- Browse by Author
Browsing by Author "Jiang, Feng"
Now showing 1 - 7 of 7
Results Per Page
Sort Options
Item An Extreme Learning Machine-based Pedestrian Detection Method(Office of the Vice Chancellor for Research, 2013-04-05) Yang, Kai; Du, Eliza Y.; Delp, Edward J.; Jiang, Pingge; Jiang, Feng; Chen, Yaobin; Sherony, Rini; Takahashi, HiroyukiPedestrian detection is a challenging task due to the high variance of pedestrians and fast changing background, especially for a single in-car camera system. Traditional HOG+SVM methods have two challenges: (1) false positives and (2) processing speed. In this paper, a new pedestrian detection method using multimodal HOG for pedestrian feature extraction and kernel based Extreme Learning Machine (ELM) for classification is presented. The experimental results using our naturalistic driving dataset show that the proposed method outperforms the traditional HOG+SVM method in both recognition accuracy and processing speed.Item High-throughput functional dissection of noncoding SNPs with biased allelic enhancer activity for insulin resistance-relevant phenotypes(Elsevier, 2023) Duan, Yuan-Yuan; Chen, Xiao-Feng; Zhu, Ren-Jie; Jia, Ying-Ying; Huang, Xiao-Ting; Zhang, Meng; Yang, Ning; Dong, Shan-Shan; Zeng, Mengqi; Feng, Zhihui; Zhu, Dong-Li; Wu, Hao; Jiang, Feng; Shi, Wei; Hu, Wei-Xin; Ke, Xin; Chen, Hao; Liu, Yunlong; Jing, Rui-Hua; Guo, Yan; Li, Meng; Yang, Tie-Lin; Medical and Molecular Genetics, School of MedicineMost of the single-nucleotide polymorphisms (SNPs) associated with insulin resistance (IR)-relevant phenotypes by genome-wide association studies (GWASs) are located in noncoding regions, complicating their functional interpretation. Here, we utilized an adapted STARR-seq to evaluate the regulatory activities of 5,987 noncoding SNPs associated with IR-relevant phenotypes. We identified 876 SNPs with biased allelic enhancer activity effects (baaSNPs) across 133 loci in three IR-relevant cell lines (HepG2, preadipocyte, and A673), which showed pervasive cell specificity and significant enrichment for cell-specific open chromatin regions or enhancer-indicative markers (H3K4me1, H3K27ac). Further functional characterization suggested several transcription factors (TFs) with preferential allelic binding to baaSNPs. We also incorporated multi-omics data to prioritize 102 candidate regulatory target genes for baaSNPs and revealed prevalent long-range regulatory effects and cell-specific IR-relevant biological functional enrichment on them. Specifically, we experimentally verified the distal regulatory mechanism at IRS1 locus, in which rs952227-A reinforces IRS1 expression by long-range chromatin interaction and preferential binding to the transcription factor HOXC6 to augment the enhancer activity. Finally, based on our STARR-seq screening data, we predicted the enhancer activity of 227,343 noncoding SNPs associated with IR-relevant phenotypes (fasting insulin adjusted for BMI, HDL cholesterol, and triglycerides) from the largest available GWAS summary statistics. We further provided an open resource (http://www.bigc.online/fnSNP-IR) for better understanding genetic regulatory mechanisms of IR-relevant phenotypes.Item Nomogram for prediction of portal vein system thrombosis after splenectomy for hypersplenism in patients with Wilson disease(APM, 2022-12-28) Yao, Yu; Zhang, Juan; Jiang, Huaizhou; Li, Rui; Xie, Daojun; Jiang, Feng; Zhang, Wanqiu; Ma, Min; Biology, School of ScienceBackground: The occurrence of portal vein system thrombosis (PVST) after splenectomy in patients with Wilson disease (WD) can lead to serious complications. The early identification of high-risk patients can help improve patient prognosis. This study aimed to establish and validate a personalized nomogram for assessing the risk of PVST after splenectomy in patients with WD and hypersplenism. Methods: We retrospectively collected the data from 81 patients with WD and hypersplenism who underwent splenectomy. Based on whether PVST occurred within a month after the operation, they were divided into the PVST group and the non-PVST group. The clinical data of the 2 groups were compared, and univariate analysis was used to select the statistically significant features and incorporated into the least absolute shrinkage and selection operator (LASSO) regression model for optimization. Multivariate logistic regression analysis was used to determine the independent risk factors for PVST after splenectomy, which were then applied to establish a personalized nomogram. We calculated the concordance (C)-index and drew the receiver operating characteristic (ROC) curve, the model calibration curve, and the clinical decision analysis (DCA) curve to evaluate the accuracy, calibration, and clinical applicability of the model, respectively. We used bootstrapping for internal validation of the model. Results: Univariate analysis showed that