Guangxi Vocational and Technical Institute of Industry

Nanning, China

Guangxi Vocational and Technical Institute of Industry

Nanning, China
Time filter
Source Type

Zheng D.,Beijing University of Chemical Technology | Meng X.,Beijing University of Chemical Technology | Meng X.,Guangxi Vocational and Technical Institute of Industry
Energy Conversion and Management | Year: 2012

The absorption-compression hybrid refrigeration cycle has been considered as an effective approach to reduce the mechanical work consumption by using low-grade heat, such as solar energy. This work aims at studying the thermodynamic mechanism of the hybrid refrigeration cycle. Two fundamental concepts have been proposed, which are the ultimate refrigerating temperature (or the ultimate temperature lift) and the behavior turning. On the basis of that, the interaction mechanism of compressor pressure increasing with other key-parameters and the impact of compressor pressure increasing on the cycle performance have been investigated. The key-parameters include the concentration difference, the circulation ratio of working fluid, etc. The work points out that the hybrid refrigeration cycle performance varies with the change of compressor outlet pressure and depends on which one achieves dominance in the hybrid refrigeration cycle, the absorption sub-system or the compression sub-system. The behavior turning point during parameters changing corresponds to a maximum value of the heat powered coefficient of performance. In this case, the hybrid refrigeration cycle performance is optimal because the low-grade heat utilization is the most effective. In addition, to validate the theoretical analysis, a solar hybrid refrigeration cycle with R134a-DMF as working pair was simulated. The Peng-Robinson equation of state was adopted to calculate thermophysical properties when the reliability assessment of the prediction models on the available literature data of R134a-DMF system had been carried out. The results are in good agreement with the theoretical analysis. © 2011 Elsevier Ltd. All rights reserved.

Luo S.,Guangxi Vocational and Technical Institute of Industry | Liu Y.,Guangxi Normal University
International Journal of Electrochemical Science | Year: 2012

Poly(acid chrome blue K) modified glassy carbon electrode (GCE) was electropolymerized by cyclic voltammetric sweep in the potential range from -0.2 to 0.9 V. The characteristic of Poly(acid chrome blue K) film was studied by different methods such as electrochemical impedance spectroscopy (EIS) and cyclic voltammetry. This modified electrode showed excellent electrocatalytic response to vanillin with the increase of the electrochemical responses. Under the optimal conditions a good linear voltammetric response could be obtained over the range of 1.0×10-7~7.0×10-5 mol dm-3 and the detection limit was got as 3.2×10-8 mol dm-3 (3s). The proposed method was successfully applied to biscuits and dark-chocolate samples with satisfactory results. © 2012 by ESG.

Chen X.,Guangxi Vocational and Technical Institute of Industry
Communications in Computer and Information Science | Year: 2012

In this paper, a routing algorithm for Wireless Body Area Sensor Networks presented that increased the reliability and decrease delay of routing from source to destination. Results show that 98% of reliability can reached by proposed algorithm. Proposed algorithm is Genetic Algorithm based. Naturally, one can combine this Genetic Algorithm with the TABU algorithm of ants then analysis results] we consider this as the future work. © 2012 Springer-Verlag Berlin Heidelberg.

Wan J.M.,Guangxi Vocational and Technical Institute of Industry
Advanced Materials Research | Year: 2014

This paper analyzes the network accounting background generated; then discusses the concept of network accounting, objectives and characteristics of its location; paper focuses on the traditional network of accounting and reflect the impact of accounting, including accounting assumptions, accounting principles, accounting reports and accounting functions of the impact study, pointed out in the Internet environment, the traditional concept of accounting change should be and try to put forward their point of view: Again, study the network accounting system, including technology-based accounting network, system, operational and enterprise applications. Finally, the network security issues were studied accounting and briefly presents the relevant strategy. © (2014) Trans Tech Publications, Switzerland.

