RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Verification Algorithm for the Duplicate Verification Data with Multiple Verifiers and Multiple Verification Challenges

        ( Guangwei Xu ),( Miaolin Lai ),( Xiangyang Feng ),( Qiubo Huang ),( Xin Luo ),( Li Li ),( Shan Li ) 한국인터넷정보학회 2021 KSII Transactions on Internet and Information Syst Vol.15 No.2

        The cloud storage provides flexible data storage services for data owners to remotely outsource their data, and reduces data storage operations and management costs for data owners. These outsourced data bring data security concerns to the data owner due to malicious deletion or corruption by the cloud service provider. Data integrity verification is an important way to check outsourced data integrity. However, the existing data verification schemes only consider the case that a verifier launches multiple data verification challenges, and neglect the verification overhead of multiple data verification challenges launched by multiple verifiers at a similar time. In this case, the duplicate data in multiple challenges are verified repeatedly so that verification resources are consumed in vain. We propose a duplicate data verification algorithm based on multiple verifiers and multiple challenges to reduce the verification overhead. The algorithm dynamically schedules the multiple verifiers’ challenges based on verification time and the frequent itemsets of duplicate verification data in challenge sets by applying FP-Growth algorithm, and computes the batch proofs of frequent itemsets. Then the challenges are split into two parts, i.e., duplicate data and unique data according to the results of data extraction. Finally, the proofs of duplicate data and unique data are computed and combined to generate a complete proof of every original challenge. Theoretical analysis and experiment evaluation show that the algorithm reduces the verification cost and ensures the correctness of the data integrity verification by flexible batch data verification.

      • KCI등재

        Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

        Guangwei Xu,Shan Li,Miaolin Lai,Yanglan Gan,Xiangyang Feng,Qiubo Huang,Lili Yang,Wei Li 한국인터넷정보학회 2022 KSII Transactions on Internet and Information Syst Vol.16 No.2

        Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

      • KCI등재

        An experimental study on the cavitation vibration characteristics of a centrifugal pump at normal flow rate

        Yi Li,Guangwei Feng,Xiaojun Li,Qiaorui Si,ZuChao Zhu 대한기계학회 2018 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.32 No.10

        Cavitation is a challenging flow abnormality that leads to undesirable effects on the energy performance of the centrifugal pump and the reliable operation of the pump system. The onset and mechanism of a phenomenon that results in unsteady cavitation must be realised to ensure a reliable operation of pumps under the cavitation state. This study focuses on cavitation instability at normal flow rate, at which point the unsteady cavitation occurs as the available net positive suction head (NPSHa) falls below 5.61 m for the researched pump. An ameliorative algorithm–united algorithm for cavitation vibration analysis is proposed on the basis of short time Fourier transform (STFT) and Wigner–Ville distribution (WVD). The STFT–WVD method is then tested using vibration data measured from the centrifugal pump. The relationship between vibration and suction performance indicates that the inception and development of cavitation can be effectively detected by the distribution and intensity of the united algorithm at the testing points. Intermediate frequency components at approximately 6 kHz fluctuate initially with the development of cavitation. A time–frequency characteristic is found to be conducive to monitoring the cavitation performance of centrifugal pumps.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