This growing collection consists of scholarly works authored by ASU-affiliated faculty, staff, and community members, and it contains many open access articles. ASU-affiliated authors are encouraged to Share Your Work in KEEP.

Displaying 1 - 10 of 35
Filtering by

Clear all filters

Description

Linnorm is a novel normalization and transformation method for the analysis of single cell RNA sequencing (scRNA-seq) data. Linnorm is developed to remove technical noises and simultaneously preserve biological variations in scRNA-seq data, such that existing statistical methods can be improved. Using real scRNA-seq data, we compared Linnorm with existing

Linnorm is a novel normalization and transformation method for the analysis of single cell RNA sequencing (scRNA-seq) data. Linnorm is developed to remove technical noises and simultaneously preserve biological variations in scRNA-seq data, such that existing statistical methods can be improved. Using real scRNA-seq data, we compared Linnorm with existing normalization methods, including NODES, SAMstrt, SCnorm, scran, DESeq and TMM. Linnorm shows advantages in speed, technical noise removal and preservation of cell heterogeneity, which can improve existing methods in the discovery of novel subtypes, pseudo-temporal ordering of cells, clustering analysis, etc. Linnorm also performs better than existing DEG analysis methods, including BASiCS, NODES, SAMstrt, Seurat and DESeq2, in false positive rate control and accuracy.

ContributorsYip, Shun H. (Author) / Wang, Panwen (Author) / Kocher, Jean-Pierre A. (Author) / Sham, Pak Chung (Author) / Wang, Junwen (Author) / College of Health Solutions (Contributor)
Created2017-09-18
Description

A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks

A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks over a relatively wide range of consecutive IP addresses, we successfully uncover intrinsic spatiotemporal patterns underlying cyberattacks, where the term “spatio” refers to the IP address space. In particular, we focus on analyzing macroscopic properties of the attack traffic flows and identify two main patterns with distinct spatiotemporal characteristics: deterministic and stochastic. Strikingly, there are very few sets of major attackers committing almost all the attacks, since their attack “fingerprints” and target selection scheme can be unequivocally identified according to the very limited number of unique spatiotemporal characteristics, each of which only exists on a consecutive IP region and differs significantly from the others. We utilize a number of quantitative measures, including the flux-fluctuation law, the Markov state transition probability matrix, and predictability measures, to characterize the attack patterns in a comprehensive manner. A general finding is that the attack patterns possess high degrees of predictability, potentially paving the way to anticipating and, consequently, mitigating or even preventing large-scale cyberattacks using macroscopic approaches.

ContributorsChen, Yu-Zhong (Author) / Huang, Zi-Gang (Author) / Xu, Shouhuai (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2015-05-20
Description

Supply-demand processes take place on a large variety of real-world networked systems ranging from power grids and the internet to social networking and urban systems. In a modern infrastructure, supply-demand systems are constantly expanding, leading to constant increase in load requirement for resources and consequently, to problems such as low

Supply-demand processes take place on a large variety of real-world networked systems ranging from power grids and the internet to social networking and urban systems. In a modern infrastructure, supply-demand systems are constantly expanding, leading to constant increase in load requirement for resources and consequently, to problems such as low efficiency, resource scarcity, and partial system failures. Under certain conditions global catastrophe on the scale of the whole system can occur through the dynamical process of cascading failures. We investigate optimization and resilience of time-varying supply-demand systems by constructing network models of such systems, where resources are transported from the supplier sites to users through various links. Here by optimization we mean minimization of the maximum load on links, and system resilience can be characterized using the cascading failure size of users who fail to connect with suppliers.

We consider two representative classes of supply schemes: load driven supply and fix fraction supply. Our findings are: (1) optimized systems are more robust since relatively smaller cascading failures occur when triggered by external perturbation to the links; (2) a large fraction of links can be free of load if resources are directed to transport through the shortest paths; (3) redundant links in the performance of the system can help to reroute the traffic but may undesirably transmit and enlarge the failure size of the system; (4) the patterns of cascading failures depend strongly upon the capacity of links; (5) the specific location of the trigger determines the specific route of cascading failure, but has little effect on the final cascading size; (6) system expansion typically reduces the efficiency; and (7) when the locations of the suppliers are optimized over a long expanding period, fewer suppliers are required. These results hold for heterogeneous networks in general, providing insights into designing optimal and resilient complex supply-demand systems that expand constantly in time.

