Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 123 )

2018 ( 939 )

2017 ( 887 )

2016 ( 871 )

Custom range...

Search Results: 1 - 10 of 63155 matches for " Huang Feng "
All listed articles are free for downloading (OA Articles)
Page 1 /63155
Display every page Item
The Effect of R&D Investment on Firms’ Financial Performance: Evidence from the Chinese Listed IT Firms  [PDF]
Zhaohui Zhu, Feng Huang
Modern Economy (ME) , 2012, DOI: 10.4236/me.2012.38114
Abstract: Technological innovation by R&D is at the core of business strategy for firms to compete in the competitive market. This paper tests the correlation between firms R&D investment intensity and the one-year lagged performance of Chinese Listed IT firms, and suggests that firms with an intensive investment strategy in R&D will have significantly larger financial performances in the following year.
Implementation of 6LoWPAN and Its Application in Smart Lighting  [PDF]
Zucheng Huang, Feng Yuan
Journal of Computer and Communications (JCC) , 2015, DOI: 10.4236/jcc.2015.33014

Smart lighting system based on PLC (Power Line Communication) is lack of extensibility due to low data rate and non-standard communication protocol. 6LoWPAN is an IP-based communication standard for WSN (Wireless Sensor Network) proposed by IETF. We upgraded the SEMS smart lighting system from PLC to 6LoWPAN, PLC nodes were replaced by 6LoWPAN nodes and centralized controllers were replaced by border routers. 6LoWPAN system testing was carried out on the street after the implementation. The results show that smart lighting system based on 6LoWPAN is better than PLC in transmission rate, signal coverage range, compatibility and extensibility.

