SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Zhao Ming) ;conttype:(scientificother)"

Search: WFRF:(Zhao Ming) > Other academic/artistic

  • Result 1-10 of 22
Sort/group result
   
EnumerationReferenceCoverFind
1.
  •  
2.
  • Adnane, Bouchaib, et al. (author)
  • Origin of photoresponse at 8-14 μm in stacks of self-assembled SiGe/Si quantum dots
  • 2009
  • In: Physical Review B. Condensed Matter and Materials Physics. - 1098-0121 .- 1550-235X.
  • Journal article (other academic/artistic)abstract
    • A normal incidence photodetector operating at 8-14 μm is demonstrated using p-type δ-doped SiGe dot multilayer structures grown by molecular beam epitaxy on Si(001) substrates. Based on the experimental results of photoluminescence and photoluminescence excitation spectroscopies together with numerical analysis, the origin of the measured photocurrent was attributed to intersubband optical transitions between the heavy hole and light hole states of the valence band of the self-assembled SiGe dots and subsequent lateral transport of photo-excited carriers in the conduction channels formed by Ge wetting layers.
  •  
3.
  • Brunk, Ulf, et al. (author)
  • Septic shock and the lysosomal-mitochondrial axis theory of apoptosis
  • 2009
  • In: Molecular Mechanism of Severe Shock. - Kerala, India : Research Signpost. - 9788130803388 ; , s. 91-106
  • Book chapter (other academic/artistic)abstract
    • Over 250 years ago, Le Dran, a distinguished French Surgeon, first used the word “shock” in his treatise. Since then, much progress has been made in shock research. However, many questions have still confused the medical doctors until now. For example, why the reduced blood pressure can’t return to normal after anti-shock treatment in severe shock, why the high mortality of septic shock can’t be reduced though many new therapies are reported, what is the reason for the development of systemic inflammatory response syndrome and multiple organ dysfunction syndrome following a prolonged severe shock, and what event triggers the connection among shock, systemic inflammation, and multi-organ dysfunction, etc. In order to resolve these questions, research on the pathogenesis of shock has been made at molecular level in recent years. Current advances of shock molecular mechanism are presented in this book, which is divided into 10 chapters, including new theory about auto-digestion in shock and organ failure, septic shock and the lysosomal-mitochondrial axis theory in apoptosis, molecular mechanism of endotoxin action, HMGB-1 and sepsis after burns, role of MAPK in inflammation and septic shock, ion channels and low vasoreactivity in severe shock, vascular permeability in shock, lymphatic microcirculation and shock, calcium signaling in cardiac dysfunction of burns, the effect and mechanism of a new anti-shock medicine Polydatin. We hope that these chapters will help the readers to develop strategies and tactics that will promote shock research. We want to thank all the authors for their excellent cooperation and manuscript preparation. We also give special thanks to Dr. Pandalai for inviting us to edit and publish this review book in Research Signpost 
  •  
4.
  • Garber, Nicholas J, et al. (author)
  • Distribution and characteristics of crashes at different locations within work zones in Virginia
  • 2001
  • In: Proceedings of the Conference Road Safety on Three Continents in Pretoria, South Africa, 20-22 September 2000. - Linköping : Statens väg- och transportforskningsinstitut. ; , s. 473-498
  • Conference paper (other academic/artistic)abstract
    • Work zones tend to cause hazardous conditions for vehicle drivers and construction workers since these work zones generate conflicts between construction activities and the traffic, and therefore aggravate the existing traffic conditions. This study investigated the characteristics of work zone crashes in Virginia that occurred between 1996 and 1999. The information on each crash was obtained from the police crash records. Each crash was located in one of five areas of the work zone: 1) advance warning area; 2) transition area; 3) longitudinal buffer area; 4) activity area; and 5) termination area. An analysis of the percentage distributions was then carried out, with respect to the locations of the crashes, the severity, collision types and different types of highways. The proportionality test was used to determine significant differences at the 5% significance level. The results indicate that the Activity Area (Area 4) is the predominant location for work zone crashes regardless of the highway type, and that rear-end crashes are the predominant type of crashes. However, the results also indicated that the proportion of the sideswipe in same direction (SS) crashes in the Transition Area (area 2) is significantly higher than that in the Advance Warning Area (Area 1).
  •  
5.
  •  
6.
  • Hu, W, et al. (author)
  • Iterative Strategy Analyze During Agile Development
  • 2012
  • In: Weidianzixue yu jisuanji [Microelectronics & Computer]. - 1000-7180. ; 29:5, s. 165-169
  • Journal article (other academic/artistic)abstract