ContributorsZhang, Si-Ping (Author) / Huang, Zi-Gang (Author) / Dong, Jia-Qi (Author) / Eisenberg, Daniel (Author) / Seager, Thomas (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2015-06-23
128573-Thumbnail Image.png
Description

Two distinct monocyte (Mo)/macrophage (Mp) subsets (Ly6Clow and Ly6Chi) orchestrate cardiac recovery process following myocardial infarction (MI). Prostaglandin (PG) E2 is involved in the Mo/Mp-mediated inflammatory response, however, the role of its receptors in Mos/Mps in cardiac healing remains to be determined. Here we show that pharmacological inhibition or gene

Two distinct monocyte (Mo)/macrophage (Mp) subsets (Ly6Clow and Ly6Chi) orchestrate cardiac recovery process following myocardial infarction (MI). Prostaglandin (PG) E2 is involved in the Mo/Mp-mediated inflammatory response, however, the role of its receptors in Mos/Mps in cardiac healing remains to be determined. Here we show that pharmacological inhibition or gene ablation of the Ep3 receptor in mice suppresses accumulation of Ly6Clow Mos/Mps in infarcted hearts. Ep3 deletion in Mos/Mps markedly attenuates healing after MI by reducing neovascularization in peri-infarct zones. Ep3 deficiency diminishes CX3C chemokine receptor 1 (CX3CR1) expression and vascular endothelial growth factor (VEGF) secretion in Mos/Mps by suppressing TGFβ1 signaling and subsequently inhibits Ly6Clow Mos/Mps migration and angiogenesis. Targeted overexpression of Ep3 receptors in Mos/Mps improves wound healing by enhancing angiogenesis. Thus, the PGE2/Ep3 axis promotes cardiac healing after MI by activating reparative Ly6Clow Mos/Mps, indicating that Ep3 receptor activation may be a promising therapeutic target for acute MI.

ContributorsTang, Juan (Author) / Shen, Yujun (Author) / Chen, Guilin (Author) / Wan, Qiangyou (Author) / Wang, Kai (Author) / Zhang, Jian (Author) / Qin, Jing (Author) / Liu, Guizhu (Author) / Zuo, Shengkai (Author) / Tao, Bo (Author) / Yu, Yu (Author) / Wang, Junwen (Author) / Lazarus, Michael (Author) / Yu, Ying (Author) / College of Health Solutions (Contributor)
Created2017-03-03
127905-Thumbnail Image.png
Description

We present a new approach to computing event shape distributions or, more precisely, charge flow correlations in a generic conformal field theory (CFT). These infrared finite observables are familiar from collider physics studies and describe the angular distribution of global charges in outgoing radiation created from the vacuum by some

We present a new approach to computing event shape distributions or, more precisely, charge flow correlations in a generic conformal field theory (CFT). These infrared finite observables are familiar from collider physics studies and describe the angular distribution of global charges in outgoing radiation created from the vacuum by some source. The charge flow correlations can be expressed in terms of Wightman correlation functions in a certain limit. We explain how to compute these quantities starting from their Euclidean analogues by means of a nontrivial analytic continuation which, in the framework of CFT, can be performed elegantly in Mellin space. The relation between the charge flow correlations and Euclidean correlation functions can be reformulated directly in configuration space, bypassing the Mellin representation, as a certain Lorentzian double discontinuity of the correlation function integrated along the cuts. We illustrate the general formalism in N = 4 SYM, making use of the well-known results on the four-point correlation function of half-BPS scalar operators. We compute the double scalar flow correlation in N = 4 SYM, at weak and strong coupling and show that it agrees with known results obtained by different techniques. One of the remarkable features of the N = 4 theory is that the scalar and energy flow correlations are proportional to each other. Imposing natural physical conditions on the energy flow correlations (finiteness, positivity and regularity), we formulate additional constraints on the four-point correlation functions in N = 4SYM that should be valid at any coupling and away from the planar limit.

ContributorsBelitsky, Andrei (Author) / Hohenegger, S. (Author) / Korchemsky, G. P. (Author) / Sokatchev, E. (Author) / Zhiboedov, A. (Author) / College of Liberal Arts and Sciences (Contributor)
Created2014-04-30
127886-Thumbnail Image.png
Description

Modeling of transcriptional regulatory networks (TRNs) has been increasingly used to dissect the nature of gene regulation. Inference of regulatory relationships among transcription factors (TFs) and genes, especially among multiple TFs, is still challenging. In this study, we introduced an integrative method, LogicTRN, to decode TF–TF interactions that form TF

Modeling of transcriptional regulatory networks (TRNs) has been increasingly used to dissect the nature of gene regulation. Inference of regulatory relationships among transcription factors (TFs) and genes, especially among multiple TFs, is still challenging. In this study, we introduced an integrative method, LogicTRN, to decode TF–TF interactions that form TF logics in regulating target genes. By combining cis-regulatory logics and transcriptional kinetics into one single model framework, LogicTRN can naturally integrate dynamic gene expression data and TF-DNA-binding signals in order to identify the TF logics and to reconstruct the underlying TRNs. We evaluated the newly developed methodology using simulation, comparison and application studies, and the results not only show their consistence with existing knowledge, but also demonstrate its ability to accurately reconstruct TRNs in biological complex systems.

