Yin-Sheng Li

  • Citations Per Year
Learn More
Rural sewage treatment is now paid more and more attention in China. Vermifiltration technology could be one of the practical options under the review of previous studies. It showed good removal rates of contaminants on small to pilot scales for short-term tests. However, the impacts of season, temperature or other unknown factors are usually not taken into(More)
OBJECTIVE To study on the effect and mechanism of curcumin on inhibiting injury induced by free radical in pulmonary fibrosis. METHOD One hundred and forty-four male SD rats were randomly divided into 6 groups (24 rats in each group). Rats in the model control group, positive medicine group, and high, moderate and low curcumin groups were injected with a(More)
Large volumes of untreated palm oil mill effluent (POME) pose threat to aquatic environment due to the presence of very high organic content. The present investigation involved two pilot-scale anaerobic expanded granular sludge bed (EGSB) reactors, continuously operated for 1 year to treat POME. Setting HRT at 9.8 d, the anaerobic EGSB reactors reduced COD(More)
With the increasingly intensive market competition and the demand for individualized products from customers, a new pattern for manufacturing, mass customization, is therefore emerging. We propose an architecture to construct a three-dimensional e-commerce Web site which supports mass customization. Online product information is represented as VRML models,(More)
Palm oil is one of the most important agroindustries in Malaysia. Huge quantities of palm oil mill effluent (POME) pose a great threat to aqueous environment due to its very high COD. To make full use of discharged wastes, the integrated "zero discharge" pilot-scale industrial plant comprising "pretreatment-anaerobic and aerobic process-membrane separation"(More)
Constraint is an important aspect of role-based access control (RBAC) and is sometimes considered to be the principal motivation for RBAC. Current major RBAC systems generally do not support constraints, or support constraints only in pure RBAC mode. But a few practical systems need direct authorization to ease permission administration. To achieve this(More)
  • 1