Huanggang, China
Huanggang, China

Huanggang Normal University is a full-time provincial public normal university in Hubei, China. It is under the Educational Administration of Hubei Province.HNU offers courses to undergraduate students as well as other training courses for continuing education. Wikipedia.


Time filter

Source Type

Xu Z.,Wuhan University of Technology | Xu Z.,Huanggang Normal University | Yu J.,Wuhan University of Technology | Xiao W.,Wuhan University
Chemistry - A European Journal | Year: 2013

Mesoporous ferrihydrite/SiO2 composites were synthesized according to a water-in-oil microemulsion method and characterized by X-ray diffraction, scanning electron microscopy, transmission electron microscopy, Fourier transform infrared spectroscopy, thermogravimetry, nitrogen-adsorption/ desorption, and by X-ray photoelectron spectroscopy. The as-prepared porous ferrihydrite/SiO2 composites showed an excellent adsorption performance for formaldehyde (HCHO) removal from indoor air at ambient temperature. It was found that the aging time during the synthesis had a sig Copyright © 2013 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.


Xu Z.,Wuhan University of Technology | Xu Z.,Huanggang Normal University | Yu J.,Wuhan University of Technology
Nanoscale | Year: 2011

Fe-modified TiO2 nanotube arrays (TiO2 NTs) were prepared by annealing amorphous TiO2 NTs whose surface was covered with Fe3+ by a dip-coating procedure, and characterized by scanning electron microscopy, X-ray diffraction, X-ray photoelectron spectroscopy and UV-visible reflectance spectroscopy. The photoelectrochemical properties were evaluated by the photocurrent response and photoelectrocatalytic (PEC) degradation of methylene orange (MO) and 4-chlorophenol in water under visible-light irradiation (λ > 420 nm). The results showed that a Fe-modified TiO2 NTs electrode exhibited a larger photocurrent response and higher PEC activity for the degradation of organic pollutants than a pure TiO2 NTs electrode. At a bias potential of 0.4 V, the photocurrent response of a 0.5 M Fe-modified TiO2 NTs electrode exceeded that of a pure TiO2 NTs electrode by a factor of about 10, and the PEC degradation rates of MO and 4-chlorophenol on a 0.5 M Fe-modified TiO2 NTs electrode exceeded those on a pure TiO2 NTs electrode by a factor of about 2.5. The larger photocurrent response and higher PEC activity of Fe-modified TiO2 NTs could be attributed to the enhancement of separation of charge-carriers at the external electric field and the extension of the light response range of TiO2 to the visible-light region with the narrowing of the band gap. © 2011 The Royal Society of Chemistry.


Wang J.,Zhejiang University of Technology | Jiang X.,Huanggang Normal University
Sensors and Actuators, B: Chemical | Year: 2014

Anodic near-infrared electrochemiluminescence (NECL) from 3-mercaptopropionic acid (MPA)-capped CdTe/CdS coresmall/shellthick quantum dots (QDs) without any co-reactants were studied in aqueous solution for the first time. A stable and intensive anodic NECL emission at +1.32 V with an onset potential of +0.84 V was observed in pH 7.4 PBS at an indium tin oxide electrode, which results from the annihilation process between the oxidation products of QDs and the produced QDs anions. Various influencing factors, such as pH, electrolyte, scan rates and electrode materials on the NECL were investigated. Based on the selective quenching by Cu2+ to the NECL emission from the QDs, a simple and sensitive method for the determination of Cu2+ was developed. Moreover, as a practical application, the proposed method was used to monitor Cu2+ level in lake water and milk with satisfactory results obtained. © 2014 Elsevier B.V. All rights reserved.


Wang C.,Huazhong University of Science and Technology | Wang C.,Huanggang Normal University | Shen Y.,Huazhong University of Science and Technology
IET Control Theory and Applications | Year: 2012

This study investigates the problem of delay-dependent robust stability for uncertain stochastic systems with interval time-varying delay. No restrictions on the derivative of the time-varying delay are imposed, although lower and upper bounds of the delay interval are assumed to be known. By decomposing the delay interval into multiple equidistant subintervals, new Lyapunov-Krasovskii functionals are introduced on these intervals, which result in being much less conservative than most existing results in the literature. In addition, the reduction in the conservatism of the proposed stability criteria is also attributed to the free-weighting matrix technique and a newly proposed bounding condition, which is used to estimate the upper bound of stochastic differential of the Lyapunov-Krasovskii functional without neglecting any useful terms. All the stability criteria are formulated in the form of linear matrix inequalities (LMIs), which are dependent on the size of the time delay. Some numerical examples are given to show the less conservatism and applicability of the obtained results. Moreover, when the number of the divided subintervals increases, the corresponding criteria can provide an improvement on the results. © 2012 The Institution of Engineering and Technology.


