RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • SCIESCOPUSKCI등재

        PEC: A Privacy-Preserving Emergency Call Scheme for Mobile Healthcare Social Networks

        Liang, Xiaohui,Lu, Rongxing,Chen, Le,Lin, Xiaodong,Shen, Xuemin (Sherman) The Korea Institute of Information and Commucation 2011 Journal of communications and networks Vol.13 No.2

        In this paper, we propose a privacy-preserving emergency call scheme, called PEC, enabling patients in life-threatening emergencies to fast and accurately transmit emergency data to the nearby helpers via mobile healthcare social networks (MHSNs). Once an emergency happens, the personal digital assistant (PDA) of the patient runs the PEC to collect the emergency data including emergency location, patient health record, as well as patient physiological condition. The PEC then generates an emergency call with the emergency data inside and epidemically disseminates it to every user in the patient's neighborhood. If a physician happens to be nearby, the PEC ensures the time used to notify the physician of the emergency is the shortest. We show via theoretical analysis that the PEC is able to provide fine-grained access control on the emergency data, where the access policy is set by patients themselves. Moreover, the PEC can withstandmultiple types of attacks, such as identity theft attack, forgery attack, and collusion attack. We also devise an effective revocation mechanism to make the revocable PEC (rPEC) resistant to inside attacks. In addition, we demonstrate via simulation that the PEC can significantly reduce the response time of emergency care in MHSNs.

      • KCI등재

        Back-stepping Fault-tolerant Control for Morphing Aircraft Based on Fixed-time Observer

        Xiaohui Liang,Qing Wang,Bin Xu,Chaoyang Dong 제어·로봇·시스템학회 2021 International Journal of Control, Automation, and Vol.19 No.12

        In this paper, the problem of the back-stepping fault-tolerant control (FTC) based on fixed-time observer is addressed for the morphing aircraft with model uncertainties, external disturbances, and actuator faults. First, thelongitudinal dynamics for the morphing process are presented, and the control-oriented models subject to undesired malfunctions are established. Second, the fixed-time observer is designed for offering estimations of compounddisturbances, including system uncertainties, disturbance, and malfunction information. Especially, the observer errors could converge to zero by the proposed observer within a settling time, which is independent of the system’sinitial conditions. Then, a back-stepping FTC strategy based on the observations is proposed for the altitude and velocity subsystem, and the stability of the close loop system would be guaranteed by the proposed controller despite the actuator failures. Furthermore, to eliminate the effects of the “explosion of complexity” of the backstepping method, a modified dynamic surface is applied to compute derivatives of virtual laws. Finally, the numerical simulations verify the effectiveness of the proposed control approach.

      • KCI등재

        PEC: A Privacy-Preserving Emergency Call Scheme for Mobile Healthcare Social Networks

        Xiaohui Liang,Rongxing Lu,Le Chen,Xiaodong Lin,Xuemin (Sherman) Shen 한국통신학회 2011 Journal of communications and networks Vol.13 No.2

        In this paper, we propose a privacy-preserving emergency call scheme, called PEC, enabling patients in life-threatening emergencies to fast and accurately transmit emergency data to the nearby helpers via mobile healthcare social networks (MHSNs). Once an emergency happens, the personal digital assistant (PDA)of the patient runs the PEC to collect the emergency data including emergency location, patient health record, as well as patient physiological condition. The PEC then generates an emergency call with the emergency data inside and epidemically disseminates it to every user in the patient’s neighborhood. If a physician happens to be nearby, the PEC ensures the time used to notify the physician of the emergency is the shortest. We show via theoretical analysis that the PEC is able to provide fine-grained access control on the emergency data, where the access policy is set by patients themselves. Moreover,the PEC can withstandmultiple types of attacks, such as identity theft attack, forgery attack, and collusion attack. We also devise an effective revocation mechanism to make the revocable PEC (rPEC) resistant to inside attacks. In addition, we demonstrate via simulation that the PEC can significantly reduce the response time of emergency care in MHSNs.

      • Trust Based Service Selection in Cloud Computing Environment

        Xiaohui Li,Hongxing Liang,Xing Zhang 보안공학연구지원센터 2016 International Journal of Smart Home Vol.10 No.11

        In order to meet cloud user demand for managed service, we propose a scheme based on trust for cloud service selection. The scheme includes the service chosen and services delivered two parts, which can choose the cloud service through its trust value, to meet the safety requirements premise, and make trust decisions to achieve service controllability. First it make choice of the service in accordance with service attributes weight using AHP, then complete user data delivery rely on trust, which allowing users to combine with their own situation and trust in cloud services dynamically adjusting the cloud user data release granularity to reach the controllability of the service .Instance results show that the scheme is effective and can guarantee service selection under safe and controlled conditions.

