Recently, self-sustained oscillatory genetic regulatory networks (GRNs) have attracted significant attention in the biological field. Given a GRN, it is important to anticipate whether the network could generate osc...Recently, self-sustained oscillatory genetic regulatory networks (GRNs) have attracted significant attention in the biological field. Given a GRN, it is important to anticipate whether the network could generate oscillation with proper parameters, and what the key ingredients for the oscillation are. In this paper the ranges of some function-related parameters which are favorable to sustained oscillations are considered. In particular, some oscillatory motifs appearing with high-frequency in most of the oscillatory GRNs are observed. Moreover, there are some anti-oscillatory motifs which have a strong oscillation repressing effect. Some conclusions analyzing these motif effects and constructing oscillatory GRNs are provided.展开更多
Both time-delays and anti-windup(AW)problems are conventional problems in system design,which are scarcely discussed in cellular neural networks(CNNs).This paper discusses stabilization for a class of distributed time...Both time-delays and anti-windup(AW)problems are conventional problems in system design,which are scarcely discussed in cellular neural networks(CNNs).This paper discusses stabilization for a class of distributed time-delayed CNNs with input saturation.Based on the Lyapunov theory and the Schur complement principle,a bilinear matrix inequality(BMI)criterion is designed to stabilize the system with input saturation.By matrix congruent transformation,the BMI control criterion can be changed into linear matrix inequality(LMI)criterion,then it can be easily solved by the computer.It is a one-step AW strategy that the feedback compensator and the AW compensator can be determined simultaneously.The attraction domain and its optimization are also discussed.The structure of CNNs with both constant timedelays and distribute time-delays is more general.This method is simple and systematic,allowing dealing with a large class of such systems whose excitation satisfies the Lipschitz condition.The simulation results verify the effectiveness and feasibility of the proposed method.展开更多
Anti-inflammatory activity of a series of tri-substituted pyrimidine derivatives was predicted using two Quantitative Structure-Activity Relationship models. These relationships were developed from molecular descripto...Anti-inflammatory activity of a series of tri-substituted pyrimidine derivatives was predicted using two Quantitative Structure-Activity Relationship models. These relationships were developed from molecular descriptors calculated using the DFT quantum chemistry method using the B3LYP/6-31G(d,p) level of theory and molecular lipophilicity. Thus, the four descriptors which are the dipole moment μ<sub>D</sub>, the energy of the highest occupied molecular orbital E<sub>HOMO</sub>, the isotropic polarizability α and the ACD/logP lipophilicity were selected for this purpose. The Multiple Linear Regression (MLR) and Artificial Neural Network (ANN) models are respectively accredited with the following statistical indicators: R<sup>2</sup>=91.28%, R<sup>2</sup><sub>aj</sub>=89.11%, RMCE = 0.2831, R<sup>2</sup><sub>ext</sub>=86.50% and R<sup>2</sup>=98.22%, R<sup>2</sup><sub>aj</sub>=97.75%, RMCE = 0.1131, R<sup>2</sup><sub>ext</sub>=98.54%. The results obtained with the artificial neural network are better than those of the multiple linear regression. However, these results show that the two models developed have very good predictive performance of anti-inflammatory activity. These two models can therefore be used to predict anti-inflammatory activity of new similar pyrimidine derivatives.展开更多
In this paper,we study the anti-periodic solutions for a class of impulsive Cohen-Grossberg neural networks with mixed delays.By using analysis techniques,some sufficient conditions are obtained which guarantee the ex...In this paper,we study the anti-periodic solutions for a class of impulsive Cohen-Grossberg neural networks with mixed delays.By using analysis techniques,some sufficient conditions are obtained which guarantee the existence and global exponential stability of the anti-periodic solutions.The criteria extend and improve some earlier results.Moreover,we give an examples to illustrate our main results.展开更多
Various force disturbances influence the thrust force of linear motors when a linear motor (LM) is running. Among all of force disturbances, the force ripple is the dominant while a linear motor runs in low speed. I...Various force disturbances influence the thrust force of linear motors when a linear motor (LM) is running. Among all of force disturbances, the force ripple is the dominant while a linear motor runs in low speed. In order to suppress the force ripple, back propagation(BP) neural network is proposed to learn the function of the force ripple of linear motors, and the acquisition method of training samples is proposed based on a disturbance observer. An off-line BP neural network is used mainly because of its high running efficiency and the real-time requirement of the servo control system of a linear motor. By using the function, the force ripple is on-line compensated according to the position of the LM. The experimental results show that the force ripple is effectively suppressed by the compensation of the BP neural network.展开更多
