RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Highly Durable and Robust Superhydrophobic/Superoleophilic Cotton Fabric with Well-designed Roughness for Oil/Water Separation

        Jiangtao Hu,Qianhong Gao,Lu Xu,Minglei Wang,Maojiang Zhang,Kuo Zhang,Xiaojing Guo,Weihua Liu,Guozhong Wu 한국섬유공학회 2018 Fibers and polymers Vol.19 No.7

        Herein we report a simple and reproducible method for fabricating highly durable and robust superhydrophobic and superoleophilic cotton fabrics via simultaneous radiation-induced graft polymerization of glycidyl methacrylate and subsequent chemical modifications with aminopropyltriethoxysilane and hexamethyldisilazane. The chemical structure and the surface topography of the pristine and the modified cotton fabrics were investigated in detail by ATR-FTIR, XPS, and 29Si NMR, and a grafting layer was successfully immobilized onto the surface of the cotton fabric by forming covalent bonds. Multi-dimensional surface roughness was created by combining micro-sized fibers of the cotton fabric, nanoscaled protuberances of the grafting chain, and molecular level spherical projection points of silicon methyl. The superhydrophobic cotton fabric exhibited long-term stability, ultra-high durability and robustness, and maintained its properties even after 25 wash cycles. The fabric also showed excellent water repellency with a water contact angle of 153 o and a high efficiency of oil/water separation (98 %). The superhydrophobic/superoleophilic cotton fabric developed in the present work exhibits important potential applications in superhydrophobic textiles and oil/water separation.

      • New receipt-free voting scheme using double-trapdoor commitment

        Chen, Xiaofeng,Wu, Qianhong,Zhang, Fangguo,Tian, Haibo,Wei, Baodian,Lee, Byoungcheon,Lee, Hyunrok,Kim, Kwangjo Elsevier 2011 Information sciences Vol.181 No.8

        <P><B>Abstract</B></P><P>It is considered to be the most suitable solution for large scale elections to design an electronic voting scheme using blind signatures and anonymous channels. Based on this framework, Okamoto first proposed a receipt-free voting scheme <ce:cross-ref refid='b0150'>[30]</ce:cross-ref> for large scale elections. However, in the following paper, Okamoto <ce:cross-ref refid='b0155'>[31]</ce:cross-ref> proved that the scheme <ce:cross-ref refid='b0150'>[30]</ce:cross-ref> was not receipt-free and presented two improved schemes. One scheme requires the help of the parameter registration committee and the other needs a stronger physical assumption of the voting booth. In this paper, we utilize the double-trapdoor commitment to propose a new receipt-free voting scheme based on blind signatures for large scale elections. Neither the parameter registration committee nor the voting booth is required in our scheme. We also present a more efficient zero-knowledge proof for secret permutation. Therefore, our scheme is much more efficient than Okamoto’s schemes <ce:cross-refs refid='b0150 b0155'>[30,31]</ce:cross-refs> with the weaker physical assumptions. Moreover, we prove that our scheme can achieve the desired security properties.</P>

      • KCI등재

        H-mode experimental integrated modeling of impurity injection to control divertor heat flux on HL-2A

        Yu Peng,Huang Qianhong,Zhong Yijun,Wu Ting,Wang Jun,Wang Zhanhui,Gong Xue-yu 한국물리학회 2023 THE JOURNAL OF THE KOREAN PHYSICAL SOCIETY Vol.82 No.8

        Based on the METIS integrated modeling platform, combined with the experimental data of the #34512 shot detached divertor operation on the HL-2A, this paper selects suitable physical models, and compares and analyzes the integrated modeling results with the experimental results. The modeling results are in good agreement with the experimental results. On this basis, the reason for the decrease of the peak heat fux on the divertor targets is investigated using the METIS simulator. The results show that the two factors of entering the H-mode and the radiation enhancement efect generated by impurity injection work together to reduce the heat fow on the targets. Finally, the diferent efects of N, Ar and Ne impurity gases on the heat fux reduction of the targets are simulated under the condition that the plasma line-average efective charge (Zef) is kept unchanged. The results show that N and Ar are both better than Ne in controlling the heat fow on the targets, and N has the best compatibility in the core, which can not only reduce the boundary heat fow but also maintain the core confnement performance.

      • KCI등재

        Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing

        ( Wenyi Tang ),( Bo Qin ),( Yanan Li ),( Qianhong Wu ) 한국인터넷정보학회 2020 KSII Transactions on Internet and Information Syst Vol.14 No.1

        Fog computing has become a popular concept in the application of internet of things (IoT). With the superiority in better service providing, the edge cloud has become an attractive solution to IoT networks. The data outsourcing scheme of IoT devices demands privacy protection as well as computation verification since the lightweight devices not only outsource their data but also their computation. Existing solutions mainly deal with the operations over encrypted data, but cannot support the computation verification in the same time. In this paper, we propose a data outsourcing scheme based on an encrypted database system with linear computation as well as efficient query ability, and enhance the interlayer program in the original system with homomorphic message authenticators so that the system could perform computational verifying. The tools we use to construct our scheme have been proven secure and valid. With our scheme, the system could check if the cloud provides the correct service as the system asks. The experiment also shows that our scheme could be as effective as the original version, and the extra load in time is neglectable.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