oalib

OALib Journal期刊

ISSN: 2333-9721

费用:99美元

投稿

匹配条件: “Zhigang” ,找到相关结果约908条。
列表显示的所有文章,均可免费获取
第1页/共908条
每页显示
Weak Greedy Routing over Graph Embedding for Wireless Sensor Networks  [PDF]
Zhigang Li, Nong Xiao
Wireless Sensor Network (WSN) , 2010, DOI: 10.4236/wsn.2010.29082
Abstract: In this paper we classify the greedy routing in sensor networks into two categories, strong greedy routing and weak greedy routing. Most existing work mainly focuses on weak greedy routing over geographic location network or strong greedy routing over greedy embedding network. It is a difficult job and needs much cost to obtain geographic location or greedy embedding of the network. We propose a light-weight Tree-based graph embedding (TGE) for sensor networks. Over the TGE, we design a weak greedy routing protocol, TGR. TGR can archive good performance on path stretch factor and load balance factor.
Partial Feedback Based Orthogonal Space-Time Block Coding With Flexible Feedback Bits  [PDF]
Lei Wang, Zhigang Chen
Communications and Network (CN) , 2013, DOI: 10.4236/cn.2013.53B2024
Abstract: The conventional orthogonal space-time block code (OSTBC) with limited feedback has fixed p-1 feedback bits for the specific ntp transmit antennas. A new partial feedback based OSTBC which provides flexible feedback bits is proposed in this paper. The proposed scheme inherits the properties of having a simple decoder and the full diversity of OSTBC, moreover, preserves full data rate. Simulation results show that for ntp transmit antennas, the proposed scheme has the similar performance with the conventional one by using p-1 feedback bits, whereas has the better performance with more feedback bits.
Relation between Small Functions with Differential Polynomials Generated by Solutions of Linear Differential Equations
Zhigang Huang
Abstract and Applied Analysis , 2012, DOI: 10.1155/2012/451825
Abstract: This paper is devoted to studying the growth of solutions of second-order nonhomogeneous linear differential equation with meromorphic coefficients. We also discuss the relationship between small functions and differential polynomials ()=2′′
Some Oscillation Results of Higher-Order Linear Differential Equations with Meromorphic Coefficients
Zhigang Huang
Abstract and Applied Analysis , 2012, DOI: 10.1155/2012/417051
Abstract: We investigate the growth of solutions of higher-order nonhomogeneous linear differential equations with meromorphic coefficients. We also discuss the relationship between small functions and solutions of such equations.
A Local and Global Search Combine Particle Swarm Optimization Algorithm for Job-Shop Scheduling to Minimize Makespan
Zhigang Lian
Discrete Dynamics in Nature and Society , 2010, DOI: 10.1155/2010/838596
Abstract: The Job-shop scheduling problem (JSSP) is a branch of production scheduling, which is among the hardest combinatorial optimization problems. Many different approaches have been applied to optimize JSSP, but for some JSSP even with moderate size cannot be solved to guarantee optimality. The original particle swarm optimization algorithm (OPSOA), generally, is used to solve continuous problems, and rarely to optimize discrete problems such as JSSP. In OPSOA, through research I find that it has a tendency to get stuck in a near optimal solution especially for middle and large size problems. The local and global search combine particle swarm optimization algorithm (LGSCPSOA) is used to solve JSSP, where particle-updating mechanism benefits from the searching experience of one particle itself, the best of all particles in the swarm, and the best of particles in neighborhood population. The new coding method is used in LGSCPSOA to optimize JSSP, and it gets all sequences are feasible solutions. Three representative instances are made computational experiment, and simulation shows that the LGSCPSOA is efficacious for JSSP to minimize makespan. 1. Introduction The job-shop scheduling problem (JSSP) is very important in field of production management. The JSSP has been proved to be a difficult task for human planners and schedulers, particularly if optimal solutions are required. With traditional optimization approaches, finding optimal solution to large size combinatorial problems is not a practicable option, because of the vast amount of computer time needed to find such solutions. Predecessors have proposed many different approaches to optimize JSSP and have obtained some harvest, but by current algorithms, even moderately sized problems cannot be solved to guarantee optimality. One of the first attempts to optimize a simple JSSP through application of genetic algorithm can be seen in the research of Davis in 1985. Since then, a significant number of successful applications of GAs to JSSP have appeared in [1–4], and so forth. Gharbi and Haouari have used an approximate decomposition algorithm for scheduling on parallel machines [5]. Xia and Wu presented an effective hybrid optimization approach for multiobjective feasible JSSP in [6]. Many researches show that GAs that are used to solve JSSP are feasible, however, their performance is far from satisfactory. Particle swarm optimization (PSO) is an evolutionary computation technique developed by Eberhart and Kennedy in 1995 [7, 8], inspired by social behavior of bird flocking or fish schooling. Similar to
Innate immune recognition and regulation in liver injury: A brief report from a series of studies
ZhiGang Tian
Chinese Science Bulletin , 2009, DOI: 10.1007/s11434-009-0252-x
