RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Wavelet based Macrotexture Analysis for Pavement Friction Prediction

        Guangwei Yang,Qiang Joshua Li,You Jason Zhan,Kelvin C. P. Wang,Chaohui Wang 대한토목학회 2018 KSCE JOURNAL OF CIVIL ENGINEERING Vol.22 No.1

        Pavement friction and texture characteristics are important aspects of road safety. Despite extensive studies conducted in the past decades, knowledge gaps still remain in understanding the relationship between pavement macrotexture and surface skid resistance. This paper implements discrete wavelet transform to decompose pavement surface macrotexture profile data into multi-scale characteristics and investigate their suitability for pavement friction prediction. Pavement macrotexture and friction data were both collected within the wheel-path from six High Friction Surface Treatment sites in Oklahoma using a high-speed profiler and a Grip Tester. The collected macrotexture profiles are decomposed into multiple wavelengths, and the total and relative energy components are calculated as indicators to represent macrotexture characteristics at various wavelengths. Correlation analysis is performed to examine the contribution of the energy indicators on pavement friction. The macrotexture energy within wavelengths from 0.97 mm to 3.86 mm contributes positively to pavement friction while that within wavelengths from 15.44 mm to 61.77 mm shows negative impacts. Subsequently, pavement friction prediction model is developed using multivariate linear regressive analysis incorporating the macrotexture energy indicators. Comparisons between predicted and monitored friction data demonstrates the robustness of the proposed friction prediction model.

      • KCI등재

        Verification Algorithm for the Duplicate Verification Data with Multiple Verifiers and Multiple Verification Challenges

        ( Guangwei Xu ),( Miaolin Lai ),( Xiangyang Feng ),( Qiubo Huang ),( Xin Luo ),( Li Li ),( Shan Li ) 한국인터넷정보학회 2021 KSII Transactions on Internet and Information Syst Vol.15 No.2

        The cloud storage provides flexible data storage services for data owners to remotely outsource their data, and reduces data storage operations and management costs for data owners. These outsourced data bring data security concerns to the data owner due to malicious deletion or corruption by the cloud service provider. Data integrity verification is an important way to check outsourced data integrity. However, the existing data verification schemes only consider the case that a verifier launches multiple data verification challenges, and neglect the verification overhead of multiple data verification challenges launched by multiple verifiers at a similar time. In this case, the duplicate data in multiple challenges are verified repeatedly so that verification resources are consumed in vain. We propose a duplicate data verification algorithm based on multiple verifiers and multiple challenges to reduce the verification overhead. The algorithm dynamically schedules the multiple verifiers’ challenges based on verification time and the frequent itemsets of duplicate verification data in challenge sets by applying FP-Growth algorithm, and computes the batch proofs of frequent itemsets. Then the challenges are split into two parts, i.e., duplicate data and unique data according to the results of data extraction. Finally, the proofs of duplicate data and unique data are computed and combined to generate a complete proof of every original challenge. Theoretical analysis and experiment evaluation show that the algorithm reduces the verification cost and ensures the correctness of the data integrity verification by flexible batch data verification.

      • KCI등재

        Wear-life analysis of deep groove ball bearings based on Archard wear theory

        Guangwei Yu,Wei Xia,Zhuoyuan Song,Rui Wu,Siling Wang,Yuan Yao 대한기계학회 2018 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.32 No.7

        A quasi-dynamic method is proposed to evaluate the characteristics of ball bearings, which include pressure distribution over the contact area between the ball and the raceway, sliding velocity distribution, and lubrication parameters. The extent of permissible wear is confirmed based on the Archard wear equation. A mathematical model for wear-life analysis is then presented for 6000 deep groove ball bearings with axial loads. The effects of axial loads, rotating speed, and structural parameters on wear characteristics of bearings are analyzed. A number of conclusions are drawn. Based on the proposed mathematical model, the wear life of a bearing decreases with increased axial load. The wear life of the bearing decreases as the rotational speed of the inner ring increases. The wear life of the bearing exhibits nearly linear increment as the groove curvature of the inner ring increases and decreases as the groove curvature of the outer ring increases.

