This growing collection consists of scholarly works authored by ASU-affiliated faculty, staff, and community members, and it contains many open access articles. ASU-affiliated authors are encouraged to Share Your Work in KEEP.

Displaying 1 - 10 of 63
Filtering by

Clear all filters

Description

Linnorm is a novel normalization and transformation method for the analysis of single cell RNA sequencing (scRNA-seq) data. Linnorm is developed to remove technical noises and simultaneously preserve biological variations in scRNA-seq data, such that existing statistical methods can be improved. Using real scRNA-seq data, we compared Linnorm with existing

Linnorm is a novel normalization and transformation method for the analysis of single cell RNA sequencing (scRNA-seq) data. Linnorm is developed to remove technical noises and simultaneously preserve biological variations in scRNA-seq data, such that existing statistical methods can be improved. Using real scRNA-seq data, we compared Linnorm with existing normalization methods, including NODES, SAMstrt, SCnorm, scran, DESeq and TMM. Linnorm shows advantages in speed, technical noise removal and preservation of cell heterogeneity, which can improve existing methods in the discovery of novel subtypes, pseudo-temporal ordering of cells, clustering analysis, etc. Linnorm also performs better than existing DEG analysis methods, including BASiCS, NODES, SAMstrt, Seurat and DESeq2, in false positive rate control and accuracy.

ContributorsYip, Shun H. (Author) / Wang, Panwen (Author) / Kocher, Jean-Pierre A. (Author) / Sham, Pak Chung (Author) / Wang, Junwen (Author) / College of Health Solutions (Contributor)
Created2017-09-18
Description

This article develops a welfare theoretic framework for interpreting evidence on the impacts of public programs on housing markets. We extend Rosen's hedonic model to explain how housing prices capitalize exogenous shocks to public goods and externalities. The model predicts that trading between heterogeneous buyers and sellers will drive a

This article develops a welfare theoretic framework for interpreting evidence on the impacts of public programs on housing markets. We extend Rosen's hedonic model to explain how housing prices capitalize exogenous shocks to public goods and externalities. The model predicts that trading between heterogeneous buyers and sellers will drive a wedge between these “capitalization effects” and welfare changes. We test this hypothesis in the context of changes in measures of school quality in five metropolitan areas. Results from boundary discontinuity designs suggest that capitalization effects understate parents’ willingness to pay for public school improvements by as much as 75%.

ContributorsKuminoff, Nicolai (Author) / Pope, Jaren C. (Author) / W.P. Carey School of Business (Contributor)
Created2014-11-01
Description

A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks

A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks over a relatively wide range of consecutive IP addresses, we successfully uncover intrinsic spatiotemporal patterns underlying cyberattacks, where the term “spatio” refers to the IP address space. In particular, we focus on analyzing macroscopic properties of the attack traffic flows and identify two main patterns with distinct spatiotemporal characteristics: deterministic and stochastic. Strikingly, there are very few sets of major attackers committing almost all the attacks, since their attack “fingerprints” and target selection scheme can be unequivocally identified according to the very limited number of unique spatiotemporal characteristics, each of which only exists on a consecutive IP region and differs significantly from the others. We utilize a number of quantitative measures, including the flux-fluctuation law, the Markov state transition probability matrix, and predictability measures, to characterize the attack patterns in a comprehensive manner. A general finding is that the attack patterns possess high degrees of predictability, potentially paving the way to anticipating and, consequently, mitigating or even preventing large-scale cyberattacks using macroscopic approaches.

ContributorsChen, Yu-Zhong (Author) / Huang, Zi-Gang (Author) / Xu, Shouhuai (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2015-05-20
Description

Supply-demand processes take place on a large variety of real-world networked systems ranging from power grids and the internet to social networking and urban systems. In a modern infrastructure, supply-demand systems are constantly expanding, leading to constant increase in load requirement for resources and consequently, to problems such as low

Supply-demand processes take place on a large variety of real-world networked systems ranging from power grids and the internet to social networking and urban systems. In a modern infrastructure, supply-demand systems are constantly expanding, leading to constant increase in load requirement for resources and consequently, to problems such as low efficiency, resource scarcity, and partial system failures. Under certain conditions global catastrophe on the scale of the whole system can occur through the dynamical process of cascading failures. We investigate optimization and resilience of time-varying supply-demand systems by constructing network models of such systems, where resources are transported from the supplier sites to users through various links. Here by optimization we mean minimization of the maximum load on links, and system resilience can be characterized using the cascading failure size of users who fail to connect with suppliers.

