RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • A Study on the Implications of China’s Personal Information Protection Act on Chinese and Korean Businesses

        Zhiyuan Tang(Zhiyuan Tang),Luyao Wang(Luyao Wang) 동아시아무역학회 2022 Journal of East Asian Trade(JEAT) Vol.4 No.1

        Purpose – This paper discusses the legislative process and necessity of China’s Personal Information Protection Law, examines the main contents of China’s Personal Information Protection Law, and studies its impact on Chinese and Korean enterprises. Thus, China’s future data protection legal system can be better understood. Design/Methodology/Approach – In October 2020, China convened the 13th National People’s Congress to deliberate and promulgate the draft Personal Information Protection Law of the People’s Republic of China 2020. The draft privacy law is China’s first specialized legislation on personal information protection, drawing global attention. Furthermore, president Xi Jinping made clear his commitment to protecting personal information by reiterating the need for “cyber security and personal information security for people” and “protecting their legitimate rights and interests in cyberspace” after the 2019 National Cyber Week. The Personal Information Protection Act of China was enacted on November 1, 2021, as personal information protection was also a real concern among the Chinese people in the highly information-oriented era. Findings – China already has an independent and unified Personal Information Protection Act, which officially promulgates and enforces the Personal Information Protection Act this year following cybersecurity, cybersecurity, and criminal law provisions. Furthermore, in October 2020, China began a full-fledged legislative process by releasing a draft Personal Information Protection Act and collecting opinions. Research Implications – China’s Personal Information Protection Act is expected to play an important role for Chinese companies and Korean companies with subsidiaries in China due to offshore applications. Therefore, it is necessary to continue to pay attention to the revision and enforcement rules of the Personal Information Protection Act so that Chinese and Korean companies can respond quickly after it is promulgated and enforced. Therefore, this paper summarizes the background of China’s Personal Information Protection Act and the main contents of the 2021 edition of the Personal Information Protection Act.

      • KCI등재

        A New Study on the Gap Effect of an Airfoil with Active Flap Control Based on the Overset Grid Method

        Zhiyuan Hu,Guohua Xu,Yongjie Shi 한국항공우주학회 2021 International Journal of Aeronautical and Space Sc Vol.22 No.4

        Rotors with active flap control have considerable potential in reducing vibration and noise and improving aerodynamic performance. However, due to the movement of the flap, there are unavoidable gaps between the components that will lead to significant changes in the aerodynamic characteristics. Moreover, considering the difficulties in motion modeling and the accuracy of the simulation of the flow field in such a narrow gap, carrying out related research is challenging; thus, there has been inadequate targeted research, and that which does exist requires supplementation. To carry out this challenging flow field simulation, the overset assembly algorithm proposed by the author in previous research is adopted in the present study. It is used to successfully assemble the narrow gap, and the accuracy of the simulation is fully verified by comparing the results with the actual experimental results and a grid study. Furthermore, to compensate for the lack of research and experiments on the gap effect, cases considering a complete range of gap widths from an absence of a gap to a width of 10% of the chord length are set up and carried out under the following three case groups: steady cases with a fixed trailing-edge deflection angle, unsteady cases in which only the trailing-edge flap is flapping, and full-motion cases characterized by the periodic flap of the main airfoil and the trailing-edge flap. The results show that the gap increases the drag of the trailing-edge flap and decreases aerodynamic efficiency, especially at low speeds and high angles of attack. Nevertheless, when the gap is unavoidable, there is a range of the gap width that makes unapparent the decrease of aerodynamic efficiency. Moreover, the decrease of aerodynamic efficiency can be reduced as much as possible by a well-designed gap region geometry to ensure that the airfoil and the trailing-edge flap fit together when moving.

