wilcoxon and Friedman tests were conducted to distinguish the differences between it and other algorithms. The results prove that the proposed algorithm is significantly superior to others on the majority of benchmark functions. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
123. Preventing Temporal Violations in Scientific Workflows: Where and How.
- Author
-
Liu, Xiao, Yang, Yun, Jiang, Yuanchun, and Chen, Jinjun
- Subjects
- *
WORKFLOW , *SCIENTIFIC development , *SOFTWARE verification , *STATISTICS , *DECISION support systems , *QUALITY of service - Abstract
Due to the dynamic nature of the underlying high-performance infrastructures for scientific workflows such as grid and cloud computing, failures of timely completion of important scientific activities, namely, temporal violations, often take place. Unlike conventional exception handling on functional failures, nonfunctional QoS failures such as temporal violations cannot be passively recovered. They need to be proactively prevented through dynamically monitoring and adjusting the temporal consistency states of scientific workflows at runtime. However, current research on workflow temporal verification mainly focuses on runtime monitoring, while the adjusting strategy for temporal consistency states, namely, temporal adjustment, has so far not been thoroughly investigated. For this issue, two fundamental problems of temporal adjustment, namely, where and how, are systematically analyzed and addressed in this paper. Specifically, a novel minimum probability time redundancy-based necessary and sufficient adjustment point selection strategy is proposed to address the problem of where and an innovative genetic-algorithm-based effective and efficient local rescheduling strategy is proposed to tackle the problem of how. The results of large-scale simulation experiments with generic workflows and specific real-world applications demonstrate that our temporal adjustment strategy can remarkably prevent the violations of both local and global temporal constraints in scientific workflows. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.