oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 35 )

2018 ( 300 )

2017 ( 270 )

2016 ( 239 )

Custom range...

Search Results: 1 - 10 of 15539 matches for " Xiaojun Tang "
All listed articles are free for downloading (OA Articles)
Page 1 /15539
Display every page Item
A Study of Service Desk Setup in Implementing IT Service Management in Enterprises  [PDF]
Xiaojun Tang, Yuki Todo
Technology and Investment (TI) , 2013, DOI: 10.4236/ti.2013.43022
Abstract: Information Technology Service Management (ITSM) provides a framework to provide IT related services and the interaction of IT staff with users, and is often related with the British Government’s Information Technology Infrastructure Library (ITIL). ITIL offers a set of “best practices” for managing IT services and is one of the most widely accepted approaches to IT service management in the world. Recently, more and more enterprises implemented a centralized IT service management model based on the ITIL framework. However, even by adopting ITIL, most of the enterprises didn’t improve their IT service management level. Some factors become the barriers to the success of ITIL and ITSM implementation. In some cases, enterprises paid more attention to IT infrastructure setup and operation but neglect the importance of Service Desk. In this study, we first review ITSM, ITIL and Service Desk. Second, we identify a full function of new Service Desk and how to setup a good Service Desk. Enterprises should take proper measures in building a mature Service Desk to ensure successful implementation of ITSM.
A brief report on the first physics experiment design competition by high school students in Guang Dong
Xiaojun WANG,Ziaojun WAhiwen TANG,Jianlv ZHONG
Asia-Pacific Forum on Science Learning and Teaching , 2002,
Abstract: The background of the first competition of physics experiment design by high school students in Guang Dong is reported. Some productions with excellent quality are analysed. The significance of the competition is also discussed.
An Integrated Fuzzy Approach for the Evaluation of Supply Chain Risk Mitigation Strategies  [PDF]
Xiaojun Wang
Open Journal of Social Sciences (JSS) , 2014, DOI: 10.4236/jss.2014.29028
Abstract:

Competing in an increasingly uncertain business environment, organizations need to mitigate its supply chain risks to enhance their resiliency. However, it is important to implement appropriate strategies to meet business needs. This paper presents a novel approach that integrates fuzzy risk assessment and fuzzy Delphi for the evaluation of strategies in order to mitigate supply chain risks. The novelty of the model lies in the fact that an analytical tool enables the specific business preferences concerning supply chain risks to be taken into consideration in making the strategic decisions. It provides a practical solution by which companies can systematically assess the risks involved in the supply chain and select appropriate strategies to address them.