      • KCI등재

        A High-Precision Feature Extraction Network of Fatigue Speech from Air Traffic Controller Radiotelephony Based on Improved Deep Learning

        Zhiyuan Shen,Yitao Wei 한국통신학회 2021 ICT Express Vol.7 No.4

        Air traffic controller (ATC) fatigue is receiving considerable attention in recent studies because it represents a major cause of air traffic incidences. Research has revealed that the presence of fatigue can be detected by analysing speech utterances. However, constructing a complete labelled fatigue data set is very time-consuming. Moreover, a manually constructed speech collection will often contain only little key information to be used effectively in fatigue recognition, while multilevel deep models based on such speech materials often have overfitting problems due to an explosive increase of model parameters. To address these problems, a novel deep learning framework is proposed in this study to integrate active learning (AL) into complex speech features selected from a large set of unlabelled speech data in order to overcome the loss of information. A shallow feature set is first extracted using stacked sparse autoencoder networks, in which fatigue state challenge features from a manually selected speaker set of are exploited as the input vector. A densely connected convolutional autoencoder (DCAE) is then proposed to learn advanced features automatically from spectrograms of the selected data to supplement the fatigue features. The network can be effectively trained using a relatively small number of labelled samples with the help of AL sampling strategies, and the addition of a dense block to the convolutional automatic encoder can decrease the number of parameters and make the model easier to fit. Finally, the two above-mentioned features are combined using multiple kernel learning with a support-vector-machine classifier. A series of comparative experiments using the Civil Aviation Administration of China radiotelephony corpus demonstrates that the proposed method provides a significant improvement in the detection precision compared to current state-of-the-art approaches.

      • KCI등재

        Novel Multi-user Conjunctive Keyword Search Against Keyword Guessing Attacks Under Simple Assumptions

        ( Zhiyuan Zhao ),( Jianhua Wang ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.7

        Conjunctive keyword search encryption is an important technique for protecting sensitive personal health records that are outsourced to cloud servers. It has been extensively employed for cloud storage, which is a convenient storage option that saves bandwidth and economizes computing resources. However, the process of searching outsourced data may facilitate the leakage of sensitive personal information. Thus, an efficient data search approach with high security is critical. The multi-user search function is critical for personal health records (PHRs). To solve these problems, this paper proposes a novel multi-user conjunctive keyword search scheme (mNCKS) without a secure channel against keyword guessing attacks for personal health records, which is referred to as a secure channel-free mNCKS (SCF-mNCKS). The security of this scheme is demonstrated using the Decisional Bilinear Diffie-Hellman (DBDH) and Decision Linear (D-Linear) assumptions in the standard model. Comparisons are performed to demonstrate the security advantages of the SCF-mNCKS scheme and show that it has more functions than other schemes in the case of analogous efficiency.

      • A Study on the Guarantee of Chinese One-man Company for Its Shareholders

        Zhiyuan Tang 동북아경상학회 2023 동북아경상연구 Vol.4 No.1

        Purpose - Research the legality of one member company’s shareholder guarantee. First of all, as far as the legislative purpose of the decision-making power of the shareholders’ meeting and the procedure for shareholders to avoid voting under the special guarantee stipulated in the Company Law of China is concerned, its legislative purpose is to prevent major shareholders from abusing their rights, protection of the Company and minority shareholders. Design/Methodology/Approach - There is no difference between large and small shareholders in a one-person company. The only shareholder of a one-person company is the only participant in the company’s operation and decision-making, who has the most direct understanding of the company’s operation, and has the most clear judgment on the company’s major issues. The oneness of the shareholders of a human company makes their behavior not only represent the will of shareholders, but also reflect the will of the company. Findings - Therefore, the Company Law does not deny the legality of one person’s company’s guarantee for shareholders. Secondly, the current Company Law has legally confirmed the full guarantee capacity of the company, and it is legitimate for the company to provide guarantees for others, shareholders or actual controllers of the company. Research Implications - Based on not violating the relevant principles of the Company Law, one person company’s provision of security for its shareholders belongs to the territory of “company autonomy”. As long as its procedures are legitimate, its behavior naturally has legitimacy.

