oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 63 )

2018 ( 452 )

2017 ( 458 )

2016 ( 432 )

Custom range...

Search Results: 1 - 10 of 29263 matches for " Zhiqiang Sun "
All listed articles are free for downloading (OA Articles)
Page 1 /29263
Display every page Item
An Efficient Data Delivery Mechanism by Exploring Multipath Routes for Wireless Sensor Networks
Zhiqiang Ruan,Xingming Sun
Information Technology Journal , 2011,
Abstract: This paper study the data delivery mechanisms that can with high probability thwarting node capture attacks in unattended or distributed wireless sensor networks. Classic cryptographic approaches are vulnerable to such attacks, mainly due to their deterministic nature. Because once the adversary compromises the sensor nodes, it can acquire the credential as well as the data collected and held by sensors. Furthermore, the adversary can easily insert bogus sensor readings or change the processing results and then use these keys to authenticate forged information. This study proposes and analyzes the application of Reed-Solomon (RS) codes to address the problem. In the proposed scheme, each sensor node encodes the original data into multiple redundancy data shares by applying predefined (n, k) RS codes and applies non-uniform allocation through multiple node-disjoint paths to the destination. Analysis and simulation results demonstrate that the proposed scheme is efficient and resilient against node capture attack.
Fabricating colloidal crystals and construction of ordered nanostructures
Sun Zhiqiang,Yang Bai
Nanoscale Research Letters , 2006,
Abstract: Colloidal crystals of polymeric or inorganic microspheres are of extensive interest due to their potential applications in such as sensing, optics, photonic bandgap and surface patterning. The article highlights a set of approaches developed in our group, which are efficient to prepare colloidal crystals with ordered voids, patterned colloidal crystals on non-planar surfaces, heterogeneous colloidal crystals of different building blocks, colloidal crystals composed of non-spherical polyhedrons, and colloidal crystals of non-close-packed colloidal microspheres in particular. The use of these colloidal crystals as templates for different microstructures range from nanoscale to micron-scale is also summarized.
Computed tomography imaging of an ectopic thyroid on the ascending aorta  [PDF]
Chongfu Jia, Zhiqiang Yang, Xiaoming Bian, Fei Zheng, Xixia Sun, Zhaoqian Wang
World Journal of Cardiovascular Diseases (WJCD) , 2013, DOI: 10.4236/wjcd.2013.32032
Abstract: Ectopic thyroid on the ascending aorta is extremely rare, and its radiologic characteristics have not been reported in the radiologic literature. A case of ectopic thyroid on the ascending aorta is reported, and its imaging characteristics on computed tomography are discussed.
DC Emergency Power Control Strategy for AC/DC Multi-Channel Interconnected System  [PDF]
Yicong Wang, Dejun Shao, Zhiqiang Zhang, Youping Xu, Xiaojie Pan, Haishun Sun
Energy and Power Engineering (EPE) , 2017, DOI: 10.4236/epe.2017.94B079
Abstract:
Inter-regional transmission line fault often results in power flow transferring, tie-line overloading and system islanding. Traditional control methods such asgenerator tripping and load shedding are costly, and also have undesirable impacts on theloadside. In this paper, a new emergency power control strategy is proposed for multi-channel interconnected system by using the overload capacity of non-fault DC lines. First of all, the capacity of emergency power control can be acquired by critical transmission power of a certain tie-line for stability. Secondly, the shortest electric distance can be calculated by Dijkstra algorithm, and then the priority of emergency control of the DC lines can be obtained by the entropy weight method. When the inter-regional transmission power decreases and the effect of single DC line emergency control is poor, the multi-channel cooperative emergency control strategy is proposed to ensure the system stability. Simulation results verify the effectiveness of the method proposed.
CADS: Co-operative Anti-fraud Data Storage Scheme for Unattended Wireless Sensor Networks
Zhiqiang Ruan,Xingming Sun,Wei Liang,Decai Sun
Information Technology Journal , 2010,
