期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Study of brain morphology change in Alzheimer’s disease and amnestic mild cognitive impairment compared with normal controls 被引量:4
1
作者 Huanqing Yang Hua Xu +10 位作者 Qingfeng Li Yan Jin Weixiong Jiang Jinghua Wang Yina Wu Wei Li Cece Yang Xia Li Shifu Xiao Feng Shi Tao Wang 《General Psychiatry》 CSCD 2019年第2期75-83,共9页
Background With an aggravated social ageing level, the number of patients with Alzheimer's disease (AD) is gradually increasing, and mild cognitive impairment (MCI) is considered to be an early form of Alzheimer&#... Background With an aggravated social ageing level, the number of patients with Alzheimer's disease (AD) is gradually increasing, and mild cognitive impairment (MCI) is considered to be an early form of Alzheimer's disease. How to distinguish diseases in the early stage for the purposes of early diagnosis and treatment is an important topic. Aims The purpose of our study was to investigate the differences in brain cortical thickness and surface area among elderly patients with AD, elderly patients with amnestic MCI (aMCI) and normal controls (NC). Methods 20 AD patients, 21 aMCIs and 25 NC were recruited in the study. FreeSurfer software was used to calculate cortical thickness and surface area among groups. Results The patients with AD had less cortical thickness both in the left and right hemisphere in 17 of the 36 brain regions examined than the patients with aMCI or NC. The patients with AD also had smaller cerebral surface area both in the left and right hemisphere in 3 of the 36 brain regions examined than the patients with aMCI or NC. Compared with the NC, the patients with aMCI only had slight atrophy in the inferior parietal lobe of the left hemisphere, and no significant difference was found. Conclusion AD, as well as aMCI (to a lesser extent), is associated with reduced cortical thickness and surface area in a few brain regions associated with cognitive impairment. These results suggest that cortical thickness and surface area could be used for early detection of AD. 展开更多
关键词 brain morphology CHANGE amnestic MILD COGNITIVE IMPAIRMENT compared aMCI NC
暂未订购
Non-identical Neural Network Synchronization Study Based on an Adaptive Learning Rule of Synapses 被引量:1
2
作者 YAN Chuan-Kui WANG Ru-Bin 《Chinese Physics Letters》 SCIE CAS CSCD 2012年第9期20-23,共4页
An adaptive learning rule of synapses is proposed for a general asymmetric non-identical neural network.Its feasibility is proved by the Lasalle principle.Numerical simulation results show that synaptic connection wei... An adaptive learning rule of synapses is proposed for a general asymmetric non-identical neural network.Its feasibility is proved by the Lasalle principle.Numerical simulation results show that synaptic connection weight can converge to an appropriate strength and the identical network comes to synchronization.Furthermore,by this approach of learning,a non-identical neural population can still reach synchronization.This means that the learning rule has robustness on mismatch parameters.The firing rhythm of the neural population is totally dependent on topological properties,which promotes our understanding of neuron population activities. 展开更多
关键词 NEURAL identical APP
原文传递
Controlling the collision between two solitons in the condensates by a double-barrier potential
3
作者 李志坚 李锦茴 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第8期85-89,共5页
We present an analytical solution of two solitons of Bose-Einstein condensates trapped in a double-barrier potential by using a multiple-scale method. In the linear case, we find that the stable spots of the soliton f... We present an analytical solution of two solitons of Bose-Einstein condensates trapped in a double-barrier potential by using a multiple-scale method. In the linear case, we find that the stable spots of the soliton formation are at the top of the barrier potential and at the region of barrier potential absence. For weak nonlinearity, it is shown that the height of the barrier potential has an important effect on the dark soliton dynamical properties. Especially, in the case of regarding a double-barrier potential as the output source of the solitons, the collision spots between two dark solitons can be controlled by the height of the barrier potential. 展开更多
关键词 Bose Einstein condensates SOLITONS double-barrier potential
原文传递
Soliton dynamical properties of Bose Einstein condensates trapped in a double square well potential
4
作者 李锦茴 李志坚 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第10期118-122,共5页
We first present an analytical solution of the single and double solitions of Bose-Einstein condensates trapped in a double square well potential using the multiple-scale method. Then, we show by numerical calculation... We first present an analytical solution of the single and double solitions of Bose-Einstein condensates trapped in a double square well potential using the multiple-scale method. Then, we show by numerical calculation that a dark soliton can be transmitted through the square well potential. With increasing depth of the square well potential, the amplitude of the dark soliton becomes larger, and the soliton propagates faster. In particular, we treat the collision behaviour of the condensates trapped in either equal or different depths of the double square well potential. If we regard the double square well potential as the output source of the solitons, the collision locations (position and time) between two dark solitons can be controlled by its depth. 展开更多
关键词 Bose-Einstein condensates SOLITONS double square well potential
原文传递
Compiler IR-Based Program Encoding Method for Software Defect Prediction
5
作者 Yong Chen Chao Xu +2 位作者 Jing Selena He Sheng Xiao Fanfan Shen 《Computers, Materials & Continua》 SCIE EI 2022年第9期5251-5272,共22页
