53 research outputs found

    Model-free screening procedure for ultrahigh-dimensional survival data based on Hilbert-Schmidt independence criterion

    Full text link
    How to select the active variables which have significant impact on the event of interest is a very important and meaningful problem in the statistical analysis of ultrahigh-dimensional data. Sure independent screening procedure has been demonstrated to be an effective method to reduce the dimensionality of data from a large scale to a relatively moderate scale. For censored survival data, the existing screening methods mainly adopt the Kaplan--Meier estimator to handle censoring, which may not perform well for scenarios which have heavy censoring rate. In this article, we propose a model-free screening procedure based on the Hilbert-Schmidt independence criterion (HSIC). The proposed method avoids the complication to specify an actual model from a large number of covariates. Compared with existing screening procedures, this new approach has several advantages. First, it does not involve the Kaplan--Meier estimator, thus its performance is much more robust for the cases with a heavy censoring rate. Second, the empirical estimate of HSIC is very simple as it just depends on the trace of a product of Gram matrices. In addition, the proposed procedure does not require any complicated numerical optimization, so the corresponding calculation is very simple and fast. Finally, the proposed procedure which employs the kernel method is substantially more resistant to outliers. Extensive simulation studies demonstrate that the proposed method has favorable exhibition over the existing methods. As an illustration, we apply the proposed method to analyze the diffuse large-B-cell lymphoma (DLBCL) data and the ovarian cancer data

    Drought-Induced Carbon and Water Use Efficiency Responses in Dryland Vegetation of Northern China

    Get PDF
    Given the context of global warming and the increasing frequency of extreme climate events, concerns have been raised by scientists, government, and the public regarding drought occurrence and its impacts, particularly in arid and semi-arid regions. In this paper, the drought conditions for the forest and grassland areas in the northern region of China were identified based on 12 years of satellite-based Drought Severity Index (DSI) data. The impact of drought on dryland vegetation in terms of carbon use efficiency (CUE) and water use efficiency (WUE) were also investigated by exploring their correlations with DSI. Results indicated that 49.90% of forest and grassland experienced a dry trend over this period. The most severe drought occurred in 2001. In general, most forests in the study regions experienced near normal and wet conditions during the 12 year period. However, grasslands experienced a widespread drought after 2006. The forest CUE values showed a fluctuation increase from 2000 to 2011, whereas the grassland CUE remained steady over this period. In contrast, WUE increased in both forest and grassland areas due to the increasing net primary productivity (NPP) and descending evapotranspiration (ET). The CUE and WUE values of forest areas were more sensitive to droughts when compared to the values for grassland areas. The correlation analysis demonstrated that areas of DSI that showed significant correlations with CUE and WUE were 17.24 and 10.37% of the vegetated areas, respectively. Overall, the carbon and water use of dryland forests was more affected by drought than that of dryland grasslands

    Psychological symptoms in Chinese nurses may be associated with predisposition to chronic disease: A cross-sectional study of suboptimal health status