    • In this paper, We used characteristic of the Unified Modeling Language (UML) use case model in describing the function of the system' s and the iteration sequence of agile development process to obtain a new iteration sequence based on the risk an value of the various use cases in UML use case diagrams. An obvious advantage of doing so is to ensure high-risk and high-value use cases will be first developed, so that the use cases will be repeatedly tested in the next iteration, thereby increasing overall system reliability.
  •  
7.
  •  
8.
  • Hu, W, et al. (author)
  • VDM++ Formalization of UML Class Diagram
  • 2012
  • In: Weidianzixue yu jisuanji [Microelectronics & Computer]. - 1000-7180. ; 29:6, s. 104-107
  • Journal article (other academic/artistic)abstract
    • The purpose of this paper is to use the most widely used formal language-VDM + + that has characteristics of accuracy and consistent in describing syntax and semantic of the system model, combined with VDMTOOLS and Rational Rose tool to transform the various elements of the UML class model into representation of VI)M+ +. This method achieves the various elements contained UML class model about the syntax and semantics checking, and further improves the quality of UML modeling.
  •  
9.
  • Wang, X., et al. (author)
  • Reliability analysis and evaluation of gas supply system
  • 2009
  • In: ICMET'09 - Proceedings of the 2009 International Conference on Mechanical and Electrical Technology. - Beijing. - 9780791802946 ; , s. 245-249
  • Conference paper (other academic/artistic)abstract
    • In this paper, the reliability model and the evaluation methods were neatly used with combining the engineering practice of the noise laboratory supply system, and this study give a quantitative evaluation result of the reliability system. It provides the scientific basis for improving the engineering design and increasing the reliability. This research results can be extended to similar projects, such as fuel supply system. From an engineering point of view, it is an innovation that the filter in the system is identified to be a "series - parallel mixed" structure by considering its physical structure and performance requirement.
  •  
10.
  • Wang, Zhao (author)
  • Interference Alignment with Imperfect Channel Knowledge and Secrecy Constraints
  • 2015
  • Doctoral thesis (other academic/artistic)abstract
    • In this thesis, the degrees of freedom (DOF) of wireless networks are studied with imperfect channel state information at transmitters (CSIT) and/or secrecy constraints. Different interference alignment schemes are proposed to establish the DOF lower bound for a variety of wireless networks.For the imperfections of CSIT, we mainly have two practical concerns. The first concern is the long delay of the high-resolution feedback from receivers to transmitters such that the obtained CSIT is totally outdated. The second concern is the inaccurate estimation on the instantaneous CSIT. Specifically, the first scenario is solely investigated in a delayed CSIT model, and a combination of these two types of imperfections is studied in a mixed CSIT model. The DOF of wireless networks are studied based on these two CSIT models. Regarding secrecy constraints, we also consider two scenarios, to be specific, the weak secrecy where the confidentiality is measured by the normalized information leakage with respect to the codeword length, and the strong secrecy where the total information leakage of the whole codeword is used as the secrecy measure.In the first part of the thesis, the impact of imperfect CSIT is investigated for the multi-hop broadcast networks. The Maddah-Ali \& Tse (MAT) alignment is extended to the considered multi-hop network to make use of the delayed CSIT, and it is also shown that the MAT scheme can be integrated with linear beamforming to achieve the optimal sum DOF of a two-user multi-hop broadcast network with mixed CSIT.In the second part of the thesis, the secrecy constraints are subjected to the studied networks. With weak secrecy constraints, we propose artificial noise alignment approaches for seeking the optimal secure degrees of freedom (SDOF) of wireless $X$ networks, the multiple-input single-output (MISO) broadcast channel and the two-hop interference channel. It is worth noting that the proposed alignment schemes are also based on divergent CSIT conditions, i.e., delayed, mixed or even no CSIT. With strong secrecy constraints, the secure coding based on channel resolvability and the signaling method by interference alignment are combined to provide the optimal SDOF of the $K$-user interference channel with confidential messages. It is worth noting that a general framework of the secure interference alignment encoder is provided in the thesis, which consists of two functional sections: the stochastic encoding section to provide secure codes and the alignment section to provide signaling solutions. This framework can be applied to all the network models studied in the latter part of the thesis.   
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-10 of 22

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view