Time filter

Source Type

Xiang W.,PLA Navy Submarine Academy | Zhang L.,Chinese Naval Aeronautical Engineering Academy | Yan W.,PLA National Defence University
Proceedings - 2012 IEEE Symposium on Robotics and Applications, ISRA 2012 | Year: 2012

To solve the development problems of current WETS (Weapons and Equipments Training Simulation Software), a development approach of WETS was presented. The WSML (Weapons and Equipments Training Simulation Software Modeling Language) metamodel was constructed on metamodeling method, covering both function and non-function, by logical separation and description of every part of the system and relations between them. A domain-oriented modeling language is generated from the metamodel by the metamodel interpreter. A user model can be constructed according to WSML, source code can be generated automatically by the model interpreter and an application system can be compiled. Lots applications indicated that this method support model reuse and can improve development efficiency of WETS. © 2012 IEEE.

Luo Z.,Lanzhou University | Liu M.,Lanzhou University | Liu M.,PLA National Defence University | Sun L.,Lanzhou University | Rui F.,Tianshui Normal University
Molecular Medicine Reports | Year: 2015

A number of recent studies have suggested that icariin (ICA), a class of phytochemical with numerous biological activities, may exert protective effects against postmenopausal bone loss. However, it remains unclear whether ICA regulates or improves the osteoblastic function of bone marrow stromal cells (BMSCs) in the treatment and prevention of osteoporosis. In the present study, the osteogenic differentiation of BMSCs from ovariectomy (OVX) rats was found to be significantly decreased in vitro compared with that in rats that had undergone a sham operation. Treatment with ICA at a dose of 10-5 M was shown to restore the osteogenic differentiation of BMSCs in OVX rats. The results indicated that ICA restored the differentiation and mineralization capacity of OVX-BMSCs, which had been induced by estrogen deficiency. The effects of this compound on alkaline phosphatase (ALP) activity and calcium deposition were also measured at various time points. The number of colonies and areas that stained positive for ALP expression, and mineralized bone nodules were analyzed histochemically at 14 and 21 days after the osteogenic induction. The expression of the runt-related transcription factor 2 and osterix bone metabolism biomarker proteins and genes were detected by western blotting and reverse transcription-quantitative polymerase chain reaction (RT-qPCR). The expression of factors involved in the estrogen signaling pathway, estrogen receptor α (ERα), progesterone receptor (PR) and trefoil factor 1 (PS-2), was also detected by western blotting and RT-qPCR. ICA enhanced the expression of ERα, PR, PS-2 in OVX-BMSCs, but this effect was abrogated when ICI 182780, an ER antagonist was added. Transplantation of BMSCs into nude mice demonstrated that ICA restored the osteogenic capability of OVX-BMSCs in vivo. Therefore, it may be that ICA acts through the estrogen pathway in order to improve and restore the osteogenic differentiation and mineralization of OVX-BMSCs, which are inhibited by estrogen deficiency and increasing age.

Xu W.-C.,Academy of Armored force Engineering | Xue Q.,Academy of Armored force Engineering | Yu P.-G.,PLA National Defence University | Zheng C.-W.,Academy of Armored force Engineering
Xitong Fangzhen Xuebao / Journal of System Simulation | Year: 2014

The research of modeling method of combat system is the base of combat system effectiveness evaluation, structure designing optimization and system survivability and synchronicity. When modeling combat system, it's necessary to stand out the role of C2, especially the role of information. Starting from FINC method, TOCF method was proposed based on OODA theory. The node unit of combat system complex network was extracted and the relation matrix was formed, and a directed combat net model was constructed with node attribute. Finally, compared with the old model, the results turn out that the TOCF method is better in modeling of combat system under the informationized condition.

Zhong Y.-B.,Guangzhou University | Deng Y.-Z.,Guangzhou University | Liu Z.-L.,PLA National Defence University | Yuan X.-H.,Dalian University of Technology
Advances in Intelligent Systems and Computing | Year: 2016

Fuzzy methods are widely used in the study of trustworthiness. Based on this fact, the paper researches the trustworthiness system (T-System) and probability distribution theory based on bounded product (B-P) implication and Larsen square (L-S) implication. Firstly, we convert a group of single-input and singleoutput data into fuzzy inference rules and generate fuzzy relation by selecting the appropriate fuzzy implication operator, then calculate joint probability density function of two-dimensional random variables by using of this fuzzy relation. Two specific probability density functions can be obtained by selecting the fuzzy implication as bounded product implication or Larsen square implication. Secondly, we study of the center-of-gravity trustworthiness system based on these two probability distributions. Finally, we gave the sufficient conditions of universal approximations for those trustworthiness systems. © Springer International Publishing Switzerland 2016.

Yuan X.-H.,Dalian University of Technology | Liu Z.-L.,PLA National Defence University | Stanley Lee E.,Kansas State University
Computers and Mathematics with Applications | Year: 2011

In this paper, the construction and approximation problem of a single input and single output (SISO) fuzzy system with normal implication and center-of-gravity defuzzifier is discussed. First, the method of a non-singleton fuzzifier for the input variable and the concept of an adaptive universe for the output fuzzy set are proposed. Then, by using this method and this concept of an adaptive universe, SISO fuzzy systems based on center-of-gravity defuzzifier and normal implications such as the KleeneDienes implication or the Lukasiewicz implication are constructed. The constructed fuzzy systems have the general form S̄(x)=Ai*(x)f(xi)+Ai+1*(x)f(xi+ 1), with Ai*(x)+Ai+1*(x)=1, and, furthermore, they are universal approximators. The sufficient conditions for the proposed fuzzy systems to be universal approximators are also obtained. To illustrate the universal property, an example is also given. © 2011 Elsevier Ltd. All rights reserved.

