oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2020 ( 5 )

2019 ( 308 )

2018 ( 1799 )

2017 ( 1715 )

Custom range...

Search Results: 1 - 10 of 104718 matches for " Yuanyuan Zhang "
All listed articles are free for downloading (OA Articles)
Page 1 /104718
Display every page Item
Identification of Atrial Fibrillation Using Complex Network Similarity  [PDF]
Yajuan Zhang, Yuanyuan Wang
Engineering (ENG) , 2013, DOI: 10.4236/eng.2013.510B005
Abstract:

We investigate the use of complex network similarity for the identification of atrial fibrillation. The similarity of the network is estimated via the joint recurrence plot and Hamming distance. Firstly, we transform multi-electrodes epicardium signals recorded from dogs into the recurrence complex network. Then, we extract features representing its similarity. Finally, epicardium signals are classified utilizing the classification and regression tree with extracted features. The method is validated using 1000 samples including 500 atrial fibrillation cases and 500 normal sinus ones. The sensitivity, specificity and accuracy of the identification are 98.2%, 98.8% and 98.5% respectively. This experiment indicates that our approach may lay a foundation for the prediction of the onset of atrial fibrillation.

OFDI Reverse Technology Spillovers of Western China  [PDF]
Xianping Yuan, Yuanyuan Zhang
Open Journal of Social Sciences (JSS) , 2018, DOI: 10.4236/jss.2018.62006
Abstract:
As an important technology spillover path, FDI plays an increasingly important role in promoting domestic technological progress and optimizing industrial structure. This paper selects the data of GDP, R&D investment and fixed assets investment and employment in China from 2004 to 2011, and adopts a simple and classical linear-model to investigate the relationship between to increase the risk. From the regression results (t-statistics and p-value), there is the effect of reverse technology spillovers in Western China. And China in western region has the problems that economy and science and technology are underdeveloped, so the western region through the increase of foreign direct investment to promote technological upgrading is very necessary. At the same time, we believe that the government of the western region can improve and enhance the technical level, through foreign direct investment, so as to promote local economic development; at the same time, the western region enterprises through overseas investment, especially in technology intensive industry investment to improve the technical level, and mergers and acquisitions may be the effective way to obtain such a spillover effect.
A New Perspective on Innovation Driving Global Value Chains Upgrading of High-Tech Industries: Evidence from China  [PDF]
Yuanyuan Shan, Wei Zhang
American Journal of Industrial and Business Management (AJIBM) , 2019, DOI: 10.4236/ajibm.2019.94056
Abstract:
High-tech industries and their upgrading along global value chains are the important parts of China’s future industry development. The process of innovation promoting global value chains upgrading of high-tech industries is affected by four factors, namely, the innovation input, the innovation carrier, the innovation culture and the innovation market. If analyzed by the chemical reaction equation, the innovation input is considered as the reactant, the output is the resultant, the innovation carrier is the catalyst, the innovation culture is the equivalent to the reaction conditions, and the innovation market has the selection to the resultant. The final chosen innovation achievement can bring high-tech industries with product upgrading, process upgrading, function upgrading and value chain upgrading. Through the empirical test, it finds that the innovation input, the innovation market and the innovation culture have obvious effects on global value chains upgrading of high-tech industries, but the innovation carrier not.
How the Principle of Risk Management Can Be Applied to Different Types of Projects?
Yuanyuan Zhang
International Journal of Business and Management , 2009, DOI: 10.5539/ijbm.v4n1p9
Abstract: Project risk management is a process which combines the analysis and management of the risks with a project and the principles of risk management include two key points which are risk analysis and risk control and arrangement. The case studies clarify the principles of project risk management can be used in different types of projects, and also when doing risk management it should be followed by right steps, choosing the right analysis methods, quantifying the risks precisely and formulating appropriate plan for risks control.
Non-English Major College Students’ English Communicative Competence and Communicative Strategic Development
Yuanyuan ZHANG
Canadian Social Science , 2011, DOI: 10.3968/j.css.1923669720110704.050
Abstract: Many university students in China remain less competent in addressing all kinds of communication breakdowns. This paper helps to provide Chinese teachers with approaches to the development of students’ communication strategies in classroom teaching. Key words: Communicative competence; Communicative strategies; Teaching model Résumé: De nombreux étudiants en Chine restent moins compétents dans la lutte contre toutes sortes de pannes de communication. Ce document contribue à fournir aux enseignants chinois avec des approches à l'élaboration de stratégies de communication des élèves dans l'enseignement en classe. Mots clé: La compétence de communication; Les stratégies de communication; Le modèle d'enseignement
Compensation of Finite Bandwidth Effect by Using an Optimal Filter in Photoacoustic Imaging  [PDF]
Chen Zhang, Yan Zhang, Yuanyuan Wang
Engineering (ENG) , 2013, DOI: 10.4236/eng.2013.510B006
Abstract:

Most existing reconstruction algorithms for photoacoustic imaging (PAI) assume that transducers used to receive ultrasound signals have infinite bandwidth. When transducers with finite bandwidth are used, this assumption may result in reduction of the imaging contrast and distortions of reconstructed images. In this paper, we propose a novel method to compensate the finite bandwidth effect in PAI by using an optimal filter in the Fourier domain. Simulation results demonstrate that the use of this method can improve the contrast of the reconstructed images with finite-bandwidth ultrasound transducers.


