oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2018 ( 1 )

2017 ( 3 )

2015 ( 10 )

2014 ( 10 )

Custom range...

Search Results: 1 - 10 of 126 matches for " Xiangyun "
All listed articles are free for downloading (OA Articles)
Page 1 /126
Display every page Item
New Design for Energy Saving Water Dispensers  [PDF]
Xiangyun Huang
Journal of Power and Energy Engineering (JPEE) , 2015, DOI: 10.4236/jpee.2015.34059
Abstract:

This article is in view of the existing water dispensers’ repeated heating, large energy consumption and fresh water quality’s problem, designed a new type energy saving water dispenser with the function of rapid cooling-or-heating. Anhydrous bravery structure is used in the water dispensers in drinking water flow process to cool or heat it, so as to ensure the water quality fresh. Among them, the application of semiconductor refrigeration technology achieved collecting heat and preheating the water [1], which is called the initial heating. Cooperating with the secondary heating of the electrothermal quartz heating tube, the water dispensers really realize the flowing liquid heating, bid farewell to the so-called thousand-times boiling water and improve the heat energy utilization greatly [2].

Heat Induced Capsid Disassembly and DNA Release of Bacteriophage λ
Xiangyun Qiu
PLOS ONE , 2012, DOI: 10.1371/journal.pone.0039793
Abstract: Successive structural changes of bacteriophage upon heating were characterized with quantitative experimental methods. In the commonly used Tris-Mg buffer, differential scanning calorimetry measurements first established that the protein capsid of phage melts at 87°C and its genomic DNA melts at 91°C. Interestingly, prior to the capsid melting, DNA was found to escape out of the capsid and subject to DNase digestion above 68°C, as concluded from light scattering, UV absorption, and electron microscopy studies. Further investigations indicated distinct temperature-dependent behaviors of the three phage proteins. Around 68°C, disruption of the tail first occurs and leads to the escape of DNA; above the capsid melting temperature of 87°C, the auxiliary protein gpD of the phage head remains soluble in solution and resists centrifugal sedimentation, whereas the major capsid protein gpE is easily precipitated and likely exists as aggregates.
Location for the Left Eigenvalues of Quaternionic Matrix
Xiangyun Chen
Journal of Mathematics Research , 2010, DOI: 10.5539/jmr.v2n4p141
Abstract: The purpose of this paper is to locate and estimate the left eigenvalues of quaternionic matrices. We present some distribution theorems for the left eigenvalues of square quaternionic matrices based on the generalized Gerschgorin theorem and generalized Brauer theorem.
Training-Based SWIPT: Optimal Power Splitting at the Receiver
Xiangyun Zhou
Computer Science , 2014,
Abstract: We consider a point-to-point system with simultaneous wireless information and power transfer (SWIPT) over a block fading channel. Each transmission block consists of a training phase and a data transmission phase. Pilot symbols are transmitted during the training phase for channel estimation at the receiver. To enable SWIPT, the receiver adopts a power-splitting design, such that a portion of the received signal is used for channel estimation or data detection, while the remaining is used for energy harvesting. We optimally design the power-splitting ratios for both training and data phases to achieve the best ergodic capacity performance while maintaining a required energy harvesting rate. Our result shows how a power-splitting receiver can make the best use of the received pilot and data signals to obtain the optimal SWIPT performance.
On third-order three-point right focal boundary value problems
Xiangyun Wu,Zhanbing Bai
Tamkang Journal of Mathematics , 2008, DOI: 10.5556/j.tkjm.39.2008.317-324
Abstract: In this paper, a fixed point theorem in a cone, some inequalities of the associated Green's function and the concavity of solutions are applied to obtain the existence of positive solutions of third-order three-point boundary value problem with dependence on the first-order derivative $egin{cases}& x'''(t) = f(t, x(t), x'(t)), quad 0 < t < 1, & x(0) = x'(eta) = x''(1) = 0, end{cases}$where $f:[0, 1] imes[0, infty) imes R o [0,infty)$ is a nonnegative continuous function, $etain(1/2, 1).$
4-Chloroanilinium (4-chlorophenyl)guanidinium dichloride hemihydrate
Yanhua Zhang,Xiangyun Liu
Acta Crystallographica Section E , 2010, DOI: 10.1107/s1600536810007774
Abstract: In the title hydrated molecular salt, C6H7ClN+·C7H9ClN3+·2Cl ·0.5H2O, the water O atom lies on a crystallographic twofold axis. In the crystal, intermolecular N—H...Cl and O—H...Cl hydrogen bonds form layers perpendicular to the ac plane in which both the water molecule and the chloride anion are involved in connecting the layers into a three-dimensional structure.
Analysis of the Mathematical Model for the Spread of Pine Wilt Disease
Xiangyun Shi,Guohua Song
Journal of Applied Mathematics , 2013, DOI: 10.1155/2013/184054
Abstract:
Modelling the Drugs Therapy for HIV Infection with Discrete-Time Delay
Xueyong Zhou,Xiangyun Shi
Abstract and Applied Analysis , 2014, DOI: 10.1155/2014/294052
