- X-ray Diffraction in Crystallography
- Crystallization and Solubility Studies
- Semantic Web and Ontologies
- Data Management and Algorithms
- Metal-Organic Frameworks: Synthesis and Applications
- Magnetism in coordination complexes
- Service-Oriented Architecture and Web Services
- Metal complexes synthesis and properties
- Graph Theory and Algorithms
- Crystal structures of chemical compounds
- Energy Efficient Wireless Sensor Networks
- Software System Performance and Reliability
- Opportunistic and Delay-Tolerant Networks
- Crystallography and molecular interactions
- Mobile Ad Hoc Networks
- Advanced Database Systems and Queries
- Aluminum Alloys Composites Properties
- Data Quality and Management
- Security in Wireless Sensor Networks
- Advanced Graph Neural Networks
- Cognitive Computing and Networks
- Network Security and Intrusion Detection
- Advanced Photocatalysis Techniques
- Extraction and Separation Processes
- Additive Manufacturing and 3D Printing Technologies
Zhengzhou University of Science and Technology
2024
Ningxia University
2007-2024
Luoyang Normal University
2010-2023
Chengdu University of Technology
2021-2023
State Ethnic Affairs Commission
2023
Northeastern University
2017-2022
China State Shipbuilding (China)
2022
China Shipbuilding Industry Corporation (China)
2021
Chengdu University
2021
Luoyang Institute of Science and Technology
2012-2020
A practical strategy for the value-added utilization of agricultural waste was provide. The buckwheat husk derived N, S, O-co-doped porous carbon used as bifunctional electrode materials symmetric supercapacitor and capacitive deionization.
Programmed death receptor-1 (PD-1) and T cell immunoglobulin mucin domain-containing protein-3 (Tim-3) play important roles in tumor immune evasion. PD-1 blockade could produce an effective antitumor effect many solid tumors except prostate cancer (PCa) because of rare programmed ligand-1 (PD-L1) expression on PCa cells. Streptavidin (SA)-GM-CSF surface-anchored (Anchored GM-CSF) vaccines increase the number tumor-infiltrating lymphocytes (TILs) induce specific responses. The Anchored-GM-CSF...
One of the highly attractive research directions in electrochemiluminescence (ECL) field is how to regulate and improve ECL efficiency. Quantum dots (QDs) are promising materials due their adjustable luminescence size strong luminous MoS2 NSs@QDs, an emitter, synthesized via hydrothermal methods, its mechanism investigated using cyclic voltammetry ECL-potential curves. Then, a stable vertical attachment triplex DNA (tsDNA) probe nanosheets (NSs) applied electrode. Next, innovative sensor...
Location-Based Service (LBS) is becoming a ubiquitous technology for mobile devices. In this work, we propose signal-fusion architecture called XINS to perform effective indoor positioning and navigation. uses signals from inertial navigation units as well WiFi floor-map constraints detect turns, estimate travel distances, predict locations. employs non-intrusive calibration procedures significantly reduce errors, fuses synergistically improve computational efficiency, enhance...
Clustering methods have shown their promising effects in the conservation of energy Wireless Sensor Networks (WSNs). In this paper, we present a Ring-structured Energy-efficient Architecture (RECA) for WSNs to prolong network lifetime. RECA uses deterministic cluster-head management algorithm evenly distribute work load among nodes within cluster. Nodes cluster make local decisions on fair-share length duty cycle according remaining supply and those rest same This guarantees that all deplete...
A novel class of imprinted quantum dots as fluorescent nanosensors were prepared based on boronate affinity-based template-immobilization surface imprinting for detection isoquercitrin (Isq).
Form mining waste to energy storage device, a new strategy for high-added value reutilization of VTMT is presented.
Designing noble metal-free anode catalysts for visible light-assisted direct methanol fuel cells still remains a significant challenge. In this study, combining the photocatalytic and electrocatalytic properties of CoSx, oxidation strategy was provided. Doping engineering employed to adjust electronic structure CoSx improve their photoassisted activity. Using ZIF-67 as precursor, transition metal-doped (M-CoSx, M = Zn, Cu, Ni, Cd) nanocage synthesized by cation exchange L-cysteine-controlled...
Chlorogenic acid (CGA), a <italic>cis</italic>-diol-containing compound, can exhibit anti-inflammatory, antiviral, antimicrobial and anti-oxidation properties.
Random key Pre-distribution scheme has been proposed to overcome the memory, computation and energy limits of individual sensor in wireless networks. In this scheme, a ring keys is randomly drawn from large pool assigned sensor. Nodes sharing common can communicate securely, path-key needs be established for those nodes who do not share any keys. However, there no hard security guarantee path set up existing protocols. paper, we propose two new methods discover multiple secure proxies...
In order to enhance the service performance, preservation and increase of system dependability are researched a self-tuning method is proposed based on autonomic computing. The attempts achieve sustained growth by on-line evaluation, dynamic prediction tuning scheme. There four methods random interval, settled threshold value event trigger, which discussed in simulation experimentation. effects that affect increment analyzed, optimal opportunities for each given. result experiment shows will...
Secure communication is a necessity for some wireless sensor network (WSN) applications. However, the resource constraints of render existing cryptographic systems traditional impractical WSN. Random key predistribution scheme has been proposed to overcome these limits. In this scheme, ring keys randomly drawn from large pool and assigned sensor. Nodes sharing common can communicate securely using shared key, while path-key established those nodes that do not share any keys. This requires...
Vagueness (or imprecision) naturally arises in real-world Resource Description Framework (RDF) data. The way we query RDF data is a crucial subject because of the vagueness and wide connectivity such Fuzzy quantified queries have been studied over several types allow to sum up large volumes very intuitive manner. However, there are few works that led on graph database. In this study, dealt with specific type fuzzy context (fuzzy) We first show how these can be expressed interpreted pattern,...
Two lanthanide complexes, [Ln(HCAM)2(OH-Py)·3H2O]· 2H2O (HCAM = 4-hydroxypyridine-2, 6-dicarboxylate, OH-Py 4-hydroxypyridine; Ln Ce(1), Tb(2), have been synthesized and characterized by elemental analysis, IR spectroscopy, X-ray single-crystal diffraction. diffraction reveals that the two complexes are isostructural, crystallizing in monoclinic system, space group of P2(1)/c, each forms monomeric structure. The exhibits one dimensional (1-D) zigzag chain array, these 1-D chains further...
It is difficult to detect the intention of an intruder, identify semantics attacks and predict further effectively using intrusion detection methods in construction high-level attack scene disposal sophisticated attack. An identification method based on dynamic Bayesian network proposed for indeterminate problems that occur during attacks. This applies directed acyclic graphs give real-time formulation incidence among behaviors, intentions also probabilistic reasoning by intruder. The result...
In this study, a unified constitutive model has been developed for both yield strength and work hardening behaviour prediction of aluminium alloys with different types precipitates during after artificial ageing. The type dimensions general precipitate shapes (sphere, plate, rod) have classified modelled by primary dimension aspect ratio, which set equations utilised to the evolutions ageing various alloys. addition, effects main microstructures on not only but also work-hardening...
Aiming at shortage of the SPIHT algorithm, an improved image compression algorithm is proposed, in order to overcome shortcomings decoding quality and coding time, LS9/7 lifting wavelet transform adopted. According characteristics human visual system (HVS), scanning mode method determine threshold are changed improve reconstruction image. On question repeating scan using maximum list thought, greatly reduce computation save operating time. The experimental results have proved that time...