A Literature Review on the Studies of Internet Retailing Management  [PDF]
Tao Zhang, Guijun Zhuang, Yuanyuan Huang
Technology and Investment (TI) , 2010, DOI: 10.4236/ti.2010.11003
Abstract: This paper reviewed the studies of Internet retailing management. It found that, in general, most of the pa-pers on the topic took focus on Internet retailing strategy and online merchandise management. Specifically, it drawn following conclusions: First, there were six major incentives for firms to adopt Internet retailing, including improving internal communication, improving operational efficiency, facing competition, enhanc-ing customer services, reaching out to a wider audience, and improving relations with suppliers. Second, cost of Internet trading and consumer preference were negatively, while status of Internet retailing strategy, tech-nology capability, Internet communication preference, Internet marketplace, and market development op-portunity were positively, affect firms to adopt Internet retailing. Third, market positioning, business model, estimation of the market size, Internet-based innovative application, and strong brand of website were the key factors for the success of an online retailing website. Fourth, cross-channel conflict might be reduced by reconstructing the business process or adjusting the pricing strategy, while Internet retailing inventory might be improved by firms’ zero inventory policy, in-stock inventory policy, and dynamic inventory policy. Fi-nally, a firm’s quality of logistics and delivery could be increased by high-value-package strategy and emer-gency transshipments. Implications of these conclusions were suggested。
Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures
Yuanyuan Zhang,Marine Minier
Journal of Computer Networks and Communications , 2012, DOI: 10.1155/2012/184783
Abstract: Network coding has attracted the attention of many researchers in security and cryptography. In this paper, a well-known attack selective forwarding attack will be studied in network coding systems. While most of the works have been dedicated to the countermeasures against pollution attacks where an attacker modifies intermediate packets, only few works concern selective forwarding attacks on data or acknowledgment (ACK) packets; those last ones are required in network coding. However, selective forwarding attacks stay a real threat in resource constraint networks such as wireless sensor networks, especially when selective forwarding attacks target the acknowledgment (ACK) messages, referred to as flooding attack. In the latter model, an adversary can easily create congestion in the network and exhaust all the resources available. The degradation of the QoS (delay, energy) goes beyond the capabilities of cryptographic solutions. In this paper, we first simulate and analyze the effects of selective forwarding attacks on both data flows and ACK flows. We then investigate the security capabilities of multipath acknowledgment in more details than in our original proposal (Zhang et al., 2011). 1. Introduction Network coding is a very active field of both information theory and networking for information dissemination. It consists in encoding a message into several packets and transmitting those packets in an oriented multicast way through the network to the destination. The intermediate nodes can also combine the received packets. It has been shown that network coding could reach the maximum possible information flow in a network. Network coding is also very interesting for security. Many works have been interested in demonstrating the security capacity of network coding. Two security worlds coexist, and the border is delimited by the adversary capabilities. Network coding can be used to bring secrecy if the adversary eavesdropping capabilities are bounded (see [1–3]). Otherwise, cryptography and security must be used to defeat more powerful adversaries [4–6]. This paper falls in the second class of works related to network coding and security. In network coding, two information flows are identified: the data flow and the acknowledgment (ACK) flow. Both flows can be targeted by an adversary with different consequences. An adversary attacking the data flow wants to affect the messages produced by different sources and decoded by the destinations. An example of such an attack is pollution attacks [6]. Many works have proposed countermeasures against pollution
Study of alternate cooling and heating treatment induced tumor microvasculature injury
YuanYuan Shen,AiLi Zhang
Chinese Science Bulletin , 2010, DOI: 10.1007/s11434-009-0508-5
Abstract: Tumor microvasculature is important to tumor growth, metastasis and thus tumor treatment outcome. The alternate cooling and heating treatment has been confirmed to have advantages over single treatment of cooling or heating. The degree of tumor microvasculature damage induced by the alternate cooling and heating treatment and the mechanisms underlying are studied in this paper. The response of the tumor microvasculature to different treatments including alternate cooling and heating is observed in vivo through confocal microscopy using the nude mice dorsal skin fold tumor chamber model. Results show that alternate cooling and heating has induced much more severe damage to the microvessel structure throughout the entire tumor. Numerical simulations of the mechanical stresses on the tumor vessel wall has found that during the alternate treatment, the vessel wall suffer a rapid chang in thermal stresses in the opposite directions successively, which might caused damage to the peripheral microvasculature and micro-cracks in the central vessels. Reperfusion of blood flow after freezing also led to relatively large stresses on the vessel wall, especially when blood flow re-perfuses quickly during the subsequent heating. The quick increase of stresses on the blood vessel might be one of the key issues causing the blood vessel rupture referring to the experimental observation. The preliminary study has partly revealed the mechanism underlying serious tumor microvasculature damage caused by the alternate cooling and heating treatment.
The Use of Authentic Materials in Teaching EFL Listening
Ji Lingzhu,Zhang Yuanyuan
Humanising Language Teaching , 2010, DOI: 17559715
Abstract:
Page 1 /104718
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.