Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 7 )

2018 ( 282 )

2017 ( 258 )

2016 ( 216 )

Custom range...

Search Results: 1 - 10 of 14788 matches for " Xueming Tang "
All listed articles are free for downloading (OA Articles)
Page 1 /14788
Display every page Item
Fuzzy Decision Method Applied in Action of Reactive Power Compensation Devices in Wind System  [PDF]
Xueming Li, Li Feng, Yi Tang, Yonghua Chen
Journal of Power and Energy Engineering (JPEE) , 2014, DOI: 10.4236/jpee.2014.24039
Abstract: Frequent occurrence of large-scale cascading trip-off of wind turbine raises the concern about the decision process of ordered control of reactive power compensation devices. The theory of fuzzy multi-attribute decision making is adopted to ascertain the action sequence of reactive power compensation devices. First, a set of evaluation indexes including control sensitivity, regulation
margin, response time, response level and cost is set up, and fuzziness of the proposed qualitative indexes is introduced to make them comparable to the proposed quantitative indexes. Then a method to calculate fuzzy weight of each index is put forward for evaluating relative importance of the proposed indexes. Finally, the action sequence of reactive power compensation devices is determined through the theory of fuzzy compromise decision making. The case study shows that the proposed method is effective to obtain the action sequence of reactive power compensation device which correspond to experience.
A Framework For Fully-Simulatable $h$-Out-Of-$n$ Oblivious Transfer
Bing Zeng,Xueming Tang,Chingfang Hsu
Computer Science , 2010,
Abstract: We present a framework for fully-simulatable $h$-out-of-$n$ oblivious transfer ($OT^{n}_{h}$) with security against non-adaptive malicious adversaries. The framework costs six communication rounds and costs at most $40n$ public-key operations in computational overhead. Compared with the known protocols for fully-simulatable oblivious transfer that works in the plain mode (where there is no trusted common reference string available) and proven to be secure under standard model (where there is no random oracle available), the instantiation based on the decisional Diffie-Hellman assumption of the framework is the most efficient one, no matter seen from communication rounds or computational overhead. Our framework uses three abstract tools, i.e., perfectly binding commitment, perfectly hiding commitment and our new smooth projective hash. This allows a simple and intuitive understanding of its security. We instantiate the new smooth projective hash under the lattice assumption, the decisional Diffie-Hellman assumption, the decisional $N$-th residuosity assumption, the decisional quadratic residuosity assumption. This indeed shows that the folklore that it is technically difficult to instantiate the projective hash framework under the lattice assumption is not true. What's more, by using this lattice-based hash and lattice-based commitment scheme, we gain a concrete protocol for $OT^{n}_{h}$ which is secure against quantum algorithms.
Assessing the Impacts of High Speed Rail Development in China’s Yangtze River Delta Megaregion  [PDF]
Xueming Chen
Journal of Transportation Technologies (JTTs) , 2013, DOI: 10.4236/jtts.2013.32011
This paper assesses the impacts of high speed rail (HSR) development in the Yangtze River Delta (YRD) Megaregion, China. After giving an introduction and conducting a literature review, the paper proposes a pole-axis-network system (PANS) model guiding the entire study. On the one hand, the HSR projects in the YRD Megaregion are expected to generate significant efficiency-related transportation and non-transportation benefits. As a result, the spillover effects from Shanghai and other major cities (poles) will greatly promote the urban and regional developments along the major HSR corridors (axes), and the entire megaregion will become more integrated economically, socially, and culturally. But, on the other hand, the HSR projects will also create serious social and geographic inequity issues, which need to be addressed as soon as possible in a proper way. This empirical study confirms the PANS model proposed.
Multipartite matroids and secret sharing
ChingFang Hsu,XueMing Tang,Qi Cheng,HaiJun Xiao
Chinese Science Bulletin , 2010, DOI: 10.1007/s11434-010-3086-7
Abstract: In a secret-sharing scheme, a secret value is distributed among a set of participants by giving each participant a share. The requirement is that only predefined subsets of participants can recover the secret from their shares. The family of the predefined authorized subsets is called the access structure. An access structure is ideal if there exists a secret-sharing scheme realizing it in which the shares have optimal length, that is, in which the shares are taken from the same domain as the secrets. Brickell and Davenport proved that ideal access structures are induced by matroids. Subsequently, ideal access structures and access structures induced by matroids have received a lot of attention. Seymour gave the first example of an access structure induced by a matroid namely the Vamos matroid, that is non-ideal. Since every matroid is multipartite and has the associated discrete polymatroid, in this paper, by dealing with the rank functions of discrete polymatroids, we obtain a sufficient condition for a multipartite access structure to be ideal. Furthermore, we give a new proof that all access structures related to bipartite and tripartite matroids coincide with the ideal ones. Our results give new contributions to the open problem, that is, which matroids induce ideal access structures.
Nutrient distribution within and release from the contaminated sediment of Haihe River

