oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 8 )

2018 ( 76 )

2017 ( 85 )

2016 ( 61 )

Custom range...

Search Results: 1 - 10 of 4170 matches for " RuoYu Miao "
All listed articles are free for downloading (OA Articles)
Page 1 /4170
Display every page Item
Progression and prospects of translational medicine in China
GuangBing Li,RuoYu Miao,HaiTao Zhao
Science China Life Sciences , 2012, DOI: 10.1007/s11427-012-4397-5
Abstract:
Reuse of Ferric Sludge by Ferrous Sulfide in the Fenton Process for Nonylphenol Ethoxylates Wastewater Treatment  [PDF]
Ruoyu Zhou, Wenqi Zhang
Computational Water, Energy, and Environmental Engineering (CWEEE) , 2017, DOI: 10.4236/cweee.2017.61007
Abstract: In this paper, Fenton process was determined to be an effective technique to treat the refractory Nonylphenol ethoxylates (NPEOs) wastewater. The COD removal efficien-cies above 89% were obtained when the initial COD concentration was 12000mg/L. However, A large number of ferric sludge (SS=8.724g/L) would be produced after the Fenton oxidation of the wastewater and must be disposed appropriately. A novel process for Fenton sludge reused by low-cost ferrous sulfide (FeS) was also investi-gated. Experimental results show that the Fenton sludge could be reduced to produce a certain amount of Fe2+ in the acidic mixed liquor by ferrous sulfide. This mixed liquor from Fenton sludge could be used as the new catalyst in the Fenton process and was also highly effective for the NPEOs wastewater treatment. The residual ferrous sulfide from the mixed liquor could be used for the next batch of the reaction
Treatment of the High Concentration Nonylphenol Ethoxylates (NPEOs) Wastewater by Fenton Oxidation Process  [PDF]
Ruoyu Zhou, Wenqi Zhang
American Journal of Analytical Chemistry (AJAC) , 2017, DOI: 10.4236/ajac.2017.81006
Abstract: The Fenton oxidation process was applied in the treatment of an actual high concentration nonylphenol Ethoxylates (NPEOs) wastewater. The effects of H2O2 dosage, molar ratio of H2O2/Fe2+ (Fe2+ dosage), pH value and reaction time on the degradation of NPEOs were investigated. The orthogonal experiment indicated that the order of degree of influence on the COD removal was molar ratio of H2O2/Fe2+, reaction time, dosage of H2O2, and initial pH. The single-factor tests were carried out to determine the optimal conditions, and the results were H2O2 dosage of 76.32 mmol/L, molar ratio of H2O2/Fe2+ of 3, pH value of 5 and reaction time of 2 h. Under the optimum operation conditions, the COD removal efficiency was 85.6% and the effluent could be mixed with other wastewater into the large-scale biological treatment system.
Identification of Recurrence Related microRNAs in Hepatocellular Carcinoma after Surgical Resection
Zhen Yang,Ruoyu Miao,Guangbing Li,Yan Wu,Simon C. Robson,Xiaobo Yang,Yi Zhao,Haitao Zhao,Yang Zhong
International Journal of Molecular Sciences , 2013, DOI: 10.3390/ijms14011105
Abstract: Hepatocellular carcinoma (HCC) is one of the most aggressive human cancers with a high frequency of post-surgical recurrence. It is very critical to diagnose HCC recurrence at an early stage for a better therapeutic treatment. In this study, we examined the microRNA (miRNA) expression profiling in tumor tissues obtained from early and late recurrent HCC patients post-resection, using a microarray assay. A total of 32 miRNAs were identified to be differentially expressed during the progression of recurrence. Among these, 16 miRNAs were upregulated and 16 were downregulated. In addition, this miRNA expression signature was further validated by quantitative real-time polymerase chain reaction (qRT-PCR) analysis. Moreover, functional annotation of predicted target genes of these recurrent HCC-related miRNAs indicates that multiple biological pathways ( i.e., focal adhesion pathway, cancer-related pathways and mitogen-activated protein kinase (MAPK) signaling) that are all critical for cancer development and progression, may participate in the recurrence of HCC. Our data suggest potential molecular mechanisms underpinning miRNA-controlled HCC recurrence, and support the notion that miRNA expression signature and miRNA-based therapy can be useful tools for a better diagnosis and treatment stratification of this disease.
The role and clinical implications of microRNAs in hepatocellular carcinoma
Xue Zhao,Zhen Yang,GuangBing Li,DongKai Li,Yi Zhao,Yan Wu,Simon C. Robson,Lian He,YiYao Xu,RuoYu Miao,HaiTao Zhao
Science China Life Sciences , 2012, DOI: 10.1007/s11427-012-4384-x
Abstract: Hepatocellular carcinoma (HCC) is common and one of the most aggressive of all human cancers. Recent studies have indicated that miRNAs, a class of small noncoding RNAs that regulate gene expression post-transcriptionally, directly contribute to HCC by targeting many critical regulatory genes. Several miRNAs are involved in hepatitis B or hepatitis C virus replication and virus-induced changes, whereas others participate in multiple intracellular signaling pathways that modulate apoptosis, cell cycle checkpoints, and growth-factor-stimulated responses. When disturbed, these pathways appear to result in malignant transformation and ultimately HCC development. Recently, miRNAs circulating in the blood have acted as possible early diagnostic markers for HCC. These miRNA also could serve as indicators with respect to drug efficacy and be prognostic in HCC patients. Such biomarkers would assist stratification of HCC patients and help direct personalized therapy. Here, we summarize recent advances regarding the role of miRNAs in HCC development and progression. Our expectation is that these and ongoing studies will contribute to the understanding of the multiple roles of these small noncoding RNAs in liver tumorigenesis.
Identification Technique for the Intrusion of Airport Enclosure Based on Double Mach-Zehnder Interferometer
