oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 45 )

2018 ( 601 )

2017 ( 526 )

2016 ( 468 )

Custom range...

Search Results: 1 - 10 of 37746 matches for " HE Xiang "
All listed articles are free for downloading (OA Articles)
Page 1 /37746
Display every page Item
Research on the ultraweak photon emission from anti-cancer plants  [PDF]
Ping Wu, Xiang He
Journal of Biomedical Science and Engineering (JBiSE) , 2009, DOI: 10.4236/jbise.2009.23026
Abstract: UPE (Ultraweak photon emission) is one kind of a common phenomenon in biological organisms. It contains a wealth of information of biological functions. In this paper, single photon counting system is used to measure UPE of some anti- cancer herbal plants. For the plants, the changes of UPE under different water condition are stud-ied and the varying laws of ultraweak photon number with time are analysed. The results are higher fit double exponential decay law.
Identity Authentication Based on Two-Beam Interference  [PDF]
Wenqi He, Xiang Peng
Journal of Computer and Communications (JCC) , 2014, DOI: 10.4236/jcc.2014.24005
Abstract:

A two-factor identity authentication method on the basis of two-beam interference was presented. While verifying a user’s identity, a specific “phase key” as well as a corresponding “phase lock” are both mandatory required for a successful authentication. Note that this scheme can not only check the legality of the users, but also verify their identity levels so as to grant them hierarchical access permissions to various resources of the protected systems or organizations. The authentication process is straightforward and could be implemented by a hybrid optic-electrical system. However, the system designing procedure involves an iterative Modified Phase Retrieval Algorithm (MPRA) and can only be achieved by digital means. Theoretical analysis and simulations both validate the effectiveness of our method.