Min Wu,Suiliang Huang,Wei Wen,Xueming Sun,Xianqiang Tang,Miklas Scholz,

环境科学学报(英文版) , 2011,
Abstract: We assessed nutrient characteristics, distributions and fractions within the disturbed and undisturbed sediments at four sampling sites within the mainstream of Haihe River. The river sediments contained mostly sand (> 60%). The fraction of clay was < 3%. Total nitrogen (TN) and total phosphorus (TP) concentrations ranged from 729 to 1922 mg/kg and from 692 to 1388 mg/kg, respectively. Nutrient concentrations within the sediments usually decreased with increasing depth. The TN and TP concentrations within the fine sand were higher than for that within silt. Sediment phosphorus fractions were between 2.99% and 3.37% Ex-P (exchangeable phosphorus), 7.89% and 13.71% Fe/Al-P (Fe, Al oxides bound phosphorus), 61.32% and 70.14% Ca-P (calcium-bound phosphorus), and 17.03% and 22.04% Org-P (organic phosphorus). Nitrogen and phosphorus release from sediment could lead to the presence of 21.02 mg N/L and 3.10 mg P/L within the water column. A river restoration project should address the sediment nutrient stock.
A 90-Day Dietary Toxicity Study of Genetically Modified Rice T1C-1 Expressing Cry1C Protein in Sprague Dawley Rats
Xueming Tang, Fangting Han, Kai Zhao, Yan Xu, Xiao Wu, Jinbin Wang, Lingxi Jiang, Wei Shi
PLOS ONE , 2012, DOI: 10.1371/journal.pone.0052507
Abstract: In a 90-day study, Sprague Dawley rats were fed transgenic T1C-1 rice expressing Cry1C protein and were compared with rats fed non-transgenic parental rice Minghui 63 and rats fed a basal diet. No adverse effects on animal behavior or weight gain were observed during the study. Blood samples were collected and analyzed, and standard hematological and biochemical parameters were compared. A few of these parameters were found to be significantly different, but were within the normal reference intervals for rats of this breed and age, and were thus not considered to be treatment-related. Following sacrifice, a large number of organs were weighed, and macroscopic and histopathological examinations were performed with no changes reported. The aim of this study was to use a known animal model to determine the safety of the genetically modified (GM) rice T1C-1. The results showed no adverse or toxic effects due to T1C-1 rice when tested in this 90-day study.
An Efficient Adaptive Anticollision Algorithm Based on 4-Ary Pruning Query Tree
Wei Zhang,Yajun Guo,Xueming Tang,Guohua Cui,Longkai Wu,Ying Mei
International Journal of Distributed Sensor Networks , 2013, DOI: 10.1155/2013/848746
Abstract: In radio frequency identification system (RFID), the efficiency in which the reader identifies multiple tags is closely related to the methods to solve the collision of multiple tags. At present, a reasonable solution is the introduction of 4-ary query tree (or n-ary query tree) to reduce the collision time slots and additional query is used to decrease idle timeslots. The advantage of a 4-ary tree anti-collision algorithm is that it is able to reduce collision timeslots, but it also increases the idle timeslots. To reduce these excessive idle timeslots the 4-ary tree anticollision algorithm brings, an anti-collision algorithm based on adaptive 4-ary pruning query tree (A4PQT) is proposed in this paper. On the basis of the information of collision bits, some idle timeslots can be eliminated through pruning the 4-ary tree. Both theoretical analysis and simulation results support that A4PQT algorithm can significantly reduce recognition time and improve throughput of the RFID system. 1. Introduction In the Radio frequency identification (RFID) system, if multiple readers and multiple tags, or a single reader and multiple tags, transmit simultaneously in the readers’ working area, there are three types of collision as readers and tags operate on the same wireless channel. First, it is the frequency interference among readers which is due to the overlapping of two or more readers in the working area. The signals transmitted by these readers are causing mutual interference; thus the readers cannot read properly the tag data within the region. Second, when a tag appears in two or more readers' working area, it will not know which readers to communicate with. Third, when many tags appear in the working area of one reader, these tags respond simultaneously to the queries of the reader, which will result in collision. Generally, the first two types of collision are called reader-to-reader collision, and the third is known as reader-to-tag collision. When collision occurs, the reader cannot read the tag's data. How to reduce the number of collisions? How to reduce the messages that tag transmits repeatedly and reduce the communication overhead of the RFID system? Therefore, an efficient anticollision algorithm for identifying multitag is of great importance for the wireless RFID system. RFID system for solving multitag collision problem is currently divided into ALOHA-based anticollision algorithms and tree-based anticollision algorithms [1, 2]. ALOHA-based anticollision algorithms such as Slotted ALOHA, framed slotted ALOHA, dynamic framed slotted ALOHA, and