      • KCI등재

        Energy-Efficient Algorithm for Assigning Verification Tasks in Cloud Storage

        ( Guangwei Xu ),( Zhifeng Sun ),( Cairong Yan ),( Xiujin Shi ),( Yue Li ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.1

        Mobile Cloud Computing has become a promising computing platform. It moves users` data to the centralized large data centers for users` mobile devices to conveniently access. Since the data storage service may not be fully trusted, many public verification algorithms are proposed to check the data integrity. However, these algorithms hardly consider the huge computational burden for the verifiers with resource-constrained mobile devices to execute the verification tasks. We propose an energy-efficient algorithm for assigning verification tasks (EEAVT) to optimize the energy consumption and assign the verification tasks by elastic and customizable ways. The algorithm prioritizes verification tasks according to the expected finish time of the verification, and assigns the number of checked blocks referring to devices` residual energy and available operation time. Theoretical analysis and experiment evaluation show that our algorithm not only shortens the verification finish time, but also decreases energy consumption, thus improving the efficiency and reliability of the verification.

      • A Japanese Word Study Model for Chinese Learners by Using Petri Net

        Guangwei Yuan,Qi-Wei Ge,Takashi Naritomi 대한전자공학회 2008 ITC-CSCC :International Technical Conference on Ci Vol.2008 No.7

        This paper proposes a Japanese word study model for Chinese learners by using Petri net. Firstly we classify Japanese words into several groups by considering Chinese learners’ knowledge on Chinese characters. Then analyzing the difficulty levels of these word groups for Chinese learners to learn, we decide the studying order for these word groups. Based on these analytical results, we propose a Japanese word study model by using Petri net. Finally, we introduce an evaluation scheme to the proposed study model in order to evaluate learning effect of the learners.

      • KCI등재

        A Rapid Locating Protocol of Corrupted Data for Cloud Data Storage

        ( Guangwei Xu ),( Yanbin Yang ),( Cairong Yan ),( Yanglan Gan ) 한국인터넷정보학회 2016 KSII Transactions on Internet and Information Syst Vol.10 No.10

        The verification of data integrity is an urgent topic in remote data storage environments with the wide deployment of cloud data storage services. Many traditional verification algorithms focus on the block-oriented verification to resolve the dispute of dynamic data integrity between the data owners and the storage service providers. However, these algorithms scarcely pay attention to the data verification charge and the users` verification experience. The users more concern about the availability of accessed files rather than data blocks. Moreover, the data verification charge limits the number of checked data in each verification. Therefore, we propose a mixed verification protocol to verify the data integrity, which rapidly locates the corrupted files by the file-oriented verification, and then identifies the corrupted blocks in these files by the block-oriented verification. Theoretical analysis and simulation results demonstrate that the protocol reduces the cost of the metadata computation and transmission relative to the traditional block-oriented verification at the expense of little cost of additional file-oriented metadata computation and storage at the data owner. Both the opportunity of data extracted and the scope of suspicious data are optimized to improve the verification efficiency under the same verification cost.

      • KCI등재

        English-Medium Instruction in Higher Education: Lessons from China

        Guangwei Hu 아시아테플 2019 The Journal of Asia TEFL Vol.16 No.1

        The last few decades have seen escalating national and institutional efforts to internationalize higher education around the globe. One current, popular strategy is to provide English-medium instruction (EMI) in educational contexts where English is a foreign language. As a curricular strategy intended to internationalize tertiary institutions and improve the quality of higher education, EMI has enjoyed strong policy support in Asia. However, there is a scarcity of empirical research in Asian contexts to justify such policy support. This article draws on the current literature and discusses the rationale and spread of EMI in European and Asian countries. It then presents the findings of four empirical studies recently conducted on EMI in several Chinese universities to provide a Chinese perspective. By way of conclusion, the article discusses the implications of the aforementioned studies for endeavors to implement EMI in Chinese and other EFL contexts.

