Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 108 )

2018 ( 616 )

2017 ( 634 )

2016 ( 545 )

Custom range...

Search Results: 1 - 10 of 41519 matches for " Yao-tang Ji "
All listed articles are free for downloading (OA Articles)
Page 1 /41519
Display every page Item
Effect of different deformation and annealing procedures on non-magnetic textured Cu60Ni40 alloy substrates
Jin Cui,Hong-li Suo,Jin-hua Wang,Jean-Claude Grivel,Lin Ma,Chun-yan Li,Yao-tang Ji,Shaheen Kausar,Min Liu,Yi Wang
- , 2018, DOI: https://doi.org/10.1007/s12613-018-1642-3
Abstract: In this work, a series of specimens was prepared by the casting method. Sharp cube-textured substrates were processed by heavy cold rolling and recrystallization annealing (i.e., the rolling-assisted biaxially textured substrates (RABiTS) method). Both the rolling and the recrystallization texture in the alloy tapes were investigated by X-ray diffraction and electron back-scatter diffraction, respectively. The results showed that a strong copper-type deformation texture was obtained in the heavy cold-rolled substrate. In addition, the recrystallization annealing process was found to be very important for the texture transition in the Cu–Ni alloy substrates. The cube texture content in the Cu60Ni40 alloy substrates reached 99.7% (≤10°) after optimization of the cold-rolling procedure and the recrystallizing heat-treatment process, whereas the content of low-angle grain boundaries (from 2° to 10° misorientation) in the substrate reached 95.1%.
Some variants of Newton's method with fifth-order and four-order convergence for solving nonlinear equations
Yao-tang Li,Ai-quan Jiao
International Journal of Applied Mathematics and Computation , 2009,
Abstract: Chun's two-step predictor-corrector type iterative method for solving nonlinear equations (Iterative Methods Improving Newton's Method by the Decomposition Method, J . Comput. Math. Appl.50, 1559-1568 ) is improved and a kind of new iterative method is presented. Some present methods derived from Adomian Decomposition method are unified in a form and a series of new methods with high convergence order and the value of EFF are obtained by introducing parameter also. Those methods can be considered as a significant improvement of the Newton's method and its variant forms.
Resource Elasticity of Offspring Survival and the Optimal Evolution of Sex Ratios
Rui-Wu Wang, Ya-Qiang Wang, Jun-Zhou He, Yao-Tang Li
PLOS ONE , 2013, DOI: 10.1371/journal.pone.0053904
Abstract: The fitness of any organisms includes the survival and reproductive rate of adults and the survival of their offspring. Environmental selection pressures might not affect these two aspects of an organism equally. Assuming that an organism first allocates its limited resources to maintain its survival under environmental selection pressure, our model, based on the evolutionarily stable strategy theory, surprisingly shows that the sex ratio is greatly affected by the environmental pressure intensity and by the reproductive resource elasticity of offspring survival. Moreover, the concept of the resource elasticity of offspring survival intrinsically integrates the ecological concepts of K selection and r selection. The model shows that in a species with reproductive strategy K, increased environmental selection pressure will reduce resource allocation to the male function. By contrast, in a species with reproductive strategy r, harsher environmental selection pressure will increase allocation to the male function. The elasticity of offspring survival might vary not only across species, but also across many other factors affecting the same species (e.g., age structure, spatial heterogeneity), which explains sex ratio differences across species or age structures and spatial heterogeneity in the same species.
Using a Fiber Loop and Fiber Bragg Grating as a Fiber Optic Sensor to Simultaneously Measure Temperature and Displacement
Yao-Tang Chang,Chih-Ta Yen,Yue-Shiun Wu,Hsu-Chih Cheng
Sensors , 2013, DOI: 10.3390/s130506542
Abstract: This study integrated a fiber loop manufactured by using commercial fiber (SMF-28, Corning) and a fiber Bragg grating (FBG) to form a fiber optic sensor that could simultaneously measure displacement and temperature. The fiber loop was placed in a thermoelectric cooling module with FBG affixed to the module, and, consequently, the center wavelength displacement of FBG was limited by only the effects of temperature change. Displacement and temperature were determined by measuring changes in the transmission of optical power and shifts in Bragg wavelength. This study provides a simple and economical method to measure displacement and temperature simultaneously.
Infinity norm bounds for the inverse of Nekrasov matrices
Ljiljana Cvetkovic,Ping-Fan Dai,Ksenija Doroslovacki,Yao-Tang Li
Mathematics , 2011,
Abstract: From the application point of view, it is important to have a good upper bound for the maximum norm of the inverse of a given matrix A. In this paper we will give two simple and practical upper bounds for the maximum norm of the inverse of a Nekrasov matrix.
Relation between two non-pollinating wasps oviposition and the fruit abscission on Ficus racemosa