PubMed | PLA National Defence University and General Hospital of Beijing Military Command of PLA
Type: | Journal: BioMed research international | Year: 2015

Invasive trichosporonosis is a deep mycosis found mainly in immunocompromised hosts, and the major pathogen is Trichosporon asahii. We detected the species-specific intergenic spacers (IGS) of rRNA gene of T. asahii using a loop-mediated isothermal amplification (LAMP) assay in 15 isolates with 3 different visualization methods, including SYBR green detection, gel electrophoresis, and turbidimetric methods. The LAMP assay displayed superior rapidity to other traditional methods in the detection time; that is, only 1h was needed for detection and identification of the pathogen DNA. Furthermore, the detection limit of the LAMP assay was more sensitive than the PCR assay. We also successfully detect the presence of T. asahii in samples from experimentally infected mice and samples from patients with invasive trichosporonosis caused by T. asahii, suggesting that this method may become useful in clinical applications in the near future.

Li X.,Zhejiang University | Xiang Z.,Zhejiang University | Zhang H.,Zhejiang University | Zhu Z.,PLA National Defence University
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2012

On the foundation of analyzing the existing classification, an acquisition method of extension transformation knowledge based on Decision Tree classification has been proposed The new-bored method re-mines and transforms the decision tree rules to "can't to can, not to yes" strategy which aims to provide targeted decision-making on the transformation of the customer churn by flexible use of the extension set and extension transformation theory. Its practice in a web company has proved that this method is highly feasible, and also has the reference value for other methods research based on Extenics. © 2012 Springer-Verlag Berlin Heidelberg.

Olymvax Biopharmaceuticals Inc. and PLA National Defence University | Date: 2016-12-07

Provided is staphylococcus protein A expressed by a mutational Staphylococcus aureus and its coding sequence, as well as a vector, host bacteria, composition or kit which contains the coding sequence of the mutational protein. Also provided is the use of the mutational protein and the composition thereof in the preparation of vaccines, therapeutic antibodies, diagnostic kits and the like, and for the prevention, treatment and detection of infections by Staphylococcus aureus. Also provided are methods for producing, fermenting and purifying the mutational protein.

Zhi T.,PLA National Defence University | Si G.,PLA National Defence University | He X.,PLA National Defence University | Xu Y.,PLA National Defence University
Proceedings - 2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control, IMCCC 2011 | Year: 2011

To destroy a country's physical electric power infrastructure by attacking its control system through cyber means, has become an important way to weaken a country's war power. Along with the construction of next generation smart grid, development of the internet of things and appearance of system of systems(henceforth, SOS) warfare based on information systems, the complicated control networks system would confront more and more threat of cyber attack. we design the main structure and key arithmetic of the model, based on the physical electric power infrastructure whose cyber and physical system is close interdependent in order to provide theoretic reference to the analyzing and evaluating the cascading effects from increasing cyber attack to physic system. Preliminary experiments show that these structures and algorithms are reasonable and feasible. © 2011 IEEE.

Mei Y.-B.,PLA National Defence University | Zhou W.-Q.,PLA National Defence University | Zhang X.-Y.,PLA National Defence University | Wei X.-J.,PLA National Defence University | Feng Z.-C.,PLA National Defence University
Cellular Physiology and Biochemistry | Year: 2013

Background: Although the expression of toll-like receptors (TLRs) on different types of human mesenchymal stem cells (hMSCs) has recently been reported, controversy remains regarding the presence of TLR4 as well as its engagement and impact on human Wharton's jelly-derived MSCs (hWJ-MSCs). Methods: In the present study, the expression and role of TLR4 in hWJ-MSCs was investigated using a model of lipopolysaccharide (LPS). Proliferation, apoptosis, and the expression of paracrine factors in hWJ-MSCs primed with LPS were analysed. Results: The expression of TLR4 was high at the RNA level but very low at the protein level. hWJ-MSCs responded to LPS stimulation and initiated a marked up-regulation of inflammatory cytokine (IL-1α, IL-1β, IL-6, and IL-8) production. Moreover, hWJ-MSCs LPS stimulation resulted in the up-regulation of indoleamine 2,3-dioxygenase [IDO]-1, Cox2, interferon [IFN]-β, and matrix metalloproteinase (MMP)-2 but a down-regulation of MMP-9, which affect the immunosuppressive potential of hWJ-MSCs. Conclusions: These data suggest that LPS engagement shapes hWJ-MSCs and results in the production of pro-inflammatory cytokines and inhibitory immune mediators, showing TLR4 agonist induces the hWJ-MSCs polarization to a pro-inflammatory and immunosuppressive state, which may be beneficial for the exploration of the clinical potential of hWJ-MSCs. © 2013 S. Karger AG, Basel.

Loading PLA National Defence University collaborators
Loading PLA National Defence University collaborators