      • KCI등재

        Evaluation of the performance of polymer gels mixed with asphalt particle as a novel composite profile control system

        Guangwei Liu,Hanqiao Jiang,Junjian Li,Min Wang,Fuzhen Chen,Shuaiwei Ding,Xiangan Lu 한국공업화학회 2015 Journal of Industrial and Engineering Chemistry Vol.26 No.-

        This paper presents gels with asphalt particle (GAP) as a novel composite profile control system, which has better sealing effect for plugging channeling in fractured reservoir. This composite agent was prepared by modified asphalt particle and polymer gels served as suspension. Laboratory core–flood tests showed good injectiviy of GAP solution in high permeability zone with a high plugging rate. Also, the enhance oil recovery mechanism of GAP and polymer gels in fractured reservoir were compared by parallel core–flood test. Simulation results indicate longer response time and better enhance oil recovery for GAP than polymer gels in fractured system.

      • KCI등재

        Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

        Guangwei Xu,Shan Li,Miaolin Lai,Yanglan Gan,Xiangyang Feng,Qiubo Huang,Lili Yang,Wei Li 한국인터넷정보학회 2022 KSII Transactions on Internet and Information Syst Vol.16 No.2

        Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

      • KCI등재

        목적 범주의 의미기초와 중국어 목적 범주의 문법 표현 형식에 대하여

        GUANGWEI LU 한국중국언어학회 2018 중국언어연구 Vol.0 No.79

        목적 범주는 지향성, '목적-행위' 또는 '행위-목적'의 의미관계, 비현실 등 세 가지 근본적인 의미특징을 가진다. 그리고 이 세 가지 의미특징을 의미기초로 목적 범주를 수립할 수 있다. 한편 위의 세 가지 의미특징의 유무에 따라 중국어 문장이나 구성이 목적 범주를 표현하는지 여부를 판단할 수 있다. 본고에서 판단한 결과 중국어 목적관계 접속문과 특수 접속문인 목적관계 긴축문, 관련사어에 의해 구성된 목적관계 단문, 특수 단문인 목적관계 연동문, 그리고 'V + PO' 구성이 목적 범주를 표현할 수 있는 것으로 나타났다. 그 중 목적관계 접속문은 중국어 목적 범주의 가장 원형적인 구성원이고 나머지는 모두 주변적인 구성원이다. 그리하여 관련사 '爲, 爲了, 爲著, 以, 以便, 以期, 以求, 好, 借以, 用以, 來, 以免, 以防, 省得, 免得'과 관련구 '爲(了)……而……, 爲(了)……起見, 爲的是, 是爲了' 등은 중국어 목적 범주의 목적 표지로 볼 수 있다. The purpose category possesses three fundamental semantic features: intentionality, the semantic relationship of “Purpose-Action” or “Action-Purpose”, and irrealis. Moreover, these three semantic features can be used as the semantic foundation to establish the purpose category. In addition, whether a sentence or a construction possesses these three semantic features or not can be regarded as a criteria to tell this sentence or construction reflects the purpose category or not. The findings of this research showed that the purpose conjunctive sentence and the purpose contraction conjunctive sentence, the purpose conjunctive simple sentence which is connected by connectives, the purpose conjunctive serial verb sentence and 'V + PO' construction have the function of reflecting the purpose category. Among these members of purpose category, the purpose conjunctive sentence is the most prototypical member, and rest of the members are marginal members. Therefore, we can regard the connective word such as "wei, weile, weizhe, yi, yibian, yiqi, yiqiu, hao, jieyi, yongyi, lai, yimian, yifang, shengde, miande" and the connective phrase such as "wei(le)……er……, wei(le)……qijian, weideshi, shiweile" as the purposive marker of the Chinese purpose category.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