the differences in preoperative portal vein diameter and velocity of portal blood flow, postoperative mean platelet volume (MPV), mean platelet distribution width (PDW), D-dimer, prothrombin time (PT), and the increase of platelet count (PLT) were of statistical significance (P<0.05). According to the results of the LASSO and multivariate logistic regression analyses, a model including preoperative portal vein diameter, preoperative portal blood flow velocity, postoperative D-dimer, and the increase of PLT was established to predict the risk of PVST after splenectomy. The model showed good accuracy with a C-index of 0.838 (95% CI: 0.750–0.926) and had a well-fitted calibration curve. Furthermore, internal validation showed it achieved a moderate C-index of 0.805. The DCA curve indicated that the model has clinical applicability when patients are treated at thresholds of 2–100%. Conclusions: Establishing a predictive model for the risk of PVST in patients with WD and hypersplenism after splenectomy can help clinicians identify patients at high risk of PVST who require intervention measures.Item A Novel Quality Assessment for Visual Secret Sharing(Office of the Vice Chancellor for Research, 2015-04-17) Jiang, Feng; King, BrianThere is a variety of visual data, such as pictures, text, military or medical records, biometric patterns, etc. that need to be protected for privacy reasons. Visual secrets are different from textual secrets, in that the information obtained by perceiving the visual data needs to be protected. Visual secret sharing (or visual cryptography) [1] proposed in 1994 is a practical solution to this. The secret information is encrypted by hiding it into random looking shares. The secret data is encrypted in such a way that the decryption becomes a physical operation that is performed without computer. How much of the secret information can be retrieved depends on the visual quality of the decryption result. However, there is no practical tool for visual quality evaluation currently. The common visual quality metrics such as contrast [2], blackness [3], PSNR [4] and SSIM [5] cannot represent the visual quality properly as we demonstrate in our work. A fair and uniform visual quality metric is needed urgently. We propose a novel approach for visual quality evaluation. It is straightforward to implement and applicable to various applications in visual cryptography.Item A novel quality assessment for visual secret sharing schemes(Springer, 2017-12) Jiang, Feng; King, Brian; Department of Engineering Technology, School of Engineering and TechnologyTo evaluate the visual quality in visual secret sharing schemes, most of the existing metrics fail to generate fair and uniform quality scores for tested reconstructed images. We propose a new approach to measure the visual quality of the reconstructed image for visual secret sharing schemes. We developed an object detection method in the context of secret sharing, detecting outstanding local features and global object contour. The quality metric is constructed based on the object detection-weight map. The effectiveness of the proposed quality metric is demonstrated by a series of experiments. The experimental results show that our quality metric based on secret object detection outperforms existing metrics. Furthermore, it is straightforward to implement and can be applied to various applications such as performing the security test of the visual secret sharing process.Item A secure and efficient image transmission system for sharing an image with multiple parties(Office of the Vice Chancellor for Research, 2014-04-11) Jiang, Feng; Tanksale, Vinayak; Salama, Paul; King, BrianSecure and efficient digital image transmissions are important as internet transmissions can easily be intercepted or plagiarized. Comparing with point-topoint communication and broadcasting transmission, multicasting transmission is more popular and flexible. The number of transmissions among sources to multiple clients can be huge. For example, if 200 friends share one image with each other every day, the accumulated transmissions will be 280,000 in one week. As an image can be significant in size, compression will also be necessary. Image must be compressed then encrypted for transmission, so the whole process can be slow. Selective encryption, which combines encryption with compression [1][2] has been proposed for media data transmission. Our work is an extension of the previous work [1]. A novel encryption scheme is proposed to ensure both security and efficiency of mass image transmissions. Images can be shared to multiple parties in a fast speed and under a low bandwidth.Item Up-Regulation of Akt and Nav1.8 in BmK I-Induced Pain(Springer Nature, 2018-06) Zhou, Guokun; Jiao, Yunlu; Zhou, You; Qin, Shichao; Tao, Jie; Jiang, Feng; Tan, Zhi-Yong; Ji, Yong-Hua; Pharmacology and Toxicology, School of Medicine