    Get PDF
    © 2020, The Author(s). Background: Suboptimal health status (SHS) is a reversible state between ideal health and illness and it can be effectively reversed by risk prediction, disease prevention, and personalized medicine under the global background of predictive, preventive, and personalized medicine (PPPM) concepts. More and more Chinese nurses have been troubled by psychological symptoms (PS). The correlation between PS and SHS is unclear in nurses. The purpose of current study is to investigate the prevalence of SHS and PS in Chinese nurses and the relationship between SHS and PS along with predisposing factors as well as to discuss the feasibility of improving health status and preventing diseases according to PPPM concepts in Chinese nurses. Methods: A cross-sectional study was conducted with the cluster sampling method among 9793 registered nurses in Foshan city, China. SHS was evaluated with the Suboptimal Health Status Questionnaire-25 (SHSQ-25). Meanwhile, the PS of depression and anxiety were evaluated with Self-Rating Depression Scale (SDS) and Self-Rating Anxiety Scale (SAS) self-assessment questionnaires. The relationship between PS and SHS in Chinese nurses was subsequently analyzed. Results: Among the 9793 participants, 6107 nurses were included in the final analysis. The prevalence of SHS in the participants was 74.21% (4532/6107) while the symptoms of depression and anxiety were 47.62% (2908/6107) and 24.59% (1502/6107) respectively. The prevalence of SHS in the participants with depression and anxiety was significantly higher than those without the symptoms of depression (83.3% vs 16.7%, P \u3c 0.001) and anxiety (94.2% vs 5.8%, P \u3c 0.0001). The ratio of exercise habit was significantly lower than that of non-exercise habit (68.8% vs 78.4%, P \u3c 0.001) in SHS group. Conclusions: There is a high prevalence of SHS and PS in Chinese nurses. PS in Chinese nurses are associated with SHS. Physical exercise is a protective factor for SHS and PS so that the exercise should be strongly recommended as a valuable preventive measure well in the agreement with PPPM philosophy. Along with SDS and SAS, SHSQ-25 should also be highly recommended and applied as a novel predictive/preventive tool for the health measures from the perspectives of PPPM in view of susceptible population and individual screening, the predisposition to chronic disease preventing, personalization of intervention, and the ideal health state restoring

    A Shared Neural Basis Underlying Psychiatric Comorbidity

    Get PDF
    Recent studies proposed a general psychopathology factor underlying common comorbidities among psychiatric disorders. However, its neurobiological mechanisms and generalizability remain elusive. In this study, we used a large longitudinal neuroimaging cohort from adolescence to young adulthood (IMAGEN) to define a neuropsychopathological (NP) factor across externalizing and internalizing symptoms using multitask connectomes. We demonstrate that this NP factor might represent a unified, genetically determined, delayed development of the prefrontal cortex that further leads to poor executive function. We also show this NP factor to be reproducible in multiple developmental periods, from preadolescence to early adulthood, and generalizable to the resting-state connectome and clinical samples (the ADHD-200 Sample and the Stratify Project). In conclusion, we identify a reproducible and general neural basis underlying symptoms of multiple mental health disorders, bridging multidimensional evidence from behavioral, neuroimaging and genetic substrates. These findings may help to develop new therapeutic interventions for psychiatric comorbidities

    AI-based power system stability assessment and GUI design

    No full text
    This article introduces some methods of machine learning (ML) and artificial intelligence (AI) used to assess the stability of the power system. Four models are mainly used, including Support Vector Machine (SVM), Multilayer Perceptron (MLP), Convolutional Neural Network (CNN) and Long Short-term Memory (LSTM). The four methods’ theoretical motivation is conceptually explained, and they are tested with the 7127 feature and label data. The results along with the accuracy, the recall rate, the mean absolute error as well as the mean squared error are being analyzed. During pre-processing procedure, Principal Components Analysis (PCA) is used to reduce dimension and select features. With the result of the AI model, a GUI is designed to display the label result directly.Master of Science (Computer Control and Automation

    Investigating the Neural Bases of Risky Decision Making Using Multi-Voxel Pattern Analysis

    No full text
    Choices between smaller certain reward and larger riskier reward are referred to as risky decision making. Numerous functional magnetic resonance imaging (fMRI) studies have investigated the neural substrates of risky decision making via conventional univariate analytical approaches, revealing dissociable activation of decisions involving certain rewards and risky rewards. However, it is still unclear how the patterns of brain activity predict the choice that the individual will make. With the help of multi-voxel pattern analyses, which is more sensitive for evaluating information encoded in spatially distributed patterns, we showed that fMRI activity patterns represent viable signatures of certain and risky choice and individual differences. Notably, the regions involved in representation of value and risk and cognitive control play prominent roles in differentiating certain and risky choices as well as individuals with distinct risk preference. These results deepen our understanding of the neural correlates of risky decision making as well as emphasize the important roles of regions involved in representation of value and risk cognitive control in predicting risky decision making and individual differences

