oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 70 )

2018 ( 650 )

2017 ( 646 )

2016 ( 544 )

Custom range...

Search Results: 1 - 10 of 48285 matches for " Lin Xing "
All listed articles are free for downloading (OA Articles)
Page 1 /48285
Display every page Item
Existence of Solutions to a Generalized System  [PDF]
Yali Zhao, Lin Xing, Jia Tao
Applied Mathematics (AM) , 2012, DOI: 10.4236/am.2012.36077
Abstract: In this paper, we introduce a generalized system (for short, GS) in real Banach spaces. Using Brouwer’s fixed point theorem, we establish some existence theorems for the generalized system without monotonicity. Further, we extend the concept of C-strong pseudomonotonicity and extend Minty’s lemma for the generalized system. And using the Minty lemma and KKM-Fan lemma, we establish an existence theorem for the generalized system with monotonicity in real reflexive Banach spaces. As the continuation of existing studies, our paper present a series of extended results based on existing corresponding results.
GnRH Antagonist Protocol: Is It Optimal for All Patients of Different Ages Undergoing In Vitro Fertilization and Embryo Transfer?  [PDF]
Weijie Xing, Haiyan Lin, Qingxue Zhang
Advances in Sexual Medicine (ASM) , 2017, DOI: 10.4236/asm.2017.74012
Abstract: Background: To assess the effect of these two protocols in patients of different ages. Methods: 1923 in vitro fertilization and embryo transfer (IVF-ET) cycles were divided into two groups: a GnRH-ant protocol group and GnRH-a long protocol group, and then every group were subdivided into four age ranges. The general materials and IVF outcomes were compared. Results: The incidence of OHSS fluctuated from 0% to 2.37% with GnRH-ant protocol, which was significantly lower than another (P < 0.05). Of all age ranges, the implantation and clinical pregnancy rates with GnRH-ant protocol were all lower than those with GnRH-a protocol. When the age was less than 35 years old, the CPRs in GnRH-ant protocol group were significantly lower than in another group (45.56% vs. 62.29%, 46.07% vs. 55.59%, respectively; P < 0.05). Conclusion: The antagonist protocol should be considered in patients with a high ovarian response (e.g., PCOS patients) to avoid OHSS. Older patients (>35 years) could be treated with the antagonist protocol.
GnRH Antagonist Protocol: Is It Effective for Expected Poor Ovarian Responders with Tubal Factor Undergoing IVF?  [PDF]
Weijie Xing, Haiyan Lin, Qingxue Zhang
Advances in Reproductive Sciences (ARSci) , 2017, DOI: 10.4236/arsci.2017.54007
Abstract: Background: This study aimed to determine if the gonadotropin releasing hormone (GnRH) antagonist protocol is optimal for expected poor ovarian responders with tubal factor undergoing in vitro fertilization-embryo transfer (IVF-ET). Methods: A total of 341 IVF-ET cycles were retrospectively identified. The following inclusion criteria were applied: age ≥ 40 years and patients with tubal factors. The cycles were divided into two groups: a GnRH antagonist group (157 cycles) and a GnRH agonist group (184 cycles). Results: The duration of stimulation and the total doses of gonadotropin in the GnRH agonist group were significantly more than those in the GnRH antagonist group (P < 0.05). There were significant differences in LH and P values on the hCG measurement days between the two groups (0.91 ± 1.17 vs. 4.82 ± 4.69 U/L and 0.69 ± 0.42 vs. 1.03 ± 0.50 ng/mL, P < 0.05). The implantation rate of the GnRH antagonist group was 12.24%, which was slightly higher than that of the GnRH agonist group (10.10%, P = 0.437). The clinical pregnancy rate of the two groups showed no statistical differences (23.36% vs. 23.03%, P = 1.000). Conclusion: For expected poor ovarian responders, the GnRH antagonist protocol was, to some extent, superior to the GnRH agonist protocol in terms of the implantation and clinical pregnancy rates.
Treatment effectiveness of traditional Chinese medicine for different types of absence seizures
Xing-lin YANG
Zhong Xi Yi Jie He Xue Bao , 2007,
Abstract:
Network Anomaly Detection Based on Wavelet Fuzzy Neural Network with Modified QPSO
Ruhui Ma,Yuan Liu,Xing Lin
International Journal of Distributed Sensor Networks , 2009, DOI: 10.1080/15501320802540488
Abstract: This paper proposes a novel network anomaly detection method employing wavelet fuzzy neural network (WFNN) to use modified Quantum-Behaved Particle Swarm Optimization (QPSO). In this paper, wavelet transform is applied to extract fault characteristics from the anomaly state. Fuzzy theory and neural network are employed to fuzzify the extracted information. Wavelet is then integrated with fuzzy neural network to form the wavelet fuzzy neural network (WFNN). The Quantum-Behaved Particle Swarm Optimization proposed by Jun Sun, which outperforms the other optimization algorithm considerably on its simple architecture and fast convergence, has previously applied to solve the optimum problem. However, the QPSO also has its own shortcomings. In QPSO if a particle flew off the boundary (the search area), the algorithm usually would regard the position value of the particle as the value of the boundary. If the boundary is at the position of local optimum, the particles were trapped into local optimum easily. It is impossible for them to arrive at the global optimum. With the increase of particle, the diversity of swam would be declined and the global search quality of the algorithm would be also declined. In the modified algorithm, it shows that the particles field off the boundary were distributed in the c*r and () search space. The diversity of swam and the global search quality would be enhanced. So there exists a modified QPSO which is employed to train WFNN in this paper. We have demonstrated performance comparisons to QPSO-WFNN, PSO-WFNN using the same data set extracts from the KDD99 Datasets, and the results have shown that the MQPSO-WFNN model exhibits superior performance with a higher attack detection rate and lower false positive rate. Experiments with KDD Cup 1999 connection traffic data have shown that this model is able to effectively detect intrusive behaviors. It also shows the remarkable ability of our IDS to detect new type of attacks.
Modified expression for the effective viscosity in the semi dilute shear flows of fiber suspension
Lingxin Zhang,Jianzhong Lin,Xing Shi
Chinese Science Bulletin , 2004, DOI: 10.1360/03ww0107
Abstract: The available expressions for the effective viscosity can not provide good predictions compared with the experiment data measured in the semi-dilute shear flows of fiber suspension with small aspect ratio. The departure of the theoretical prediction from the measured data increases with the decrease of the fiber aspect ratio. Therefore, by experiment for the fiber with 20 μm diameter, a new expression for the effective viscosity in the semi-dilute shear flows of fiber suspension with small aspect ratio is proposed, the relationship between the shear viscosity of fiber suspensions and the fiber concentration is given. The results show that the effective viscosity is not a linear function of the fiber concentration.
Notes on the Improvements of Wood-sectioning Techniques
木材制片技术的改进