We consider two representative classes of supply schemes: load driven supply and fix fraction supply. Our findings are: (1) optimized systems are more robust since relatively smaller cascading failures occur when triggered by external perturbation to the links; (2) a large fraction of links can be free of load if resources are directed to transport through the shortest paths; (3) redundant links in the performance of the system can help to reroute the traffic but may undesirably transmit and enlarge the failure size of the system; (4) the patterns of cascading failures depend strongly upon the capacity of links; (5) the specific location of the trigger determines the specific route of cascading failure, but has little effect on the final cascading size; (6) system expansion typically reduces the efficiency; and (7) when the locations of the suppliers are optimized over a long expanding period, fewer suppliers are required. These results hold for heterogeneous networks in general, providing insights into designing optimal and resilient complex supply-demand systems that expand constantly in time.

ContributorsZhang, Si-Ping (Author) / Huang, Zi-Gang (Author) / Dong, Jia-Qi (Author) / Eisenberg, Daniel (Author) / Seager, Thomas (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2015-06-23
128589-Thumbnail Image.png
Description

Increasing levels of financial inequality prompt questions about the relationship between income and well-being. Using a twins sample from the Survey of Midlife Development in the U. S. and controlling for personality as core self-evaluations (CSE), we found that men, but not women, had higher subjective financial well-being (SFWB) when

Increasing levels of financial inequality prompt questions about the relationship between income and well-being. Using a twins sample from the Survey of Midlife Development in the U. S. and controlling for personality as core self-evaluations (CSE), we found that men, but not women, had higher subjective financial well-being (SFWB) when they had higher incomes. This relationship was due to ‘unshared environmental’ factors rather than genes, suggesting that the effect of income on SFWB is driven by unique experiences among men. Further, for women and men, we found that CSE influenced income and SFWB, and that both genetic and environmental factors explained this relationship. Given the relatively small and male-specific relationship between income and SFWB, and the determination of both income and SFWB by personality, we propose that policy makers focus on malleable factors beyond merely income in order to increase SFWB, including financial education and building self-regulatory capacity.

ContributorsZyphur, Michael J. (Author) / Li, Wen-Dong (Author) / Zhang, Zhen (Author) / Arvey, Richard D. (Author) / Barsky, Adam P. (Author) / W.P. Carey School of Business (Contributor)
Created2015-09-29
128582-Thumbnail Image.png
Description

The debate about representation in the brain and the nature of the cognitive system has been going on for decades now. This paper examines the neurophysiological evidence, primarily from single cell recordings, to get a better perspective on both the issues. After an initial review of some basic concepts, the

The debate about representation in the brain and the nature of the cognitive system has been going on for decades now. This paper examines the neurophysiological evidence, primarily from single cell recordings, to get a better perspective on both the issues. After an initial review of some basic concepts, the paper reviews the data from single cell recordings – in cortical columns and of category-selective and multisensory neurons. In neuroscience, columns in the neocortex (cortical columns) are understood to be a basic functional/computational unit. The paper reviews the fundamental discoveries about the columnar organization and finds that it reveals a massively parallel search mechanism. This columnar organization could be the most extensive neurophysiological evidence for the widespread use of localist representation in the brain. The paper also reviews studies of category-selective cells. The evidence for category-selective cells reveals that localist representation is also used to encode complex abstract concepts at the highest levels of processing in the brain. A third major issue is the nature of the cognitive system in the brain and whether there is a form that is purely abstract and encoded by single cells. To provide evidence for a single-cell based purely abstract cognitive system, the paper reviews some of the findings related to multisensory cells. It appears that there is widespread usage of multisensory cells in the brain in the same areas where sensory processing takes place. Plus there is evidence for abstract modality invariant cells at higher levels of cortical processing. Overall, that reveals the existence of a purely abstract cognitive system in the brain. The paper also argues that since there is no evidence for dense distributed representation and since sparse representation is actually used to encode memories, there is actually no evidence for distributed representation in the brain. Overall, it appears that, at an abstract level, the brain is a massively parallel, distributed computing system that is symbolic. The paper also explains how grounded cognition and other theories of the brain are fully compatible with localist representation and a purely abstract cognitive system.

ContributorsRoy, Asim (Author) / W.P. Carey School of Business (Contributor)
Created2017-02-16
128573-Thumbnail Image.png
Description

Two distinct monocyte (Mo)/macrophage (Mp) subsets (Ly6Clow and Ly6Chi) orchestrate cardiac recovery process following myocardial infarction (MI). Prostaglandin (PG) E2 is involved in the Mo/Mp-mediated inflammatory response, however, the role of its receptors in Mos/Mps in cardiac healing remains to be determined. Here we show that pharmacological inhibition or gene

Two distinct monocyte (Mo)/macrophage (Mp) subsets (Ly6Clow and Ly6Chi) orchestrate cardiac recovery process following myocardial infarction (MI). Prostaglandin (PG) E2 is involved in the Mo/Mp-mediated inflammatory response, however, the role of its receptors in Mos/Mps in cardiac healing remains to be determined. Here we show that pharmacological inhibition or gene ablation of the Ep3 receptor in mice suppresses accumulation of Ly6Clow Mos/Mps in infarcted hearts. Ep3 deletion in Mos/Mps markedly attenuates healing after MI by reducing neovascularization in peri-infarct zones. Ep3 deficiency diminishes CX3C chemokine receptor 1 (CX3CR1) expression and vascular endothelial growth factor (VEGF) secretion in Mos/Mps by suppressing TGFβ1 signaling and subsequently inhibits Ly6Clow Mos/Mps migration and angiogenesis. Targeted overexpression of Ep3 receptors in Mos/Mps improves wound healing by enhancing angiogenesis. Thus, the PGE2/Ep3 axis promotes cardiac healing after MI by activating reparative Ly6Clow Mos/Mps, indicating that Ep3 receptor activation may be a promising therapeutic target for acute MI.

