12 results on '"Dingding Wang"'
Search Results
2. Study on the distribution characteristics of faults and their control over petroliferous basins in the China seas and its adjacent areas
- Author
-
Xin’gang Luo, Wanyin Wang, Ying Chen, Zhizhao Bai, Dingding Wang, Tao He, Yimi Zhang, and Ruiyun Ma
- Subjects
Aquatic Science ,Oceanography - Published
- 2023
- Full Text
- View/download PDF
3. Mild hyperamylasemia in type 1 diabetic children without diabetic ketoacidosis is associated with C-peptide
- Author
-
Dingding Wang, Yu Qiao, Guimei Li, Jiang Xue, and Wei Song
- Subjects
medicine.medical_specialty ,Diabetic ketoacidosis ,Endocrinology, Diabetes and Metabolism ,medicine.medical_treatment ,030209 endocrinology & metabolism ,Diabetic nephropathy ,03 medical and health sciences ,chemistry.chemical_compound ,0302 clinical medicine ,Internal medicine ,Diabetes mellitus ,Internal Medicine ,medicine ,030212 general & internal medicine ,Amylase ,Glycemic ,biology ,business.industry ,C-peptide ,Insulin ,medicine.disease ,Endocrinology ,chemistry ,biology.protein ,Hyperamylasemia ,business - Abstract
The aim of this study is to investigate the relationship between plasma amylase concentration and C-peptide level in type 1 diabetic and healthy children. The cross-sectional study involved 31 Chinese type 1 diabetic children without complications and 107 healthy control subjects. Clinical examination and laboratory examinations were assessed for all participants. Significantly higher amylase concentrations were measured in type 1 diabetic children than in controls (102.8 U/l vs. 70.2 U/l, respectively; p
- Published
- 2019
- Full Text
- View/download PDF
4. MCC: a Multiple Consensus Clustering Framework
- Author
-
Dingding Wang, Jian Xu, Tao Li, and Yi Zhang
- Subjects
Modularity (networks) ,Computer science ,Library and Information Sciences ,computer.software_genre ,Partition (database) ,Set (abstract data type) ,Tree (data structure) ,ComputingMethodologies_PATTERNRECOGNITION ,Mathematics (miscellaneous) ,Tree structure ,Consensus clustering ,Pattern recognition (psychology) ,Psychology (miscellaneous) ,Data mining ,Statistics, Probability and Uncertainty ,Cluster analysis ,computer - Abstract
Consensus clustering has emerged as an important extension of the classical clustering problem. Given a set of input clusterings of a given dataset, consensus clustering aims to find a single final clustering which is a better fit in some sense than the existing clusterings. There is a significant drawback in generating a single consensus clustering since different input clusterings could differ significantly. In this paper, we develop a new framework, called Multiple Consensus Clustering (MCC), to explore multiple clustering views of a given dataset from a set of input clusterings. Instead of generating a single consensus, we propose two sets of approaches to obtain multiple consensus. One employs the meta clustering method, and the other uses a hierarchical tree structure and further applies a dynamic programming algorithm to generate a flat partition from the hierarchical tree using the modularity measure. Multiple consensuses are finally obtained by applying consensus clustering algorithms to each cluster of the partition. Extensive experimental results on 11 real-world datasets and a case study on a Protein-Protein Interaction (PPI) dataset demonstrate the effectiveness of the MCC framework.
