Advanced search    

Search: authors:"Jing Li"

14 papers found.
Use AND, OR, NOT, +word, -word, "long phrase", (parentheses) to fine-tune your search.

Research on multi-robot scheduling algorithms based on machine vision

In the multi-robot system, how to achieve effective and reasonable task coordination between multi-robots is an important problem;, multi-robot task scheduling is the term used for the coordination of the key technologies. Therefore, in this paper we combined the pilot scheduling method with the following method and the behavior method of the robot based on task scheduling, and...

A generic integrity verification algorithm of version files for cloud deduplication data storage

and large-scale verification for different version data. KeywordsData integrity verification Version file storage Version group Random diffusion extraction  Guangwei Xu, Jing Li and Li Sun

Distribution of CYP2C19 polymorphisms in Mongolian and Han nationals and the choice of specific antiplatelet drugs

Background Individualized medication reviews may improve our understanding of the distribution of CYP2C19 polymorphisms in ethnic populations. Objective To evaluate differences in CYP2C19 gene polymorphisms between Mongolian and Han nationals and determine the effect of adjustments of antiplatelet treatments according to the genetic profile in patients undergoing percutaneous...

Global budget payment system helps to reduce outpatient medical expenditure of hypertension in China

BackgroundAs healthcare spending continues to increase, medical insurance is now under great pressure of growing economic burden. To control the excessive growth of medical expenditure, change of medical payment system was clearly put forward in China’s new healthcare reform. With this end, Tianjin, a large city in North China, is now exploring to replace traditional fee-for...

An efficient traceable access control scheme with reliable key delegation in mobile cloud computing

With the increasing number of mobile applications and the popularity of cloud computing, the combination of these two techniques that named mobile cloud computing (MCC) attracts great attention in recent years. However, due to the risks associated with security and privacy, mobility security protection in MCC has become an important issue. In this paper, we propose an efficient...

Can pelvic lymphadenectomy be omitted in patients with stage IA2, IB1, and IIA1 squamous cell cervical cancer?

Purpose This study aimed to identify the surgical-pathologic risk factors of lymph node metastasis (LNM) in patients with early stage squamous cell cervical cancer and to evaluate the potential efficacy of omitting pelvic lymphadenectomy. Methods A total of 276 patients with stage IA2, IB1, and IIA1 squamous cell cervical cancer receiving primary radical hysterectomy with pelvic...

Analysis of Clinical Predictors of Resolution of Sleep Disturbance Related to Frequent Nighttime Heartburn and Acid Regurgitation Symptoms in Individuals Taking Esomeprazole 20 mg or Placebo

Le Moigne, Jing Li, PhD, and Charles Pollack, MD, are employees of Pfizer Consumer Healthcare. Peter Nagy, MD, is an employee of AstraZeneca AB. Ethical approval All procedures performed in studies

DUP1 peptide modified micelle efficiently targeted delivery paclitaxel and enhance mitochondrial apoptosis on PSMA-negative prostate cancer cells

Li Xuehua Jiang Lulu Cai Xiang Li Prostate tumor cell targeted peptide fragment conjugated to the nano drug delivery system is a promising strategy for prostate cancer therapy. In this work, an

Spectral problems for fractional differential equations from nonlocal continuum mechanics

This paper studies the spectral problem of a class of fractional differential equations from nonlocal continuum mechanics. By applying the spectral theory of compact self-adjoint operators in Hilbert spaces, we show that the spectrum of this problem consists of only countable real eigenvalues with finite multiplicity and the corresponding eigenfunctions form a complete orthogonal...

A family of chaotic pure analog coding schemes based on baker’s map function

This paper considers a family of pure analog coding schemes constructed from dynamic systems which are governed by chaotic functions—baker’s map function and its variants. Various decoding methods, including maximum likelihood (ML), minimum mean square error (MMSE), and mixed ML-MMSE decoding algorithms, have been developed for these novel encoding schemes. The proposed mirrored...

Mutation detection in Chinese patients with familial hypercholesterolemia

BackgroundFamilial hypercholesterolemia (FH) is the first molecularly and clinically characterized genetic disease of lipid metabolism. It is an autosomal dominant disorder with significantly elevated levels of total cholesterol and low density of lipoprotein cholesterol in serum, which would lead to extensive xanthomas and premature coronary heart disease. Mutations in low...

Differentially Encoded LDPC Codes—Part I: Special Case of Product Accumulate Codes

Part I of a two-part series investigates product accumulate codes, a special class of differentially-encoded low density parity check (DE-LDPC) codes with high performance and low complexity, on flat Rayleigh fading channels. In the coherent detection case, Divsalar's simple bounds and iterative thresholds using density evolution are computed to quantify the code performance at...

Differentially Encoded LDPC Codes—Part II: General Case and Code Optimization

This two-part series of papers studies the theory and practice of differentially encoded low-density parity-check (DE-LDPC) codes, especially in the context of noncoherent detection. Part I showed that a special class of DE-LDPC codes, product accumulate codes, perform very well with both coherent and noncoherent detections. The analysis here reveals that a conventional LDPC code...

An Efficient SF-ISF Approach for the Slepian-Wolf Source Coding Problem

A simple but powerful scheme exploiting the binning concept for asymmetric lossless distributed source coding is proposed. The novelty in the proposed scheme is the introduction of a syndrome former (SF) in the source encoder and an inverse syndrome former (ISF) in the source decoder to efficiently exploit an existing linear channel code without the need to modify the code...