      • KCI등재

        Separation and Characterization of Organic Chlorides in a Chinese Crude Oil

        Xiaohui Li,Rui Ma,Liang Ding,Huiying Yuan,Bencheng Wu,Jianhua Zhu 대한화학회 2018 Bulletin of the Korean Chemical Society Vol.39 No.4

        A crude oil from Shengli oilfield of China was extracted with N,N‐dimethylformamide (DMF) for separation and enrichment of organic chlorides. The resulting extract with relatively higher chlorine concentration was analyzed with gas chromatography–mass spectrometry (GC/MS). Among the identified heteroatom compounds in the extract sample, nitrogen‐containing compounds were most abundant in the extract sample, followed by chlorine‐, sulfur‐, and oxygen‐containing compounds, respectively. Four organochlorines with an aromatic core structure, i.e., 5‐chloro‐2‐methylaniline, 2‐chloro‐6‐methylaniline, 4‐chloro‐2‐nitrotoluene, and 1‐(5‐chloro‐2‐hydroxyphenyl)ethanone, were identified from crude oil extract. The dominant abundant organic chloride is 5‐chloro‐2‐methylaniline with relative content of 65.1% in the total of identified organic chlorides, followed by 1‐(5‐chloro‐2‐hydroxyphenyl)ethanone of 16.3%, 2‐chloro‐6‐methylaniline of 14.5%, and 4‐chloro‐2‐nitrotoluene of 4.1%, respectively.

      • Research on Privacy Protection Approach for Cloud Computing En-vironments

        Xiaohui Li,Hongxing Liang,Dan Jia 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.3

        Cloud computing is a convenient and cost efficient way that refers to the running of software over a network, as on a local computer. But, what is cheap and easy, isn’t always safe. Stor-ing important data on cloud means that you give up a certain control of privacy. Privacy pro-tection is a very important issue in cloud computing. In this paper,we focus on the need of cloud users managed services and propose an approach for data protection based trust mech-anism, which using adaptive mapping resources based on trust to ensure the user data protec-tion initiative, and data security. The analysis shows that the cloud user can independently con-trols the content and manner of services by using the approach, which can achieve the free de-ployment of resources and the balance of user data protection and service provided.

      • KCI등재

        Effect of Electrostatic Spraying Conditions on Droplet Deposition in Different Depth Areas on the Back of Target

        Zhao Liang,Hao Ding,Guangming Wang,Xiaohui Zhang 한국전기전자재료학회 2020 Transactions on Electrical and Electronic Material Vol.21 No.2

        In order to explore the optimal spraying effect of diff erent electrostatic spraying parameters on droplet deposition on the back of target, the application height, angle, charging voltage, and nozzle water pressure had been applied as spraying variables for the test designed to investigate on droplet density, deposition and coverage in diff erent depth areas of the target. The results of the study showed that the height and angle of the spatial parameters of the application had a significant effect on the application effect. The droplet deposition effect decreased by 94.71%, 89.09% and 94.17% at diff erent depths on the back of the target as the height increased from 20 to 50 cm. The deposition effects of droplets at diff erent depths on the back of the target at 60° tilt angle are 5.91%, 9.81% and 51.97% of them at 0° tilt angle respectively. The results of orthogonal experiment showed that the optimal parameters of diff erent depth areas on the back of different targets were inconsistent. The height and angle of application are the main influencing factors, when the target is warped up. The depth range of the target (5–7.5 cm) is greatly affected by the nozzle water pressure. In the actual spraying pesticides application, the appropriate operating parameters can be selected according to the size and attitude of the leaf surface to improve the spraying effect.