The Actual Nature of Light (Ⅰ) Reveal the Mystery about the Actual Nature of Light from Newton, Einstein to the Recent Mistakes  [PDF]
He-Zhou Wang, He-Xiang He, Jie Feng, Xiao-Dong Chen, Wei Lin
Journal of Quantum Information Science (JQIS) , 2011, DOI: 10.4236/jqis.2011.12008
Abstract: When Newton became the President of the Royal Society, he proposed corpuscle concept (wave-particle duality) to destroy the fruitions of Hooke and Huygens, because Newton mistook Hooke and Huygens as his enemies. Thereafter, this erroneous concept governed the scientific world for more than one hundred years. This paper will reveal the mystery: why corpuscle concept could govern the scientific world for one hundred years after Newton’s death. In the beginning of last century, photon, a palingenesis of Newton’s corpuscle, was proposed by Einstein again, as a sudden whim, because Planck strongly opposed this wrong concept, since 1907, Einstein strongly doubted this concept. Finally, Einstein disappointedly said: “The quanta really are a hopeless mess.” This paper will reveal the mystery: why photon concept can govern the scientific world until now, and give the evidences for the actual nature of light.
Treatment of nodular vasculitis based on syndrome differentiation: A report of 32 cases
HE Gan-Xiang
Zhong Xi Yi Jie He Xue Bao , 2003,
Abstract:
Two-Hop Secure Communication Using an Untrusted Relay
He Xiang,Yener Aylin
EURASIP Journal on Wireless Communications and Networking , 2009,
Abstract: We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted relay node is essential, we find that a positive secrecy rate is achievable. The center piece of the achievability scheme is the help provided by either the destination node with transmission capability, or an external "good samaritan" node. In either case, the helper performs cooperative jamming that confuses the eavesdropping relay and disables it from being able to decipher what it is relaying. We next derive an upper bound on the secrecy rate for this system. We observe that the gap between the upper bound and the achievable rate vanishes as the power of the relay node goes to infinity. Overall, the paper presents a case for intentional interference, that is, cooperative jamming, as an enabler for secure communication.
Two-Hop Secure Communication Using an Untrusted Relay
Xiang He,Aylin Yener
EURASIP Journal on Wireless Communications and Networking , 2009, DOI: 10.1155/2009/305146
Abstract: We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted relay node is essential, we find that a positive secrecy rate is achievable. The center piece of the achievability scheme is the help provided by either the destination node with transmission capability, or an external “good samaritan” node. In either case, the helper performs cooperative jamming that confuses the eavesdropping relay and disables it from being able to decipher what it is relaying. We next derive an upper bound on the secrecy rate for this system. We observe that the gap between the upper bound and the achievable rate vanishes as the power of the relay node goes to infinity. Overall, the paper presents a case for intentional interference, that is, cooperative jamming, as an enabler for secure communication.
The observed charmed hadron $Λ_c(2940)^+$ and the $D^*N$ interaction
Jun He,Xiang Liu
Physics , 2010, DOI: 10.1103/PhysRevD.82.114029
Abstract: In this work, we systematically study the interaction of $D^*$ and nucleon, which is stimulated by the observation of $\Lambda_c(2940)^+$ close to the threshold of $D^*p$. Our numerical result obtained by the dynamical investigation indicates the existence of the $D^*N$ systems with $J^P=1/2^\pm,\,3/2^\pm$, which not only provides valuable information to understand the underlying structure of $\Lambda_c(2940)^+$ but also improves our knowledge of the interaction of $D^*$ and nucleon. Additionally, the bottom partners of the $D^*N$ systems are predicted, which might be as one of the tasks in LHCb experiment.
The open-charm radiative and pionic decays of molecular charmonium Y(4274)
Jun He,Xiang Liu
Physics , 2011, DOI: 10.1140/epjc/s10052-012-1986-1
Abstract: In this work, we investigate the decay widths and the line shapes of the open-charm radiative and pionic decays of Y(4274) with the $D_s\bar{D}_{s0}(2317)$ molecular charmonium assignment. Our calculation indicates that the decay widths of $Y(4274)\to D^{+}_{s}D^{*-}_{s}\gamma$ and $Y(4274)\to D^+_{s}D^-_{s}\pi^0$ can reach up to 0.05 keV and 0.75 keV, respectively. In addition, the result of the line shape of the photon spectrum of $Y(4274)\to D_s^+ {D}_s^{*-} \gamma$ shows that there exists a very sharp peak near the large end point of photon energy. The line shape of the pion spectrum of $Y(4274)\to D_s^+ {D}_s^{*-} \pi^0$ is similar to that of the pion spectrum of $Y(4274)\to D_s^+ {D}_s^{*-} \gamma$, where we also find a very sharp peak near the large end point of pion energy. According to our calculation, we suggest further experiments to carry out the search for the open-charm radiative and pionic decays of Y(4274).
Discovery potential for charmonium-like state Y(3940) by the meson photoproduction
Jun He,Xiang Liu
Physics , 2009, DOI: 10.1103/PhysRevD.80.114007
Abstract: In this work, we investigate the discovery potential for Y(3940) by the photoproduction process $\gamma p\to Y(3940)p$. The numerical result shows that the upper (lower) limit of the total cross section for $\gamma p\to Y(3940)p$ is up to the order of 1 $nb$ (0.1 $\mu b$). Additionally, the background analysis and the Dalitz plot relevant to the production of Y(3940) are studied. The Dalitz plot analysis of Y(3940) production indicates that Y(3940) signal can be distinguished from the background clearly. The lower limit of the number of events of Y(3940) reaches up to 10/0.02GeV$^2$ for one billion collisions of $\gamma p$ by studying the invariant mass spectrum of $J/\psi\omega$. Experimental search for Y(3940) by the meson photoproduction is suggested.
Providing Secrecy With Structured Codes: Tools and Applications to Two-User Gaussian Channels
Xiang He,Aylin Yener
Mathematics , 2009,
Abstract: Recent results have shown that structured codes can be used to construct good channel codes, source codes and physical layer network codes for Gaussian channels. For Gaussian channels with secrecy constraints, however, efforts to date rely on random codes. In this work, we advocate that structured codes are useful for providing secrecy, and show how to compute the secrecy rate when structured codes are used. In particular, we solve the problem of bounding equivocation rates with one important class of structured codes, i.e., nested lattice codes. Having established this result, we next demonstrate the use of structured codes for secrecy in two-user Gaussian channels. In particular, with structured codes, we prove that a positive secure degree of freedom is achievable for a large class of fully connected Gaussian channels as long as the channel is not degraded. By way of this, for these channels, we establish that structured codes outperform Gaussian random codes at high SNR. This class of channels include the two-user multiple access wiretap channel, the two-user interference channel with confidential messages and the two-user interference wiretap channel. A notable consequence of this result is that, unlike the case with Gaussian random codes, using structured codes for both transmission and cooperative jamming, it is possible to achieve an arbitrary large secrecy rate given enough power.
Page 1 /37746
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.