Lihui Jiang,Ruoyu Yang
Journal of Computers , 2012, DOI: 10.4304/jcp.7.6.1453-1459
Abstract: In view of the high rate of false alarm problems on the distributed optical fiber sensing technique applied in enclosure, a sensor is proposed based on double Mach-Zehnder interferometer and a method is needed urgently to identify intrusion accurately. This involves eliminating non-intrusion events caused by operating environments from intrusion events. To address the issue, this paper states the tensile strain principle of optical fiber and combines autocorrelation with frequency-energy distribution of signals to extract vibration characteristics. Finally, an identification technique is presented based on vibration theory to distinguish events. The results of simulation show that the algorithm can eliminate vibration characteristic of non-intrusion events so as to minimize the nuisance alarm rate and make prepare for the following recognition of intrusion.
Hurst Parameter for Security Evaluation of LAN Traffic
Ruoyu Yan,Yingfeng Wang
Information Technology Journal , 2012,
Abstract: Self-similarity analysis and anomaly detection in networks are research focus in the traffic analysis and network security community. How to use Hurst parameter estimated accurately to detect traffic anomaly timely is a meaningful work. In the study, based on traffic self-similarity, an effective scheme is proposed to detect and evaluate LAN traffic anomaly. Firstly, iterative estimation method is used to estimate Hurst parameters of four traffic metrics in real time. Then the Hurst values are compared with confidence intervals of normal values to detect anomaly in four kinds of traffics. Finally the anomaly detection results are integrated and normalized to evaluate general security situation of LAN traffic. The simulation results show that iterative estimation of Hurst value has faster speed, higher accuracy and smaller confidence intervals than variance-time plots, a widely used time-domain estimation method and than a new whittle estimator method, which is better than wavelet analysis method. On the other hand, experiments on real LAN traffic show that the method proposed in the paper can detect LAN traffic anomaly and display security situation of LAN traffic accurately.
Using Renyi Cross Entropy to Analyze Traffic Matrix and Detect DDoS Attacks
Ruoyu Yan,Qinghua Zheng
Information Technology Journal , 2009,
Abstract: In this study, we propose Renyi cross entropy to analyze matrix traffic and detect anomaly rather than other entropy metrics, such as Shannon entropy, used extensively in many earlier studies. At first, we introduce a new type of traffic termed IF-flow (internal flow) collected in router. IF-flow can make the attack traffic more conspicuous in a large number of normal traffics, which makes attacks, especially DDoS attacks, spotted more easily. Then, the analysis of Renyi cross entropy of IF-flow matrix traffic, Abilene matrix traffic confirms that matrix traffic distribution has local stability in time. This conclusion provides a guidance to accurately detect anomaly. Finally, Renyi cross entropy is used to detect DDoS attacks existed in IF-flow testing data set and Abilene testing data set. The results of detection experiments show Renyi cross entropy based method can detect DDoS attacks at the beginning with higher detection rate, lower false alarm than Shannon entropy based method.
Hierarchical Method for Anomaly Detection and Attack Identification in High-speed Network
Ruoyu Yan,Chao Shao
Information Technology Journal , 2012,
Abstract: Traffic anomaly detection and attack identification are research focus in the network security community. In the paper, a hierarchical system framework is proposed to detect and identify traffic anomaly in high-speed network. At first, multiple basic detectors developed under authors’ previous research work are represented roughly. Then an alerts fusion method combining these basic detectors is used to improve on the anomaly detection ability. Experiments in real high-speed network demonstrate that the method has higher detection performance than basic detectors and majority voting method. To further identify attack type accurately, seven traffic features are used to characterize three types of attack (port scan, network scan and DoS attack) and traffic distribution change for each traffic feature is measured by cross entropy. Then Exponentially Weighted Moving Average (EWMA) control chart method based on cross entropy is proposed to classify attacks. The experimental results on traffic in backbone router have shown that the method has strong ability to detect and identify attacks.
Moderate Deviation Principles for Weakly Interacting Particle Systems
Amarjit Budhiraja,Ruoyu Wu
Mathematics , 2015,
Abstract: Moderate deviation principles for empirical measure processes associated with weakly interacting Markov processes are established. Two families of models are considered: the first corresponds to a system of interacting diffusions whereas the second describes a collection of pure jump Markov processes with a countable state space. For both cases the moderate deviation principle is formulated in terms of a large deviation principle (LDP), with an appropriate speed function, for suitably centered and normalized empirical measure processes. For the first family of models the LDP is established in the path space of an appropriate Schwartz distribution space whereas for the second family the LDP is proved in the space of $l_2$ (the Hilbert space of square summable sequences)-valued paths. Proofs rely on certain variational representations for exponential functionals of Brownian motions and Poisson random measures.
Page 1 /4170
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.