Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2020 ( 2 )

2019 ( 302 )

2018 ( 1816 )

2017 ( 1730 )

Custom range...

Search Results: 1 - 10 of 106711 matches for " Heng Zhang "
All listed articles are free for downloading (OA Articles)
Page 1 /106711
Display every page Item
Fracture and Damage Behaviors of Concrete in the Fractal Space  [PDF]
Heng Zhang, Demin Wei
Journal of Modern Physics (JMP) , 2010, DOI: 10.4236/jmp.2010.11006
Abstract: The fracture toughness, the driving force and the fracture energy for an infinite plate with a fractal crack are investigated in the fractal space in this work. The perimeter-area relation is adopted to derive the transforma-tion rule between damage variables in the fractal space and Euclidean space. A plasticity yield criterion is introduced and a damage variable tensor is decomposed into tensile and compressive components to describe the distinct behaviors in tension and compression. A plastic damage constitutive model for concrete in the Euclidean space is developed and generalized to fractal case according to the transformation rule of damage variables. Numerical calculations of the present model with and without fractal are conducted and compared with experimental data to verify the efficiency of this model and show the necessity of considering the fractal effect in the constitutive model of concrete. The structural response and mesh sensitivity of a notched unre-inforced concrete beam under 3-point bending test are theoretical studied and show good agreement with the experimental data.
Disjunctive Logic Programs versus Normal Logic Programs
Heng Zhang,Yan Zhang
Computer Science , 2013,
Abstract: This paper focuses on the expressive power of disjunctive and normal logic programs under the stable model semantics over finite, infinite, or arbitrary structures. A translation from disjunctive logic programs into normal logic programs is proposed and then proved to be sound over infinite structures. The equivalence of expressive power of two kinds of logic programs over arbitrary structures is shown to coincide with that over finite structures, and coincide with whether or not NP is closed under complement. Over finite structures, the intranslatability from disjunctive logic programs to normal logic programs is also proved if arities of auxiliary predicates and functions are bounded in a certain way.
Expressiveness of Logic Programs under General Stable Model Semantics
Heng Zhang,Yan Zhang
Computer Science , 2014,
Abstract: The stable model semantics had been recently generalized to non-Herbrand structures by several works, which provides a unified framework and solid logical foundations for answer set programming. This paper focuses on the expressiveness of normal and disjunctive programs under the general stable model semantics. A translation from disjunctive programs to normal programs is proposed for infinite structures. Over finite structures, some disjunctive programs are proved to be intranslatable to normal programs if the arities of auxiliary predicates and functions are bounded in a certain way. The equivalence of the expressiveness of normal programs and disjunctive programs over arbitrary structures is also shown to coincide with that over finite structures, and coincide with whether NP is closed under complement. Moreover, to capture the exact expressiveness, some intertranslatability results between logic program classes and fragments of second-order logic are obtained.
Research on Embedding Capacity and Efficiency of Information Hiding Based on Digital Images  [PDF]
Yanping Zhang, Juan Jiang, Yongliang Zha, Heng Zhang, Shu Zhao
International Journal of Intelligence Science (IJIS) , 2013, DOI: 10.4236/ijis.2013.32009

Generally speaking, being an efficient information hiding scheme, what we want to achieve is high embedding capacity of the cover image and high visual quality of the stego image, high visual quality is also called embedding efficiency. This paper mainly studies on the information hiding technology based on gray-scale digital images and especially considers the improvement of embedding capacity and embedding efficiency. For the purpose of that, two algorithms for information hiding were proposed, one is called high capacity of information hiding algorithm (HCIH for short), which achieves high embedding rate, and the other is called high quality of information hiding algorithm (HQIH for short), which realizes high embedding efficiency. The simulation experiments show that our proposed algorithms achieve better performance.

A Tunable Resolution MUSIC Algorithm for Interharmonics Analysis  [PDF]
Ming Zhang, Xiang Zhang, Heng Yao, Shunfan He
Journal of Power and Energy Engineering (JPEE) , 2017, DOI: 10.4236/jpee.2017.59001
Abstract: The harmonic and interharmonic analysis recommendations are contained in the latest IEC standards on power quality. Measurement and analysis experiences have shown that great difficulties arise in the interharmonic detection and measurement with acceptable levels of accuracy. In order to improve the resolution of spectrum analysis, the traditional method (e.g. discrete Fourier transform) is to take more sampling cycles, e.g. 10 sampling cycles corresponding to the spectrum interval of 5 Hz while the fundamental frequency is 50 Hz. However, this method is not suitable to the interharmonic measurement, because the frequencies of interharmonic components are non-integer multiples of the fundamental frequency, which makes the measurement additionally difficult. In this paper, the tunable resolution multiple signal classification (TRMUSIC) algorithm is presented, which the spectrum can be tuned to exhibit high resolution in targeted regions. Some simulation examples show that the resolution for two adjacent frequency components is usually sufficient to measure interharmonics in power systems with acceptable computation time. The proposed method is also suited to analyze interharmonics when there exists an undesirable asynchronous deviation and additive white noise.
Exploiting the inherent invasive property totreat glioblastoma multiforme

