Huan Tang

Learn More
—In this paper, we investigate the multicast capacity for static network with heterogeneous clusters. We study the effect of heterogeneities on the achievable capacity from two aspects, including heterogeneous cluster traffic (HCT) and heterogeneous cluster size (HCS). HCT means cluster clients are more likely to appear near the cluster head, instead of(More)
The leaf area index (LAI) is a crucial parameter of vegetation structure. It provides key information for earth surface process simulations and climate change research on the global and regional scales. Focusing on the meadow steppe in Hulunber, Inner Mongolia, China, the present study assessed the accuracy of the Moderate Resolution Imaging(More)
The meganuclease I-SceI has been effectively used to facilitate transgenesis in fish eggs for nearly a decade. I-SceI-mediated transgenesis is simply via embryo cytoplasmic microinjection and only involves plasmid vectors containing I-SceI recognition sequences, therefore regarding the transgenesis process and application of resulted transgenic organisms,(More)
The establishment of human flora-associated animal models allows the in vivo manipulation of host, microbial, and environmental parameters to influence the gut microbial community. However, it is difficult to simulate infant gut microbiota in germ-free animals because of the variation and dynamic state of infant microbial communities. In this study, the(More)
Cytochomosome P450 enzymes (CYP) are heme-containing monooxygenases responsible for oxidative metabolism of many exogenous and endogenous compounds including drugs. The species difference of CYP limits the extent to which data obtained from animals can be translated to humans in pharmacodynamics or pharmacokinetics studies. Transgenic expression of human(More)
—A cognitive network refers to the one where two overlaid structures, called primary and secondary networks coexist. The primary network consists of primary nodes who are licensed spectrum users while the secondary network comprises unauthorized users that have to access the licensed spectrum opportunistically. In this paper, we study the percolation degree(More)