- Published
- 2019
- Full Text
- View/download PDF
5. Prognostic value of long non-coding RNA GHET1 in cancers: a systematic review and meta-analysis
- Author
-
Xiaolian Fang, Xue Zhang, Hong Zhang, Dingding Wang, and Honggang Liu
- Subjects
GHET1 ,Oncology ,Cancer Research ,medicine.medical_specialty ,MEDLINE ,Review ,lcsh:RC254-282 ,Metastasis ,03 medical and health sciences ,0302 clinical medicine ,Internal medicine ,Genetics ,Medicine ,lcsh:QH573-671 ,Stage (cooking) ,030304 developmental biology ,0303 health sciences ,lcsh:Cytology ,business.industry ,Hazard ratio ,Cancer ,Odds ratio ,Prognosis ,lcsh:Neoplasms. Tumors. Oncology. Including cancer and carcinogens ,medicine.disease ,Confidence interval ,Meta-analysis ,030220 oncology & carcinogenesis ,Cancers ,business - Abstract
Background A number of studies have demonstrated the critical role of long non-coding RNA gastric cancer high expressed transcript 1 (GHET1) in many cancers. This meta-analysis provides an evidence-based evaluation of the prognostic role of GHET1 in cancer. Materials and methods Literature searches were conducted in several databases including Medline, Cochrane, EMBASE, CNKI, and Wanfang. The pooled odds ratio (OR) and hazard ratio (HR) with 95% confidence interval (CI) were used to evaluate the role of GHET1 in cancer. The study protocol was registered at PROSPERO (ID: CRD42018111252). Results Sixteen studies, containing 1315 patients, were analyzed in this meta-analysis. The pooled results indicated that GHET1 overexpression was significantly associated with poor overall survival (OS) and disease-free survival (DFS) in cancer. Moreover, up-regulation of GHET1 expression predicted larger tumor size, positive lymph node metastasis, positive distant metastasis, and advanced TNM (tumor-node-metastases) stage in human cancers. Conclusion There is a significant correlation between up-regulation of GHET1 and both poor prognosis and advanced clinicopathological cancer characteristics. GHET1 may be a potential prognostic predictor for human cancers.
- Published
- 2020
- Full Text
- View/download PDF
6. A survey on expert finding techniques
- Author
-
Shuyi Lin, Dingding Wang, Wenxing Hong, and Tao Li
- Subjects
Data collection ,Computer Networks and Communications ,Computer science ,02 engineering and technology ,Data science ,Data resources ,Task (project management) ,Artificial Intelligence ,Hardware and Architecture ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Software ,Information Systems - Abstract
Finding experts in specified areas is an important task and has attracted much attention in the information retrieval community. Research on this topic has made significant progress in the past few decades and various techniques have been proposed. In this survey, we review the state-of-the-art methods in expert finding and summarize these methods into different categories based on their underlying algorithms and models. We also introduce the most widely used data collection for evaluating expert finding systems, and discuss future research directions.
- Published
- 2017
- Full Text
- View/download PDF
7. Characterization of Mg–Y co-doped ZrO2/MgAl2O4 composite ceramic and the corrosion reaction in molten uranium
- Author
-
Sibo Shen, Liping Luo, Dingding Wang, Shu Cai, Shuxin Niu, and Tong Zhang
- Subjects
010302 applied physics ,Thermal shock ,Materials science ,Health, Toxicology and Mutagenesis ,Metallurgy ,Public Health, Environmental and Occupational Health ,chemistry.chemical_element ,Corrosion reaction ,02 engineering and technology ,Uranium ,021001 nanoscience & nanotechnology ,01 natural sciences ,Pollution ,Analytical Chemistry ,Corrosion ,Characterization (materials science) ,Nuclear Energy and Engineering ,chemistry ,0103 physical sciences ,Composite ceramic ,Radiology, Nuclear Medicine and imaging ,Graphite ,0210 nano-technology ,Spectroscopy ,Co doped - Abstract
A kind of composite ceramic consisted of Mg–Y co-doped ZrO2 and MgAl2O4 was prepared as a lining material of the high density graphite crucibles in nuclear industry. When the addition of MgAl2O4 was 7 wt%, the sample showed good thermal shock resistance. The obtained samples were tested in flowing molten uranium and no apparent cracks were found on the corrosion surface. Meanwhile, with the prolonging of corrosion time, the corrosion rate significantly decreased due to the formation of a protection layer consisted of UO2, Al3Zr2 and ZrC.