ContributorsTang, Juan (Author) / Shen, Yujun (Author) / Chen, Guilin (Author) / Wan, Qiangyou (Author) / Wang, Kai (Author) / Zhang, Jian (Author) / Qin, Jing (Author) / Liu, Guizhu (Author) / Zuo, Shengkai (Author) / Tao, Bo (Author) / Yu, Yu (Author) / Wang, Junwen (Author) / Lazarus, Michael (Author) / Yu, Ying (Author) / College of Health Solutions (Contributor)
Created2017-03-03
127886-Thumbnail Image.png
Description

Modeling of transcriptional regulatory networks (TRNs) has been increasingly used to dissect the nature of gene regulation. Inference of regulatory relationships among transcription factors (TFs) and genes, especially among multiple TFs, is still challenging. In this study, we introduced an integrative method, LogicTRN, to decode TF–TF interactions that form TF

Modeling of transcriptional regulatory networks (TRNs) has been increasingly used to dissect the nature of gene regulation. Inference of regulatory relationships among transcription factors (TFs) and genes, especially among multiple TFs, is still challenging. In this study, we introduced an integrative method, LogicTRN, to decode TF–TF interactions that form TF logics in regulating target genes. By combining cis-regulatory logics and transcriptional kinetics into one single model framework, LogicTRN can naturally integrate dynamic gene expression data and TF-DNA-binding signals in order to identify the TF logics and to reconstruct the underlying TRNs. We evaluated the newly developed methodology using simulation, comparison and application studies, and the results not only show their consistence with existing knowledge, but also demonstrate its ability to accurately reconstruct TRNs in biological complex systems.

ContributorsYan, Bin (Author) / Guan, Daogang (Author) / Wang, Chao (Author) / Wang, Junwen (Author) / He, Bing (Author) / Qin, Jing (Author) / Boheler, Kenneth R. (Author) / Lu, Aiping (Author) / Zhang, Ge (Author) / Zhu, Hailong (Author) / College of Health Solutions (Contributor)
Created2017-10-19
129329-Thumbnail Image.png
Description

This paper studies an infinite-horizon repeated moral hazard problem where a single principal employs several agents. We assume that the principal cannot observe the agents' effort choices; however, agents can observe each other and can be contractually required to make observation reports to the principal. Observation reports, if truthful, can

This paper studies an infinite-horizon repeated moral hazard problem where a single principal employs several agents. We assume that the principal cannot observe the agents' effort choices; however, agents can observe each other and can be contractually required to make observation reports to the principal. Observation reports, if truthful, can serve as a monitoring instrument to discipline the agents. However, reports are cheap talk so that it is also possible for agents to collude, i.e., where they shirk, earn rents, and report otherwise to the principal. The main result of the paper constructs a class of collusion-proof contracts with two properties. First, equilibrium payoffs to both the principal and the agents approach their first-best benchmarks as the discount factor tends to unity. These payoff bounds apply to all subgame perfect equilibria in the game induced by the contract. Second, while equilibria themselves depend on the discount factor, the contract that induces these equilibria is independent of the discount factor.

ContributorsChandrasekher, Madhav (Author) / W.P. Carey School of Business (Contributor)
Created2015-01-01
129295-Thumbnail Image.png
Description

This paper traces the history of mortgage law in the United States. I explore the history of foreclosure procedures, redemption periods, restrictions on deficiency judgments, and foreclosure moratoria. The historical record shows that the most enduring aspects of mortgage law stem from case law rather than statute. In particular, the

This paper traces the history of mortgage law in the United States. I explore the history of foreclosure procedures, redemption periods, restrictions on deficiency judgments, and foreclosure moratoria. The historical record shows that the most enduring aspects of mortgage law stem from case law rather than statute. In particular, the ability of creditors to foreclose nonjudicially is determined very early in states’ histories, usually before the Civil War, and usually in case law. In contrast, the aspects of mortgage law developed through statute change more frequently. This finding calls into question whether common law is inherently more flexible than the civil-law system used in some other countries. However, case law tends to be less responsive to populist pressures than statutes. My findings suggest that the reason common law favors financial development is unlikely to be its greater flexibility relative to law made by statute.

ContributorsGhent, Andra (Author) / W.P. Carey School of Business (Contributor)
Created2014-11-01