Wen Zhao

Wen Zhao

About

46
Publications
1,321
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,006
Citations
Citations since 2016
5 Research Items
413 Citations
20162017201820192020202120220204060
20162017201820192020202120220204060
20162017201820192020202120220204060
20162017201820192020202120220204060
Introduction
Skills and Expertise

Publications

Publications (46)
Article
Background A series of novel 2,6-dichloro-4-(trifluoromethyl)phenyl)-3-(difluoromethyl)- 1H-pyrazole-4-carboxamide derivatives were designed and synthesized. Methods All the title compounds were confirmed by 1H NMR and MS. Results and Conclusion The primarily nematicidal activity results indicated that some of them exhibited moderate control effi...
Article
A series of novel difluoromethylpyrazole carboxamides derivatives were synthesized by introduction of flexible alkyl chain. Nematicidal bioassay results showed that some of them exhibited good control efficacy against M. incognita, which indicated that these difluoromethylpyrazole carboxamides derivatives might be potential novel lead compounds for...
Article
A novel series of pyrazole carboxamide derivatives had been designed, synthesized and some of them exhibited good nematocidal activity.
Article
A novel series of novel 1,2,4-triazolo[4,3-a]pyridines were designed and synthesized under microwave irradiation condition. The structures were identified by 1H NMR, MS and elemental analysis, and the antifungal activities of them were evaluated at 100 ppm. It was found that some of the 1,2,4-triazolo[4,3-a]pyridines displayed good antifungal activ...
Article
A series of novel chiral fluorinated pyrazole carboxamides derivatives were designed and synthesized. All these title compounds were confirmed by NMR and MS. The primarily nematicidal activity results indicated that some of them exhibited good control efficacy against the tomato root-knot nematode disease caused by Meloidogyne incognita. The dockin...
Article
A series of novel thioether derivatives containing 1,2,4-triazole moiety were designed and synthesized from 4-chlorophenol and ethyl 2-chloroacetate as starting materials by multi-step reactions under microwave irradiation, and their structures were characterized by H-1-NMR, MS and elemental analysis. The antifungal activity of title compounds was...
Article
A novel 1,2,4-triazole compound was synthesized and the chemical structure was confirmed by H-1 NMR, MS and elemental analyses. The crystal structure of the 1,2,4-triazole (C13H14FN3S, Mr = 263.33) has been determined by single-crystal X-ray diffraction. The compound crystallizes in the monoclinic system, space group P2(1)/c with a = 7.5179(15), b...
Article
In order to investigate the biological activity of novel thiourea compounds, some novel 1,2,3- thiadiazole derivatives containing 1,3,4-thiadiazole were synthesized under phase transfer catalyzed condition( PEG-600)by multi-step reactions. The chemical structures of all compounds were established by 1H NMR, FTIR, MS, and elemental analysis, and som...
Conference Paper
For some special domains, if search engines only take advantage of keywords, the searchers need to mater lots of professional terms. Moreover, to refine the search interests, the professional rules and reasoning of those rules should be used. To resolving above problems, this paper focuses on extending search engines via ontology extraction and mod...
Conference Paper
For performance and security concern in large-scale application environment, based on "follow the chain" mode, a distributed RFID discovery system is proposed and implemented. At first, system architecture is given. Secondly, core components, such as query engine, local cache and client, are formally specified with TIOA. Experiments on query execut...
Article
RFID technology and its applications have become a hot spot in automatic identification field in recent years.As a core service provided for RFID applications,RFID code resolution service is responsible for mapping RFID code to one or more URIs corresponding to RFID information services.According to administrative mode and performance concern,based...
Conference Paper
Formalizing and verifying Web service composition is one important research area in service oriented computing (SOC). In order to design Business Processes specified by business process execution language (BPEL) correctly, and make ensure it can run accurately, an extended Petri-net model with labels and two colored tokens is proposed to formalize...
Article
In order to build large-scale RFID applications, it is necessary to establish public RFID service infrastructure, the essential task is to build efficient and secure RFID code resolution network. Aiming at alleviating the problems in load balancing, single node failure tolerance and security of resolution network, based on related standards and res...
Conference Paper
Traditional application integration technologies are performed in a rigid and slow process and do not fully utilize the computing power and storage capability of client. By extending mashup concept into application integration space, we can achieve a novel and more lightweight integration approach. This paper introduces our Web based integration pl...
Conference Paper
