RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Joint Routing and Channel Assignment in Multi-rate Wireless Mesh Networks

        ( Jiping Liu ),( Wenxiao Shi ),( Pengxia Wu ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.5

        To mitigate the performance degradation caused by performance anomaly, a number of channel assignment algorithms have been proposed for multi-rate wireless mesh networks. However, network conditions have not been fully considered for routing process in these algorithms. In this paper, a joint scheme called Multi-rate Dijkstra`s Shortest path - Rate Separated (MDSRS) is proposed, combining routing metrics and channel assignment algorithm. In MDSRS, the routing metric are determined through the synthesized deliberations of link costs and rate matches; then the rate separated channel assignment is operated based on the determined routing metric. In this way, the competitions between high and low rate links are avoided, and performance anomaly problem is settled, and the network capacity is efficiently improved. Theoretical analysis and NS-3 simulation results indicate that, the proposed MDSRS can significantly improve the network throughput, and decrease the average end-to-end delay as well as packet loss probability. Performance improvements could be achieved even in the heavy load network conditions.

      • An EU-E decision model and explanations of the certainty effect in prospect theory

        Jiping Yang 인하대학교 정석물류통상연구원 2009 인하대학교 정석물류통상연구원 학술대회 Vol.2009 No.10

        We proposed a measure of risk and a decision making model based on expected utility and entropy, which are called the EU-E measure of risk and the EU-E decision model in our previous studies. The EU-E measure of risk reflects an individual’s an individual’s intuitive attitude toward risk and can solve a kind of risky decision making problems. In this paper, we have further discussed the EU-E decision model. Using this decision model, the certainty effect in prospect theory can be interpreted in a reasonable way. we further demonstrate the reasonability of this model being as a descriptive or a normative decision model involving risk to some extent.

      • KCI등재
      • KCI등재

        Preparation of magnetic metal-organic frameworks with high binding capacity for removal of two fungicides from aqueous environments

        Jiping Ma,Shuang Li,Gege Wu,Maryam Arabi,Feng Tan,Yafeng Guan,Jinhua Li,Lingxin Chen 한국공업화학회 2020 Journal of Industrial and Engineering Chemistry Vol.90 No.-

        A novel kind of Zr-based magnetic metal-organic frameworks (MMOFs) was prepared by immobilizationof UiO-66 onto Fe3O4@SiO2 particles via an efficient one-pot solvothermal method. Subsequently, it wasused for adsorptive removal of triclosan (TCS) and triclocarban (TCC) fungicides from aqueousenvironments by magnetic solid phase separation. Morphology and physical/chemical features of theMMOFs were fully characterized by XRD, SEM, TEM, FT-IR, and VSM etc., showing high specific surfacearea, appropriate functionality, and desirable magnetic property. Several main factors affecting theadsorption performances of TCS and TCC on the MMOFs were systematically investigated and optimized,such as pH value of water sample, amounts/types of adsorbent and salinity. Under the optimizedconditions, short adsorption equilibrium time (only 25 min) and outstanding saturated adsorptioncapacities (476.27 and 602.40 mg g 1 for TCS and TCC, respectively) were the remarkable superiorities ofthe MMOFs compared with that of most reported adsorbents. The MMOFs demonstrated excellentadsorption selectivity for TCS and TCC and anti-interference ability. Also, the reusability for at least 11cycles was another major profit of the MMOFs that saved cost and prevented waste. Moreover, theMMOFs demonstrated satisfactory removal/purification ability for actual environmental water samples. These benefits propounded a promising outlook of employing the MMOFs for influential removal ofpollutants with considerable reliability in thefield of wastewater treatment.

      • KCI등재

        An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks

        ( Jiping Li ),( Yaoming Ding ),( Zenggang Xiong ),( Shouyin Liu ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.11

        As a main component of Internet of Things (IoTs), the wireless sensor networks (WSNs) have been widely applied to various areas, including environment monitoring, health monitoring of human body, farming, commercial manufacture, reconnaissance mission in military, and calamity alert etc. Meanwhile, the privacy concerns also arise when the users are required to get the real-time data from the sensor nodes directly. To solve this problem, several user authentication and key agreement schemes with a smart card and a password have been proposed in the past years. However, these schemes are vulnerable to some attacks such as offline password guessing attack, user impersonation attack by using attacker’s own smart card, sensor node impersonation attack and gateway node bypassing attack. In this paper, we propose an improved scheme which can resist a wide variety of attacks in WSNs. Cryptanalysis and performance analysis show that our scheme can solve the weaknesses of previously proposed schemes and enhance security requirements while maintaining low computational cost.

