oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 131 )

2018 ( 1158 )

2017 ( 1166 )

2016 ( 1132 )

Custom range...

Search Results: 1 - 10 of 88552 matches for " Yu-Jie Fu "
All listed articles are free for downloading (OA Articles)
Page 1 /88552
Display every page Item
Synthesis of the Key Intermediate of Coenzyme Q10
Fan-Song Mu,Meng Luo,Yu-Jie Fu,Xuan Zhang,Ping Yu,Yuan-Gang Zu
Molecules , 2011, DOI: 10.3390/molecules16054097
Abstract: (2’E)-1-(3-methyl-4-p-toluenesulfonyl-2-butene)-6-methyl-2,3,4,5-tetramethoxybenzene (4) is the key intermediate in the synthesis of coenzyme Q10 via a coupling reaction with solanesyl bromide. In this paper, we report a simple and effective synthesis of compound 4, starting with the readily available and inexpensive precursors p-toluenesulfonyl chloride (TsCl) and isoprene to obtain (2E)-1-p-toluenesulfonyl-2-methyl-4-hydroxy-2-butene (3) by addition, esterification and hydrolysis. Application of the Friedel-Crafts alkylation to compound 3, followed by the addition of 2,3,4,5-tetramethoxytoluene (TeMT), assembled the two parts into compound 4. The key parameters of each reaction were optimized at the same time, and the four total operations needed to produced compound 4 had a 27.9% overall yield under the optimized conditions. The structures of the compounds were characterized by 1H-NMR, IR and MS. This alternative process has the potential to be used for large-scale process.
Multiparty quantum secret sharing with pure entangled states and decoy photons
Ping Zhou,Xi-Han Li,Yu-Jie Liang,Fu-Guo Deng,Hong-Yu Zhou
Physics , 2007, DOI: 10.1016/j.physa.2007.04.018
Abstract: We present a scheme for multiparty quantum secret sharing of a private key with pure entangled states and decoy photons. The boss, say Alice uses the decoy photons, which are randomly in one of the four nonorthogonal single-photon states, to prevent a potentially dishonest agent from eavesdropping freely. This scheme requires the parties of communication to have neither an ideal single-photon quantum source nor a maximally entangled one, which makes this scheme more convenient than others in a practical application. Moreover, it has the advantage of having high intrinsic efficiency for qubits and exchanging less classical information in principle.
VPN identity certification technology based on fingerprint identification
基于指纹识别的VPN身份认证研究

