oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2020 ( 1 )

2019 ( 73 )

2018 ( 430 )

2017 ( 431 )

Custom range...

Search Results: 1 - 10 of 28485 matches for " Yuqian Sun "
All listed articles are free for downloading (OA Articles)
Page 1 /28485
Display every page Item
The Influence of Customer’s Verbal Abuse on Turnover Intention and Job Burnout of Sales Service Staff—The Moderating Effect of Organizational Atmosphere and Psychological Capital  [PDF]
Zhun Gong, Yuqian Sun, Zihua Zhang
Psychology (PSYCH) , 2018, DOI: 10.4236/psych.2018.910135
Abstract: This study with subjects of 345 sales service personnel, examines the organization atmosphere and psychological capital in the customer’s verbal abuse and sales staff turnover intention and job burnout of the influence of the adjustment. It was found that: 1) verbal violation of the customer had a significant positive correlation with the tendency to resign and job burnout; 2) psychological capital has a negative moderating effect on the relationship between verbal abuse and turnover intention of sales staff; 3) organization atmosphere has negative moderating effect on the relationship between customer’s verbal violation and sales staff’s turnover intention and job burnout.
Efficient Point-to-Subspace Query in $\ell^1$ with Application to Robust Object Instance Recognition
Ju Sun,Yuqian Zhang,John Wright
Computer Science , 2012, DOI: 10.1137/130936166
Abstract: Motivated by vision tasks such as robust face and object recognition, we consider the following general problem: given a collection of low-dimensional linear subspaces in a high-dimensional ambient (image) space, and a query point (image), efficiently determine the nearest subspace to the query in $\ell^1$ distance. In contrast to the naive exhaustive search which entails large-scale linear programs, we show that the computational burden can be cut down significantly by a simple two-stage algorithm: (1) projecting the query and data-base subspaces into lower-dimensional space by random Cauchy matrix, and solving small-scale distance evaluations (linear programs) in the projection space to locate candidate nearest; (2) with few candidates upon independent repetition of (1), getting back to the high-dimensional space and performing exhaustive search. To preserve the identity of the nearest subspace with nontrivial probability, the projection dimension typically is low-order polynomial of the subspace dimension multiplied by logarithm of number of the subspaces (Theorem 2.1). The reduced dimensionality and hence complexity renders the proposed algorithm particularly relevant to vision application such as robust face and object instance recognition that we investigate empirically.
Efficient Point-to-Subspace Query in $\ell^1$: Theory and Applications in Computer Vision
Ju Sun,Yuqian Zhang,John Wright
Computer Science , 2012,
Abstract: Motivated by vision tasks such as robust face and object recognition, we consider the following general problem: given a collection of low-dimensional linear subspaces in a high-dimensional ambient (image) space and a query point (image), efficiently determine the nearest subspace to the query in $\ell^1$ distance. We show in theory that Cauchy random embedding of the objects into significantly-lower-dimensional spaces helps preserve the identity of the nearest subspace with constant probability. This offers the possibility of efficiently selecting several candidates for accurate search. We sketch preliminary experiments on robust face and digit recognition to corroborate our theory.
Efficient programs of NPC problems should be length upper-bounded, and a thought experiment to search for them by machine enumeration
YuQian Zhou
Computer Science , 2012,
Abstract: This paper proposes a thought experiment to search for efficient bounded algorithms of NPC problems by machine enumeration. The key contributions are: -- On Universal Turing Machines, a program's time complexity should be characterized as: execution time(n) = loading time(n) + running time(n). -- Introduces the concept of bounded algorithms; proposes a comparison based criterion to decide if a bounded algorithm is inefficient; and establishes the length upper bound of efficient bounded programs. -- Introduces the growth rate characteristic function to evaluate program complexity, which is more easily machine checkable based on observations. -- Raises the theoretical question: if there exists any bounded algorithm with polynomial execution time for NPC problems.
Kink Waves and Their Evolution of the RLW-Burgers Equation
Yuqian Zhou,Qian Liu
Abstract and Applied Analysis , 2012, DOI: 10.1155/2012/109235
Abstract: This paper considers the bounded travelling waves of the RLW-Burgers equation. We prove that there only exist two types of bounded travelling waves, the monotone kink waves and the oscillatory kink waves. For the oscillatory kink wave, the regularity of its maximum oscillation amplitude changing with parameters is discussed. Exact expressions of the monotone kink waves and approximate expressions of the oscillatory ones are obtained in some special cases. Furthermore, all bounded travelling waves of the RLW-Burgers equation under different parameter conditions are identified and the evolution of them is discussed to explain the corresponding physical phenomena.
Enhanced transmission of transverse electric waves through subwavelength slits in a thin metallic film
Yuqian Ye,Yi Jin
Physics , 2009, DOI: 10.1103/PhysRevE.80.036606
Abstract: y coating a cover layer with metallization of cut wire array, the transmission of transverse electric waves (TE; the electric field is parallel to the slits) through subwavelength slits in a thin metallic film is significantly enhanced. An 800-fold enhanced transmission is obtained compared to the case without the cut wires. It is demonstrated that a TE incident wave is highly confined by the cut wires due to the excitation of the electric dipole-like resonance, and then effectively squeezed into and through the subwavelength slits.
90 degree polarization rotator using a bilayered chiral metamaterial with giant optical activity
Yuqian Ye,Sailing He
Physics , 2010, DOI: 10.1063/1.3429683
Abstract: A bilayered chiral metamaterial (CMM) is proposed to realize a 90 degree polarization rotator, whose giant optical activity is due to the transverse magnetic dipole coupling among the metallic wire pairs of enantiomeric patterns. By transmission through this thin bilayered structure of less than \lambda/30 thick, a linearly polarized wave is converted to its cross polarization with a resonant polarization conversion efficiency (PCE) of over 90%. Meanwhile, the axial ratio of the transmitted wave is better than 40 dB. It is demonstrated that the chirality in the propagation direction makes this efficient cross-polarization conversion possible. The transversely isotropic property of this polarization rotator is also experimentally verified. The optical activity of the present structure is about 2700 degree/\lambda, which is the largest optical activity that can be found in literature.
SuperNova IDentification spectral templates of 70 stripped-envelope core-collapse supernovae
Yuqian Liu,Maryam Modjaz
Physics , 2014,
Abstract: We constructed 70 SuperNova IDentification (SNID; Blondin & Tonry 2007) supernova (SN) templates using 640 spectra of stripped-envelope core-collapse SNe (SESNe) published by Modjaz et al. (2014). Fifty-six SN templates which are constructed from 458 spectra are brand new, increasing the number of SESNe and the number of SESNe spectra in the current SNID database by a factor of 2.6 and 2.0, respectively. We also made some type and phase refinements to templates in the current SNID database.
Genotyping analysis of Helicobacter pylori using multiple-locus variable-number tandem-repeats analysis in five regions of China and Japan
Chunliang Guo, Yaling Liao, Yan Li, Jun Duan, Ying Guo, Yuqian Wu, Yujun Cui, Hongwu Sun, Jinyong Zhang, Bing Chen, Quanming Zou, Gang Guo
BMC Microbiology , 2011, DOI: 10.1186/1471-2180-11-197
Abstract: MLVA of 12 VNTR loci with high discrimination power based on 30 candidates were performed on a collection of 202 strains of H. pylori which originated from five regions of China and Japan. Phylogenetic tree was constructed using MLVA profiles. 12 VNTR loci presented with high various polymorphisms, and the results demonstrated very close relationships between genotypes and ethnic groups.This study used MLVA methodology providing a new perspective on the ethnic groups and distribution characteristics of H. pylori.Helicobacter pylori (H. pylori) is a spiral-shaped, Gram-negative bacterium that infects half the world's population and is the major cause of chronic gastritis, peptic ulcers and gastric malignancies, including gastric non-cardia adenocarcinoma and mucosal-associated lymphoid tissue lymphoma [1,2]. Most infected individuals present with no clinical symptoms, but approximately 10~20% will develop peptic ulcers and 1% will develop gastric cancer [3,4], which could be associated with the diversity of H. pylori.H. pylori exhibits exceptionally high rates of DNA point mutations and intra- and inter-genomic recombination. Recently, many molecular typing tools have been developed to investigate genetic relatedness among H. pylori isolates. However, these methods have limitations including lower discrimination power, or preventing results from different labs being compared [5,6].In 1999, MLVA analysis was proposed as a general approach to providing accurate, portable data that were appropriate for the epidemiological investigation of bacterial pathogens [7-11]. However, there's little information concerning populations of H. pylori species using MLVA. Whether this method is available for the H. pylori population is still uncertain.H. pylori infections in China are common and extensively distributed, with an average infection rate of about 58%. In this study, 12 VNTR loci of the H. pylori genome were identified and used to analyze 202 strains of H. pylori which orig
Leptin Induced Apoptosis in Rat Adipose-derived Stem Cells Cultured in vitro
瘦素诱导体外培养大鼠脂肪间充质干细胞凋亡

