RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment

        MA, Zhuo,MA, Jianfeng,MOON, SangJae,LI, Xinghua The Institute of Electronics, Information and Comm 2010 IEICE transactions on information and systems Vol.93 No.3

        <P>Trusted Network Connect provides the functionality of the platform authentication and integrity verification which is crucial for enhancing the security of authentication protocols. However, applying this functionality directly to concrete authentications is susceptible to unknown attacks and efficiency degradation. In this paper, we propose TWMAP, a novel authentication protocol for WLAN Mesh networks in a trusted environment which completed the platform authentication and integrity verification during the user authentication. And, the Schnorr asymmetric signature scheme is utilized to reduce the overhead of the client. The security properties of the new protocol are examined using the Universally Composable Security model. The analytic comparisons and simulation results show that the new protocol is very efficient in both computing and communication costs.</P>

      • KCI등재

        Investigation of Electrochemical Performance on SnSe2 and SnSe Nanocrystals as Anodes for Lithium Ions Batteries

        Yayi Cheng,Jianfeng Huang,Liyun Cao,Yongfeng Wang,Ying Ma,Shaohua Xi,Bingyao Shi,Hui Xie,Jiayin Li 성균관대학교(자연과학캠퍼스) 성균나노과학기술원 2019 NANO Vol.15 No.01

        SnSe2 and SnSe nanocrystals were prepared using a simple solvothermal method by changing the molar ratio of SnCl2 · 2H2O and Se powder. When SnSe2 and SnSe are acted as lithium ion battery anodes, the SnSe hybrid structure shows more excellent electrochemical performance than that of SnSe2 interconnected nanosheet. It delivers a reversible capacity of 1023 mA h g -1 at a current density of 200 mA g -1, and maintaining a capacity of 498 mA h g -1 till 120 cycles. According to many present works, SnSe2 with interconnected thin nanosheet should possess more superior property than hybrid structured SnSe due to short charge transfer paths. However, in our research, the result is the opposite. Therefore, we consider that the superior electrochemical performance of SnSe is attributed to its highly reversible conversion reaction mechanism than SnSe2.

      • KCI등재

        Visible light photocatalytic removal performance and mechanism of diclofenac degradation by Ag3PO4 sub-microcrystals through response surface methodology

        Jianfeng Gou,Qiuling Ma,Yuqi Cui,Xiaoyong Deng,Huixuan Zhang,Xiuwen Cheng,Xiaoli Li,Mingzheng Xie,Qingfeng Cheng,Huiling Liu 한국공업화학회 2017 Journal of Industrial and Engineering Chemistry Vol.49 No.-

        In this study, high visible light response and charge separation efficiency of body-centered cubic Ag3PO4sub-microcrystals were fabricated through ultrasound-precipitation process. Additionally, the parameterswere optimized by photocatalytic (PC) removal degradation of diclofenac based on response surfacemethodology. Results indicated that the PC removal efficiency of diclofenac was significantly affected byAg3PO4 content and pH value. Under the optimized conditions, 99.9% of diclofenac could be degradedwithin 16 min Xenon illumination. Furthermore, three PC removal degradation pathways of diclofenacwere proposed, including OH-adduct to aromatic ring, direct oxidation by photoinduced holes anddecarboxylation of side chain from the parent compound.

      • KCI등재

        An Efficient Algorithm for the Tensor Product Model Transformation

        Jianfeng Cui,Ke Zhang,Tiehua Ma 제어·로봇·시스템학회 2016 International Journal of Control, Automation, and Vol.14 No.5

        The tensor-product (TP) model transformation was proposed recently as a numerical and automaticallyexecutable method which is capable of transforming linear parameter varying (LPV) state-space models into thehigher order singular value decomposition (HOSVD) based canonical form of polytopic models. The crucial disadvantageof the TP model transformation is that its computational load explodes with the density of discretization andthe dimensionality of the parameter vector of the parameter-varying state-space model. In this paper we propose anew algorithm that leads to considerable reduction of the computation in the TP model transformation. The mainidea behind the modified algorithm is to minimize the number of discretized points to acquire as much informationas possible. The modified TP model transformation can readily be executed on a regular computer efficiently andconcisely, especially in higher dimensional cases when the original TP model transformation fails. The paper alsopresents numerical examples to show the effectiveness of the new algorithm.

      • KCI등재

        Effects of the friction coefficient on the torque characteristics of a hydraulic cam-rotor vane motor

        Qiankun Ma,Xuyong Wang,Fan Yuan,Liangshen Chen,Jianfeng Tao,Zhonghua Miao 대한기계학회 2016 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.30 No.8

        The friction coefficient between the vane and the slot is one of the most critical factors that affects the performance of a continuous rotary hydraulic cam-rotor vane motor. To study the effects of this coefficient on the torque characteristics of the motor, the mathematical model for the normal force and the disturbing torque between the cam rotors and the vanes of the motor was established by analyzing the forces exerted on the vanes. The mathematical model was simulated with MATLAB, and simulation results show that an increase in the friction coefficient would simultaneously decrease the normal force and increase the disturbing torque, which would negatively affect the performance of the motor. Further experimental research indicated that the low-speed performance of the hydraulic cam-rotor motor was significantly improved when the friction coefficient was reduced by controlling the parallelism tolerance, flatness and roughness between the vanes and the slots.