Lin Jin-xing,
林金星

植物学报 , 1993,
Abstract:
Inhomogeneous Vacuum: An Alternative Interpretation of Curved Spacetime

YE Xing-Hao,LIN Qiang,

中国物理快报 , 2008,
Abstract: The strong similarities between the light propagation in a curved spacetime and that in a medium with graded refractive index are found. It is pointed out that a curved spacetime is equivalent to an inhomogeneous vacuum for light propagation. The corresponding graded refractive index of the vacuum in a static spherically symmetrical gravitational field is derived. This result provides a simple and convenient way to analyse the gravitational lensing in astrophysics.
A one-time one-key encryption algorithm based on the ergodicity of chaos

Wang Xing-Yuan,Teng Lin,

中国物理 B , 2012,
Abstract: In this paper, we propose a new one-time one-key encryption algorithm based on the ergodicity of a skew tent chaotic map. We divide the chaotic trajectory into sub-intervals and map them to integers, and use this scheme to encrypt plaintext and obtain ciphertext. In this algorithm, the plaintext information in the key is used, so different plaintexts or different total numbers of plaintext letters will encrypt different ciphertexts. Simulation results show that the performance and the security of the proposed encryption algorithm can encrypt plaintext effectively and resist various typical attacks.
An Interactive System SDI on Microcomputer
Zhong Renbao,Xing Lin,Ren Zhaoyang
计算机科学技术学报 , 1987,
Abstract: SDI is an interactive system,based on PASCAL,for Symbolic Differentiation and Integrationcompulation.It runs on an IBM-PC.Both input and output are symbolic mathematical expressions.It canmanipulate symbolic differentiation,symbolic integration,and algebraic simplification,etc.The languageand implementation of SDI will be presented in this paper.
Page 1 /48285
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.