Objective: Better understanding of China's landscape in oncology drug research is of great significance for discovering anti-cancer drugs in future. This article differs from previous studies by focusing on Chinese ...Objective: Better understanding of China's landscape in oncology drug research is of great significance for discovering anti-cancer drugs in future. This article differs from previous studies by focusing on Chinese oncology drug research communities in co-publication networks at the institutional level. Moreover, this research aims to explore structures and behaviors of relevant research units by thematic community analysis and to address policy recommendations. Methods: This research used social network analysis to define an institutions network and to identify a community network which is characterized by thematic content. Results: A total of 675 sample articles from 2008 through 2012 were retrieved from the Science Citation Index Expanded (SCIE) database of Web of Science, and top institutions and institutional pairs are highlighted for further discussion. Meanwhile, this study revealed that institutions based in the Chinese mainland are located in a relatively central position, Taiwan's institutions are closely assembled on the side, and Hong Kong's units located in the middle of the Chinese mainland's and Taiwan's. Spatial division and institutional hierarchy are still critical barriers to research collaboration in the field of anti-cancer drugs in China. In addition, the communities focusing on hot research areas show the higher nodal degree, whereas communities giving more attention to rare research subjects are relatively marginalized to the periphery of network. Conclusions= This paper offers policy recommendations to accelerate cross-regional cooperation, such as through developing information technology and increasing investment. The brokers should focus more on outreach to other institutions. Finally, participation in topics of common interest is conducive to improved efficiency in research and development (R&D) resource allocation.展开更多
Curcumin,the medically active component from Curcuma longa(Turmeric),is widely used to treat inflammatory diseases.Protein interaction network(PIN) analysis was used to predict its mechanisms of molecular action.Targe...Curcumin,the medically active component from Curcuma longa(Turmeric),is widely used to treat inflammatory diseases.Protein interaction network(PIN) analysis was used to predict its mechanisms of molecular action.Targets of curcumin were obtained based on ChE MBL and STITCH databases.Protein–protein interactions(PPIs) were extracted from the String database.The PIN of curcumin was constructed by Cytoscape and the function modules identified by gene ontology(GO) enrichment analysis based on molecular complex detection(MCODE).A PIN of curcumin with 482 nodes and 1688 interactions was constructed,which has scale-free,small world and modular properties.Based on analysis of these function modules,the mechanism of curcumin is proposed.Two modules were found to be intimately associated with inflammation.With function modules analysis,the anti-inflammatory effects of curcumin were related to SMAD,ERG and mediation by the TLR family.TLR9 may be a potential target of curcumin to treat inflammation.展开更多
In the past decades, various neural network models have been developed for modeling the behavior of human brain or performing problem-solving through simulating the behavior of human brain. The recurrent neural networ...In the past decades, various neural network models have been developed for modeling the behavior of human brain or performing problem-solving through simulating the behavior of human brain. The recurrent neural networks are the type of neural networks to model or simulate associative memory behavior of human being. A recurrent neural network (RNN) can be generally formalized as a dynamic system associated with two fundamental operators: one is the nonlinear activation operator deduced from the input-output properties of the involved neurons, and the other is the synaptic connections (a matrix) among the neurons. Through carefully examining properties of various activation functions used, we introduce a novel type of monotone operators, the uniformly pseudo-projectionanti-monotone (UPPAM) operators, to unify the various RNN models appeared in the literature. We develop a unified encoding and stability theory for the UPPAM network model when the time is discrete. The established model and theory not only unify but also jointly generalize the most known results of RNNs. The approach has lunched a visible step towards establishment of a unified mathematical theory of recurrent neural networks.展开更多
Anti-worm is an effective way to fight against malicious worm and has been followed closely by malicious worm researchers recently. However, active and passive confronting technologies in peer-to-peer (P2P) networks...Anti-worm is an effective way to fight against malicious worm and has been followed closely by malicious worm researchers recently. However, active and passive confronting technologies in peer-to-peer (P2P) networks have not been studied in depth. This paper introduces both of them to fight against malicious worm in P2P networks. To study their effectiveness in P2P networks, this paper takes the topology degree in P2P networks into consideration and puts forward a four-state propagation model for active anti-worm and a five-state propagation model for passive anti-worm respectively. Both of the models are simplified in the case that size of a P2P network is large enough. The simulation results have not only validated the effectiveness of our propagation models but also evaluated the excellent performance of both active anti-worm and passive anti-worm.展开更多