      • KCI등재

        The Effect of pH on the Efficiency of an SBR Processing Piggery Wastewater

        LiLong Yan,Yu Liu,Yuan Ren,Xiaohui Wang,Haijing Liang,Ying Zhang 한국생물공학회 2013 Biotechnology and Bioprocess Engineering Vol.18 No.6

        To treat piggery wastewater efficiently, thehydrolysis of urea (mainly derived from swine urine) inpiggery wastewater with the change of sewage pH must beconsidered. Using activated sludge, piggery wastewaterwas treated in a sequencing batch reactor (SBR), and theeffects of influent pH on SBR processing efficiency, sludgesettle ability, and sludge activity were investigated. Theresults showed that a high influent pH value contributed tothe improvement of the removal rate of ammonia nitrogenand reduction of the chemical oxygen demand (COD). When the influent pH was between 9.0 and 9.5, the removalrate of ammonia nitrogen was higher than 90%, and thereduction of COD from its original value was 80%. Theinfluent pH had a greater influence on sludge concentrationand sludge activity. When the influent pH increased from7.0 to 9.5, the sludge concentration increased from 2,350 to3,947 mg/L in the reactor, and the activities of ammoniumoxidizing bacteria (AOB) and nitrite oxidizing bacteria(NOB) first increased and then decreased. When theinfluent pH was 9.0 and 8.0, the maximum values (0.48 gO2/(g MLSS/day) and 0.080 g O2/(g MLSS/day)) werereached, and the sludge settling ratio was nearly steadybetween 20 and 35% in each reactor.

      • KCI등재

        Thermal Analysis of 3J33 Grinding Under Minimum Quantity Lubrication Condition

        Zishan Ding,Jian Sun,Weicheng Guo,Xiaohui Jiang,Chongjun Wu,Steven Y. Liang 한국정밀공학회 2022 International Journal of Precision Engineering and Vol.9 No.5

        With the increasing requirements of environmental protection, energy conservation, and low consumption, minimum quantity lubrication (MQL) technology has attracted people’s attention. In the grinding process, the cooling performance of MQL has always been the focus. In this study, considering the influence of the grinding wheel speed, grinding fluid flow rate, and gas pressure on the useful flow rate, the MQL grinding cooling performance was studied and analyzed, and the MQL grinding heat transfer coefficient model, grinding energy partition model and grinding temperature calculation model were established. Grinding experiments were carried out with maraging steel 3J33 as the experimental object, of which the results verified the accuracy of the model. The error of temperature calculation model is 9.45%. The influence of different parameters on the surface processing quality of the workpiece was studied through experimental results. The results show that the grinding wheel speed and gas pressure have a more significant influence on the useful fl ow rate of the grinding fluid. The grinding fluid flow rate but significant impact on the surface quality of the workpiece.

      • SCIESCOPUSKCI등재

        Temporal expression profiling of long noncoding RNA and mRNA in the peripheral blood during porcine development

        Gu, Yiren,Zhou, Rui,Jin, Long,Tao, Xuan,Zhong, Zhijun,Yang, Xuemei,Liang, Yan,Yang, Yuekui,Wang, Yan,Chen, Xiaohui,Gong, Jianjun,He, Zhiping,Li, Mingzhou,Lv, Xuebin Asian Australasian Association of Animal Productio 2020 Animal Bioscience Vol.33 No.5

        Objective: We investigated the temporal expression profiles of long noncoding RNA (lncRNA) and mRNA in the peripheral blood of pigs during development and identified the lncRNAs that are related to the blood-based immune system. Methods: Peripheral blood samples were obtained from the pigs at 0, 7, 28, and 180 days and 2 years of age. RNA sequencing was performed to survey the lncRNA and mRNA transcriptomes in the samples. Short time-series expression miner (STEM) was used to show temporal expression patterns in the mRNAs and lncRNAs. Gene ontology and Kyoto encyclopedia of genes and genomes analyses were performed to assess the genes' biological relevance. To predict the functions of the identified lncRNAs, we extracted mRNAs that were nearby loci and highly correlated with the lncRNAs. Results: In total of 5,946 lncRNA and 12,354 mRNA transcripts were identified among the samples. STEM showed that most lncRNAs and mRNAs had similar temporal expression patterns during development, indicating the expressional correlation and functional relatedness between them. The five stages were divided into two classes: the suckling period and the late developmental stage. Most genes were expressed at low level during the suckling period, but at higher level during the late stages. Expression of several T-cell-related genes increased continuously during the suckling period, indicating that these genes are crucial for establishing the adaptive immune system in piglets at this stage. Notably, lncRNA TCONS-00086451 may promote blood-based immune system development by upregulating nuclear factor of activated T-cells cytoplasmic 2 expression. Conclusion: This study provides a catalog of porcine peripheral blood-related lncRNAs and mRNAs and reveals the characteristics and temporal expression profiles of these lncRNAs and mRNAs during peripheral blood development from the newborn to adult stages in pigs.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