Abstract: In this study, we focus on design efficient security techniques to maximize chances of data survival in wireless sensor networks, which involve disconnected or unattended operation with periodic visited by the sink, we refer to such networks as UWSNs. Data security in such UWSNs poses a number of challenges when applied in security-sensitive environments. First, sensors must accumulate data for a long time until it can be off loaded to a periodic sink. The adversary has lots of time to mount various attacks that aim to learn, erase, or modify potentially valuable data collected and held by sensors. Second, there is no ever-present sink, thus real time detection dose not help and the adversary can reach its goal and remain undetected. To address these security problems, we present CADS, a novel Co-operative and Anti-fraud Data Storage scheme for UWSNs by integrating the techniques of secret sharing and Discrete Logarithm Problem (DLP). We first propose a share generation and distributed scheme to achieve reliable and fault-tolerant initial data storage by providing redundancy for original data components, we then utilize discrete logarithm problem to ensure the integrity of the distributed data shares. The proposed scheme enables individual sensors to verify all the related data shares simultaneously in the absence of the original data in each round. Security analysis and simulations show that the proposed scheme has resistance against node capture attacks and outperforms existing security scheme in terms of data survival quantity and false negative probability.
An Algorithm Based on Diagonal Feature for Local Alignment in Large Database
Decai Sun,Xingming Sun,Xiaoxia Wang,Zhiqiang Ruan
Information Technology Journal , 2011,
Abstract: Sequence alignment was one of the most popular operations in bioinformatics. The key issue of alignment was how to improve matching speed in a large sequences database. In this study, a full-sensitivity algorithm was proposed to solve the problem of finding all local alignments over a given length w with an error rate at most e. The proposed algorithm was implemented on a q-gram index. First, a large part of irrelevant subsequences were eliminated quickly by effective filtrating with new diagonal features. These new diagonal features were extracted from match-regions by analyzing the edit matrix of query sequence and database. Second, the unfiltered regions were verified by smith-waterman algorithm to search the true matches. The experimental results demonstrate that the proposed algorithm improves the filtration efficiency in a short filtration time and the algorithm is always faster than the well-known SWIFT on condition of low max error rate. This result is of great practical to local alignment with low error rate and short window size.
Research on Industry Leaders’ External Auditing Demand in China—Based on the Signal Transfer Theory  [PDF]
Zhiqiang Wen
Open Journal of Business and Management (OJBM) , 2016, DOI: 10.4236/ojbm.2016.41013
Abstract: This paper validates the demand for audit’s signal transfer theory by China’s A-share listed company data. As having a significant influence on the region and the industries where they locate in, industry leaders will catch more attention. In this case, compared to other companies, industry leaders have stronger demands for high-quality audit services, because it can transmit a signal to the market that they are under a good company supervision. However, high growth industry leaders don’t have a stronger demand for high quality audit services than other ones as we refer in the hypothesis. The reason is that even industry leaders do not have external financing needed, they will still choose high-quality audit services, as it can transfer a good signal to the outside world.
Analysis of Cause of Death in Inner Mongolia of China, 2008-2014  [PDF]
Shuli Xing, Zhiqiang Sun, Maolin Du, Xuesen Shi, Hairong Zhang, Zhanlong Wang, Xiaoyan Zhang, Zhihui Hao, Zhuang Su, Ying Yang, Rong Liu, Yueling Hu, Juan Sun
Open Journal of Epidemiology (OJEpi) , 2017, DOI: 10.4236/ojepi.2017.71002
Abstract: Objective: The aim of our study was to analyze the character of cause of death in Inner Mongolia of China from 2008 to 2014. Methods: We collected data from monitoring points of the Death Registry System (DRS) in Inner Mongolia. We calculated the mortality rates by gender, year and age-specific. We calculated the proportion, the mortality rate and potential years of life lost (PYLL) of various system deaths. Results: During the period 2008-2014, the average crude mortality rate of all cause of death was 539.33/105. The mortality rate increased semilogarithm linearly with age. The top four system deaths were circulatory system, neoplasm, respiratory system and injury. In 2014, the mortality rates of circulatory system were increased and the mortality rates of certain infectious and parasitic diseases, neoplasms, respiratory system, genitourinary system and injury were decreased compared to those in 2008. Conclusion: Through analysis the indicators of proportion, the mortality rate and PYLL indicated that health status of a population in Inner Mongolia was at a better level.