    The age differences of sleep disruption on mood states and memory performance

    No full text
    Objectives: In the present study, we explored the age differences of mood states and memory performance between younger and older adults after one night of sleep disruption. Method: Twenty-nine younger adults and 30 older adults completed mood states assessments and memory tasks before and after sleep disruption. Participants&#39; sleep was disrupted by periodical phone calls once per hour. Sleep parameters of baseline sleep and disrupted sleep were recorded by actigraphy. Results: Regarding the mood states, older adults were less affected than younger adults, more tolerant of sleep disruption. With respect to memory, younger adults showed increased memory performance after nocturnal sleep, even if this sleep was disrupted. In contrast, older adults&#39; sleep-related memory consolidation was impaired. Conclusion: Periodic sleep disruption for one night resulted in impaired function of older adults&#39; sleep-related memory consolidation and younger adults&#39; mood states. These findings shed light on the understanding of sleep function on memory and emotion. Specifically, sleep disruption might be one of the reasons for older adults&#39; memory decline and it might also be one of the causes for younger adults&#39; emotion disorders. Further investigations on the relationship between sleep disruption, cognitive performance and emotional well-being are needed to find potential ways to prevent and treat the sleep-related neuropsychological impairments in both younger and older adults.</p

    Task switching involves working memory: Evidence from neural representation

    No full text
    It is generally assumed that task switching involves working memory, yet some behavioral studies question the relationship between working memory and task switching ability. This debate can be resolved by directly comparing the brain activity pattern in task switching and working memory processes. If the task switching involves working memory, the neural activity patterns evoked by such two tasks would exhibit higher similarity. Here, we employed the task switching task and working memory to investigate the characteristic of the neural representation in such two cognitive processes. A conjunction analysis showed that the bilateral superior parietal lobule (SPL), bilateral insula, bilateral middle frontal gyrus (MFG), bilateral dorsal lateral prefrontal cortex (DLPFC) and pre-supplementary motor area (pre-SMA) were commonly and significantly activated in both task switching and working memory task. Critically, we found that task switching and working memory processing elicited similar activity patterns in bilateral SPL, right insula, left MFG, left DLPFC and pre-SMA, consistent with common neural processes for both tasks. These results not only suggest that the task switching process involves working memory from the perspective of neural representation, but also provide major new insights into the neurocognitive links between task switching and working memory

    Attacks and defenses in user authentication systems: A survey

    No full text
    Funding Information: This work was supported in part by the National Natural Science Foundation of China under Grant 62072351 ; in part by the Academy of Finland under Grant 308087 and Grant 335262 ; in part by the Shaanxi Innovation Team Project under Grant 2018TD-007 ; and in part by the 111 Project under Grant B16037 . Publisher Copyright: © 2021 Elsevier LtdUser authentication systems (in short authentication systems) have wide utilization in our daily life. Unfortunately, existing authentication systems are prone to various attacks while both system security and usability are expected to be satisfied. But the current research still lacks a thorough survey on various types of attacks and corresponding countermeasures regarding user authentication, including traditional password-based and emerging biometric-based systems. In this paper, we make a comprehensive review on attacks and defenses of the authentication systems. We firstly introduce a number of common attacks by classifying them into different categories based on attacker knowledge, attack target, attack form and attack strength. Then, we propose a set of evaluation criteria for evaluating different kinds of attack defense mechanisms. Furthermore, we review and evaluate the existing methods of detecting and resisting attacks in the authentication systems by employing the proposed evaluation criteria as acommon measure. Specifically, we focus on comparing and analyzing the performance of different defense mechanisms in different types of authentication systems. Through serious review and analysis, we put forward a number of open issues and propose some promising future research directions, hoping to inspire further research in this field.Peer reviewe
    corecore