Yuling Jiang,Hong Qiao,Mengxue Liu,Qiang Li,Yuqian Sun,Jinchao Zhang,
姜玉玲
,乔虹,刘梦雪,李强,孙玉倩,张巾超

生物工程学报 , 2008,
Abstract: To determine the direct effect of leptin on adipose tissue apoptosis in vitro using rat adipose-derived stem cells(ADSCs), we isolated the ADSCs of rat epididymis adipose tissue by collagenase digestion, filtration, and subsequent centrifugation. Cell cultures with or without leptin (10-9 mol/L, 10-8 mol/L, 10-7 mol/L and 10-6 mol/L) were incubated for different time. We examined the cell surface phenotype by immunofluorescence and detected the apoptosis morphological changes of ADSCs by laser scanning confocal microscope(LCSM). The number of apoptotic cells was determined by flow cytometry assay after annexin V binding and PI staining. Caspase-3 activity was measured by spectrofluorometry. The present study demonstrates that leptin treatment causes a marked increase in adipose-derived stem cell apoptosis. With the LCSM, after being treated with leptin, ADSCs showed the typical characteristic of apoptosis. Leptin in used concentrations (0 mol/L, 10-8 mol/L, 10-7 mol/L, 10-6 mol/L) caused a marked increase in cell apoptosis after 48 h incubation time (for 2.50%±0.72%, 6.78%±1.99%, 11.99%±1.58% and 17.93%±4.82%, respectively, P<0.05). Caspase-3 activity increased and reached a maximal level after 48 h in a linear fashion. The effect of leptin was dose-dependent and time-dependent. Leptin has been demonstrated to induce preadipocyte and adipocyte apoptosis, and today we demonstrate that leptin can induce ADSCs apoptosis, which can contribute to the decrease of adiposity. To our knowledge, this is the first study demonstrating the direct peripheral effect of leptin on ADSCs.
Page 1 /28485
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.