An Open Conformance Test System towards the Standardization of Wireless Sensor Networks
Zhonghua Zhao,Wei Huangfu,Linmin Sun,Zhiqiang Shi,Wei Gan
International Journal of Distributed Sensor Networks , 2012, DOI: 10.1155/2012/931869
Abstract: The conformance testing on the wireless sensor networks (WSNs) is fundamental for the functional large-scale deployment and interconnection with the global Internet. The WSN protocols based on the Internet Protocol version 6 (IPv6) are the major trends of the future applications, which include IEEE 802.15.4, 6LoWPAN, and RPL. These protocols are not only diverse for various applications, but also volatile in the future. Moreover, sensor nodes are resource constrained, application related and lack the standardized test interface. Hence the corresponding conformance testing is seriously insufficient and needs urgently research. In this paper, the IPv6-based WSN protocols are analyzed and the conformance testing techniques and methods for IPv6-based WSNs are investigated towards the standardization of WSNs. A novel conformance test system for IPv6-based WSNs is designed and implemented, which is open, flexible, full featured, and practical. The conformance test system is suitable for the protocol evolution and the various hardware interfaces for the sensor nodes. The related outcomes will promote the standardization and commercialization of WSNs. 1. Introduction Wireless sensor networks (WSNs) are the emerging research areas in the current international academia and industry, which can be widely used in many fields, such as intelligent transportation, environmental monitoring, and industrial automation. WSNs have received widespread attention, with a great prospect for economic and social value. It is fundamental to consider the interconnection between WSNs and Internet for the large-scale application of WSNs. As the core of next-generation Internet protocols, IPv6 has many advantages which include the richness in address resource, the autoconfiguration of address, supporting real-time business, higher security, and better mobility. With the combination of IPv6 and WSNs, IPv6-based WSNs can meet the demands of the current WSNs in the address, security, mobility, and the integration with the existing networks, which will greatly promote the development of WSNs and has become a hot research field of WSNs. Some lightweight IPv6 protocol standards and draft for WSNs have successively been developed in industry, such as IEEE 802.15.4 in MAC (Media Access Control) layer, 6LoWPANs (IPv6 over Low-power Wireless Personal Area Networks) in the adaptation layer, and routing protocol RPL (IPv6 Routing Protocol for Low-power and Lossy Networks) in the network layer. The IETF is accelerating the standardization process of the above-mentioned protocols. IEEE 802.15.4 is
Zebrafish Chemical Screening Reveals the Impairment of Dopaminergic Neuronal Survival by Cardiac Glycosides
Yaping Sun, Zhiqiang Dong, Hadie Khodabakhsh, Sandip Chatterjee, Su Guo
PLOS ONE , 2012, DOI: 10.1371/journal.pone.0035645
Abstract: Parkinson's disease is a neurodegenerative disorder characterized by the prominent degeneration of dopaminergic (DA) neurons among other cell types. Here we report a first chemical screen of over 5,000 compounds in zebrafish, aimed at identifying small molecule modulators of DA neuron development or survival. We find that Neriifolin, a member of the cardiac glycoside family of compounds, impairs survival but not differentiation of both zebrafish and mammalian DA neurons. Cardiac glycosides are inhibitors of Na+/K+ ATPase activity and widely used for treating heart disorders. Our data suggest that Neriifolin impairs DA neuronal survival by targeting the neuronal enriched Na+/K+ ATPase α3 subunit (ATP1A3). Modulation of ionic homeostasis, knockdown of p53, or treatment with antioxidants protects DA neurons from Neriifolin-induced death. These results reveal a previously unknown effect of cardiac glycosides on DA neuronal survival and suggest that it is mediated through ATP1A3 inhibition, oxidative stress, and p53. They also elucidate potential approaches for counteracting the neurotoxicity of this valuable class of medications.
Page 1 /29263
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.