SUN Bao-Fa,WANG Rui-Wu,HU Zhong,LI Yao-Tang,

生态学报 , 2009,
Abstract: In the fig-fig wasp obligate mutualism, parasitic wasps Platyneura testacea and Platyneura mayri coexist with pollinating wasps. Theses non-pollinating wasps only use the seeds of figs or compete with pollinating wasp for floral resources, bring no any benefits to figs. The parasitism of these non-pollinating wasps may result in the disruption of the cooperation between figs and fig wasps. The fruit abscission mechanism of plant is generally considered as one of the key factors maintaining system stability. However, our quantitative experiment and field observations of fig-fig wasp system showed that the figs did not abscise fruits oviposited by Platyneura mayri, but abscised fruits over-ovipisited by P.testacea. The observation showed that tree oviposited by more P. testacea will have higher proportion of abscission. The over-ovipositing of P.testacea is the main reason for selective abscission of syconium. Our results indicate that the plant can only abscise fruits oviposited by parasitic wasps before pollinating wasps in fig-fig wasp mutualism, but do not abscise the fruits parasitized by wasps ovipositing simultaneous or later than pollinating wasps, implying that abscission can not sufficiently maintain the fig-fig wasp mutualism.
Prescreening teratogenic potential of chlorinated drinking water disinfection by-products by using Hydra regeneration assay
Prescreening teratogenic potential of chlorinated drinking water disinfection by products by using Hydra regeneration assay

Ji Yuan tang,
Ji Yuan tang
,Chen Qin yao,Wei Xiao fei,Li Yi,Liao Hong mei

环境科学学报(英文版) , 1998,
Abstract: --Practicability of method for the Hydra regeneration assay
Supply Chain Contract Incorporating Fairness under Asymmetric Information  [PDF]
Guangxing Wei, Yao Tang
Open Journal of Social Sciences (JSS) , 2016, DOI: 10.4236/jss.2016.47005

This paper obtains optimal settings of each parameter on a supply chain composed of a rational manufacturer and a fair retailer. Through the establishment of model under information symmetry and information asymmetry, in which the effort level of retailer can’t be observed by manufacturer, the impact of retailer’s fairness on his effort level and manufacturer’s utility are explored and investigated. From the comparison, this paper find that retailer’s effort level and manufacturer’s utility under information asymmetry are higher than those under information symmetry, and the difference is directly proportional to the degree of retailer’s fairness. Retailer’s fairness has positive effect on his effort level and manufacture’s utility under information asymmetry, and manufacturers tend to cooperate with the retailer who has higher degree of fairness.

Design and Analysis of Security Protocols for RFID Based on LPN Problem

Tang Jing,Ji Dong-yao,
唐 静

电子与信息学报 , 2009,
Abstract: The existing security protocols for RFID based on LPN problem are systematically analyzed and their secure vulnerabilities are summarized. In order to conquer these security leaks, a new RFID security protocol named HB# is designed, which is an improved version of HB+ protocol. Finally, it is proved that HB# protocol is secure in the random oracle model.
Deniable problems in secret authentication

TANG Qiang,JI Dong-Yao,

中国科学院研究生院学报 , 2009,
Abstract: One privacy-related problem is that the member in a group would like to only communicate with the member of the same group. When they are in the same group, message should be authenticated.Otherwise, nothing about the affiliation information could be leaked. After the communication, the sender would not like to leave evidence for convincing others.To the best of our knowledge,all the existing designs are not efficient in solving this kind of problems. We formalized the problem, proposed a non-interactive deniable organization hiding authentication, and proved our scheme in our model.
Page 1 /41519
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.