HAO Yu-jie,FENG Yin-fu,LAI Pan,
郝玉洁
,冯银付,赖攀

计算机应用 , 2009,
Abstract: This paper analyzed and compared the advantages and disadvantages of the existing identity certification schemes for VPN connection, and pointed out the advantages of using fingerprint information for VPN identity certification. An identity certification scheme for VPN connection based on fingerprint identification was proposed. The paper also analyzed the security of the scheme, and introduced the application effect in the practical project. The scheme can prevent middle attack, tampering and falsifying information. It has forward-security, and is of better security than the existing schemes.
Efficient quantum cryptography network without entanglement and quantum memory
Chun-Yan Li,Xi-Han Li,Fu-Guo Deng,Ping Zhou,Yu-Jie Liang,Hong-Yu Zhou
Physics , 2007, DOI: 10.1088/0256-307X/23/11/004
Abstract: An efficient quantum cryptography network protocol is proposed with d-dimension polarized photons, without resorting to entanglement and quantum memory. A server on the network, say Alice, provides the service for preparing and measuring single photons whose initial state are |0>. The users code the information on the single photons with some unitary operations. For preventing the untrustworthy server Alice from eavesdropping the quantum lines, a nonorthogonal-coding technique (decoy-photon technique) is used in the process that the quantum signal is transmitted between the users. This protocol does not require the servers and the users to store the quantum state and almost all of the single photons can be used for carrying the information, which makes it more convenient for application than others with present technology. We also discuss the case with a faint laser pulse.
Quantum secure direct communication with quantum encryption based on pure entangled states
Xi-Han Li,Chun-Yan Li,Fu-Guo Deng,Ping Zhou,Yu-Jie Liang,Hong-Yu Zhou
Physics , 2005,
Abstract: We present a scheme for quantum secure direct communication with quantum encryption. The two authorized users use repeatedly a sequence of the pure entangled pairs (quantum key) shared for encrypting and decrypting the secret message carried by the traveling photons directly. For checking eavesdropping, the two parties perform the single-photon measurements on some decoy particles before each round. This scheme has the advantage that the pure entangled quantum signal source is feasible at present and any eavesdropper cannot steal the message.
Multiparty Quantum Remote Secret Conference
Xi-Han Li,Chun-Yan Li,Fu-Guo Deng,Ping Zhou,Yu-Jie Liang,Hong-Yu Zhou
Physics , 2006, DOI: 10.1088/0256-307X/24/1/007
Abstract: We present two schemes for multiparty quantum remote secret conference in which each legitimate conferee can read out securely the secret message announced by another one, but a vicious eavesdropper can get nothing about it. The first one is based on the same key shared efficiently and securely by all the parties with Greenberger-Horne-Zeilinger (GHZ) states, and each conferee sends his secret message to the others with one-time pad crypto-system. The other one is based on quantum encryption with a quantum key, a sequence of GHZ states shared among all the conferees and used repeatedly after confirming their security. Both these schemes are optimal as their intrinsic efficiency for qubits approaches the maximal value.
Multiparty Quantum Secret Report
Fu-Guo Deng,Xi-Han Li,Chun-Yan Li,Ping Zhou,Yu-Jie Liang,Hong-Yu Zhou
Physics , 2006, DOI: 10.1088/0256-307X/23/7/006
Abstract: A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her $M$ agents first share a sequence of ($M$+1)-particle Greenberger--Horne--Zeilinger (GHZ) states that only Alice knows which state each ($M$+1)-particle quantum system is in. Each agent exploits a controlled-not (CNot) gate to encrypt the travelling particle by using the particle in the GHZ state as the control qubit. The boss Alice decrypts the travelling particle with a CNot gate after performing a $\sigma_x$ operation on her particle in the GHZ state or not. After the GHZ states (the quantum key) are used up, the parties check whether there is a vicious eavesdropper, say Eve, monitoring the quantum line, by picking out some samples from the GHZ states shared and measure them with two measuring bases. After confirming the security of the quantum key, they use the GHZ states remained repeatedly for next round of quantum communication. This scheme has the advantage of high intrinsic efficiency for qubits and the total efficiency.
Deterministic secure quantum communication without maximally entangled states
Xi-Han Li,Fu-Guo Deng,Chun-Yan Li,Yu-Jie Liang,Ping Zhou,Hong-Yu Zhou
Physics , 2006,
Abstract: Two deterministic secure quantum communication schemes are proposed, one based on pure entangled states and the other on $d$-dimensional single-photon states. In these two schemes, only single-photon measurements are required for the two authorized users, which makes the schemes more convenient than others in practical applications. Although each qubit can be read out after a transmission of additional classical bit, it is unnecessary for the users to transmit qubits double the distance between the sender and the receiver, which will increase their bit rate and their security. The parties use decoy photons to check eavesdropping efficiently. The obvious advantage in the first scheme is that the pure entangled source is feasible with present techniques.
Advance in Microbiological Limit and Detection Technique of Plant Extracts
植物提取物微生物限量标准及检测技术进展

MU Fan-Song,LUO Meng,ZU Yuan-Gang,FU Yu-Jie,
牟璠松
,罗 猛,祖元刚,付玉杰

微生物学通报 , 2008,
Abstract: Microbiological test of the plant extracts is an important measure to guarantee the safety of the plant extracts products. It is important to establish strict criterion system of the plant extracts quality control, especially for functional food, food additive and daily use chemicals from the plants. We elaborate on great significance of microbiological test of the plants extracts to the quality and safety of the plant extracts products, which is critical problem for the integrated development of the plant extracts industry. In this paper we introduced the current research and development trends on microbiological detection techniques, and also give some advice on how to establish a new standard system of microbiological test of the plant extracts industry, so that our plant extracts industry has competitive advantages on the international markets.
Advance in Microbiological Limit and Detection Technique of Plant Extracts
植物提取物微生物限量标准及检测技术进展

MU Fan-Song,LUO Meng,ZU Yuan-Gang,FU Yu-Jie,
牟璠松
,罗 猛,祖元刚,付玉杰

微生物学报 , 2008,
Abstract: Microbiological test of the plant extracts is an important measure to guarantee the safety of the plant extracts products. It is important to establish strict criterion system of the plant extracts quality control, especially for functional food, food additive and daily use chemicals from the plants. We elaborate on great significance of microbiological test of the plants extracts to the quality and safety of the plant extracts products, which is critical problem for the integrated development of the plant extracts industry. In this paper we introduced the current research and development trends on microbiological detection techniques, and also give some advice on how to establish a new standard system of microbiological test of the plant extracts industry, so that our plant extracts industry has competitive advantages on the international markets.
Page 1 /88552
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.