RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • The Study of Services Management Based on the Network Environment

        Xuemin Zhang,Zenggang Xiong,Guangwei Wang,Conghuan Ye,Fang Xu 보안공학연구지원센터 2015 International Journal of Smart Home Vol.9 No.5

        Service-Oriented Architecture (SOA) constructs applications by publishing services in an open network environment. In network environment individual service changes highly dynamically, it is required the system based on services to adapt to this change. But the current service management in network environment doesn’t have a good, unified management mode, management mechanism, service and quality control system, and lacks of theoretical foundation to express formal service system. In this paper, a service management framework is designed. A mechanism and method based on strategy and dynamic network environment service management are proposed. The method can effectively solve the problem of dynamic service management in network environment, and is widely used in dynamic service management based on Web services.

      • P2PCloud-W: A Novel P2PCloud Workflow Management Architecture Based on Petri Net

        Xuemin Zhang,Zenggang Xiong,Gangwei Wang,Conghuan Ye,Xu Fang 보안공학연구지원센터 2015 International Journal of Grid and Distributed Comp Vol.8 No.2

        IaaS model in the Cloud Computing provides infrastructure services to users. However, the provider of such centralized Cloud requires notable investments to maintain the infrastructures. P2P Cloud, whose infrastructures are provided by multiple volunteer nodes in the P2P network, gives a low cost option to the provision of Cloud Computing. P2PCloud workflow is used to handle tasks with control and data dependencies, and plays an important role in P2PCloud environment. It is essential to design an appropriate model to satisfy the distributed and heterogeneous workflow systems that must be flexible, reusable, dynamic feature in higher level. In this paper, An architecture of a P2PCloud system firstly is proposed, and then a P2PCloud-W(P2PCloud workflow system) framework is proposed, which is a novel hybrid decentralized workflow management system facilitating both Cloud and P2P technologies. Finally, a P2PCloud-W case is analyzed using Petri Net.

      • KCI등재

        Effect of Adding Surfactant for Transforming Lignocellulose into Fermentable Sugars during Biocatalysing

        Yuqing Zhang,Xuemin Xu,Yuyuan Zhang,Jianfa Li 한국생물공학회 2011 Biotechnology and Bioprocess Engineering Vol.16 No.5

        Fuel ethanol is one of the most important alternative fuels used as a substitute for fossil fuel. Lignocellulose is the most abundant biomass resource for the production of fuel ethanol. However, the hydrolysis of lignocellulose requires high enzyme loading. In order to strengthen the process of enzyme hydrolysis of lignocellulose,surfactant-polyethylene glycol (PEG) was applied to the catalysis of lignocellulose into fermentable sugars. The effect of PEG on both the enzymatic hydrolysis and adsorption of cellulose were investigated. The addition of surfactant obviously facilitated enzymatic hydrolysis. In particular, upon addition of PEG4000, the enzyme catalytic efficiency increased by 51.06%. Meanwhile,the adsorption quantity of cellulase decreased by 11.25%. In addition, the mechanism of the effect of PEG on enzymatic hydrolysis and cellulase adsorption is discussed.

      • Secure Multimedia Content Distribution for M2M Communication

        Conghuan Ye,Zenggang Xiong,Yaoming Ding,Xuemin Zhang,Guangwei Wang,Fang Xu 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.4

        Multimedia content distribution based on M2M communication is attracting increasing attentions nowadays. Considering that multimedia will be widely used in various applications over M2M network, the wide range of multimedia content and M2M devices has raised new security requirements for multimedia communication. In this paper, we focus on an aspect of DRM that involves secure multimedia distribution which combines multimedia encryption, copy detection, and digital fingerprinting to prevent widespread piracy. Multimedia encryption is used to encrypt multimedia content firstly before distribution, then, Copy detection is used to verify whether a protected multimedia content is a redistributed copy of its or no, At last, digital fingerprinting is introduced to protect multimedia content further. In this paper, we first use using encryption, fingerprinting and copy detection for secure distribution in M2M communication environments. The secure effect of the proposed scheme has been verified through theory analysis and experimental results.

      • Parallel Joint Fingerprinting and Encryption for Social Multimedia Sharing Based on Game of Life

        Conghuan Ye,Zenggang Xiong,Yaoming Ding,Xuemin Zhang,Guangwei Wang,Fang Xu,Kaibing Zhang 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.7

        The advent of online social network and mobile multimedia communication has made content sharing in social network easier and more efficient. It is very important to combine fingerprinting and encryption for social multimedia content protection. In this paper, a parallel JFE (joint fingerprinting and encryption) framework is proposed. Firstly, the multi-level social fingerprint code is produced using social network analysis, and followed by TSH (tree structure harr) wavelet decomposition for multimedia content. And then, fingerprints are embedded into all the LL, HL and LH subbands parallelly. At last, GoL(Game of Life) are used to for confusion for wavelet coefficients parallelly. The proposed parallel JFE method, to the best of our knowledge, is the first JFE method using GoL in the TSH wavelet domain for security and privacy. Theory analysis and experimental results demonstrate the effectiveness of the proposed JFE scheme.

      • A New Collusion Attack Using Interpolation for Multimedia Fingerprinting

        Conghuan Ye,Zenggang Xiong,Yaoming Ding,Xuemin Zhang,Guangwei Wang,Fang Xu 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.5

        Digital fingerprinting is a special digital watermarking technology that can deter legal user to redistribute multimedia content to others. With traitor tracing, it can detect illegal users who use multimedia content illegally. However, collusion attack can avoid some illegal users being detected. With different fingerprinted copies, collusion attack can produce a new colluded fingerprinted copy for get rid of the fingerprint information from the colluded copy, so digital fingerprinting technique should deter collusion attacks. In order to improve the performance of new digital fingerprinting technique in future, this paper presents a new collusion attack approach based on interpolation. The proposed interpolation collusion attack scheme comes from the idea of image fusion. The experimental results demonstrate that the proposed interpolation collusion attack method outperform average attack and maximum attack.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