Zhang C.-Y.,Huanggang Normal University
Proceedings - 2011 International Conference on Intelligence Science and Information Engineering, ISIE 2011 | Year: 2011

Denial of Service (DoS) and distributed denial of service attack (DDoS) is now a common means of attack that affects seriously network security and the quality of online services. This paper analyzes the DoS (DDoS) attack prevention principles and gives an thorough analysis of existing prevention techniques, proposed to prevent DoS (DDoS) attacks in three ways: using a router DoS attack prevention; increase the trusted platform module; increase system defenses. © 2011 IEEE.


Zhou J.,Huanggang Normal University
Proceedings - 2010 International Symposium on Intelligence Information Processing and Trusted Computing, IPTC 2010 | Year: 2010

This paper described the current network of primary language XML in network applications, introduced its own XML language features and development to illustrate aspects of XML technology in the application of network security and significance. The network security is a systems engineering which is need to carefully consider the security needs of the system, and a variety of security technologies, such as passwords and technology combine to produce a highly efficient, universal, secure network systems. Secondly, this paper analysis of network security architecture and the current network security system for the protection of technical methods used: the network against viruses, configuration, firewall, intrusion detection systems used, Web, Email, BBS's safety monitoring system, vulnerability scanning systems, IP Theft solution, using network monitoring to maintain system security subnet. Finally, the XML technology for network security enabled areas of security, XML has become a field for the safety of a valuable mechanism for exchange of data, related development is related to XML encryption and XML signature. © 2010 IEEE.


Zhou J.,Huanggang Normal University
Applied Mechanics and Materials | Year: 2012

This article tells the story of in order to effectively resist the invasion of external.NET platform system, improve system security, we must establish the prevention and monitoring technologies improve system security system. System programmer and administrators only in the system design stage, to do a good job safety prevention programs and solutions to security applications wherein, to nip in the bud, development of safer, more reliable and robust web system, and this paper Analysis the possible security problems of the.NET platform system; in view of the existing safety problems to make the safety performance analysis, finally put forward the platform system safety prevention programme. © (2012) Trans Tech Publications, Switzerland.


Zhang B.,Huanggang Normal University
Research Journal of Applied Sciences, Engineering and Technology | Year: 2013

The statistics of sports arena accidents show that the main reasons which leading to crowd stampede are the exports blockage and the poor surrounding transportations. In the process of evacuation, the most common problem is that there are a large number of people are stranded and also they are the main carrier which leading to crowded stampede. With large amounts of data and reasonable evaluations on staffs and transportation instruments. We propose inflow model in the crowding state, principle of maximum flow on channel design, optimal model of vehicle parking, evacuation model of subways and buses, according to sections of evacuation in stadiums. We analyze their usage area, marginal conditions and real data. Finally, we get some valuable results, which are curves of density and flow, evacuation time, formula for channel design, optimal parking design and formulas for evacuation time of subways and buses. Such data suits the real data from varied references. With the help of models and results, we get the total time of evacuation, simulation of progress and give parts of real situations of evacuation. According to such results, 100000 people's evacuation can be finished in about 45 min. On such basis, we propose some optimal plans for stadium and its surroundings building. © Maxwell Scientific Organization, 2013.


Yang G.,Huanggang Normal University
Proceedings - 2011 International Symposium on Intelligence Information Processing and Trusted Computing, IPTC 2011 | Year: 2011

Hadoop provides a sophisticated framework for cloud platform programmers, which, MapReduce is a programming model for large-scale data sets of parallel computing. By MapReduce distributed processing framework, we are not only capable of handling large-scale data, and can hide a lot of tedious details, scalability is also wonderful. This paper analyzes the Hadoop architecture and MapReduce Working principle, described how to perform a MapReduce job in the cloud platform, how to write Mapper and Reducer classes, and how to use the object, proposed a program based on the MapReduce framework that enables distributed programming, Comparison results show that use of MapReduce architecture simplifies distributed programming. © 2011 IEEE.


Peng J.,Huanggang Normal University
Fuzzy Optimization and Decision Making | Year: 2013

Real-life decisions are usually made in the state of uncertainty or risk. In this article we present two types of risk metrics of loss function for uncertain system. Firstly, the concept of value at risk (VaR) of loss function is introduced based on uncertainty theory and its fundamental properties are examined. Then the tail value at risk (TVaR) concept of loss function is evolved and some fundamental properties of the proposed TVaR are investigated. Both the VaR and TVaR are harmonious risk metrics. The suggested VaR or TVaR methodology can be widely used as tools of risk analysis in uncertain environments. © 2012 Springer Science+Business Media New York.

Loading Huanggang Normal University collaborators
Loading Huanggang Normal University collaborators