Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 40 )

2018 ( 290 )

2017 ( 262 )

2016 ( 221 )

Custom range...

Search Results: 1 - 10 of 15111 matches for " Jinsong Tang "
All listed articles are free for downloading (OA Articles)
Page 1 /15111
Display every page Item
Alcohol and nicotinic acetylcholine receptors
Jinsong Tang,Yanhui Liao
QScience Connect , 2013, DOI: 10.5339/connect.2013.15
Abstract: Background The frequent co-abuse of alcohol and tobacco may suggest that they share some common neurological mechanisms. For example, nicotine acts on Nicotinic acetylcholine receptors (nAChRs) in the brain to release dopamine to sustain addiction. Might nAChRs be entwined with alcohol? Objectives This review summarizes recent studies on the relationship between alcohol and nAChRs, including the role of nAChRs in molecular biological studies, genetic studies and pharmacological studies on alcohol, which indicate that nAChRs have been potently modulated by alcohol. Methods We performed a cross-referenced literature search on biological, genetic and pharmacological studies of alcohol and nAChRs. Results Molecular biological and genetic studies indicated that nAChR (genes) may be important in mediating alcohol intake, but we still lack substantial evidence about how it works. Pharmacological studies proved the correlation between nAChRs and alcohol intake, and the association between nicotine and alcohol at the nAChRs. The positive findings of varenicline (a partial agonist at the _4_2 nAChR, smoking-cessation pharmaceutical) treatment for alcoholism, provides a new insight for treating co-abuse of these two substances. >Conclusions Molecular biological, genetic and pharmacological studies of alcohol at the nAChR level, provide a new sight for preventing and treating the co-abuse of alcohol and nicotine. Given the important role of nAChRs in nicotine dependence, the interaction between alcohol and nAChRs would provide a new insight in finding effective pharmacological treatments, in decreasing or stopping alcohol consumption and cigarette smoking concurrently.
Using Confidence Interval to Summarize the Evaluating Results of DSM Systems
Using Confidence interval to Summarize the Evaluating Results of DSM Systems

SHI Weisong,Tang Zhimin,Shi Jinsong,
SHI Weisong
,TANG Zhimin,SHI Jinsong

计算机科学技术学报 , 2000,
Abstract: Distributed Shared Memory (DSM) systems have gained popularacceptance by combining the scalability and low cost of distributed system with theease of use of single address space. Many new hardware DSM and software DSMsystems have been proposed in recent years. In general, benchmarking is widely usedto demonstrate the performance advantages of new systems. However, the commonmethod used to summarize the measured results is the arithmetic mean of ratios,which is incorrect in some cases. Furthermore, many published papers list a lot ofdata only, and do not summarize them effectively, which confuse users greatly. Infact, many users want to get a single number as conclusion, which is not providedin old summarizing techniques. Therefore, a new data-summarizing technique basedon confidence interval is proposed in this paper. The new technique includes twodata-summarizing methods: (1) paired confidence interval method; (2) unpairedconfidence interval method. With this new technique, it is concluded that at someconfidence one system is better than others. Four examples are shown to demonstratethe advantages of this new technique. Furthermore, with the help of confidence level,it is proposed to standardize the benchmarks used for evaluating DSM systems sothat a convincing result can be got. In addition, the new summarizing technique fitsnot only for evaluating DSM systems, but also for evaluating other systems, such asmemory system and communication systems.
Modelling and Analysis on Noisy Financial Time Series  [PDF]
Jinsong Leng
Journal of Computer and Communications (JCC) , 2014, DOI: 10.4236/jcc.2014.22012

Building the prediction model(s) from the historical time series has attracted many researchers in last few decades. For example, the traders of hedge funds and experts in agriculture are demanding the precise models to make the prediction of the possible trends and cycles. Even though many statistical or machine learning (ML) models have been proposed, however, there are no universal solutions available to resolve such particular problem. In this paper, the powerful forward-backward non-linear filter and wavelet-based denoising method are introduced to remove the high level of noise embedded in financial time series. With the filtered time series, the statistical model known as autoregression is utilized to model the historical times aeries and make the prediction. The proposed models and approaches have been evaluated using the sample time series, and the experimental results have proved that the proposed approaches are able to make the precise prediction very efficiently and effectively.

