scispace - formally typeset
Search or ask a question
Institution

Xuzhou Institute of Technology

EducationXuzhou, China
About: Xuzhou Institute of Technology is a education organization based out in Xuzhou, China. It is known for research contribution in the topics: Catalysis & Computer science. The organization has 1696 authors who have published 1521 publications receiving 13541 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, the authors investigated the adsorption effect of extracellular polymeric substances (EPS) from AnAOB on different substrates by using a mathematical model and determined the possible role of EPS in bacterial growth.
Abstract: Anaerobic ammonium oxidation (Anammox) bacteria (AnAOB) are beneficial for the treatment of NH4+-N and NO2−-N simultaneously in sewage waste. These bacteria form particles by secreting or capturing substances such as extracellular polymeric substances (EPS), which adsorb harmful ions with the help of charge adsorption and complexation to protect the growth of AnAOB. However, the substrate also has an electric charge, and the effect of EPS on the adsorption and mass transfer of NH4+-N and NO2−-N remains to be elucidated. In this study, we investigated the adsorption effect of EPS from AnAOB on different substrates by using a mathematical model and determined the possible role of EPS in bacterial growth. EPS proteins, which were extracted using the ultrasound method and detected by proteomics, were consistent with the proteins involved in the anammox reaction in cells. The detection models to calculate the adsorption capacity were established in accordance with the dialysis principle. Both the Freundlich model and Langmuir model were used to explain the adsorption of NH4+-N and NO2−-N by EPS proteins. Compared with the adsorption of NH4+-N by EPS, that of NO2−-N by EPS was well-fitted in the Langmuir model, with relatively high maximum adsorption concentrations.

4 citations

Journal Article
TL;DR: In this article, the degradation laws of shearing performance for reinforced concrete beams were studied by experiment, and the mechanism was studied, too, based on the above, the predicting models of the shearing capacity varying with the corrosion rate of longitudinal reinforcements and stirrups were set up.
Abstract: The degradation laws of shearing performance for reinforced concrete beams were studied by experiment,and the mechanism was studied,too.Based on the above,the predicting models of shearing capacity varying with the corrosion rate of longitudinal reinforcements and stirrups were set up.

4 citations

Journal Article
TL;DR: In this article, the existence of positive solution to a fractional differential equation was discussed by using fixed point theory on a cone and some new sufficient conditions for existence of two positive solutions were discussed.
Abstract: The existence of positive solution to a fractional differential equation was discussed by using fixed point theory on a cone.Some new sufficient conditions for existence of two positive solutions to the equation discussed.

4 citations

Proceedings ArticleDOI
01 Oct 2019
TL;DR: An image encryption algorithm based on the combination of low-dimensional chaos and highdimensional chaos that has great encryption effect, large key space and strong key sensitivity and can effectively resist various attacks is proposed.
Abstract: This paper proposes an image encryption algorithm based on the combination of low-dimensional chaos and highdimensional chaos. Some key parameters are given by the encryption operator and the rest are obtained from the original image. These two parts constitute the complete key system of the encryption algorithm. The chaotic sequences generated by Logistic map and improved Logistic map are used to scramble the positions of the original image pixels. Two chaotic sequences generated by Lorenz system are used to diffuse the scrambled image. Simulation experiment shows that this algorithm has great encryption effect, large key space and strong key sensitivity and can effectively resist various attacks. Thus, it has high security and practicability

4 citations


Authors

Showing all 1711 results

NameH-indexPapersCitations
Peng Wang108167254529
Qiong Wu5131612933
Wenping Cao341764093
Bin Hu302133121
Syed Abdul Rehman Khan291312733
Jingui Duan29933807
Vivian C.H. Wu251052566
Lei Chen16991062
Chao Wang1674741
Wenbin Gong1627953
Jing Li16401025
Chao Liu1543737
Qinglin Wang1472595
Yaocheng Zhang1454566
Chao Wang1325774
Network Information
Related Institutions (5)
Shandong University of Science and Technology
16.3K papers, 187.1K citations

81% related

Wuhan University of Science and Technology
11.8K papers, 125.9K citations

80% related

Nanjing Normal University
20.2K papers, 325K citations

79% related

Chongqing University
57.8K papers, 784.6K citations

78% related

Yangzhou University
22K papers, 321K citations

78% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20237
202228
2021328
2020181
2019121
201873