- Published
- 2016
- Full Text
- View/download PDF
8. Improved sqrt-cosine similarity measurement
- Author
-
Dingding Wang and Sahar Sohangir
- Subjects
Hellinger distance ,lcsh:Computer engineering. Computer hardware ,Information Systems and Management ,Computer Networks and Communications ,Computer science ,lcsh:TK7885-7895 ,02 engineering and technology ,Similarity measure ,computer.software_genre ,lcsh:QA75.5-76.95 ,Semantic similarity ,Similarity (network science) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Information retrieval ,Cluster analysis ,lcsh:T58.5-58.64 ,lcsh:Information technology ,Computer Science::Information Retrieval ,Similarity heuristic ,Cosine similarity ,Euclidean distance ,Hardware and Architecture ,Normalized compression distance ,020201 artificial intelligence & image processing ,lcsh:Electronic computers. Computer science ,Data mining ,computer ,Information Systems - Abstract
Text similarity measurement aims to find the commonality existing among text documents, which is fundamental to most information extraction, information retrieval, and text mining problems. Cosine similarity based on Euclidean distance is currently one of the most widely used similarity measurements. However, Euclidean distance is generally not an effective metric for dealing with probabilities, which are often used in text analytics. In this paper, we propose a new similarity measure based on sqrt-cosine similarity. We apply the proposed improved sqrt-cosine similarity to a variety of document-understanding tasks, such as text classification, clustering, and query search. Comprehensive experiments are then conducted to evaluate our new similarity measurement in comparison to existing methods. These experimental results show that our proposed method is indeed effective.
- Published
- 2017
- Full Text
- View/download PDF
9. Personalized News Recommendation: A Review and an Experimental Investigation
- Author
-
Dingding Wang, Lei Li, Shunzhi Zhu, and Tao Li
- Subjects
Computer science ,business.industry ,media_common.quotation_subject ,Internet privacy ,Recommender system ,computer.software_genre ,Computer Science Applications ,Theoretical Computer Science ,Ranking (information retrieval) ,Personalization ,News aggregator ,World Wide Web ,Empirical research ,Computational Theory and Mathematics ,Ranking ,Hardware and Architecture ,Reading (process) ,Collaborative filtering ,The Internet ,business ,computer ,Software ,media_common - Abstract
Online news articles, as a new format of press releases, have sprung up on the Internet. With its convenience and recency, more and more people prefer to read news online instead of reading the paper-format press releases. However, a gigantic amount of news events might be released at a rate of hundreds, even thousands per hour. A challenging problem is how to efficiently select specific news articles from a large corpus of newly-published press releases to recommend to individual readers, where the selected news items should match the reader's reading preference as much as possible. This issue refers to personalized news recommendation. Recently, personalized news recommendation has become a promising research direction as the Internet provides fast access to real-time information from multiple sources around the world. Existing personalized news recommendation systems strive to adapt their services to individual users by virtue of both user and news content information. A variety of techniques have been proposed to tackle personalized news recommendation, including content-based, collaborative filtering systems and hybrid versions of these two. In this paper, we provide a comprehensive investigation of existing personalized news recommenders. We discuss several essential issues underlying the problem of personalized news recommendation, and explore possible solutions for performance improvement. Further, we provide an empirical study on a collection of news articles obtained from various news websites, and evaluate the effect of different factors for personalized news recommendation. We hope our discussion and exploration would provide insights for researchers who are interested in personalized news recommendation.