Improvement of Environmental Stability of the Antireflective Coating by PEG Modified SiO2 Sol  [PDF]
Jianbin Feng, Jichen Huang
Journal of Materials Science and Chemical Engineering (MSCE) , 2017, DOI: 10.4236/msce.2017.55001
Abstract: As the antireflective coating prepared by sol-gel method had poor environmental stability, sol-modified method was used to improve its performance. The alkaline silica sol was prepared in ethanol solvent by using tetraethyl orthosilicate (TEOS) as precursors and aqueous ammonia as catalyst (content ~ 28%). Polyethylene glycol (PEG200) was used to modify the silica sol and the antireflective (AR) coating was prepared by dip-coating from the modified sol. The transmittance, composition, refractive index, and hydrophobicity of AR coating were discussed by combining the spectrophotometer, FTIR, Coating Wizard 32 coating design software, optical microscopy imaging system and JC2000A static droplet contact angle measurement software. Finally, the environmental stability of the AR coating was tested. The results showed that AR coating transmittance decreased by less than 0.1% after UV light for 20 hours and its transmittance decreased by about 0.57% in the humid environment for 2 months. Resistance to environmental stability has been improved.
Dynamic Spatial Discrimination Maps of Discriminative Activation between Different Tasks Based on Support Vector Machines  [PDF]
Guangxin Huang, Huafu Chen, Feng Yin
Applied Mathematics (AM) , 2011, DOI: 10.4236/am.2011.21010
Abstract: As a set of supervised pattern recognition methods, support vector machines (SVMs) have been successfully applied to functional magnetic resonance imaging (fMRI) field, but few studies have focused on visualizing discriminative regions of whole brain between different cognitive tasks dynamically. This paper presents a SVM-based method for visualizing dynamically discriminative activation of whole-brain voxels between two kinds of tasks without any contrast. Our method provides a series of dynamic spatial discrimination maps (DSDMs), representing the temporal evolution of discriminative brain activation during a duty cycle and describing how the discriminating information changes over the duty cycle. The proposed method was applied to investigate discriminative brain functional activations of whole brain voxels dynamically based on a hand-motor task experiment. A set of DSDMs between left hand movement and right hand movement were reached. Our results demonstrated not only where but also when the discriminative activations of whole brain voxels occurred between left hand movement and right hand movement during one duty cycle.
Cooperative Loss Recovery for Reliable Multicast in Ad Hoc Networks  [PDF]
Mengjie HUANG, Gang FENG, Yide ZHANG
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2010, DOI: 10.4236/ijcns.2010.31010
Abstract: Providing reliable multicast service is very challenging in Ad Hoc networks. In this paper, we propose an efficient loss recovery scheme for reliable multicast (CoreRM). Our basic idea is to apply the notion of cooperative communications to support local loss recovery in multicast. A receiver node experiencing a packet loss tries to recover the lost packet through progressively cooperating with neighboring nodes, upstream nodes or even source node. In order to reduce recovery latency and retransmission overhead, CoreRM caches not only data packets but also the path which could be used for future possible use to expedite the loss recovery process. Both analytical and simulation results reveal that CoreRM significantly improves the reliable multicast performance in terms of delivery ratio, throughput and recovery latency compared with UDP and PGM.
Simulation Model of Shipboard Low Voltage Molded Case Circuit Breaker Based on PSCAD/EMTDC  [PDF]
Jing Huang, Bing Shen, Feng Yang
Journal of Power and Energy Engineering (JPEE) , 2014, DOI: 10.4236/jpee.2014.24072
Abstract: A simulation model of shipboard low voltage molded case circuit breaker (MCCB) is developed based on power system simulation software PSCAD/EMTDC. The motion characteristic of the magnetic instantaneous acting trip based on electromagnetic characteristic analysis and Cassie arc model are applied into the simulation model to describe the dynamic behavior of the MCCB
during short-circuit protection. The results of short-circuit interruption experiments verify the simulation model. It demonstrates that the simulation model has good prospect in optimizing the design and protection performance of MCCB.
A New Design of Access Control in Wireless Sensor Networks
Hui-Feng Huang
International Journal of Distributed Sensor Networks , 2011, DOI: 10.1155/2011/412146
Abstract: Nodes in a sensor network may be lost because of power exhaustion or malicious attacks. To extend the span of sensor network, new nodes deployment is necessary. To prevent malicious nodes from joining the sensor networks, access control is a designed requirement for controlling sensor node deployment. Based on elliptic curve cryptography (ECC), this paper presents a new access control protocol for secure wireless sensor networks. The proposed scheme not only prevents malicious nodes from joining sensor networks, but also key establishment is included in the authentication procedure. Compared to the previously proposed schemes, the authentication procedure and common key generation of the proposed method are very simple and efficient. It could offer computational efficiency, energy, and bandwidth savings. In addition, it can be easily implemented as a dynamic access control, because all the old secret keys and information in existing nodes should not be updated once a new node is added or an old node is lost. 1. Introduction Wireless sensor networks applied to the monitoring of physical environments have recently emerged as an important infrastructure. It usually consists of one or more base stations and lots of sensor nodes, which are densely deployed either inside the phenomenon or very close to it. To save manufacturing, a sensor node is usually built as a small device, which has limited memory, a low-end processor, and is powered by a battery [1]. The position of sensor nodes need not to be engineered or predetermined. This allows random deployment in inaccessible terrain or disaster relief operations. Therefore, sensor networks are being deployed for a wide variety of applications, including military sensing and tracking, patient monitoring, and environmental monitoring, and airport and home security [1, 2]. Owing to the property of sensor devices, sensor networks may easily be compromised by adversaries who modify messages or provide misleading information to other sensor nodes. To prevent information and communication systems from illegal delivery and modification, the receiver must authenticate messages transmitted from the sensor nodes over a wireless sensor network. Because of the sensor devices, after several days or weeks of operation, some nodes in the network may exhaust their power or lost. That is, nodes in a sensor network may exhaust their battery or be stolen by malicious attacks. In addition, some nodes may be destroyed by adversaries so that the entire network may become useless. To extend the lifetime of the sensor network, new node
Thermal Properties and Thermal Degradation of Cellulose Tri-Stearate (CTs)
Feng-Yuan Huang
Polymers , 2012, DOI: 10.3390/polym4021012
Abstract: Cellulose tri-stearate (CTs) was synthesized employing tri?uoroacetic anhydride (TFAA), stearic acid (SA), with microcrystal cellulose (MCC) and characterized with FT-IR and 1H-NMR. The degree of substitution of CTs was determined by the traditional saponi?cation method and 1H-NMR. The thermal properties of CTs were investigated by the thermogravimetric analysis (TGA) under Ar flow in dynamic heating conditions. Thermal stability, activation energy, as well as the degradation mechanism of the decomposition process were revealed. The results showed that the thermal stability of CTs is superior to that of raw materials-MCC, and that the degradation of CTs in argon is a first-order weight loss; the initial decomposition temperature and the temperature corresponding to maximum degradation rate ( Tp) increase with an increase in heating rate. The activation energy values were calculated with the Ozawa method, Coats-Redfern method and Kinssinger method, respectively. Analyses of experimental results suggest that the degradation mechanism 0.10 < α < 0.80 is F2 type, A3 for α < 0.1, and R3 for α > 0.80. The degradation mechanism of CTs in the whole conversion range is a complex mechanism, and is the combination of A3, F2 and R3.
CRPCG—Clustering Routing Protocol based on Connected Graph
Feng Li,Liuhong Huang
International Journal of Intelligent Systems and Applications , 2011,
Abstract: In order to balance the load between cluster head, save the energy consumption of the inter-cluster routing, enhance reliability and flexibility of data transmission, the paper proposes a new clustering routing protocol based on connected graph (CRPCG). The protocol optimizes and innovates in three aspects: cluster head election, clusters formation and clusters routing. Eventually, a connected graph is constituted by the based station and all cluster heads, using the excellent algorithm of the graph theory, to guarantee the network connectivity and reliability, improve the link quality, balance node energy and prolong the network life cycle. The results of simulation show that, the protocol significantly prolong the network life cycle, balance the energy of network nodes, especially in the phase of inter-cluster data transmission, improving the reliability and efficiency of data transmission.
Xian-Feng Huang
Acta Crystallographica Section E , 2009, DOI: 10.1107/s1600536809038045
Abstract: In the title complex, [Cu(C12H15Cl2N2O)2], the CuII ion is coordinated by one N,O-bidentate and one N,N′,O-tridentate Schiff base ligand, resulting in a distorted CuN3O2 square-based pyramidal coordination for the metal ion, with the O atoms lying trans to each other in the basal plane.
Page 1 /63155
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.