Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 28 )

2018 ( 311 )

2017 ( 336 )

2016 ( 297 )

Custom range...

Search Results: 1 - 10 of 23406 matches for " Lujian Zheng "
All listed articles are free for downloading (OA Articles)
Page 1 /23406
Display every page Item
Diagnosis and Efficacy Improvement of Staff Training in Medium- and Small-Sized Private Enterprises  [PDF]
Lujian Zheng, Jianmin Wang
American Journal of Industrial and Business Management (AJIBM) , 2018, DOI: 10.4236/ajibm.2018.83048
Abstract: Socioeconomic development has intensified inter-enterprise competition and made human resource exploitation extremely important for all enterprises. As a major part of the market economy, private enterprises play an increasingly important role. Staff training, a key step of human resource development, is critical for improving individual performances and overall corporate performance & yield. However, the staff training of medium- and small-sized private enterprises is faced by many problems that restrict the training efficacy. To further diagnose the training-related problems faced by medium- and small-sized private enterprises, here the author analyzed the current situations of staff training in M and identified the problems. Together with relevant knowledge and theories, the author analyzed underlying causes and proposed appropriate suggestions, aiming to provide some references and guidance for improving the training system of M.
Large Capacity Data Hiding Combined with Secure-intra-watermarking Based on H.264/AVC
Lujian Hu,Rangding Wang,Dawen Xu
Information Technology Journal , 2013,
Abstract: In this study, a method of using the watermark to enhance the security of the data hiding is proposed for H.264/AVC. The DCT coefficients in Intra-frames are modified to embed the watermark while the secrete information is inserted by modulating the appropriate MVD in P and B frames. The introduced Intra-watermarking, on one hand, can authenticate the integrity of the video stream. Furthermore, by the detected Intra-watermark and its integrity, the receiver can determine the reliability of the extracted hided information and judge whether the video has suffered from various attacks in addition, the security of the secrete communication can be guaranteed. Experiment results demonstrate that this scheme can achieve a large hiding capacity with low bit-rate increase, while the real-time performance can also be obtained.
Research and Development of Trust Management in Web Security

