RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Geological characteristics and main controlling factors of Permian lacustrine tight oil in the eastern part of the Junggar Basin

        Junwei Zhao,Huaimin Xu,Cui He,Lin Li,Zhen Yi,Huijing Fang,Zhicheng Lei 한국지질과학협의회 2017 Geosciences Journal Vol.21 No.2

        The Junggar basin is rich in oil and gas resources, and recently, unconventional oil and gas reservoirs have become important targets. Significant amounts of oil and gas are located in Permian formations in the Shazhang–Dajing area, however, fewer studies have focused on unconventional oil and gas reservoirs, particularly on the factors controlling the distribution of unconventional reservoirs. In this study, a sequence stratigraphic framework of the study area was developed based on cores, well logs and seismic data. Source rock samples were analyzed, including tests of kerogen, vitrinite reflectance, chloroform bitumen, organic carbon and group composition. The physical properties and pore characteristics of reservoir samples were also analyzed using scanning electron microscope and high resolution electron microscope. The Permian Pingdiquan Formation comprises three thirdorder sequences in which individual sequence can be divided into a low-stand system tract (LST), a transgression system tract (TST), an early high-stand system tract (E-HST), and a late high-stand system tract (L-HST). Several source rock lithologies have high total organic carbon (TOC), and are matured, having excellent hydrocarbon generation potential. Clastic and dolomitic rocks are the main reservoirs, and nanometer-scale pores are the main reservoir space in the tight reservoirs. The distribution of tight oil is controlled by the sequence stratigraphy, palaeogeomorphic units, and sedimentary facies. The fine sediments, which were generally deposited near the initial flooding surface (FFS) and the maximum flooding surface (MFS), are favorable zones for tight oil. The distributions of the hydrocarbon source rocks are controlled by the depositional environment, depending on the palaeogeomorphic units; the deep depression in the Huoshaoshan area and the moderately-deep depression in the Shishugou area are two distinct hydrocarbon generating centers. The distribution of tight oil is clearly controlled by the sedimentary facies; the tight oil is mainly located in the fan delta front and lacustrine depositional environments. The distribution of tight oil in this area is summarized, and favorable areas of tight oil are proposed.

      • KCI등재후보

        CDN Scalability Improvement using a Moderate Peer-assisted Method

        ( Peichang Shi ),( Huaimin Wang ),( Hao Yin ),( Bo Ding ),( Tianzuo Wang ),( Miao Wang ) 한국인터넷정보학회 2012 KSII Transactions on Internet and Information Syst Vol.6 No.3

        Content Delivery Networks (CDN) server loads that fluctuant necessitate CDN to improve its service scalability especially when the peak load exceeds its service capacity. The peer assisted scheme is widely used in improving CDN scalability. However, CDN operators do not want to lose profit by overusing it, which may lead to the CDN resource utilization reduced. Therefore, improving CDN scalability moderately and guarantying CDN resource utilization maximized is necessary. However, when and how to use the peer-assisted scheme to achieve such improvement remains a great challenge. In this paper, we propose a new method called Dynamic Moderate Peer-assisted Method (DMPM), which uses time series analysis to predict and decide when and how many server loads needs to offload. A novel peer-assisted mechanism based on the prediction designed, which can maximize the profit of the CDN operators without influencing scalability. Extensive evaluations based on an actual CDN load traces have shown the effectiveness of DMPM.

      • Implicit Detection of Hidden Processes with a Local-Booted Virtual Machine

        Yan Wen,Huaimin Wang,Jinjing Zhao 보안공학연구지원센터 2008 International Journal of Security and Its Applicat Vol.2 No.4

        Currently stealth malware is becoming a major threat to the PC computers. Process hiding is the technique commonly used by stealth malware to evade detection by anti-malware scanners. On the defensive side, previous host-based approaches will be defeated once the privileged stealth malware controls a lower reach of the system. The virtual machine (VM) based solutions gain tamper resistance at the cost of losing the OS-level process view. Moreover, existing VM-based approaches cannot introspect the preinstalled OS which is just the protecting concern for PC users. In this paper, we present a new VM-based approach called Libra which accurately reproduces the software environment of the underlying preinstalled OS within the Libra VM and provides an OS-level semantic view of the processes. With our new local-booting technology, Libra VM just boots from the underlying host OS but not a newly installed OS image. Thus, Libra provides a way to detect the existing process-hiding stealth malware in the host OS. In addition, instead of depending on the guest information which is subvertable to the privileged guest malware, Libra adopts a unique technique to implicitly construct the Trusted View of Process List (TVPL) from within the virtualized hardware layer. Our evaluation results with real-world hiding-process rootkits, which are widely used by stealth malware, demonstrate its practicality and effectiveness.

      • Towards Reliable Trust Management based on Structural Trust Scopes of Distributed Roles

        Gang Yin,Huaimin Wang,Ning Zhou 보안공학연구지원센터 2009 International Journal of Security and Its Applicat Vol.3 No.1

        Role based trust management uses distributed role hierarchies (DRH) to provide flexible and scalable authorization in multi-domain environments, but DRH are inherently transitive and may easily lead to unexpected or even illegal authorization. In this paper, we propose TS-DRH, a generalized extension of DRH based on a novel trust scope model of distributed roles. TS-DRH introduces the notion of scoped roles with four kinds of structural trust scopes, and uses scoped roles to control the member scopes of senior roles and the permission scopes of junior roles, and thus helps to control the propagation of role memberships and permissions in DRH. This paper also designs rule based semantics and a compliance checking algorithm to compute authorization decisions for TS-DRH.

      • Temperature Characteristics of Power Ternary Polymer Li-ion Batteries

        Fang Haifeng,Cai Lihua,Lu Huaimin,Wei Benjian,Zhu Hongping 보안공학연구지원센터 2015 International Journal of Hybrid Information Techno Vol.8 No.11

        The characteristics of power ternary polymer Li-ion batteries are closely connected to ambient temperature. The capacity characteristic, resistance and state of charge-open circuit voltage (SOC-OCV) curve are important parameters to represent the performance of power batteries and to determine battery management system (BMS) design. The experiments at different ambient temperatures are carried out and the laws between temperature and capacity, resistance and OCV are studied. The capacity drops sharply under low temperature, and increases with a relatively slower rate than under low temperature when the temperature goes up. Polarization and ohmic resistances during charge and discharge process decrease when the temperature rises, and the change rate of ohmic resistance is higher than that of the polarization resistance. Moreover, the change of ohmic resistance under low temperature is more significant than under high temperature. With the decrease of temperature, the SOC-OCV curve moves down, but generally, the curve is affected only slightly by the temperature.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