ContributorsYan, Bin (Author) / Guan, Daogang (Author) / Wang, Chao (Author) / Wang, Junwen (Author) / He, Bing (Author) / Qin, Jing (Author) / Boheler, Kenneth R. (Author) / Lu, Aiping (Author) / Zhang, Ge (Author) / Zhu, Hailong (Author) / College of Health Solutions (Contributor)
Created2017-10-19
127876-Thumbnail Image.png
Description

The Operator Product Expansion for null polygonal Wilson loop in planar maximally supersymmetric Yang–Mills theory runs systematically in terms of multi-particle pentagon transitions which encode the physics of excitations propagating on the color flux tube ending on the sides of the four-dimensional contour. Their dynamics was unraveled in the past

The Operator Product Expansion for null polygonal Wilson loop in planar maximally supersymmetric Yang–Mills theory runs systematically in terms of multi-particle pentagon transitions which encode the physics of excitations propagating on the color flux tube ending on the sides of the four-dimensional contour. Their dynamics was unraveled in the past several years and culminated in a complete description of pentagons as an exact function of the 't Hooft coupling. In this paper we provide a solution for the last building block in this program, the SU(4) matrix structure arising from internal symmetry indices of scalars and fermions. This is achieved by a recursive solution of the Mirror and Watson equations obeyed by the so-called singlet pentagons and fixing the form of the twisted component in their tensor decomposition. The non-singlet, or charged, pentagons are deduced from these by a limiting procedure.

ContributorsBelitsky, Andrei (Author) / College of Liberal Arts and Sciences (Contributor)
Created2017-08-31
127864-Thumbnail Image.png
Description

We address the near-collinear expansion of NMHV six-particle scattering amplitudes at strong value of the 't Hooft coupling in planar maximally supersymmetric Yang–Mills theory. We complement recent studies of this observable within the context of the Pentagon Operator Product Expansion, via the dual superWilson loop description, by studying effects of

We address the near-collinear expansion of NMHV six-particle scattering amplitudes at strong value of the 't Hooft coupling in planar maximally supersymmetric Yang–Mills theory. We complement recent studies of this observable within the context of the Pentagon Operator Product Expansion, via the dual superWilson loop description, by studying effects of multiple scalar exchanges that accompany (or not) massive flux-tube excitations. Due to the fact that holes have a very small, nonperturbatively generated mass mh which is exponentially suppressed in the 't Hooft coupling, their exchanges must be resummed in the ultraviolet limit, T <<1/mh. This procedure yields a contribution to the expectation value of the superloop which enters on equal footing with the classical area — a phenomenon which was earlier observed for MHV amplitudes. In all components, the near-massless scalar exchanges factorize from the ones of massive particles, at leading order in strong coupling.

ContributorsBelitsky, Andrei (Author) / College of Liberal Arts and Sciences (Contributor)
Created2016-08-20
127862-Thumbnail Image.png
Description

Scattering amplitudes in maximally supersymmetric gauge theory receive a dual description in terms of the expectation value of the super Wilson loop stretched on a null polygonal contour. This makes the analysis amenable to nonperturbative techniques. Presently, we elaborate on a refined form of the operator product expansion in terms

Scattering amplitudes in maximally supersymmetric gauge theory receive a dual description in terms of the expectation value of the super Wilson loop stretched on a null polygonal contour. This makes the analysis amenable to nonperturbative techniques. Presently, we elaborate on a refined form of the operator product expansion in terms of pentagon transitions to compute twist-two contributions to NMHV amplitudes. To start with, we provide a novel derivation of scattering matrices starting from Baxter equations for flux-tube excitations propagating on magnon background. We propose bootstrap equations obeyed by pentagon form factors with nonsinglet quantum numbers with respect to the R-symmetry group and provide solutions to them to all orders in 't Hooft coupling. These are then successfully confronted against available perturbative calculations for NMHV amplitudes to four-loop order.

ContributorsBelitsky, Andrei (Author) / College of Liberal Arts and Sciences (Contributor)
Created2015-05-05
127860-Thumbnail Image.png
Description

We address the near-collinear expansion of multiparticle NMHV amplitudes, namely, the heptagon and octagons in the dual language of null polygonal super Wilson loops. In particular, we verify multiparticle factorization of charged pentagon transitions in terms of pentagons for single flux-tube excitations within the framework of refined operator product expansion.

We address the near-collinear expansion of multiparticle NMHV amplitudes, namely, the heptagon and octagons in the dual language of null polygonal super Wilson loops. In particular, we verify multiparticle factorization of charged pentagon transitions in terms of pentagons for single flux-tube excitations within the framework of refined operator product expansion. We find a perfect agreement with available tree and one-loop data.

ContributorsBelitsky, Andrei (Author) / College of Liberal Arts and Sciences (Contributor)
Created2015-06-03