Abstract: A discrete-time-delay differential mathematical model that described HIV infection of CD4+ T cells with drugs therapy is analyzed. The stability of the two equilibria and the existence of Hopf bifurcation at the positive equilibrium are investigated. Using the normal form theory and center manifold argument, the explicit formulas which determine the stability, the direction, and the period of bifurcating periodic solutions are derived. Numerical simulations are carried out to explain the mathematical conclusions. 1. Introduction Recently there has been a substantial effort in the mathematical modelling of virus dynamics [1–8]. These models focus on uninfected target cells, infected cells that are producing virus, and virus. A basic mathematical model describing HIV infection dynamic model is of the following form which has been studied in [5, 9]: In system (1), the following variables are includes: uninfected cells at time (unit is cells ), infected cells at time (unit is cells ), and virus at time (unit is virions ). Parameters , and are the death rates of the uninfected cells, the infected cells, and the virus particles, respectively. is the contact rate between uninfected cells and the virus particles. is the average number of virus particles produced by an infected cell. Reverse transcriptase inhibitors (RTIs) are a class of antiretroviral drugs used to treat HIV infection. RTIs inhibitors work by inhibiting the action of reverse transcriptase. RTIs inhibit the activity of reverse transcriptase, a viral DNA polymerase enzyme that retroviruses need to reproduce. In [10], Srivastava et al. developed a mathematical model for primary infection with RTIs. They subdivided the infected cells class in two subclasses: pre-RT (denoted by ) and post-RT (denoted by ). They assumed that a virus enters a resting T cell, the viral RNA may not be completely reverse transcribed into DNA, the unintegrated virus may decay with time and partial DNA transcripts are labile and degrade quickly [11, 12]. And they also assumed that a fraction of cells in pre-RT class reverts back to uninfected class and the remaining proceeds to post-RT class and becomes productively infected due to presence of RT inhibitors. The model of Srivastava et al. is as follows where is the efficacy of reverse transcriptase inhibitors (RTIs), is the transition rate from pre-RT (i.e., ) infected T cells class to productively post-RT (i.e., ) which is a productively infected class, and is the reverting rate of infected cells to uninfected class due to noncompletion of reverse transcription [11, 12].
Secure On-Off Transmission Design with Channel Estimation Errors
Biao He,Xiangyun Zhou
Mathematics , 2013,
Abstract: Physical layer security has recently been regarded as an emerging technique to complement and improve the communication security in future wireless networks. The current research and development in physical layer security is often based on the ideal assumption of perfect channel knowledge or the capability of variable-rate transmissions. In this work, we study the secure transmission design in more practical scenarios by considering channel estimation errors at the receiver and investigating both fixed-rate and variable-rate transmissions. Assuming quasi-static fading channels, we design secure on-off transmission schemes to maximize the throughput subject to a constraint on secrecy outage probability. For systems with given and fixed encoding rates, we show how the optimal on-off transmission thresholds and the achievable throughput vary with the amount of knowledge on the eavesdropper's channel. In particular, our design covers the interesting case where the eavesdropper also uses the pilots sent from the transmitter to obtain imperfect channel estimation. An interesting observation is that using too much pilot power can harm the throughput of secure transmission if both the legitimate receiver and the eavesdropper have channel estimation errors, while the secure transmission always benefits from increasing pilot power when only the legitimate receiver has channel estimation errors but not the eavesdropper. When the encoding rates are controllable parameters to design, we further derive both a non-adaptive and an adaptive rate transmission schemes by jointly optimizing the encoding rates and the on-off transmission thresholds to maximize the throughput of secure transmissions.
Cutting Last Wires for Mobile Communications by Microwave Power Transfer
Kaibin Huang,Xiangyun Zhou
Mathematics , 2014,
Abstract: The advancements in microwave power transfer (MPT) over past decades have enabled wireless power transfer over long distances. The latest breakthroughs in wireless communication, namely massive MIMO, small cells and millimeter-wave communication, make wireless networks suitable platforms for implementing MPT. This can lead to the elimination of the "last wires" connecting mobile devices to the grid for recharging, thereby tackling a long-standing ICT grand challenge. Furthermore, the seamless integration between MPT and wireless communication opens a new area called wirelessly powered communications (WPC) where many new research directions arise e.g., simultaneous information-and-power transfer, WPC network architectures, and techniques for safe and efficient WPC. This article provides an introduction to WPC by describing the key features of WPC, shedding light on a set of frequently asked questions, and identifying the key design issues and discussing possible solutions.
Page 1 /126
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.