oalib

OALib Journal期刊

ISSN: 2333-9721

费用:99美元

投稿

时间不限

2018 ( 83 )

2017 ( 80 )

2016 ( 116 )

2015 ( 1187 )

自定义范围…

匹配条件: “ Lu Xia” ,找到相关结果约43982条。
列表显示的所有文章,均可免费获取
第1页/共43982条
每页显示
Performance Evaluation of Listed Companies in New-Energy Automotive Industry  [PDF]
Zexuan Lu, Hongsheng Xia
Open Journal of Energy Efficiency (OJEE) , 2014, DOI: 10.4236/ojee.2014.34011
Abstract: As one of the national strategic emerging industries, new-energy-automobile industry has been caused people’s attention increasingly. Therefore, improving the new energy industry listing corporation performance, not only can alleviate the pressure on energy and the environment, but also can conducive to accelerating the transformation and upgrading of the automotive industry. Moreover, it can foster new economic point of growth and international competitiveness. This essay uses the super efficiency DEA model and Malmquist index method to analyze the performance of new-energy-automotive industry listing corporation. The data is from Year 2011 to 2013. Finally according to the conclusion of the empirical research, this paper made several suggestions to improve the operational efficiency of China’s new energy automobile enterprises and promote new energy-automobile industry.
Two-Tier GCT Based Approach for Attack Detection  [PDF]
Zhiwen Wang, Qin Xia, Ke Lu
Journal of Software Engineering and Applications (JSEA) , 2008, DOI: 10.4236/jsea.2008.11009
Abstract: The frequent attacks on network infrastructure, using various forms of denial of service attacks, have led to an increased need for developing new techniques for analyzing network traffic. If efficient analysis tools were available, it could become possible to detect the attacks and to take action to weaken those attacks appropriately before they have had time to propagate across the network. In this paper, we propose an SNMP MIB oriented approach for detecting attacks, which is based on two-tier GCT by analyzing causal relationship between attacking variable at the attacker and abnormal variable at the target. According to the abnormal behavior at the target, GCT is executed initially to determine preliminary attacking variable, which has whole causality with abnormal variable in network behavior. Depending on behavior feature extracted from abnormal behavior, we can recognize attacking variable by using GCT again, which has local causality with abnormal variable in local behavior. Proactive detecting rules can be constructed with the causality between attacking variable and abnormal variable, which can be used to give alarms in network management system. The results of experiment showed that the approach with two-tier GCT was proved to detect attacks early, with which attack propagation could be slowed through early detection.
An Innovative Research on the Cultivation Pattern of Human Resources Management Professionals
Xia Cui,Yang Lu
Asian Social Science , 2009, DOI: 10.5539/ass.v4n5p65
Abstract: With the approaching era of knowlege-based economy as well as the gradual universalization of China’s higher education, the quantity issue in talent cultivation has given way to the quality one consequently. Setting out from some problems in the cultivation of human resources management professional in China, this article puts forward patterns for objectives, curriculum systems as well as teaching methods in innovative talent cultivation.
Deciding Nonnegativity of Polynomials by MAPLE
Lu Yang,Bican Xia
Computer Science , 2013,
Abstract: There have been some effective tools for solving (constant/parametric) semi-algebraic systems in Maple's library RegularChains since Maple 13. By using the functions of the library, e.g., RealRootClassfication, one can prove and discover polynomial inequalities. This paper is more or less a user guide on using RealRootClassfication to prove the nonnegativity of polynomials. We show by examples how to use this powerful tool to prove a polynomial is nonnegative under some polynomial inequality and/or equation constraints. Some tricks for using the tool are also provided.
Authoritarian Control Mechanism over Chinese Intellectuals under the KMT Regime: A Study on Its History and Effects  [PDF]
Lei Gao, Lu Xia
Open Access Library Journal (OALib Journal) , 2018, DOI: 10.4236/oalib.1104235
Abstract:
After the Kuomintang (KMT) established a nationalist regime on mainland China in 1927, some Chinese intellectuals were recruited into the regime and served at even key positions, whereas others chose to maintain independence and autonomy in order to check the power of the authority. In 1949, the KMT retreat from Mainland to Taiwan with many excellent intellectuals, including both those pro-regime ones and those liberal ones. Due to the variation of the components of intellectuals, the KMT authority adopted different tactics to impose its control over them. By using censorship to the critical-oppositional intellectuals, imposing campus control to the active college students, and establishing political warfare system to restrict pro-government intellectuals, the KMT regime managed to limit the sociopolitical influence of the people among these groups. However, all the strategies and tactics employed by the KMT did not work well enough to maintain its rule during the martial law period; thus, it is appropriate to say that the KMT’s social control over intellectuals were not effective to persist its authoritarian rule.
Effects of Duration and Contents of Mindfulness Training on Depression  [PDF]
Qiong Wu, Lin Shi, Zhipeng Xia, Lida Lu
Psychology (PSYCH) , 2013, DOI: 10.4236/psych.2013.46A1002
Abstract:

This study aimed to find a simple and effective mindfulness training method for intervening depression. 95 university students with moderate or severe depression participated in the study and they were divided into three mindfulness training groups: 8-week complete group, 8-week informal group, and 4-week group. All subjects completed Beck Depression Inventory (BDI-) and Five Fact Mindfulness Questionnaire (FFMQ) before the intervention, after which, 55 subjects completed the assessments once more. Results showed the scores of specific dimensions representing mindfulness levels were different. For the 4-week group, scores of description, action aware and nonjudge significantly were improved, while the other two groups were improved significantly on all the five dimensions, especially the informal training group. In the discussion, it focused more on the effects of training time and training contents, and briefly discussed the relation of subjects dropout, subjects attendance, homework completion status and intervention effects. In conclusion, all the three intervention modes have magnificent intervention effects. Integrated many sided, 8-week informal training is of the best effects, which may be considered as a better mindfulness training mode henceforth, however, the comparison between the formal training and informal training still needs further study.

Linear and nonlinear luminescence properties of thiophene based materials
PING LU,GUANG MING XIA
Journal of the Serbian Chemical Society , 2005,
Abstract: Three new thiophene based organic luminescence compounds, i.e., 2,5-bis(4 -N,N-dimethylaminostyryl) thiophene (BMST), 2,5-bis(4 -N,N-diethylaminostyryl)thiophene (BEST) and 2,5-bis(4 -N-cyclobutylaminostyryl)thiophene (BBST), were synthesized. All of their measured single-photon excited fluorescence (SP F) are located in the range of ~ 530 nm with quantum yields of around 40 %, and the corresponding lifetime was 1 ns. The examined compounds show strong solvatochromism in their SPEF spectra. Excited by a fs laser at 800 nm, a strong up-converted fluorescence of the examined compounds was detected. The profile of two-proton excited fluorescence (TPEF) was similar to that of SPEF. The two-photon absorption (TPA) cross sections of the compounds were determined by the TPEF method. All the compounds showed large TPA cross sections. Hence these thiophene derivatives may have good TPA properties.
Simulation of Arrhythmogenic Effect of Rogue RyRs in Failing Heart by Using a Coupled Model
Luyao Lu,Ling Xia,Xiuwei Zhu
Computational and Mathematical Methods in Medicine , 2012, DOI: 10.1155/2012/183978
Abstract: Cardiac cells with heart failure are usually characterized by impairment of Ca2+ handling with smaller SR Ca2+ store and high risk of triggered activities. In this study, we developed a coupled model by integrating the spatiotemporal Ca2+ reaction-diffusion system into the cellular electrophysiological model. With the coupled model, the subcellular Ca2+ dynamics and global cellular electrophysiology could be simultaneously traced. The proposed coupled model was then applied to study the effects of rogue RyRs on Ca2+ cycling and membrane potential in failing heart. The simulation results suggested that, in the presence of rogue RyRs, Ca2+ dynamics is unstable and Ca2+ waves are prone to be initiated spontaneously. These release events would elevate the membrane potential substantially which might induce delayed afterdepolarizations or triggered action potentials. Moreover, the variation of membrane potential depolarization is indicated to be dependent on the distribution density of rogue RyR channels. This study provides a new possible arrhythmogenic mechanism for heart failure from subcellular to cellular level. 