With the continuous expansion of software applications,people’s requirements for software quality are increasing.Software defect prediction is an important technology to improve software quality.It often encodes the ... With the continuous expansion of software applications,people’s requirements for software quality are increasing.Software defect prediction is an important technology to improve software quality.It often encodes the software into several features and applies the machine learning method to build defect prediction classifiers,which can estimate the software areas is clean or buggy.However,the current encoding methods are mainly based on the traditional manual features or the AST of source code.Traditional manual features are difficult to reflect the deep semantics of programs,and there is a lot of noise information in AST,which affects the expression of semantic features.To overcome the above deficiencies,we combined with the Convolutional Neural Networks(CNN)and proposed a novel compiler Intermediate Representation(IR)based program encoding method for software defect prediction(CIR-CNN).Specifically,our program encoding method is based on the compiler IR,which can eliminate a large amount of noise information in the syntax structure of the source code and facilitate the acquisition of more accurate semantic information.Secondly,with the help of data flow analysis,a Data Dependency Graph(DDG)is constructed on the compiler IR,which helps to capture the deeper semantic information of the program.Finally,we use the widely used CNN model to build a software defect prediction model,which can increase the adaptive ability of the method.To evaluate the performance of the CIR-CNN,we use seven projects from PROMISE datasets to set up comparative experiments.The experiments results show that,in WPDP,with our CIR-CNN method,the prediction accuracy was improved by 12%for the AST-encoded CNN-based model and by 20.9%for the traditional features-based LR model,respectively.And in CPDP,the AST-encoded DBNbased model was improved by 9.1%and the traditional features-based TCA+model by 19.2%,respectively. 展开更多
关键词 Compiler IR CNN data dependency graph defect prediction
在线阅读 下载PDF
Crosstalk Aware Register Reallocation Method for Green Compilation
6
作者 Sheng Xiao Jing Selena He +2 位作者 Xi Yang Yazhe Wang Lu Jin 《Computers, Materials & Continua》 SCIE EI 2020年第6期1357-1371,共15页
As nanoscale processing becomes the mainstream in IC manufacturing,the crosstalk problem rises as a serious challenge,not only for energy-efficiency and performance but also for security requirements.In this paper,we ... As nanoscale processing becomes the mainstream in IC manufacturing,the crosstalk problem rises as a serious challenge,not only for energy-efficiency and performance but also for security requirements.In this paper,we propose a register reallocation algorithm called Nearby Access based Register Reallocation(NARR)to reduce the crosstalk between instruction buses.The method includes construction of the software Nearby Access Aware Interference Graph(NAIG),using data flow analysis at assembly level,and reallocation of the registers to the software.Experimental results show that the crosstalk could be dramatically minimized,especially for 4C crosstalk,with a reduction of 80.84%in average,and up to 99.99%at most. 展开更多
关键词 CROSSTALK energy efficiency register reallocation green compilation
在线阅读 下载PDF
Timing Error Aware Register Allocation in TS
7
作者 Sheng Xiao Jing He +2 位作者 Xi Yang Heng Zhou Yujie Yuan 《Computer Systems Science & Engineering》 SCIE EI 2022年第1期273-286,共14页
Timing speculative(TS)architecture is promising for improving the energy efficiency of microprocessors.Error recovery units,designed for tolerating occasional timing errors,have been used to support a wider range of v... Timing speculative(TS)architecture is promising for improving the energy efficiency of microprocessors.Error recovery units,designed for tolerating occasional timing errors,have been used to support a wider range of voltage scaling,therefore to achieve a better energy efficiency.More specifically,the timing error rate,influenced mainly by data forwarding,is the bottleneck for voltage down-scaling in TS processors.In this paper,a new Timing Error Aware Register Allocation method is proposed.First,we designed the Dependency aware Interference Graph(DIG)construction to get the information of Read after Write(RAW)in programs.To build the construction,we get the disassemble code as input and suppose that there are unlimited registers,the same way as so-called virtual registers in many compilers.Then we change the disassemble codes to the SSA form for each basic block to make sure the registers are defined only once.Based on the DIG construction,registers were real-located to eliminate the timing error,by loosening the RAW dependencies.We con-struct the DIG for each function of the program and sort the edge of DIG by an increasing weight order.Since a smaller weighted-edge value means that its owner nodes have more frequent access in instruction flows,we expect it in different registers with no read-write dependency.At the same time,we make sure that there are no additional new spill codes emerging in our algorithm to minimize the rate of spill code.A high rate of spill code will not only decrease the performance of the system but also increase the unexpected read-write dependency.Next,we reallocate the reg-isters by weight order in turn to loosen the RAW dependencies.Furthermore,we use the NOP operation to pad the instructions with a minimal distance value of 2.Experiment results showed that the average distance of RAW dependencies was increased by over 20%. 展开更多
关键词 Timing error timing speculative architecture register allocation energy efficiency
在线阅读 下载PDF
A Cross Language Code Security Audit Framework Based on Normalized Representation
8
作者 Yong Chen Chao Xu +1 位作者 Jing Selena He Sheng Xiao 《Journal of Quantum Computing》 2022年第2期75-84,共10页
With the rapid development of information technology,audit objects and audit itself are more and more inseparable from software.As an important means of software security audit,code security audit will become an impor... With the rapid development of information technology,audit objects and audit itself are more and more inseparable from software.As an important means of software security audit,code security audit will become an important aspect of future audit that cannot be ignored.However,the existing code security audit ismainly based on source code,which is difficult to meet the audit needs of more and more programming languages and binary commercial software.Based on the idea of normalized transformation,this paper constructs a cross language code security audit framework(CLCSA).CLCSA first uses compile/decompile technology to convert different highlevel programming languages and binary codes into normalized representation,and then usesmachine learning technology to build a cross language code security audit model based on normalized representation to evaluate code security and find out possible code security vulnerabilities.Finally,for the discovered vulnerabilities,the heuristic search strategy will be used to find the best repair scheme from the existing normalized representation sample library for automatic repair,which can improve the effectiveness of code security audit.CLCSA realizes the normalized code security audit of different types and levels of code,which provides a strong support for improving the breadth and depth of code security audit. 展开更多
关键词 Code security audit NORMALIZATION cross language security vulnerabilities
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部