RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Investigation of different aspects of laminar horseshoe vortex system using PIV

        Muhammad Yamin Younis,Hua Zhang,Bo Hu,Zaka Muhammad,Saqib Mehmood 대한기계학회 2014 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.28 No.2

        Juncture flow is a classical fluid mechanics problem having wide applications in both aero and hydro dynamics. The flow separatesupstream of the obstacle due to the adverse pressure gradient generated by it, with the formation of the vortical structure called “horseshoevortex.” The current study is carried out for an elliptical leading edge obstacle placed on a flat plate to investigate the horseshoevortex for a range of Reynolds number (ReW) based on maximum width (W) for which the incoming boundary layer is laminar. Fourdifferent types of horseshoe vortex systems were found: the steady, amalgamation, transition and breakaway. The transition vortex systemis one after which the vortex system changes from amalgamation to breakaway. In this phase the vortex system alternatively undergoesboth amalgamation and breakaway vortex cycles. The effect of variation in the chord wise shape of the obstacle is investigated. Thequantitative measurements of PIV show that the vortex system does not undergo any significant change for different chord lengths of themodel with the fixed aspect ratio and maximum width. The most upstream saddle point is also studied for steady horseshoe vortex regionand found that it is the “saddle of attachment” where flow attaches to the plate surface instead of separating from it.

      • SCOPUSKCI등재

        Lipid and Protein Constituents of Crotalaria juncea L.

        Muhammad Akhtar Javed,Muhammad Saleem,Muhammad Yamin,Tanvir Ahmad Chaudri 한국생약학회 1999 Natural Product Sciences Vol.5 No.3

        Seed lipids and proteins of Crotalaria juncea L were analyzed for fatty acids and amino acids respectively. Gas chromatographic analysis of the oil gave palmitic acid (16.01%), stearic acid (7.29%), oleic acid (14.41%), linoleic acid (54.44%) and linolenic acid (7.86%). The defatted seed cake contained all the essential amino acids except methionine and six non-essential amino acids.

      • Evaluation of Various Heuristics Techniques for Home Energy Management Using Smart Grid

        Taher M. Ghazal,Shahan Yamin Siddiqui,Muhammad Ubaidullah,Hafiz Muhammad Usama,Sidra Khan,Muhammad Adnan Khan 한국차세대컴퓨팅학회 2022 한국차세대컴퓨팅학회 학술대회 Vol.2022 No.10

        Electric energy is the basic need for human survival on this earth as these needs increase with the rapid increase in population. It’s become a challenge to manage home energy with the current situation. Smart grid provided different techniques to overcome these challenges to meet the need. This paper presents the result of the different optimization techniques that give the best performance in reducing cost, PAR, and user discomfort. Based on results the best result techniques are also combined to make a hybrid model for more accuracy. This paper not only describes optimization techniques but also the limitations and features of these techniques.

      • SCOPUSKCI등재

        Lipid Studies of Carum Roxburghianum Seeds

        Amran Waheed,Shahid Mahmud,Muhammad Saleem,Muhammad Yamin,Muhammad Naeem Khan 한국생약학회 2003 Natural Product Sciences Vol.9 No.3

        Total lipids extracted from the powdered seeds of Carum roxburghianum were fractionated into hydrocarbons (0.30%), wax esters (0.30%), sterol seters (1.35%), triacylglycerols (72.41%), free fatty acids (6.06%),1,3-diacylglycerols (4.60%), 1,2-diacylglycerols (0.64%), glycolipids (5.10%), sterols (1.20%), 2-monoacylgylcerols ,(3.18%), 1-monoacylglycerols (1.46%), phosphatidylethanolamines (1.08%) phosphatidylchlines (0.40%), lysophosphatidylethanolamines (1.48%) and phosphatidylinositols (0.44%) with the help of TLC. The fatty acid composition ao all the lipid fractions was determined after converting them into their methy1 esters with BF_(3)-methanoll reagent and then analyzing them by GC. Oleic acid was found as a major component in all the lipid classes, whereas palmitic, linoleic and linolenic acids were present in lesser quantities. Arachidic acid was identified as a minor component in only seven out of twelve lipid classes.

      • Cloud Security Issues Detection Using Fuzzy Logic

        Taher M. Ghazal,Shahan Yamin Siddiqui,Muhammad Ubaidullah,Hafiz Muhammad Usama,Ali Younas,Atif Ali 한국차세대컴퓨팅학회 2022 한국차세대컴퓨팅학회 학술대회 Vol.2022 No.10

        Cloud computing is computing that provides, storage, databases, networking, intelligence, software, and analytics over the internet. Cloud services are delivered remotely and almost always from an offsite data center. Cloud services manage a better computing infrastructure efficiently. This study presents security issues & challenges in cloud computing and tries to find out the possible solution for some of the problems. It also discusses some solutions that deal with cloud computing-related to its privacy and security challenges. The proposed Intelligent Cloud Security Issues Detection using Multilayer Mamdani Fuzzy Inference System (ICSID-ML-MFIS) Expert System, can classify the different types of threats. The Expert System has eight input variables at layer-I, three input variables at layers-II, three input variables at layers-III, and six input variables at layers-IV. At layer-I input variables are threat-to-software, Traffic Monitoring, Networking Threat, Resource Availability, Platform availability, Trusted-Service-Availability, Device Availability, and Network Availability that detects output condition of threats to be affected or Not-Affected. At layer-II input variables are Detect SAAS Threats, Detect PAAS Threat, and Detect IAAS Threats, which determine the output condition as Yes or No. At layer-III input variables are Monitoring, Gaining, and managing which determine the output condition as cloud security type DCST. At layer-IV input variables are security incident response (SR), privilege identity management, locate current security problem (SP), super user account, a factor leading to inability to control traffic, and locate social engineering attacks. At last output, the layer consists of eight output types to detect the cloud security issues such as lack of visibility of data, theft of data, inability to control data, hijacking, system vulnerability, social engineering attacks, data breaches, and no-security issues. The proposed model based on Fuzzy reached 91.5% of true positive cases.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