RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        A Hierarchical Model for Mobile Ad Hoc Network Performability Assessment

        ( Shuo Zhang ),( Ning Huang ),( Xiaolei Sun ),( Yue Zhang ) 한국인터넷정보학회 2016 KSII Transactions on Internet and Information Syst Vol.10 No.8

        Dynamic topology is one of the main influence factors on network performability. However, it was always ignored by the traditional network performability assessment methods when analyzing large-scale mobile ad hoc networks (MANETs) because of the state explosion problem. In this paper, we address this problem from the perspective of complex network. A two-layer hierarchical modeling approach is proposed for MANETs performability assessment, which can take both the dynamic topology and multi-state nodes into consideration. The lower level is described by Markov reward chains (MRC) to capture the multiple states of the nodes. The upper level is modeled as a small-world network to capture the characteristic path length based on different mobility and propagation models. The hierarchical model can promote the MRC of nodes into a state matrix of the whole network, which can avoid the state explosion in large-scale networks assessment from the perspective of complex network. Through the contrast experiments with OPNET simulation based on specific cases, the method proposed in this paper shows satisfactory performance on accuracy and efficiency.

      • KCI등재

        Posterior Apophyseal Ring Fracture in Adult Lumbar Disc Herniation: An 8-Year Experience in Minimally Invasive Surgical Management of 48 Cases

        Shuo Yuan,Qichao Wu,Lei Zang,Ning Fan,Peng Du,Aobo Wang,Tianyi Wang,Fangda Si,Jian Li,Xiaochuan Kong 대한척추신경외과학회 2022 Neurospine Vol.19 No.3

        Objective: Posterior apophyseal ring fracture (PARF) is an uncommon disorder that is usually accompanied by lumbar disc herniation (LDH). The aim of this study to describe the 8-year experience of performing minimally invasive treatment of PARF, giving particular attention to surgical technique and clinical outcome. Methods: We reviewed 1,324 consecutive patients with LDH seen in our department between 2013 and 2020. Forty-eight patients (3.63%) were enrolled who were diagnosed with PARF associated with LDH and underwent transforminal endoscopic lumbar discectomy (TELD). Mean duration of the final postoperative follow-up was 5.1 years. The control group was comprised of 50 patients diagnosed with LDH without PARF at the same facility. Data on clinical outcomes were analyzed. Results: The mean operation time in the PARF group was 105.4 minutes, which was longer than the mean operation time of the control group (83.9 minutes) (p = 0.001). Surgical complications, including dural tears (6.3%) and surgical instrument rupture (4.2%) were more common in the PARF group (p = 0.025). However, there was no significant difference in the proportion of excellent and good results and recurrence rates between the LDH patients with and those without PARF, respectively. Conclusion: TELD is a safe and effective minimally invasive approach for the treatment of PARF. However, minimally invasive techniques may require longer operation time and steeper learning curve for inexperienced surgeons. The separation and removal of bone fragments, a key step in the procedure, requires patience and care to prevent rupture, residual surgical instruments, and leakage of cerebrospinal fluid.

      • KCI등재

        Efficient adsorptive elimination of organic pollutants from aqueous solutions on ZIF-8/MWCNTs-COOH nanoadsorbents: Adsorption kinetics, isotherms, and thermodynamic study

        Xinling Zhang,Ning Yuan,Shuo Xu,Yi Li,Qibao Wang 한국공업화학회 2022 Journal of Industrial and Engineering Chemistry Vol.111 No.-

        The removal of organic pollutants was examined by new zeolitic imidazolate framework-8/carboxyl-functionalized multi-walled carbon nanotubes (ZIF-8/MWCNTs-COOH) nanoadsorbents, which were preparedvia controlling the reaction sequence of MWCNTs-COOH with the precursors of ZIF-8. Structuralmorphology and chemical composition characterizations confirmed the successful preparation of ZIF-8/MWCNTs-COOH nanoadsorbents. The obtained samples manifested a preferable adsorption capacityfor Congo red with the maximum adsorption capacity of 1185.58 mg g1 with an adsorption removal rateof 97.93% at equilibrium adsorption. Further analyses indicated that the adsorption process conformed tothe pseudo-second-order kinetic model and Langmuir adsorption isotherm. The thermodynamic analyseswere depicted as endothermic, entropy-increasing, and spontaneous. The effects of pH value, interferingions, and dosage on the adsorption properties were systematically explored. The nanoadsorbent can beexpediently reused for eight cycles without a prominent reduction in adsorption activity. The improvedperformance and high reusability can be ascribed to the increasing specific surface, the presence of electrostaticinteraction, hydrogen bonding, and p–p interaction between ZIF-8/MWCNTs-COOH and organicmolecules. In addition, the prepared composites also showed a better adsorption performance for tetracyclinewith the equilibrium adsorption capacity of 471.22 mg g1 compared to pure ZIF-8 and MWCNTs-COOH.

      • KCI등재

        FRP Flexural Strengthened Concrete Member Design Method of Based on Early-Warning Fuses

        Rong Guo,Shuo Ning,Shaowei Zhao,Minghao Wang 대한토목학회 2020 KSCE JOURNAL OF CIVIL ENGINEERING Vol.24 No.11

        The bearing capacity of members strengthened with prestressed carbon fiber reinforced plastic is improved significantly, however, the ductility of the members strengthened are reduced obviously. Moreover, no sign are observed before the failure and the failure process rapidly. The current study proposed a reinforcement method based on early-warning fuses theory to address this issue and took carbon fiber reinforced plastic as an example. First, it's necessary to determine the area of carbon fiber board and the application of prestressed in each part of the member (early-warning fuses part and load-bearing part). This needs to be determined by the basic safety reserve and the additional safety reserve of the carrying capacity, then the calculation formula are derived; second, designing six simulation beams and four test beams. Based on the comparison of the computation of the derived formula with the simulation and test results, the calculated values of the early-warning load agree well with the simulated and experimental values, and the calculated values of the ultimate load are less than the simulated and experimental values. This showed that the theoretical calculation method has high accuracy. In addition, various evaluation index prove that the members strengthened have sufficient reserves.

      • KCI등재

        A Secure Scan Design based on Scan Scrambling by Pseudorandom Values and Circuit Itself

        Weizheng Wang,Yan Peng,Zuoting Ning,Peng Liu,Shuo Cai 대한전자공학회 2021 Journal of semiconductor technology and science Vol.21 No.6

        Scan-based Design-for-Testability (DfT) methodology has been employed extensively in intellectual property (IP) design to guarantee the testing efficiency. Nevertheless, it also becomes a liability for IP core security because the adversary can steal sensitive information such as secret keys by scan-based attacks. Many protection strategies have been proposed to oppose the scan-based noninvasive attacks by obfuscating the test data. Regrettably, most of these strategies incur the IP performance degradation or put forward the unacceptable resource requirement. In this paper, we propose a new secure scan design scheme, which scramble the test patterns with pseudo-random values and the test responses with selected internal nodes of the circuit. Without the knowledge of circuit design, the adversary cannot apply desired test patterns and cannot recover factual test responses. Thus, it can be prevented to deduce the sensitive information by scan attacks. Through simulation experiments and theoretical analyses, the proposed approach can guarantee the chip security with very low overhead and no impact on the testability.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