In this article, a modified susceptible-infected-removed (SIR) model is proposed to study the influence of diversity of node anti-attack abilities on the threshold of propagation in scale-free networks. In particula...In this article, a modified susceptible-infected-removed (SIR) model is proposed to study the influence of diversity of node anti-attack abilities on the threshold of propagation in scale-free networks. In particular, a vulnerability function related to node degree is introduced into the model to describe the diversity of a node anti-attack ability. Analytical results are derived using the mean-field theory and it is observed that the diversity of anti-attack of nodes in scale-free networks can increase effectively the threshold of epidemic propagation. The simulation results agree with the analytical results. The results show that the vulnerability functions can help adopt appropriate immunization strategies.展开更多
Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bot...Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bots that generate huge volumes of spam or launch Distributed Denial of Service (DDoS) attacks on victim hosts. New emerging botnet attacks degrade the status of Internet security further. To address these problems, a practical collaborative network security management system is proposed with an effective collaborative Unified Threat Management (UTM) and traffic probers. A distributed security overlay network with a centralized security center leverages a peer-to-peer communication protocol used in the UTMs collaborative module and connects them virtually to exchange network events and security rules. Security functions for the UTM are retrofitted to share security rules. In this paper, we propose a design and implementation of a cloud-based security center for network security forensic analysis. We propose using cloud storage to keep collected traffic data and then processing it with cloud computing platforms to find the malicious attacks. As a practical example, phishing attack forensic analysis is presented and the required computing and storage resources are evaluated based on real trace data. The cloud- based security center can instruct each collaborative UTM and prober to collect events and raw traffic, send them back for deep analysis, and generate new security rules. These new security rules are enforced by collaborative UTM and the feedback events of such rules are returned to the security center. By this type of close-loop control, the collaborative network security management system can identify and address new distributed attacks more quickly and effectively.展开更多
基金Project supported by the National Natural Science Foundation of China (Grant No. 10975015)the National Basic Research Program of China (Grant No. 2007CB814800)
文摘Recently, self-sustained oscillatory genetic regulatory networks (GRNs) have attracted significant attention in the biological field. Given a GRN, it is important to anticipate whether the network could generate oscillation with proper parameters, and what the key ingredients for the oscillation are. In this paper the ranges of some function-related parameters which are favorable to sustained oscillations are considered. In particular, some oscillatory motifs appearing with high-frequency in most of the oscillatory GRNs are observed. Moreover, there are some anti-oscillatory motifs which have a strong oscillation repressing effect. Some conclusions analyzing these motif effects and constructing oscillatory GRNs are provided.
基金supported by the National Natural Science Foundation of China(61374003 41631072)the Academic Foundation of Naval University of Engineering(20161475)
文摘Both time-delays and anti-windup(AW)problems are conventional problems in system design,which are scarcely discussed in cellular neural networks(CNNs).This paper discusses stabilization for a class of distributed time-delayed CNNs with input saturation.Based on the Lyapunov theory and the Schur complement principle,a bilinear matrix inequality(BMI)criterion is designed to stabilize the system with input saturation.By matrix congruent transformation,the BMI control criterion can be changed into linear matrix inequality(LMI)criterion,then it can be easily solved by the computer.It is a one-step AW strategy that the feedback compensator and the AW compensator can be determined simultaneously.The attraction domain and its optimization are also discussed.The structure of CNNs with both constant timedelays and distribute time-delays is more general.This method is simple and systematic,allowing dealing with a large class of such systems whose excitation satisfies the Lipschitz condition.The simulation results verify the effectiveness and feasibility of the proposed method.
文摘Anti-inflammatory activity of a series of tri-substituted pyrimidine derivatives was predicted using two Quantitative Structure-Activity Relationship models. These relationships were developed from molecular descriptors calculated using the DFT quantum chemistry method using the B3LYP/6-31G(d,p) level of theory and molecular lipophilicity. Thus, the four descriptors which are the dipole moment μ<sub>D</sub>, the energy of the highest occupied molecular orbital E<sub>HOMO</sub>, the isotropic polarizability α and the ACD/logP lipophilicity were selected for this purpose. The Multiple Linear Regression (MLR) and Artificial Neural Network (ANN) models are respectively accredited with the following statistical indicators: R<sup>2</sup>=91.28%, R<sup>2</sup><sub>aj</sub>=89.11%, RMCE = 0.2831, R<sup>2</sup><sub>ext</sub>=86.50% and R<sup>2</sup>=98.22%, R<sup>2</sup><sub>aj</sub>=97.75%, RMCE = 0.1131, R<sup>2</sup><sub>ext</sub>=98.54%. The results obtained with the artificial neural network are better than those of the multiple linear regression. However, these results show that the two models developed have very good predictive performance of anti-inflammatory activity. These two models can therefore be used to predict anti-inflammatory activity of new similar pyrimidine derivatives.