      • KCI등재

        A Heuristic Algorithm for Optimal Facility Placement in Mobile Edge Networks

        ( Jiping Jiao ),( Lingyu Chen ),( Xuemin Hong ),( Jianghong Shi ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.7

        Installing caching and computing facilities in mobile edge networks is a promising solution to cope with the challenging capacity and delay requirements imposed on future mobile communication systems. The problem of optimal facility placement in mobile edge networks has not been fully studied in the literature. This is a non-trivial problem because the mobile edge network has a unidirectional topology, making existing solutions inapplicable. This paper considers the problem of optimal placement of a fixed number of facilities in a mobile edge network with an arbitrary tree topology and an arbitrary demand distribution. A low-complexity sequential algorithm is proposed and proved to be convergent and optimal in some cases. The complexity of the algorithm is shown to be O(H<sup>2</sup>γ), where H is the height of tree and γ is the number of facilities. Simulation results confirm that the proposed algorithm is effective in producing near-optimal solution

      • KCI등재

        Hypoglycemic and Antioxidant Activities of Paeonol and Its Beneficial Effect on Diabetic Encephalopathy in Streptozotocin-Induced Diabetic Rats

        Jiping Liu,Shuyuan Wang,Liang Feng,Dongying Ma,Qiang Fu,Yu Song,Xiaobin Jia,Shiping Ma 한국식품영양과학회 2013 Journal of medicinal food Vol.16 No.7

        Diabetic encephalopathy (DE) is one of the severe complications in patients with diabetes mellitus. Paeonol, an active compound isolated from the root bark of Paeonia suffruticosa, has significant antidiabetic activity in vivo. However, its underlying beneficial effects on DE were unclear. In the present study, the protective activity of paeonol on DE was evaluated in streptozotocin (STZ)-induced diabetic rats. Paeonol at 50 and 100mg/kg significantly increased body weight and decreased blood glucose levels, glycosylated serum proteins, and serum advanced glycation end products (AGEs) levels. Immunohistochemistry assays and Western blot analysis revealed a significant decrease in expressions on receptor for advanced glycation end products (RAGE) and nuclear factor kappa B (NF-jB) in hippocampus and cerebral cortical neurons after paeonol treatment. Furthermore, paeonol significantly increased glutathione content and remarkedly decreased induced nitric oxide synthase activity in hippocampus tissue. Our findings indicated that paeonol could improve the pathological damage of DE in STZ-induced diabetic rats. It might be associated with the modulating AGEs/RAGE/NF-jB pathway. This study suggested that paeonol might be a promising candidate for the prevention and treatment of DE.

      • KCI등재후보

        A Dynamical Hybrid CAC Scheme and Its Performance Analysis for Mobile Cellular Network with Multi-Service

        ( Jiping Li ),( Shixun Wu ),( Shouyin Liu ) 한국인터넷정보학회 2012 KSII Transactions on Internet and Information Syst Vol.6 No.6

        Call admission control (CAC) plays an important role in mobile cellular network to guarantee the quality of service (QoS). In this paper, a dynamic hybrid CAC scheme with integrated cutoff priority and handoff queue for mobile cellular network is proposed and some performance metrics are derived. The unique characteristic of the proposed CAC scheme is that it can support any number of service types and that the cutoff thresholds for handoff calls are dynamically adjusted according to the number of service types and service priority index. Moreover, timeouts of handoff calls in queues are also considered in our scheme. By modeling the proposed CAC scheme with a one-dimensional Markov chain (1DMC), some performance metrics are derived, which include new call blocking probability ( P<sub>nb</sub> ) , forced termination probability (PF), average queue length, average waiting time in queue, offered traffic utilization, wireless channel utilization and system performance which is defined as the ratio of channel utilization to Grade of Service (GoS) cost function. In order to validate the correctness of the derived analytical performance metrics, simulation is performed. It is shown that simulation results match closely with the derived analytic results in terms of P<sub>nb</sub> and PF. And then, to show the advantage of 1DMC modeling for the performance analysis of our proposed CAC scheme, the computing complexity of multi-dimensional Markov chain (MDMC) modeling in performance analysis is analyzed in detail. It is indicated that state-space cardinality, which reflects the computing complexity of MDMC, increases exponentially with the number of service types and total channels in a cell. However, the state-space cardinality of our 1DMC model for performance analysis is unrelated to the number of service types and is determined by total number of channels and queue capacity of the highest priority service in a cell. At last, the performance comparison between our CAC scheme and Mahmoud ASH`s scheme is carried out. The results show that our CAC scheme performs well to some extend.

      • KCI등재

        An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs

        Jiping Li,Yuanyuan Zhang,Lixiang Shen,Jing Cao,Wenwu Xie,Yizheng,Shouyin Liu 한국인터넷정보학회 2024 KSII Transactions on Internet and Information Syst Vol.18 No.3

        For Internet of Things, it is more preferred to have immediate access to environment information from sensor nodes (SNs) rather than from gateway nodes (GWNs). To fulfill the goal, mutual authentication scheme between user and SNs with session key (SK) negotiation is more suitable. However, this is a challenging task due to the constrained power, computation, communication and storage resources of SNs. Though lots of authentication schemes with SK negotiation have been designed to deal with it, they are still insufficiently secure and/or efficient, and some even have serious vulnerabilities. Therefore, we design an efficient secure authentication scheme with session key negotiation (eSAS2KN) for wireless sensor networks (WSNs) utilizing fuzzy extractor technique, hash function and bitwise exclusive-or lightweight operations. In the eSAS2KN, user and SNs are mutually authenticated with anonymity, and an SK is negotiated for their direct and instant communications subsequently. To prove the security of eSAS2KN, we give detailed informal security analysis, carry out logical verification by applying BAN logic, present formal security proof by employing Real-Or-Random (ROR) model, and implement formal security verification by using AVISPA tool. Finally, computation and communication costs comparison show the eSAS2kN is more efficient and secure for practical application.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