- , 2015,
Abstract: Glioblastoma multiforme (GBM) is the most malignant brain tumor with high infiltration. The routinesurgical resection followed by radiation and chemotherapy only provides patients with a survival period ranging 12–15months. Here, I propose that the high invasiveness property of the GBM cells be exploited to treat this deadly disease. Thatis, instead of inhibiting the dissemination of GBM cells, we should take advantage of the high mobility of the disseminatedGBM cells and directionally induce these cells to return to the center of surgical resection cavity of the primary neoplasmand subsequently kill them. This idea may provide a new promise to defeat this deadly disease.
Serious Deterioration of Renal Function after Percutaneous Nephrolithotomy: A Case Report  [PDF]
Heng Zhang, Houyong Zhou, Bo Song, Zhansong Zhou, Longkun Li
Open Journal of Nephrology (OJNeph) , 2011, DOI: 10.4236/ojneph.2011.12003
Abstract: A 25-year-old man presented with stones in left kidney received the left Percutaneous nephrolithotomy (PCNL) with holmium laser lithotripsy. All the stones were successfully removed, and all the results were normal in the first three months followup. However, a deterioration of renal function was confirmed two years later. No mechanical obstruction was found with ureteroscopy. The deterioration of renal function may be induced by high internal renal pelvis pressure, injury of the laser energy, potential functional obstruction, and/or ischemia-reperfusion injury.
Research and Application of 3G Electrical Safety Job Site Intelligent Monitoring Device  [PDF]
Changqing Zhao, Chenxu Zhao, Heng Xu, Haijun Zhang, Minghao Sun
Energy and Power Engineering (EPE) , 2013, DOI: 10.4236/epe.2013.54B169

This paper describes the shortcomings and difficulties of power company security construction, such as site management for construction site security monitoring personnel is limited, in recent years , rural power grids and Urban Network alteration Faced with new situation. The use of advanced science and technology and communication terminal in order to better strengthen the means of power construction site safety supervision, improve the level of safety production supervision, design and development of a new electrical safety job site intelligent monitoring devices. The device consists of three parts of the remote wide angle 360 degrees of portable video surveillance equipment and 3G smart terminal equipment and portable battery. Through the application of such a device, professionals can remotely monitor the construction job site safety, diagnose, and effectively improve the security of the electricity sector management and reduce security risks and personnel on-site monitoring costs for improving the security of the entire power industry field operations with significance.

A Novel Model for Carbonate Formation Acidizing Based on Equivalent Permeability  [PDF]
Jing Huang, Binhai Zhang, Shujie Liu, Yanfeng Cao, Heng Xue
Open Journal of Yangtze Oil and Gas (OJOGas) , 2018, DOI: 10.4236/ojogas.2018.33015
Abstract: Based on the equivalent permeability tensor theory, a novel carbonate acidizing mathematical model is developed, which can be adopted to simulate the simulation process for carbonate matrix-acidizing and vuggy carbonate acidizing. Wormhole-channel in the core BC21 and BC10 was simulated based on the Omer Izgec experimental data. The comparative result between the experiment and the simulation shows that the two dominating wormhole-channels, the variation of pressure-drop curve and the pressure values at the inlet of the core are almost the same. The acid-flowing channel is significantly influenced by mineral distribution heterogeneity and macropore distribution pattern in the core. The acid breakthrough volume is defined as 1.5 PV divided by pore volume of core (PV is the acid volume consumed to form the dominating wormhole channel.). If the acid is injected continuously while the wormhole has completely broken through the core, the wormhole shape only changes a little, but the end-face dissolution will be formed at the end of the core. And the conclusion could be used to optimize the acid consumption volume.
Characteristics of the Fish Assemblage in the Intertidal Salt Marsh and Mudflat of the Yangtze Estuary  [PDF]
Heng Zhang, Jingyu Ye, Xuehui Wang, Shenglong Yang
Open Journal of Marine Science (OJMS) , 2019, DOI: 10.4236/ojms.2019.91004
Abstract: During July 2015 to June 2016, two permanent sampling sites were established in Scirpus mariqueter salt marsh and its adjacent mudflat on the intertidal zone of Chongming-Dongtan in the Yangtze Estuary. Based on monthly trap net surveys of fishes, the characteristics of the fish assemblages in the different subhabitats, including the salt marsh and mudflat, and the monthly variations were analyzed. A total of 19 species of fishes were found belong to 12 Families. The characteristics including the dominant fish species were different in these two subhabitats. 18 species of fish were recorded in the mudflat, of which the dominant species were the Coilia ectenes, Pelteobagrus nitidus and Lateolabrax maculatus. Ten species of fish were recorded in the salt marsh of which the dominant species were the Coilia ectenes, Saurogobio dumerili, Liza haematocheila, Lateolabrax maculatus and Acanthogobius ommaturus. Pelteobagrus nitidus prefers to use the mudflat, while Lateolabrax maculatus and Liza haematocheila
Page 1 /106711
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.