- Published
- 2011
- Full Text
- View/download PDF
10. SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging
- Author
-
Dingding Wang, Tao Li, Qingshan Jiang, Yanfang Ye, Min Zhao, and Lifei Chen
- Subjects
Application programming interface ,business.industry ,Computer science ,String (computer science) ,Feature selection ,Intrusion detection system ,computer.software_genre ,Machine learning ,Computer virus ,Support vector machine ,Naive Bayes classifier ,ComputingMethodologies_PATTERNRECOGNITION ,Hardware and Architecture ,Computer Science (miscellaneous) ,Malware ,Artificial intelligence ,Data mining ,business ,computer - Abstract
Malicious executables are programs designed to infiltrate or damage a computer system without the owner’s consent, which have become a serious threat to the security of computer systems. There is an urgent need for effective techniques to detect polymorphic, metamorphic and previously unseen malicious executables of which detection fails in most of the commercial anti-virus software. In this paper, we develop interpretable string based malware detection system (SBMDS), which is based on interpretable string analysis and uses support vector machine (SVM) ensemble with Bagging to classify the file samples and predict the exact types of the malware. Interpretable strings contain both application programming interface (API) execution calls and important semantic strings reflecting an attacker’s intent and goal. Our SBMDS is carried out with four major steps: (1) first constructing the interpretable strings by developing a feature parser; (2) performing feature selection to select informative strings related to different types of malware; (3) followed by using SVM ensemble with bagging to construct the classifier; (4) and finally conducting the malware detector, which not only can detect whether a program is malicious or not, but also can predict the exact type of the malware. Our case study on the large collection of file samples collected by Kingsoft Anti-virus lab illustrate that: (1) The accuracy and efficiency of our SBMDS outperform several popular anti-virus software; (2) Based on the signatures of interpretable strings, our SBMDS outperforms data mining based detection systems which employ single SVM, Naive Bayes with bagging, Decision Trees with bagging; (3) Compared with the IMDS which utilizes the objective-oriented association (OOA) based classification on API calls, our SBMDS achieves better performance. Our SBMDS system has already been incorporated into the scanning tool of a commercial anti-virus software.
- Published
- 2008
- Full Text
- View/download PDF
11. An intelligent PE-malware detection system based on association mining
- Author
-
Dingding Wang, Dongyi Ye, Yanfang Ye, Tao Li, and Qingshan Jiang
- Subjects
Application programming interface ,Association rule learning ,Computer science ,Decision tree ,Intrusion detection system ,computer.software_genre ,Computer virus ,Support vector machine ,Naive Bayes classifier ,Hardware and Architecture ,Computer Science (miscellaneous) ,Malware ,Data mining ,computer - Abstract
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based anti-virus systems fail to detect polymorphic/metamorphic and new, previously unseen malicious executables. Data mining methods such as Naive Bayes and Decision Tree have been studied on small collections of executables. In this paper, resting on the analysis of Windows APIs called by PE files, we develop the Intelligent Malware Detection System (IMDS) using Objective-Oriented Association (OOA) mining based classification. IMDS is an integrated system consisting of three major modules: PE parser, OOA rule generator, and rule based classifier. An OOA_Fast_FP-Growth algorithm is adapted to efficiently generate OOA rules for classification. A comprehensive experimental study on a large collection of PE files obtained from the anti-virus laboratory of KingSoft Corporation is performed to compare various malware detection approaches. Promising experimental results demonstrate that the accuracy and efficiency of our IMDS system outperform popular anti-virus software such as Norton AntiVirus and McAfee VirusScan, as well as previous data mining based detection systems which employed Naive Bayes, Support Vector Machine (SVM) and Decision Tree techniques. Our system has already been incorporated into the scanning tool of KingSoft’s Anti-Virus software.
- Published
- 2008
- Full Text
- View/download PDF
12. Inhibition of α-SMA by the Ectodomain of FGFR2c Attenuates Lung Fibrosis
- Author
-
Ju, Wang, primary, Zhihong, Yu, additional, Zhiyou, Zhou, additional, Qin, Huang, additional, Dingding, Wang, additional, Li, Sun, additional, Baowei, Zhu, additional, Xing, Wei, additional, Ying, He, additional, and An, Hong, additional
- Published
- 2012
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.