Altered spontaneous activity in young chronic cigarette smokers revealed by regional homogeneity
Tang Jinsong,Liao Yanhui,Deng Qijian,Liu Tieqiao
Behavioral and Brain Functions , 2012, DOI: 10.1186/1744-9081-8-44
Abstract: Background Few studies have been previously published about the resting state brain activity in young chronic smokers, although many previous fMRI studies have shown that the task-related activity pattern is altered in chronic smokers. Methods In the present study, forty-five healthy smokers (age: 27.9 ± 5.6 year) and forty-four healthy non-smoking control subjects (age: 26.3 ± 5.8 year) have been imaged with functional magnetic resonance imaging (fMRI) and analyzed with the regional homogeneity (ReHo) approach. Results Compared with healthy controls, decreased ReHo was found in smokers in the right inferior frontal cortex and increased ReHo was found in the left superior parietal lobe (P < 0.01, 35 Voxels,Alphasim corrected). Conclusions Our data suggested that, during resting state, neural function is less synchronized in the right inferior frontal cortex and more synchronized in the left superior parietal lobe in chronic smokers compared to non-smokers. The decreased synchronization in the right inferior frontal cortex may reflect lacking of control over reward-related behavior, and the increased synchronization may reflect smoking urges.
Dimensional Measurement of Complete-connective Network under the Condition of Particle’s Fission and Growth at a Constant Rate  [PDF]
JinSong Wang, BeiBei Hu
Journal of Software Engineering and Applications (JSEA) , 2012, DOI: 10.4236/jsea.2012.512B009
Abstract: We construct a complete-connective regular network based on Self-replication Space and the structural principles of cantor set and Koch curve. A new definition of dimension is proposed in the paper, and we also investigate a simplified method to calculate the dimension of two regular networks. By the study results, we can get a extension: the formation of Euclidean space may be built by the process of the Big Bang's continuously growing at a constant rate of three times.
Common promoter variants of the NDUFV2 gene do not confer susceptibility to schizophrenia in Han Chinese
Wen Zhang, Xiaogang Chen, Wei Gong, Jinsong Tang, Liwen Tan, Hao Guo, Yong-Gang Yao
Behavioral and Brain Functions , 2010, DOI: 10.1186/1744-9081-6-75
Abstract: We genotyped the promoter variants of this gene (rs6506640 and rs1156044) by direct sequencing in 529 unrelated Han Chinese schizophrenia patients and 505 matched controls. Fisher's Exact test was performed to assess whether these two reported single nucleotide polymorphisms (SNPs) confer susceptibility to schizophrenia in Chinese.Allele, genotype and haplotype comparison between the case and control groups showed no statistical significance, suggesting no association between the NDUFV2 gene promoter variants and schizophrenia in Han Chinese.The role of NDUFV2 played in schizophrenia needs to be further studied. Different racial background and/or population substructure might account for the inconsistent results between studies.Mitochondrial dysfunction was considered as a risk factor for the onset of schizophrenia and other psychiatric disorders [1]. As a core component of mitochondrial respiratory chain, the 24 kD subunit of mitochondrial complex I, NADH-ubiquinone oxidoreductase flavoprotein (NDUFV2), is a hot candidate target for psychiatric disorders [2-7]. The first clue that indicated a potential positive association of the NDUFV2 gene with schizophrenia could be traced to the pioneer association and linkage study by Schwab and colleagues [8], in which they reported chromosome 18p (which contains this gene), conferred susceptibility to functional psychoses in families with schizophrenia. Subsequent analyses showed a decreased level of NDUFV2 expression in postmortem prefrontal cortex and striatum of schizophrenia patients [9-11] and in lymphoblastoid cell line of Caucasian schizophrenia patients [4], suggesting an active involvement of NDUFV2 in schizophrenia. Recent association studies further indicated that the NDUFV2 promoter haplotype, which was constituted by two SNPs (rs6506640-rs1156044), was significantly associated with schizophrenia in Japanese population [5]. This association was also found in patients with bipolar disorder from different populatio
Chang’E-1 orbiter discovers a lunar nearside volcano: YUTU Mountain
JinSong Ping,Qian Huang,XiaoLi Su,GeShi Tang,Rong Shu,Long Xiao,Jun Huang
Chinese Science Bulletin , 2009, DOI: 10.1007/s11434-009-0671-8
Abstract: In the day time of the Moon surface, the strong illumination from high altitude and high albedo rate radical craters will introduce the illumination effect on observing the nearby low altitude, low albedo rate and shallow small slop rate area seriously, and even can “hide” the later area from the light. Based on the lunar global topography model obtained by Chang’E-1 mission, and by comparing with the lunar gravity model, a volcano named “YUTU Mountain” has been identified. It is a volcano with diameter of ~300 km and height of ~2 km located at (14°N, 308°E) in Oceanus Procellarum. Besides, the DEM of another volcano named “GUISHU Mountain” in the same area has been improved. This new discovery will benefit the study of lunar magmatism and volcanism evolution in the nearside of the Moon.
New method of generating phase quality map for InSAR