Abstract: The discovery of innate immune receptors and the emergence of liver immunology (high content of NK and NKT cells in liver) led to the second research summit in innate immunity since the finding of NK cells in the middle 1970s. Liver disease is one of the most dangerous threats to humans, and the progress in innate immunology and liver immunology made it possible to re-explain the cellular and molecular immune mechanisms of liver disease. In the past ten years, we have found that innate recognition of hepatic NK and NKT subsets were involved in murine liver injury. We established a novel NK cell-dependent acute murine hepatitis model by activating Toll-like receptor-3 (TLR-3) with an injection of poly I:C, which may mimic mild viral hepatitis (such as Chronic Hepatitis B). We observed that a network of innate immune cells including NK, NKT and Kupffer cells is involved in liver immune injury in our established NK cell-dependent murine model. We noted that TLR-3 on Kupffer cells activated by pretreatment with poly I:C might protect against bacterial toxin (LPS)-induced fulminant hepatitis by down-regulating TLR-4 function, while TLR-3 pre-activation of NK cells might reduce Con A-induced NKT cell-mediated fulminant hepatitis by blocking NKT cell recruitment to the liver. We also found that the oversensitivity to injury by immune stimulation in HBV (hepatitis B virus) transgenic mice (full HBV gene-tg or HBs-tg) correlated to the over-expression of Rea1, an NKG2D (natural killer cell group 2D) ligand of NK cells or CD1d, a ligand of TCR-V14 of NKT cells, on HBV+ hepatocytes, which leads to an innate immune response against hepatocytes and is critical in liver immune injury and regeneration.
1,4-Diphenylbutane-1,4-dione
Zhigang Wang
Acta Crystallographica Section E , 2008, DOI: 10.1107/s1600536808038798
Abstract: The asymmetric unit of the title compound, C16H14O2, contains one half-molecule, located on a twofold rotation axis. In the molecule, the two benzene rings form a dihedral angle of 72.28 (2)°.
Research on the Effectiveness Evaluation and Risk Optimization of Crime Prevention System Based on Fuzzy Theory and AHP Model
Zhigang Yang
Journal of Computers , 2011, DOI: 10.4304/jcp.6.2.232-239
Abstract: with the rapid development of industrialization, security situation becomes more and more serious in China. Many cities have established crime prevention systems in order to maintain social stability. With the number of crime prevention system increasing, we need to assess their effectiveness in a scientific and objective manner and establishes a risk optimization model on crime prevention system. In this paper, we first apply the Analytic Hierarchy Process and Fuzzy Comprehensive Evaluation methods in the model analysis. We not only solve the problem of interference on subject factors in traditional qualitative method for crime prevention system, but also improve the assessment objectively. In the next stage, we conduct the simulation experiment according to the specific examples of crime prevention system. The case study shows that the assessment results are consistent with the reality and this method can be reasonably used for the effectiveness evaluation of crime prevention system. Finally, combinatorial optimization technology is used to calculate the risk optimization model and a concrete example is given out to verify the model reasonably. We believe this work contributes to the theoretical framework guiding the design, development, and deployment of the crime prevention system.
THE ALL-SOURCE GREEN’S FUNCTION AND ITS APPLICATIONS TO TSUNAMI PROBLEMS
ZHIGANG XU
Science of Tsunami Hazards , 2007,
Abstract: The classical Green’s function provides the global linear response to impulse forcing at a particular source location. It is a type of one-source-all-receiver Green’s function. This paper presents a new type of Green’s function, referred to as the all-source-one-receiver, or for short the all-source Green’s function (ASGF), in which the solution at a point of interest (POI) can be written in terms of global forcing without requiring the solution at other locations. The ASGF is particularly applicable to tsunami problems. The response to forcing anywhere in the global ocean can be determined within a few seconds on an ordinary personal computer or on a web server. The ASGF also brings in two new types of tsunami charts, one for the arrival time and the second for the gain, without assuming the location of the epicenter or reversibility of the tsunami travel path. Thus it provides a useful tool for tsunami hazard preparedness and to rapidly calculate the real-time responses at selected POIs for a tsunami generated anywhere in the world’s oceans.
A History of Teaching Western Music History at the Central Conservatory of Music, Beijing, China
Yu Zhigang
Journal of Music History Pedagogy , 2012,
Abstract: The history of teaching Western Music history at the Central Conservatory of Music (CCOM) in Beijing, China is most easily reviewed by a survey of the music history textbooks used at the Conservatory. At its founding in 1950, the CCOM used a textbook created by a Soviet musicologist which focused on Marxist ideas of history, such as historical materialism. Since then, successive generations of Chinese musicologists have written their own textbooks and brought their own historical perspectives to writing Western music history. Chinese scholars have also availed themselves of the best musicological scholarship in translation. The paper concludes with a comparison between the two-semester undergraduate survey courses taught at the CCOM and the Jacobs School of Music at Indiana University.
第1页/共908条
每页显示


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.