Huang Y.,Guangxi Vocational and Technical Institute of Industry
Lecture Notes in Electrical Engineering | Year: 2014

The wireless network is to transmit data through radio waves in the air, as long as the coverage can transmit and receive data. Therefore, wireless network security for access control and privacy questions remain. Mainly in introducing the wireless network has wired equivalent privacy, search, wireless authentication spoofing attacks, information disclosure attacks, the network took over and tampering, security threats, such as denial of service attacks as well as the user's device, based on wireless network,which should adopt seven safety technologies and eight security measures. © Springer-Verlag Berlin Heidelberg 2014.

Mo X.J.,Guangxi Vocational and Technical Institute of Industry
Applied Mechanics and Materials | Year: 2014

with the rapid development and wide application of networking technology, information security increasingly prominent problems are evident, more and more attention. The article introduced the current situation of network information security, explored the meaning of network information security, major threat analysis network information security, and finally gives the implementation technology of network information security and preventive measures, to ensure the information security of computer networks, so as to give full play to role of computer networks. © (2014) Trans Tech Publications, Switzerland.

Yang X.,Guangxi Vocational and Technical Institute of Industry
Applied Mechanics and Materials | Year: 2014

Securing information system in current information era is very important task. This paper presents a novel security model in order to secure sensitive information systems. This model combines protection, detection, recovery and control mechanisms to secure information system in their development lifecycle, which is more effective than the traditional ones. © (2014) Trans Tech Publications, Switzerland.

Ma W.H.,Guangxi Vocational and Technical Institute of Industry
Advanced Materials Research | Year: 2014

Data stream in a popular research topic in big data era. There are many research results on data stream clustering domain. This paper firstly has a brief introduction to data stream methodologies, such as sampling, sliding windows, etc. Finally, it presents a survey on data streams clustering techniques. © (2014) Trans Tech Publications, Switzerland.

Luo S.-H.,Guangxi Vocational and Technical Institute of Industry
Acta Crystallographica Section C: Crystal Structure Communications | Year: 2013

The asymmetric unit of the title compound, [Pb2(C 8H3IO4)2(CH4O)] n , contains two PbII atoms, two 5-iodoisophthalate (5-IIP2-) ligands and one coordinated methanol molecule. One Pb atom is eight-coordinated, surrounded by seven carboxylate O atoms from five 5-IIP2- ligands and one O atom from the terminal methanol ligand. The other Pb atom is seven-coordinated in a hemidirected geometry, surrounded by seven carboxylate O atoms from five 5-IIP2- ligands. Both Pb atoms are connected by carboxylate groups to form a one-dimensional infinite rod along the a axis; neighbouring rods are further linked by the aromatic rings of 5-IIP2- to generate the final three-dimensional structure with channels in the a direction. An O - H···O hydrogen bond between the methanol ligand and one of the carboxylate groups of a 5-IIP2- ligand stablizes the three-dimensional framework. Interestingly, a centrosymmetric rhombus-shaped I4 unit is formed by four 5-IIP2- ligands, with I···I distances of 3.8841 (8) and 3.9204 (8) Å. © 2013 International Union of Crystallography.

Zhang Q.J.,Guangxi Vocational and Technical Institute of Industry
Applied Mechanics and Materials | Year: 2013

By the relevant engineering and manufacturing of food rheological properties to estimate, and developing unified object based on 2D/3D dynamic finite element model, to carry out physical model simulation of five elements, then to further extended to deal with heterogeneous hierarchical objects. There are three kinds of food raw materials that are tested, its deformation and mechanical behavior are also assessed, and then according to the optimization FE, it is proposed to estimate the object's rheological properties. The results show that the FE model and the estimation method can accurately reproduce food rheological and deformation, and in the manufacturing process, the finite element model can be used to predict the rheological behavior of food products. © (2013) Trans Tech Publications, Switzerland.

Loading Guangxi Vocational and Technical Institute of Industry collaborators
Loading Guangxi Vocational and Technical Institute of Industry collaborators