ZHONG Heping,TANG Jinsong,CHEN Ming,

遥感学报 , 2011,
Abstract: 针对传统质量图易受干涉条纹宽度影响,及其在真实相位差等于2kπ的陡峭区域的低识别能力,提出了一种依靠法向量一致性来度量相位质量的方法。在3×3的缠绕相位窗口中,以中心点为参考点,进行局部相位解缠。解缠后,中心点与每对窗口边界上的相邻点构成8个三角形,将8个三角形的单位法向量合成后的法向量作为局部解缠相位平面的法向量,8个三角形的法向量与合成法向量之间的夹角和作为中心点的相位质量。对仿真数据和真实InSAR干涉纹图的处理结果表明:在质量引导算法中,新质量图比传统质量图具有更精确的路径引导能力。

He You,Tang Jinsong,Wang Guohong,

电子与信息学报 , 1996,
Abstract: This paper studies the integration tracking mechanism of centralized multiradar system, such as tracking file management, operation mechanism, etc., and presents methods for initial position-presetting of radar azimuth scanning and data rearraging. Simulation is made with multiradar system of a certain ship tracking 8 targets under various tactical maneuvering situations. The simulation results show that the methods are able to solve some special problems of multiradar tracking.
Efficient and Secure Key Extraction using CSI without Chasing down Errors
Jizhong Zhao,Wei Xi,Jinsong Han,Shaojie Tang,Xiangyang Li,Yunhao Liu,Yihong Gong,Zehua Zhou
Computer Science , 2012,
Abstract: Generating keys and keeping them secret is critical in secure communications. Due to the "open-air" nature, key distribution is more susceptible to attacks in wireless communications. An ingenious solution is to generate common secret keys by two communicating parties separately without the need of key exchange or distribution, and regenerate them on needs. Recently, it is promising to extract keys by measuring the random variation in wireless channels, e.g., RSS. In this paper, we propose an efficient Secret Key Extraction protocol without Chasing down Errors, SKECE. It establishes common cryptographic keys for two communicating parties in wireless networks via the realtime measurement of Channel State Information (CSI). It outperforms RSS-based approaches for key generation in terms of multiple subcarriers measurement, perfect symmetry in channel, rapid decorrelation with distance, and high sensitivity towards environments. In the SKECE design, we also propose effective mechanisms such as the adaptive key stream generation, leakage resilient consistence validation, and weighted key recombination, to fully exploit the excellent properties of CSI. We implement SKECE on off-the-shelf 802.11n devices and evaluate its performance via extensive experiments. The results demonstrate that SKECE achieves a more than 3x throughput gain in the key generation from one subcarrier in static scenarios, and due to its high efficiency, a 50% reduction on the communication overhead compared to the state-of-the-art RSS based approaches.
Page 1 /15111
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.