Memory Suggestibility under Social Pressure and Inhibitory Control in Preschoolers  [PDF]
Xiaojun Cao
Journal of Behavioral and Brain Science (JBBS) , 2015, DOI: 10.4236/jbbs.2015.54012
Abstract: The current study examined the interaction of inhibitory control and social pressure on young children’s memory suggestibility. Children were administered the Video Memory Suggestibility Scale for Children (VMSSC) and batteries of inhibitory control tasks, and were exposed to different levels of situational social pressures during interviews for memory suggestibility. The findings indicated that inhibitory control played a significantly moderating role in the relationship between social pressure and memory suggestibility. The greater the inhibitory control, the lower the effects of social pressure on the memory suggestibility of children. For the children with lower levels of inhibitory control, the social pressure positively predicted memory suggestibility; but for the children with higher levels of inhibitory control, the social pressure didn’t significantly predict memory suggestibility. So, to a certain extent, memory suggestibility may be a dynamic integration of stable trait and fluctuating state elements. The implications for the essence of memory suggestibility were discussed.
From the Margin to the Center: The Transformation of the Identity Discourse of Chinese Ethnic Minority Literature  [PDF]
Xiaojun Gao
Advances in Literary Study (ALS) , 2018, DOI: 10.4236/als.2018.61001
Abstract: Generally, the paper tries to rethink and rediscover the very notion and the identity discourse of Chinese ethnic literatures through multi-ethnic perspectives. According to the survey, the author finds ethnic minorities and their cultures are either under “ethnic erasure” or excluded from many of the orthodox Chinese national literary histories, while writers and artists of Han nationality have always taken the center stage. The misconception of Chinese literature as Han national literature is influenced by the orthodox Chinese national literary histories and hegemonic discourses. With the transformation of literary history from monistic to multivalent, Chinese ethnic minority literatures are moving from the margin to the center in the literary landscape of China, reclaiming their identities and providing another practical methods for Chinese literature to enter into a dialogue with the world from a new perspective.
The Reflection and Outlook on the Study of Teachers’ IT-Based Teaching Ability  [PDF]
Xiaojun Wei
Open Journal of Social Sciences (JSS) , 2019, DOI: 10.4236/jss.2019.74017
Abstract: As a hot topic in the field of education, the study of teachers’ IT-based teaching ability concerns various perspectives such as theoretical paradigm, practical approach, scholarship of teaching and so on. This paper analyzes the problems existing in the development of teachers’ IT-based teaching ability. It is suggested that the improvement of IT-based teaching ability should be promoted from three aspects of school, teachers themselves and classroom teaching.
The Effect of Self-Assembling Peptide RADA16-I on the Growth of Human Leukemia Cells in Vitro and in Nude Mice
Chengkang Tang,Ximing Shao,Binbin Sun,Wenli Huang,Xiaojun Zhao
International Journal of Molecular Sciences , 2009, DOI: 10.3390/ijms10052136
Abstract: Nanofiber scaffolds formed by self-assembling peptide RADA16-I have been used for the study of cell proliferation to mimic an extracellular matrix. In this study, we investigated the effect of RADA16-I on the growth of human leukemia cells in vitro and in nude mice. Self-assembly assessment showed that RADA16-I molecules have excellent self-assembling ability to form stable nanofibers. MTT assay displayed that RADA16-I has no cytotoxicity for leukemia cells and human umbilical vein endothelial cells (HUVECs) in vitro. However, RADA16-I inhibited the growth of K562 tumors in nude mice. Furthermore, we found RADA16-I inhibited vascular tube-formation by HUVECs in vitro. Our data suggested that nanofiber scaffolds formed by RADA16-I could change tumor microenvironments, and inhibit the growth of tumors. The study helps to encourage further design of self-assembling systems for cancer therapy.
Survey of nutrients and quality assessment of crab paste by 1H NMR spectroscopy and multivariate data analysis
YangFang Ye,LiMin Zhang,HuiRu Tang,XiaoJun Yan
Chinese Science Bulletin , 2012, DOI: 10.1007/s11434-012-5119-x
Abstract: Crab paste is a traditional and popular food for people in the coastal area of China. Visual inspection is currently the only method of quality assessment. We developed a new analytical method of a comprehensive survey of nutrients and quality assessment for crab paste based on a combination of 1H NMR spectroscopy with multivariate data analysis. The aqueous extract of crab paste was dominated by amino acids, sugars, carboxylic acids, nucleotides and amines (including 19 first-time-reported compounds such as choline, uracil and guanosine). Two grades of crab paste had significant compositional differences in terms of amino acids, lactate, N-acetylglutamate, choline, dimethylamine, uridine, 1-methylnicotinamide and 2-pyridienmethanol. These results provided important information on the grade-dependence of crab-paste composition, and demonstrated that NMR-MDA was effective not only for the comprehensive survey of nutrients, but also for quality assessment of crab paste.
Multiple Access Channels with Generalized Feedback and Confidential Messages
Xiaojun Tang,Ruoheng Liu,Predrag Spasojevic,H. Vincent Poor
Mathematics , 2007,
Abstract: This paper considers the problem of secret communication over a multiple access channel with generalized feedback. Two trusted users send independent confidential messages to an intended receiver, in the presence of a passive eavesdropper. In this setting, an active cooperation between two trusted users is enabled through using channel feedback in order to improve the communication efficiency. Based on rate-splitting and decode-and-forward strategies, achievable secrecy rate regions are derived for both discrete memoryless and Gaussian channels. Results show that channel feedback improves the achievable secrecy rates.
On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels
Xiaojun Tang,Ruoheng Liu,Predrag Spasojevic,H. Vincent Poor
Mathematics , 2007,
Abstract: The focus of this paper is an information-theoretic study of retransmission protocols for reliable packet communication under a secrecy constraint. The hybrid automatic retransmission request (HARQ) protocol is revisited for a block-fading wire-tap channel, in which two legitimate users communicate over a block-fading channel in the presence of a passive eavesdropper who intercepts the transmissions through an independent block-fading channel. In this model, the transmitter obtains a 1-bit ACK/NACK feedback from the legitimate receiver via an error-free public channel. Both reliability and confidentiality of secure HARQ protocols are studied by the joint consideration of channel coding, secrecy coding, and retransmission protocols. In particular, the error and secrecy performance of repetition time diversity (RTD) and incremental redundancy (INR) protocols are investigated based on good Wyner code sequences, which ensure that the confidential message is decoded successfully by the legitimate receiver and is kept in total ignorance by the eavesdropper for a given set of channel realizations. This paper first illustrates that there exists a good rate-compatible Wyner code family which ensures a secure INR protocol. Next, two types of outage probabilities, connection outage and secrecy outage probabilities are defined in order to characterize the tradeoff between the reliability of the legitimate communication link and the confidentiality with respect to the eavesdropper's link. For a given connection/secrecy outage probability pair, an achievable throughput of secure HARQ protocols is derived for block-fading channels. Finally, both asymptotic analysis and numerical computations demonstrate the benefits of HARQ protocols to throughput and secrecy.
Page 1 /15539
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.