Publications by authors named "Yizhi Ren"

Traumatic brain injury (TBI) is a leading cause of death and disability worldwide. Microglial activation and neuroinflammation are key cellular events that determine the outcome of TBI, especially neuronal and cognitive function. Studies have suggested that the metabolic characteristics of microglia dictate their inflammatory response.

View Article and Find Full Text PDF

Macrophage alternative activation is involved in kidney fibrosis. Previous researches have documented that the transcriptional regulators Yes-associated protein (Yap)/transcriptional coactivator with PDZ-binding motif (Taz) are linked to organ fibrosis. However, limited knowledge exists regarding the function and mechanisms of their downstream molecules in regulating macrophage activation and kidney fibrosis.

View Article and Find Full Text PDF

On a crowdsourcing platform, in order to cheat for rewards or sabotage the crowdsourcing processes, spam workers may submit numerous erroneous answers to the tasks published by requesters. This type of behavior extremely reduces the completion rate of tasks and the enthusiasm of honest users, which may lead a crowdsourcing platform to a failure. Defending against malicious attacks is an important issue in crowdsourcing, which has been extensively addressed by existing methods, e.

View Article and Find Full Text PDF

Cognitive impairment is one of the most common and devastating neuropsychiatric sequelae after traumatic brain injury (TBI), and hippocampal neuronal survival plays a causal role in this pathological process. Resolvin D1 (RvD1), an important endogenous specialized pro-resolving mediator, has recently been reported to exert a potent protective effect on mitochondria. This suggests that RvD1 may suppress neuroinflammation and protect astrocytic mitochondria at the same time to play further neuroprotective roles.

View Article and Find Full Text PDF

The privacy and security of the Internet of Things (IoT) are emerging as popular issues in the IoT. At present, there exist several pieces of research on network analysis on the IoT network, and malicious network analysis may threaten the privacy and security of the leader in the IoT networks. With this in mind, we focus on how to avoid malicious network analysis by modifying the topology of the IoT network and we choose closeness centrality as the network analysis tool.

View Article and Find Full Text PDF

Wireless Sensor Networks (WSNs) have been widely deployed to monitor valuable objects. In these applications, the sensor node senses the existence of objects and transmitting data packets to the sink node (SN) in a multi hop fashion. The SN is a powerful node with high performance and is used to collect all the information sensed by the sensor nodes.

View Article and Find Full Text PDF

The mechanism of miR-30a in myocardial fibrosis in rats with myocardial infarction (MI) was investigated. rAAV9-miR-30a was constructed and transfected to heart via injecting into the left ventricular cavity of MI rats. The sham operation group, control group, miR-30a group and miR-30a-NC group were established.

View Article and Find Full Text PDF

Statins lower low-density lipoprotein cholesterol (LDL-C) and high-sensitivity C-reactive protein (hsCRP), and the addition of ezetimibe to statins further reduces LDL-C and hsCRP. Lipoprotein-associated phospholipase A2 (Lp-PLA2) is a potentially important pathogenic factor participating in the progression of atherosclerosis. The aim of current study was to investigate how the addition of ezetimibe to rosuvastatin treatment affects reductions in LDL-C, hsCRP and Lp-PLA2 in patients with acute myocardial infarction (AMI).

View Article and Find Full Text PDF

Voluntary vaccination reflects how individuals weigh the risk of infection and the cost of vaccination against the spread of vaccine-preventable diseases, such as smallpox and measles. In a homogeneously mixing population, the infection risk of an individual depends largely on the proportion of vaccinated individuals due to the effects of herd immunity. While in a structured population, the infection risk can also be affected by the structure of individuals' social network.

View Article and Find Full Text PDF

After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al.

View Article and Find Full Text PDF

An effectively designed e-healthcare system can significantly enhance the quality of access and experience of healthcare users, including facilitating medical and healthcare providers in ensuring a smooth delivery of services. Ensuring the security of patients' electronic health records (EHRs) in the e-healthcare system is an active research area. EHRs may be outsourced to a third-party, such as a community healthcare cloud service provider for storage due to cost-saving measures.

View Article and Find Full Text PDF

Encouraging cooperation among selfish individuals is crucial in many real-world systems, where individuals' collective behaviors can be analyzed using evolutionary public goods game. Along this line, extensive studies have shown that reputation is an effective mechanism to investigate the evolution of cooperation. In most existing studies, participating individuals in a public goods game are assumed to contribute unconditionally into the public pool, or they can choose partners based on a common reputation standard (e.

View Article and Find Full Text PDF

Background: The effects of intra-aortic balloon pump (IABP) usage in patients with acute myocardial infarction remain controversial. This study sought to evaluate the outcomes of IABP usage in these patients.

Methods: Medline, EMBASE, and other internet sources were searched for relevant clinical trials.

View Article and Find Full Text PDF