XU Feng,LuJian,

软件学报 , 2002,
Abstract: Trust management is a hot topic of Web security research in recent years. In this paper, the emerging of trust management is presented. Its concepts and models are described in detail, and several typical trust management systems and trust valuation models are introduced. The existing problems of current works and future research direction are discussed.
Differential Proteomic Analysis of Mammalian Tissues Using SILAM
Daniel B. McClatchy,Lujian Liao,Sung Kyu Park,Tao Xu,Bingwen Lu,John R. Yates III
PLOS ONE , 2012, DOI: 10.1371/journal.pone.0016039
Abstract: Differential expression of proteins between tissues underlies organ-specific functions. Under certain pathological conditions, this may also lead to tissue vulnerability. Furthermore, post-translational modifications exist between different cell types and pathological conditions. We employed SILAM (Stable Isotope Labeling in Mammals) combined with mass spectrometry to quantify the proteome between mammalian tissues. Using 15N labeled rat tissue, we quantified 3742 phosphorylated peptides in nuclear extracts from liver and brain tissue. Analysis of the phosphorylation sites revealed tissue specific kinase motifs. Although these tissues are quite different in their composition and function, more than 500 protein identifications were common to both tissues. Specifically, we identified an up-regulation in the brain of the phosphoprotein, ZFHX1B, in which a genetic deletion causes the neurological disorder Mowat–Wilson syndrome. Finally, pathway analysis revealed distinct nuclear pathways enriched in each tissue. Our findings provide a valuable resource as a starting point for further understanding of tissue specific gene regulation and demonstrate SILAM as a useful strategy for the differential proteomic analysis of mammalian tissues.
Demanding Model of Automobile Loan Using Stochastic Theory  [PDF]
Zheng Wang
Technology and Investment (TI) , 2010, DOI: 10.4236/ti.2010.13025
Abstract: We propose a double forecasting model using stochastic theory .The demand of automobile loan is the sum of all compound variables which indicated that automobile loan was credited to customer occurring in a certain period of time. Probability distribution of automobile loan was acquired using throughout probability theory. In view of such a fact, demand of automobile loan can be viewed as a conditional mathematic expectation. The forecasting model is proposed using growing function. Theoretical analysis and Case study shows that model based on conditional expectation is better than other model available with respect to forecasting demand of automobile loan.
A Security Transfer Model Based on Active Defense Strategy  [PDF]
Ying Zheng
Communications and Network (CN) , 2010, DOI: 10.4236/cn.2010.23027
Abstract: This paper proposes a security transfer model founded on the active defense strategy. In the unit of security domains of dynamic overlaying routers, this model defines the intelligent agent/ management of network element together with the self-similar, hierarchical and distributed management structure. Furthermore, we use deceptive packets so that the attackers can not trace back to the encrypted data packets. Finally, according to the digested information from data packets, this model is capable of detecting attacks and tracing back to the attackers immediately. In the meantime, the overlaying routers in the security domain are dynamically administered. In summary, this model not only improves the se-curity of data transfer on the web, but also enhances the effectiveness of the network management and switching efficiency of routers as well.
C0 Approximation on the Spatially Homogeneous Boltzmann Equation for Maxwellian Molecules  [PDF]
Minling Zheng
Applied Mathematics (AM) , 2010, DOI: 10.4236/am.2010.16066
Abstract: In this paper we study the viscosity analysis of the spatially homogeneous Boltzmann equation for Maxwellian molecules. We first show that the global existence in time of the mild solution of the viscosity equation . We then study the asymptotic behaviour of the mild solution as the coefficients , and an estimate on is derived.
Note on Gradient Estimate of Heat Kernel for Schrödinger Operators  [PDF]
Shijun Zheng
Applied Mathematics (AM) , 2010, DOI: 10.4236/am.2010.15056
Abstract: Let be a Schrödinger operator on . We show that gradient estimates for the heat kernel of with upper Gaussian bounds imply polynomial decay for the kernels of certain smooth dyadic spectral operators. The latter decay property has been known to play an important role in the Littlewood-Paley theory for and Sobolev spaces. We are able to establish the result by modifying Hebisch and the author’s recent proofs. We give a counterexample in one dimension to show that there exists in the Schwartz class such that the long time gradient heat kernel estimate fails.
A Modeling Framework for the Planning of Strategic Supply Chain Viewed from Complex Network  [PDF]
Jiangbo Zheng
Journal of Service Science and Management (JSSM) , 2009, DOI: 10.4236/jssm.2009.22016
Abstract: Based on the theory of complex network, this paper focuses on the planning of logistics nodes for strategic supply chain. I propose a practical mathematical modeling framework that simultaneously captures many practical aspects but still understated in the existing literatures of network planning problems. Moreover, capacity expansion and reduction sce-narios are also analyzed as well as modular capacity shifts for the fluctuation of demands. So this paper is of impor-tance for the research of network planning in strategic supply chain systems.
A Novel Mechanism in MPLS Network under Adversarial Uncertainty  [PDF]
Communications and Network (CN) , 2009, DOI: 10.4236/cn.2009.12016
Abstract: The advantage of multi-protocol label switching (MPLS) is its capability to route the packets through explicit paths. But the nodes in the paths may be possibly attacked by the adversarial uncertainty. Aiming at this problem in MPLS Network, in this paper, we propose a novel mechanism in MPLS network under adversar-ial uncertainty, making use of the theory of artificial intelligence, at first, we find the initialized label switching paths (LSPs) using the A* arithmetic, and secondly, during the process of data transmission, we switch the transmission path duly by taking advantage of the non-monotone reasoning mechanism. Com-pared to the traditional route mechanism, the experimental results show that it improves the security if data transmission remarkably under our novel mechanism in MPLS network.
Page 1 /23406
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.