Traditional application integration technologies are performed in a rigid and slow process that usually takes along time to build and deploy, requiring professional developers and domain experts. Moreover, they are server-centric and do not fully utilize the computing power and storage capability of client. As an emerging technology, mashup helps m...
Article
Fairness is among the most well known properties of Petri net systems, but it has not been investigated in depth for the purpose of application. This paper aims at such an investigation, and as a result, alternative definitions based on synchronic distances are proposed with examples for illustration.
Conference Paper
In order to build open-loop large scale RFID applications, it is necessary to establish public RFID service infrastructure, the key issue is to build efficient and robust RFID code resolution network. But there exist some problems, such as load balancing, single node failure, etc. On the basis of recent research, according to features of government...
Conference Paper
Passive RFID event refers to one kind of composite event in RFID middleware, one or more constituent sub-events of which do not occur under certain condition. Definition of passive RFID event requires careful consideration of temporal constraint and composition hierarchy, and moreover, the detection requires well-organized query plan for eventpsila...
Conference Paper
In RFID middleware, passive event refers to one kind of composite event, some of whose constituent sub-events do not occur under certain condition. To process complex RFID business logic, we should be able to define a wide variety of passive event types and perform efficient event detection. In this paper, we design an event definition language whi...
Article
Based on the routing protocol of Kademlia network and the characteristics of semantics-based publish/subscribe systems, a new type of routing protocol for semantics-based publish/subscribe systems is designed, which is called intersection concept based routing protocol (ICBRP). In ICBRP, user's subscriptions are classified by minimal intersection c...
Article
RFID technology has become a hot spot in automatic identification filed in recent years, which opens up a wide variety of applications. However, most RFID applications are still closed-loop-based. In order to build large-scale RFID applications which are trans-regional and cross-industry, it is necessary to build public RFID service platform. On th...
Conference Paper
At present, workflow technology has become a research hotspot in computer application domain, one of its major theoretical research areas is to build a formal model with which process definition, process execution and process analysis are well supported. Workflow process logic (workflow logic) specifies the causality among activities of process mod...
Article
The analysis of workflow is crucial to the correctness of workflow applications. This paper introduces a simple and practical method for analyzing workflow logic models. Firstly, some definitions of the models and some properties, such as throughness, no-redundant-transition and boundedness, are presented. Then, we propose an approach based on sync...
Conference Paper
Web service composition involves the combination of a number of existing web services to create a value-added one. WS-BPEL is a promising language which describes Web service composition in form of business processes. However, WS-BPEL is an XML-based language and may suffer from ambiguities or some erroneous properties. The analysis and verificatio...
Article
We discuss the evolution of holographic hessence model, which satisfies the holographic principle and can naturally realize the equation of state crossing −1. By discussing the evolution of the models in the w–w′ plane, we find that, if c⩾1, whe⩾−1 and keep for all time, which are quintessence-like. However, if c<−1, which mildly favors the current...
Chapter
EAI issue is constantly a significant aspect of enterprise computing area. Furthermore, recent advances in Web Service and integration sever provide a promising pushing to EAI issues. However, few investigations have focused on a general view of EAI technologies and solutions. to provide a clear perspective about EAI, a technology framework-ABCMP i...
Conference Paper
Some research has been done on probabilistic extension of description logics such as P-CLASSIC and P- SHOQ\mathcal {SHOQ} which focus on the statistical information. For example, in those kind of probabilistic DL, we can express such kind of uncertainty that the probability a randomly chosen individual in concept C is also in concept D is 90 percen...
Conference Paper
Workflow management systems (WfMSs) frequently use data to coordinate the execution of workflow instances. A WfMS makes routing decisions according to data constraints. This paper presents an extended workflow net which has its business form and portrays data constraints among tasks which act as the decision condition. Data constraint is expressed...
Article
Workflow management aims at the controlling, monitoring, optimizing and supporting of business processes. Well designed formal models will facilitate such management since they provide explicit representations of business processes as the basis for computerized analysis, verification and execution. Petri Nets have been recognized as the most suitab...
