Institution
Xuzhou Institute of Technology
Education•Xuzhou, China•
About: Xuzhou Institute of Technology is a education organization based out in Xuzhou, China. It is known for research contribution in the topics: Catalysis & Computer science. The organization has 1696 authors who have published 1521 publications receiving 13541 citations.
Topics: Catalysis, Computer science, Adsorption, Microstructure, Coal mining
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this paper, the authors investigated the adsorption effect of extracellular polymeric substances (EPS) from AnAOB on different substrates by using a mathematical model and determined the possible role of EPS in bacterial growth.
Abstract: Anaerobic ammonium oxidation (Anammox) bacteria (AnAOB) are beneficial for the treatment of NH4+-N and NO2−-N simultaneously in sewage waste. These bacteria form particles by secreting or capturing substances such as extracellular polymeric substances (EPS), which adsorb harmful ions with the help of charge adsorption and complexation to protect the growth of AnAOB. However, the substrate also has an electric charge, and the effect of EPS on the adsorption and mass transfer of NH4+-N and NO2−-N remains to be elucidated. In this study, we investigated the adsorption effect of EPS from AnAOB on different substrates by using a mathematical model and determined the possible role of EPS in bacterial growth. EPS proteins, which were extracted using the ultrasound method and detected by proteomics, were consistent with the proteins involved in the anammox reaction in cells. The detection models to calculate the adsorption capacity were established in accordance with the dialysis principle. Both the Freundlich model and Langmuir model were used to explain the adsorption of NH4+-N and NO2−-N by EPS proteins. Compared with the adsorption of NH4+-N by EPS, that of NO2−-N by EPS was well-fitted in the Langmuir model, with relatively high maximum adsorption concentrations.
4 citations
••
4 citations
•
TL;DR: In this article, the degradation laws of shearing performance for reinforced concrete beams were studied by experiment, and the mechanism was studied, too, based on the above, the predicting models of the shearing capacity varying with the corrosion rate of longitudinal reinforcements and stirrups were set up.
Abstract: The degradation laws of shearing performance for reinforced concrete beams were studied by experiment,and the mechanism was studied,too.Based on the above,the predicting models of shearing capacity varying with the corrosion rate of longitudinal reinforcements and stirrups were set up.
4 citations
•
TL;DR: In this article, the existence of positive solution to a fractional differential equation was discussed by using fixed point theory on a cone and some new sufficient conditions for existence of two positive solutions were discussed.
Abstract: The existence of positive solution to a fractional differential equation was discussed by using fixed point theory on a cone.Some new sufficient conditions for existence of two positive solutions to the equation discussed.
4 citations
••
01 Oct 2019TL;DR: An image encryption algorithm based on the combination of low-dimensional chaos and highdimensional chaos that has great encryption effect, large key space and strong key sensitivity and can effectively resist various attacks is proposed.
Abstract: This paper proposes an image encryption algorithm based on the combination of low-dimensional chaos and highdimensional chaos. Some key parameters are given by the encryption operator and the rest are obtained from the original image. These two parts constitute the complete key system of the encryption algorithm. The chaotic sequences generated by Logistic map and improved Logistic map are used to scramble the positions of the original image pixels. Two chaotic sequences generated by Lorenz system are used to diffuse the scrambled image. Simulation experiment shows that this algorithm has great encryption effect, large key space and strong key sensitivity and can effectively resist various attacks. Thus, it has high security and practicability
4 citations
Authors
Showing all 1711 results
Name | H-index | Papers | Citations |
---|---|---|---|
Peng Wang | 108 | 1672 | 54529 |
Qiong Wu | 51 | 316 | 12933 |
Wenping Cao | 34 | 176 | 4093 |
Bin Hu | 30 | 213 | 3121 |
Syed Abdul Rehman Khan | 29 | 131 | 2733 |
Jingui Duan | 29 | 93 | 3807 |
Vivian C.H. Wu | 25 | 105 | 2566 |
Lei Chen | 16 | 99 | 1062 |
Chao Wang | 16 | 74 | 741 |
Wenbin Gong | 16 | 27 | 953 |
Jing Li | 16 | 40 | 1025 |
Chao Liu | 15 | 43 | 737 |
Qinglin Wang | 14 | 72 | 595 |
Yaocheng Zhang | 14 | 54 | 566 |
Chao Wang | 13 | 25 | 774 |