- Higher Education and Teaching Methods
- Neuroinflammation and Neurodegeneration Mechanisms
- Birth, Development, and Health
- Gestational Diabetes Research and Management
- Perovskite Materials and Applications
- Hedgehog Signaling Pathway Studies
- Pregnancy and preeclampsia studies
- Conducting polymers and applications
- Immune cells in cancer
- Glycosylation and Glycoproteins Research
- Quantum Computing Algorithms and Architecture
- Cerebral Palsy and Movement Disorders
- semigroups and automata theory
- Cryptography and Data Security
- Galectins and Cancer Biology
- Advanced Memory and Neural Computing
- Firm Innovation and Growth
- Quantum Dots Synthesis And Properties
- International Law and Aviation
- Apelin-related biomedical research
- Educational Reforms and Innovations
- Subtitles and Audiovisual Media
- Economic and Environmental Valuation
- Data Quality and Management
- Digital Platforms and Economics
Fudan University
2006-2023
State Key Laboratory of Medical Neurobiology
2020-2022
Pingdingshan University
2022
Shanghai Stomatological Hospital
2021
Huashan Hospital
2020-2021
University of Virginia
2015
Changchun Municipal Engineering Design and Research Institute (China)
2014
Zhejiang Water Conservancy and Hydropower Survey and Design Institute
2009-2010
The secondary injury caused by traumatic brain (TBI), especially white matter (WMI), is highly sensitive to neuroinflammation, which further leads unfavored long-term outcomes. Although the cross-talk between three active events, immune cell infiltration, BBB breakdown, and proinflammatory microglial/macrophage polarization, plays a role in vicious cycle, its mechanisms are not fully understood. It has been reported that cordycepin, an extract from Cordyceps militaris, can inhibit...
Recent studies have shown that aberrant activation of Sonic Hedgehog (SHH)/GLI1 signaling pathway is involved in many kinds human malignancies. Both vitro and vivo experiments demonstrate inhibiting the results tumor regression for a fraction gliomas which harbor an active pathway. However, little known about linkage between SHH/GLI1 cell migration invasion gliomas. In this study, we showed GLI1 expression closely correlates with pathological grades by immunohistochemistry analysis 110 cases...
Semantic analysis often uses a pipeline of Natural Language Processing (NLP) tools such as part-of-speech (POS) tagging. Brill tagging is classic rule-based algorithm for POS within NLP. However, implementation the tagger inherently slow on conventional Von Neumann architectures. In this paper, we accelerate second stage Micron Automata Processor, new computing architecture that can perform massive pattern matching in parallel. The designed structure tested with subset Brown Corpus using 218...
<h3>Importance</h3> Evidence on the timing of fetal growth alterations associated with gestational diabetes or association maternal glycemic trajectory during pregnancy remains lacking. <h3>Objective</h3> To examine associations between glucose levels and offspring intrauterine growth. <h3>Design, Setting, Participants</h3> This cohort study used data from 4574 eligible pregnant women their in Shanghai Maternal-Child Pairs Cohort collected April 10, 2016, to 30, 2018. Group-based modeling...
Previous studies suggested that anti-inflammatory microglia/macrophages (Mi/MΦ) play a role in "normal phagocytosis," which promoted the rapid clearance of necrotic substances and apoptotic cells. More recently, few have found Mi/MΦ also "pathological phagocytosis" form excessive or reduced phagocytosis, thereby worsening damage induced by CNS diseases. However, underlying mechanisms subtypes related to this pathological phagocytosis are still unknown. Salt-inducible kinase 3 (SIK3), member...
Conjoint analysis and discrete choice experiments, which were developed in fields such as marketing economics, are useful for understanding the voice of customer to guide quality-improvement efforts. Unfortunately, these methods have received relatively little attention quality area. In this article, we provide some guidelines use conjoint experiments. We discuss what they are, why methodologies improvement, how a experiment can be carried out. demonstrate methodology by discussing real case...
Boronic acid-functionalized mesoporous magnetic particles with a hydrophilic surface for multimodal enrichment of glycopeptides glycoproteomics.
The lectin microarray was applied in analysis of the cell surface glycome on THP-1 and RAW264.7 derived M0, M1, M2 subtypes.
This paper explores the diffusion of competitive Internet technology products in context competition between local and multinational corporations as well how diffusive interactions technologies affect their dominance electronic markets. Drawing on existing theories innovation diffusion, dynamics, authors adopted a new model that incorporates influence one technology’s adoption other technology. The then validated using longitudinal field data two pairs Chinese findings this investigation...
In this study, our aim was to investigate the potential correlation between mother’s total gestational weight gain (GWG) rate and trimester-specific GWG (GWGR) with physical development status of child within 24 months age. We utilized linear regression models mixed effects explore both time point longitudinal relationships GWGR children’s anthropometric outcome z-scores at 0, 1, 2, 4, 6, 9, 12, 18, months. To examine critical exposure windows, we employed multiple informant models. also...
With the deepening of college English teaching reform, is paying more and attention to application goal orientation.OBE education concept emphasizes output orientation learning in process practicality knowledge practical workplace.Based on OBE concept, this paper analyzes advantages studies new mode under concept.
Background knowledge is an important factor in privacy preserving data publishing. Distribution-based background one of the well studied knowledge. However, to best our knowledge, there no existing work considering distribution-based worst case scenario, by which we mean that adversary has accurate about distribution sensitive values according some tuple attributes. Considering this scenario essential because cannot overlook any breaching possibility. In paper, propose algorithm anonymize...