Article
The evolution of the electric and magnetic components in an effective Yang-Mills condensate dark energy model is investigated. If the electric field is dominant, the magnetic component disappears with the expansion of the Universe. The total YM condensate tracks the radiation in the earlier Universe, and later it becomes $w_y\sim-1$ thus is similar...
Conference Paper
In this paper, we consider five possible extensions of the Pr\"ufer domain notion to the case of commutative rings with zero-divisors. We investigate the transfer of these Pr\"ufer-like properties between a ring $R$ and $R\bowtie I$; his amalgamated duplication along some ideal $I$, and then generate new and original families of rings with these pr...
Article
In this paper, we improve the calculation of the relic gravitational waves (RGW) in two aspects: First, we investigate the transfer function after considering the redshift-suppression effect, the accelerating expansion effect, the damping effect of free-streaming relativistic particles, and the damping effect of cosmic phase transition, and give a...
Article
By Polnarev’s method we analytically calculate the polarization spectra of the cosmic microwave background radiation (CMB) generated by cosmic relic gravitational waves (RGW). In this analytic approach the physics involved in this generating process is more transparent. Consequently, the effects due to various elements of physics can be isolated ea...
Article
Sometimes historic information about workflow execution is needed to analyze business processes. Process mining aims at extracting information from event logs for capturing a business process in execution. In this paper a process mining algorithm is proposed based on Synchro-Net which is a synchronization-based model of workflow logic and workflow...
Article
In this paper, we investigate a kind of special quintom model, which is made of a quintessence field ϕ1 and a phantom field ϕ2, and the potential function has the form of V(ϕ12-ϕ22). This kind of quintom field can be separated into two kinds: the hessence model, which has the state of ϕ12>ϕ22, and the hantom model with the state ϕ12<ϕ22. We discuss...
Article
Full-text available
The coincidence problem is studied in the effective Yang-Mills condensate dark energy model. As the effective YM Lagrangian is completely determined by quantum field theory, there is no adjustable parameter in this model except the energy scale, and the cosmic evolution only depends on the initial conditions. For generic initial conditions with the...
Article
Full-text available
As the strong evidence for inflation, the relic gravitational waves (RGW) have been extensively studied. Although, it has not been detected, yet some constraints have been achieved by the observations. Future experiments for the RGW detection are mainly two kinds: the CMB experiments and the laser interferometers. In this paper, we study these curr...
Article
In this paper, we investigate the quintessence models with an oscillating equation of state (EoS) and their potentials. From the constructed potentials, which have the EoS of $\omega_{\phi}=\omega_0+\omega_1\sin z$, we find they are all the oscillating functions of the field $\phi$, and the oscillating amplitudes are decreasing (or increasing) with...
Article
In this paper, we study the possibility of building Yang-Mills(YM) field dark energy models with equation of state (EoS) crossing -1, and find that it can not be realized by the single YM field models, no matter what kind of lagrangian or initial condition. But the states of $-1<\omega<0$ and $\omega<-1$ all can be naturally got in this kind of mod...
Article
Full-text available
From the damping of the Cosmic Microwave Background Radiation (CMB) anisotropy power spectrum at large scale and the recent accelerating expansion of the Universe, we find that, there may be a largest scale which we can detect in the Universe. From this, we can get the inflation parameters as spectrum index $n_s$, e-fold $N$, Hubble parameter $H$,...
Article
Full-text available
Observations have recently indicated that the Universe at the present stage is in an accelerating expansion, a process that has great implications. We evaluate the spectrum of relic gravitational waves in the current accelerating Universe and find that there are new features appearing in the resulting spectrum as compared to the decelerating models...
Article
We have suggested that the Yang-Mills(YM) field can be a kind of candidate of inflation at high energy scale or dark energy at the very low energy scale, which can naturally give the matter state of ω < 0, even it can give ω < −1. In this paper, we discuss the perturbation theory of the YM field, and give a series of equations which can describe th...
Article
Nowadays, workflow technology has been intensively applied in the domains of administration, production, and scientific research. For the complexity and variability of process logic, how to build a well-structured business process is a practical problem. Thus, process model analysis and improvement become one of research directions in workflow tech...

Network

Cited By