基金Supported by the National Natural Science Foundation of China under Grant No.10872119Research Foundation of Hangzhou Dianzi University under Grant No.KYF075610032
基金supported by National Nature Science Foundation under Grant 11161029,Chinascience and technology research projects of guangxi under Grant 2013YB282,201203YB186
文摘In this paper,we study the anti-periodic solutions for a class of impulsive Cohen-Grossberg neural networks with mixed delays.By using analysis techniques,some sufficient conditions are obtained which guarantee the existence and global exponential stability of the anti-periodic solutions.The criteria extend and improve some earlier results.Moreover,we give an examples to illustrate our main results.
基金National Natural Science Foundation of China(No. 60474021)
文摘Various force disturbances influence the thrust force of linear motors when a linear motor (LM) is running. Among all of force disturbances, the force ripple is the dominant while a linear motor runs in low speed. In order to suppress the force ripple, back propagation(BP) neural network is proposed to learn the function of the force ripple of linear motors, and the acquisition method of training samples is proposed based on a disturbance observer. An off-line BP neural network is used mainly because of its high running efficiency and the real-time requirement of the servo control system of a linear motor. By using the function, the force ripple is on-line compensated according to the position of the LM. The experimental results show that the force ripple is effectively suppressed by the compensation of the BP neural network.
基金the University of Macao for financial support for this research by the project MYRG119(Y1-L3)-ICMS12-HYJ
文摘Objective: Better understanding of China's landscape in oncology drug research is of great significance for discovering anti-cancer drugs in future. This article differs from previous studies by focusing on Chinese oncology drug research communities in co-publication networks at the institutional level. Moreover, this research aims to explore structures and behaviors of relevant research units by thematic community analysis and to address policy recommendations. Methods: This research used social network analysis to define an institutions network and to identify a community network which is characterized by thematic content. Results: A total of 675 sample articles from 2008 through 2012 were retrieved from the Science Citation Index Expanded (SCIE) database of Web of Science, and top institutions and institutional pairs are highlighted for further discussion. Meanwhile, this study revealed that institutions based in the Chinese mainland are located in a relatively central position, Taiwan's institutions are closely assembled on the side, and Hong Kong's units located in the middle of the Chinese mainland's and Taiwan's. Spatial division and institutional hierarchy are still critical barriers to research collaboration in the field of anti-cancer drugs in China. In addition, the communities focusing on hot research areas show the higher nodal degree, whereas communities giving more attention to rare research subjects are relatively marginalized to the periphery of network. Conclusions= This paper offers policy recommendations to accelerate cross-regional cooperation, such as through developing information technology and increasing investment. The brokers should focus more on outreach to other institutions. Finally, participation in topics of common interest is conducive to improved efficiency in research and development (R&D) resource allocation.
基金supported by grants from the National Natural Science Foundation of China(Grant No.81403103)Chinese Medicine Resources(Sichuan Province)Youth Science and Technology Innovation Team(Grant No.2015TD0028)+1 种基金Sichuan Province Science and Technology Support Plan(Grant No.2014SZ0156)Sichuan Province Education Department Project(Grant No.2013SZB0781)
文摘Curcumin,the medically active component from Curcuma longa(Turmeric),is widely used to treat inflammatory diseases.Protein interaction network(PIN) analysis was used to predict its mechanisms of molecular action.Targets of curcumin were obtained based on ChE MBL and STITCH databases.Protein–protein interactions(PPIs) were extracted from the String database.The PIN of curcumin was constructed by Cytoscape and the function modules identified by gene ontology(GO) enrichment analysis based on molecular complex detection(MCODE).A PIN of curcumin with 482 nodes and 1688 interactions was constructed,which has scale-free,small world and modular properties.Based on analysis of these function modules,the mechanism of curcumin is proposed.Two modules were found to be intimately associated with inflammation.With function modules analysis,the anti-inflammatory effects of curcumin were related to SMAD,ERG and mediation by the TLR family.TLR9 may be a potential target of curcumin to treat inflammation.