Xueming Chen
Theoretical and Empirical Researches in Urban Management , 2009,
Abstract: This paper gives an overview of the urban planning management system in Los Angeles, United States. This system consists of institutional subsystem, legal subsystem, operational subsystem, and technical subsystem. The City of Los Angeles Planning Department carries out its urban planning responsibilities in accordance with the General Plan Guidelines promulgated by the Governor’s Office of Planning and Research. The planning process has a good balance between government activities and citizen participations. The City’s advanced technical tools, including internet-based Zoning Information and Map Access System and online filing system, have fostered the public interaction with the planning process. The City is recommended to incorporate more market-based planning measures in the future.
Xueming CHEN
Theoretical and Empirical Researches in Urban Management , 2009,
Abstract: This paper reviews the Chinese immigration history in Los Angeles, with Chinatown representing its urbanization process and San Gabriel Valley representing its suburbanization process. These two processes are distinct and have different impacting factors. This empirical study also compares similarities and differences of the urban development patterns between the Chinese Americans and the mainstream white Americans. Furthermore, the paper examines the implications of Chinese immigration on local urban management from political, cultural, and socioeconomic aspects.
Screening of specific diagnostic peptides of swine hepatitis E virus
Kai Zhao, Qiwen Liu, Ruisong Yu, Zhen Li, Jianyue Li, Hong Zhu, Xiao Wu, Furong Tan, Jinbin Wang, Xueming Tang
Virology Journal , 2009, DOI: 10.1186/1743-422x-6-186
Abstract: By bioinformatic analysis, we identified and then synthesized 12 peptides from open reading frames (ORFs) ORF1, ORF2 and ORF3, including swHEV-1 - swHEV-12. Using the results from ELISA, we selected swHEV-11 as the best candidate antigen and used it as a coating antigen for the development of peptide-based swine anti-HEV ELISA kits. The coefficient of variation (CV) the coefficient of variation (CV) varied between 4.3-7.2% in the same batch, and between 8.2-17.7% in six different batches. When comparing our swine peptide-based kit with the commercial recombinant-based kit, the humane anti-HEV IgG test had a 73.4% correspondence rate for them.This is the first systemic study to screen the diagnostic peptides of swHEV and our findings strongly suggest that peptide swHEV-11 is a potent diagnostic reagent of swHEV that could be used in the development of highly efficient diagnostic assays for the specific and highly sensitive detection of anti-HEV activity in swine serum samples.Swine hepatitis E virus (swHEV) was discovered in pigs in the USA in 1997 [1], and it has since been demonstrated that there is potential for the zoonotic transmission and cross-species transmission between humans and pigs [2]. Based on phylogenetic analysis, swHEV genotypes 3 and 4 contain genomic sequences closely related to human HEV [3,4]. To date, swHEV infection has been documented in a number of provinces and municipalities in China [5], and is considered a major problem in pig production and a threat to human health. There is therefore a real need for specific and effective methods of diagnosis, prophylaxis and treatment for this disease.The antigenic structure of the related human HEV virus has been studied in detail. Several antigenic regions of diagnostic relevance were found within the open reading frames (ORFs) ORF1, ORF2 and ORF3, using a range of different sized synthetic peptides [6-10] or recombinant proteins [11-13]. Three of the seven peptides encoded by ORF1, ORF2 and ORF3 of
Page 1 /14788
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.