      • KCI등재

        Different QoS Constraint Virtual SDN Embedding under Multiple Controllers

        ( Zhiyuan Zhao ),( Xiangru Meng ),( Siyuan Lu ),( Yuze Su ) 한국인터넷정보학회 2018 KSII Transactions on Internet and Information Syst Vol.12 No.9

        Software-defined networking (SDN) has emerged as a promising technology for network programmability and experiments. In this work, we focus on virtual network embedding in multiple controllers SDN network. In SDN virtualization environment, virtual SDN networks (vSDNs) operate on the shared substrate network and managed by their each controller, the placement and load of controllers affect vSDN embedding process. We consider controller placement, vSDN embedding, controller adjustment as a joint problem, together considering different quality of service (QoS) requirement for users, formulate the problem into mathematical models to minimize the average time delay of control paths, the load imbalance degree of controllers and embedding cost. We propose a heuristic method which places controllers and partitions control domains according to substrate SDN network, embeds different QoS constraint vSDN requests by corresponding algorithms, and migrates switches between control domains to realize load balance of controllers. The simulation results show that the proposed method can satisfy different QoS requirement of tenants, keep load balance between controllers, and work well in the acceptance ratio and revenue to cost ratio for vSDN embedding.

      • Research on the Investment of Chinese and Korean Enterprises in the Middle East Arab Market

        Zhiyuan Tang 동아시아무역학회 2023 Journal of East Asian Trade(JEAT) Vol.5 No.1

        Purpose - The Middle East is experiencing constant international conflict. Still, with global investment attracting much attention, trade continues to increase, and the image of war-torn areas is changing gradually. Design/Methodology/Approach - Many countries in the Middle East are opening up their markets from oil and state monopolies, trying to attract investment and participate in the construction of diversified domestic industries. Findings - These countries are actively promoting that they are safe and reliable investors, regardless of regional conflicts, when political instability or tension in certain regions of the Middle East increases. In addition, Korean and Chinese companies are increasingly interested in the Middle East due to increased economic exchanges between Arab countries and China, increased investment in infrastructure by oil-producing countries, and increased imports and exports of Korean products. However, companies seeking access to Middle Eastern markets often face more complex problems than when they entered other regions. Research Implications - Investment in the Middle East market depends on the needs of related companies and governments in the Middle East, so it isn't easy to find a common point of contact. The number of Arab countries in the Middle East, including Kuwait, Saudi Arabia, Iran, Iraq, Egypt, Qatar, and Palestine, is estimated to be about 20. By analyzing the practicality and applicability of commercial and corporate laws in these countries, we will give some legal issues that Chinese and Korean companies should pay attention to when investing in the Middle East market.

      • KCI등재

        Weak fault detection method of rolling bearing based on testing signal far away from fault source

        Zhiyuan He,Guo Chen,Tengfei Hao,Chunyu Teng,Minli Hou,Zhenjie Chen 대한기계학회 2020 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.34 No.3

        In some cases, because of the complex internal structure of the machines, the positions of the vibration sensors are far away from the rolling bearings, such as in an aeroengine, causing the fault features to become extremely weak, which brings great challenge to the detection of rolling bearings. To address this problem, an integrated detection method is proposed. First, a method named MEDL is proposed to determine the optimal filter length in minimum entropy deconvolution (MED) to enhance the periodic fault impulse component in the weak signal, which accuracy is 1. After that, the MEDL is combined with variational mode decomposition (VMD) and autocorrelation to extract fault features from strong background noise. A series of fault simulation experiments for rolling bearings were conducted by using an aeroengine rotor experimental rig with casing. The results verify that the accuracy of the integrated detection method is 100 % in different measuring points, speeds and fault types. At the same time, it compared with spectral kurtosis (SK) and empirical wavelet transform (EWT). It proves that the integrated detection method is more robust in extracting the weak fault characteristic of rolling bearings from the casing signals effectively.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