1. Introduction Calcium is considered to be the key ion in mediating the process of cardiac excitation-contraction coupling (E-C coupling). Since the discovery of Ca2+ sparks in 1993 [1], Ca2+ sparks have been widely accepted to be the stereotyped elementary Ca2+ release events in the intact myocyte. Sparks arise via clusters of ryanodine receptors (RyRs) localized in the junctional SR (jSR) which is in close apposition to transverse tubules (TTs) [2]. In a diastolic myocyte, spontaneous Ca2+ sparks occur randomly at very low frequency, even in the absence of Ca2+ influx. During a single muscle twitch, Ca2+ influx via sarcolemmal L-type Ca2+ channels will trigger synchronously occurrence of thousands of sparks, summation of which in space and time causes a global steep rise of Ca2+ concentration named Ca2+ transient. However under some pathological conditions, successive recruitment of Ca2+ sparks tends to evolve into Ca2+ waves propagating across the myocytes which might trigger ventricular arrhythmias [3]. With the improvement of optical methods and innovative techniques, microscopic Ca2+ signals at the subcellular level have been extensively investigated and characterized. In addition to Ca2+ sparks via clustered RyRs, nonspark Ca2+ release events, named Ca quarks, activated by low-intensity photolysis of Ca2+-caged compounds [4] or by inward Na+ current, [5], could elicit spatially homogeneous but small Ca2+ transient. These quarks are
Note on Studying Change Point of LRD Traffic Based on Li's Detection of DDoS Flood Attacking
Zhengmin Xia,Songnian Lu,Junhua Tang
Mathematical Problems in Engineering , 2010, DOI: 10.1155/2010/962435
Abstract: Distributed denial-of-service (DDoS) flood attacks remain great threats to the Internet. To ensure network usability and reliability, accurate detection of these attacks is critical. Based on Li's work on DDoS flood attack detection, we propose a DDoS detection method by monitoring the Hurst variation of long-range dependant traffic. Specifically, we use an autoregressive system to estimate the Hurst parameter of normal traffic. If the actual Hurst parameter varies significantly from the estimation, we assume that DDoS attack happens. Meanwhile, we propose two methods to determine the change point of Hurst parameter that indicates the occurrence of DDoS attacks. The detection rate associated with one method and false alarm rate for the other method are also derived. The test results on DARPA intrusion detection evaluation data show that the proposed approaches can achieve better detection performance than some well-known self-similarity-based detection methods.
Esterification and Deacidification of a Waste Cooking Oil (TAN 68.81 mg KOH/g) for Biodiesel Production
Jincheng Ding,Zheng Xia,Jie Lu
Energies , 2012, DOI: 10.3390/en5082683
Abstract: Oils with high content of free fatty acid (FFA) can be treated by acid esterification where an alcohol reacts with the given oil in the presence of acid catalyst. The investigated parameters include methanol to oil ratio, temperature and amount of catalyst. The optimum conditions for acid esterification which could reduce FFA content in the feedstock to less than 1.88% (acid value 3.76 mg KOH/g waste cooking oil) were 50?°C, 20% methanol to oil ratio (by volume) and 0.4 vol.% H 2SO 4 after 5 h. However, oil with an acid value of more than 1 mg KOH/g oil cannot meet the alkaline catalyzed transesterification conditions. Under the conditions of NaOH concentration 0.5 N, excess alkali 15%, 60 °C, 40 min, the FFA removal rate for deacidification reached 77.11% (acid value 0.86?mg?KOH/g esterified oil). The acid value of deacidification product was reduced below 0.86?mg KOH/g esterified oil, thus meeting the base-catalyzed trans-esterification conditions.
第1页/共43982条
每页显示


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.