基金Supported by the National Basic Research Program of China (973 Program) (Grant No. 2007CB311002), the National Nature Science Foundation of China (Grant No. 61075054) and the Fundamental Research Funds for the Central Universities (Grant No. xjj20100087)
文摘In the past decades, various neural network models have been developed for modeling the behavior of human brain or performing problem-solving through simulating the behavior of human brain. The recurrent neural networks are the type of neural networks to model or simulate associative memory behavior of human being. A recurrent neural network (RNN) can be generally formalized as a dynamic system associated with two fundamental operators: one is the nonlinear activation operator deduced from the input-output properties of the involved neurons, and the other is the synaptic connections (a matrix) among the neurons. Through carefully examining properties of various activation functions used, we introduce a novel type of monotone operators, the uniformly pseudo-projectionanti-monotone (UPPAM) operators, to unify the various RNN models appeared in the literature. We develop a unified encoding and stability theory for the UPPAM network model when the time is discrete. The established model and theory not only unify but also jointly generalize the most known results of RNNs. The approach has lunched a visible step towards establishment of a unified mathematical theory of recurrent neural networks.
基金supported by the National Natural Science Foundation of China (60973139,60773041,61003039,61003236)Scientific & Technological Support Project (Industry) of Jiangsu Province (BE2010197,BE2010198)+6 种基金Jiangsu Provincial Research Scheme of Natural Science for Higher Education Institutions (10KJB520013,10KJB520014)Scientific Research & Industry Promotion Project for Higher Education Institutions (JH10-14)Science & Technology Innovation Fund for Higher Education Institutions of Jiangsu Province (CX10B-196Z)the Six Kinds of Top Talent of Jiangsu Province (2008118)Doctoral Fund of Ministry of Education of China (20103223120007)Key Laboratory Foundation of Information Technology Processing of Jiangsu Province (KJS1022)the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD)
文摘Anti-worm is an effective way to fight against malicious worm and has been followed closely by malicious worm researchers recently. However, active and passive confronting technologies in peer-to-peer (P2P) networks have not been studied in depth. This paper introduces both of them to fight against malicious worm in P2P networks. To study their effectiveness in P2P networks, this paper takes the topology degree in P2P networks into consideration and puts forward a four-state propagation model for active anti-worm and a five-state propagation model for passive anti-worm respectively. Both of the models are simplified in the case that size of a P2P network is large enough. The simulation results have not only validated the effectiveness of our propagation models but also evaluated the excellent performance of both active anti-worm and passive anti-worm.
基金supported by the Program for New Century Excellent Talents in University of China (NCET-06-0510)the National Natural Science Foundation of China (60874091)+1 种基金the Six Projects Sponsoring Talent Summits of Jiangsu Province (SJ209006)the Scientific Innovation Program for University Research Students in Jiangsu Province of China (CX08B_081Z)
文摘In this article, a modified susceptible-infected-removed (SIR) model is proposed to study the influence of diversity of node anti-attack abilities on the threshold of propagation in scale-free networks. In particular, a vulnerability function related to node degree is introduced into the model to describe the diversity of a node anti-attack ability. Analytical results are derived using the mean-field theory and it is observed that the diversity of anti-attack of nodes in scale-free networks can increase effectively the threshold of epidemic propagation. The simulation results agree with the analytical results. The results show that the vulnerability functions can help adopt appropriate immunization strategies.
基金supported by the National Key Basic Research and Development (973) Program of China(Nos.2011CB302805,2011CB302505,2012CB315801,and2013CB228206)the National Natural Science Foundation of China(No.61233016)supported by Intel Research Councils UPO program with the title of Security Vulnerability Analysis Based on Cloud Platform
文摘Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bots that generate huge volumes of spam or launch Distributed Denial of Service (DDoS) attacks on victim hosts. New emerging botnet attacks degrade the status of Internet security further. To address these problems, a practical collaborative network security management system is proposed with an effective collaborative Unified Threat Management (UTM) and traffic probers. A distributed security overlay network with a centralized security center leverages a peer-to-peer communication protocol used in the UTMs collaborative module and connects them virtually to exchange network events and security rules. Security functions for the UTM are retrofitted to share security rules. In this paper, we propose a design and implementation of a cloud-based security center for network security forensic analysis. We propose using cloud storage to keep collected traffic data and then processing it with cloud computing platforms to find the malicious attacks. As a practical example, phishing attack forensic analysis is presented and the required computing and storage resources are evaluated based on real trace data. The cloud- based security center can instruct each collaborative UTM and prober to collect events and raw traffic, send them back for deep analysis, and generate new security rules. These new security rules are enforced by collaborative UTM and the feedback events of such rules are returned to the security center. By this type of close-loop control, the collaborative network security management system can identify and address new distributed attacks more quickly and effectively.