      • SCOPUS

        Design of Intelligent Information Monitoring System for Distribution Network and Adjustment of Alarm Threshold

        Xiang Ma,Jianye Cui,Zhongming Xiang,Haoliang Du,Jianfeng Huang 한국정보과학회 2022 Journal of Computing Science and Engineering Vol.16 No.2

        In the current distribution network information monitoring system, there are many false alarm information, which forms redundant interference to the fault alarm threshold, and it is difficult to ensure the alarm accuracy of the monitoring system. The distribution network intelligent information monitoring system and the alarm threshold adjustment method based on machine learning are designed, with the physical layer of the system designed to collect the operation status information of each line and equipment of the distribution network according to various sensors, and transfer it to the data layer. The data layer extracts, processes, and classifies the received information, stores it in the database, obtains the abnormal information in the information base, and adjusts the alarm threshold based on the fuzzy clustering method in machine learning, realizing intelligent monitoring of distribution network. The test results show that the detection performance of abnormal information is good, that the abnormal information in the data can be obtained accurately, and that the clustering of the target category of abnormal information can be completed according to the eigenvalue, and has a good threshold adaptive adjustment ability, to maximize the balance between human, machine, and power grid operation state in the process of distribution network monitoring information, ensure real-time and reliable monitoring and alarm results.

      • SCISCIESCOPUS

        Asymmetric Key Pre-distribution Scheme for sensor networks

        Zhihong Liu,Jianfeng Ma,Qiping Huang,SangJae Moon IEEE 2009 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS Vol.8 No.3

        <P>A key pre-distribution scheme is a method by which initially an off-line trusted authority distributes pieces of information among a set of users. Later, each member of a group of users can compute a common key for secure communication. In this paper we present an asymmetric key pre-distribution scheme. Instead of assuming that the network is comprised entirely of identical users in conventional key pre-distribution schemes, the network now consists of a mix of users with different missions, i.e., ordinary users and keying material servers. A group of users, using secret keys preloaded in their memory and public keying material retrieved from one keying material server, can compute a session key. The properties of this method are that, the compromise of keying material servers does not reveal any information about users' secret keys and the session keys of privileged subset of users; if computational assumptions are considered, each user has very low storage requirement. These properties make it attractive for sensor networks. We first formally define the asymmetric key pre-distribution scheme in terms of the entropy and give lower bounds on user's storage requirement and the public keying material size. Then, we present its constructions and applications for sensor networks.</P>

      • SCIESCOPUSKCI등재

        A Highly Secure Identity-Based Authenticated Key-Exchange Protocol for Satellite Communication

        Yantao, Zhong,Jianfeng, Ma The Korea Institute of Information and Commucation 2010 Journal of communications and networks Vol.12 No.6

        In recent years, significant improvements have been made to the techniques used for analyzing satellite communication and attacking satellite systems. In 2003, a research team at Los Alamos National Laboratory, USA, demonstrated the ease with which civilian global positioning system (GPS) spoofing attacks can be implemented. They fed fake signals to the GPS receiver so that it operates as though it were located at a position different from its actual location. Moreover, Galileo in-orbit validation element A and Compass-M1 civilian codes in all available frequency bands were decoded in 2007 and 2009. These events indicate that cryptography should be used in addition to the coding technique for secure and authenticated satellite communication. In this study, we address this issue by using an authenticated key-exchange protocol to build a secure and authenticated communication channel for satellite communication. Our protocol uses identity-based cryptography. We also prove the security of our protocol in the extended Canetti-Krawczyk model, which is the strongest security model for authenticated key-exchange protocols, under the random oracle assumption and computational Diffie-Hellman assumption. In addition, our protocol helps achieve high efficiency in both communication and computation and thus improve security in satellite communication.

      • Secure Message Distribution Scheme with Configurable Privacy in Heterogeneous Wireless Sensor Networks

        LI, YaHui,MA, JianFeng,MOON, SangJae The Institute of Electronics, Information and Comm 2010 IEICE transactions on information and systems Vol.93 No.3

        <P>Security and privacy of wireless sensor networks are key research issues recently. Most existing researches regarding wireless sensor networks security consider homogenous sensor networks. To achieve better security and performance, we adopt a heterogeneous wireless sensor network (HWSN) model that consists of physically different types of sensor nodes. This paper presents a secure message distribution scheme with configurable privacy for HWSNs, which takes advantage of powerful high-end sensor nodes. The scheme establishes a message distribution topology in an efficient and secure manner. The sensor node only need generate one signature for all the messages for all the users, which can greatly save the communication and computation cost of the sensor node. On the other hand, the user can only know the messages that let him know based on a pre-set policy, which can meet the requirement of the privacy. We show that the scheme has small bandwidth requirements and it is resilient against the node compromise attack.</P>

      • KCI등재

        Similarity of User Ratings Play a Positive Information Filter in Social Networks

        Hui Xie,Jianfeng Ma,Lin Yang 한국물리학회 2013 THE JOURNAL OF THE KOREAN PHYSICAL SOCIETY Vol.62 No.9

        In the past decade, social recommending systems have attracted increasing attention from the physical, social and computer science communities. In this study, we use social networks to capture similarities of users’ interest and, accordingly, recommending systems to explore latent similarities. We build similarity-ratings-prediction models for a dataset of books and reviewers from Douban.com. The similarities are measured by the Pearson and the Jaccard correlation coefficients. Using singular value decomposition, we evaluate the strengths and the weaknesses of the similarity measure, and discuss their effectiveness in recommending systems.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