RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Study on Forage Oat in Qinghai Alpine Region

        Yajun Ji,Qingping Zhou,Hongbo Yan,Wenhui Liu 한국초지조사료학회 2009 한국초지조사료학회 학술대회논문집 Vol.2009 No.08

        The cultivation of oat in China could be traced back to 2500 B.C. while the Qinghai province, which located in the North-East of the Qinghai-Tibetan Plateau, has been the major region for oat production due to its high quality caused by the unique climate say long sun-shine hours and large temperature discrepancy between days and nights that is beneficial to the accumulation of nutrients in oat plant. Oat has been grown in the Qinghai alpine region on the altitude ranging from 1600m to 3600m and regarded as an ideal forage plant due to its resistance to environment. The role of oat drew more attention in 1980s along with the implementing of so called four-matched policy, which compounds establishment of fenced rangeland, animal bars, fodder production base and settled living place for local herdsmen who used to be nomadic around the region. To make a full use of the oat resource in Qinghai province, a great deal research and extension with respect of oat had been engaged in the region. The author overviewed researches accomplished in Qinghai province on oat germplasm collection, breeding of fine oat variety, cultivate techniques, oat base establishment and production and marketing system establishment as well in terms of projects completed.

      • KCI등재

        The protection of Rhein lysinate to liver in diabetic mice induced by high-fat diet and streptozotocin

        Yajun Lin,Gang Hu,Kai-Ji Li,Yu-Fang Zhao,Jie Wei,Yongzhan Zhen 대한약학회 2015 Archives of Pharmacal Research Vol.38 No.5

        Rhein lysinate (RHL) is the salt of lysine andrhein and the objective of this study was to investigate theprotection of RHL to liver in diabetic mice. The model oftype 2 diabetes was established by high-fat diet andstreptozotocin treatment. Malondialdehyde, superoxidedismutase (SOD) and glutathione peroxidase (GSH-Px)were measured using a spectrophotometer. Inflammatoryfactors (TNF-a and IL-6) and related proteins (ERK1/2 andSREBP-1c) were analyzed by Western blot. Tissue profilewas determined by hematoxylin and eosin staining andaccumulation of fat was examined by Nile red staining. The results indicated that plasma glucose levels of type 2diabetic mice were over 13.9 mM. Compared with modelgroup, plasma glucose levels were decreased, howeverinsulin levels were increased in RHL (25 and 50 mg/kg)-treated group. Elevated plasma triglyceride and cholesterolwere also markedly attenuated after RHL treatment. Theactivities of SOD and GSH-Px of livers were increasedafter RHL treatment. Livers of RHL-treated mice had morenormal structure and less steatosis than that of diabeticmice. Moreover, RHL decreased the expression of TNF-aand IL-6 and the phosphorylation of SREBP-1c and ERK1/2. In conclusion, RHL has a noticeable hepatic protectionin diabetic mice.

      • KCI등재

        Creep characteristics and instability analysis of concrete specimens with horizontal holes

        Yajun Xin,Haichun Hao,Xin Lv,Hongying Ji 사단법인 한국계산역학회 2018 Computers and Concrete, An International Journal Vol.22 No.6

        Uniaxial compressive strength test and uniaxial compression creep one were produced on four groups of twelve concrete specimens with different hole number by RLW-2000 rock triaxial rheology test system. The relationships between horizontal holes and instantaneous failure stress, the strain, and creep failure stress, the strain, and the relationships between stress level and instantaneous strain, creep strain were studied, and the relationship between horizontal holes and failure mode was determined. The results showed that: with horizontal hole number increasing, compressive strength of the specimens decreased whereas its peak strain increased, while both creep failure strength and its peak strain decreased. The relationships between horizontal holes and compressive strength of the specimens, the peak strain, were represented in quadratic polynomial, the relationships between horizontal holes and creep failure strength, the peak strain were represented in both linear and quadratic polynomial, respectively. Instantaneous strain decreased with stress level increasing, and the more holes in the blocks the less the damping of instantaneous strain were recorded. In the failure stress level, instantaneous strain reversally increased, creep strain showed three stages: decreasing, increasing, and sharp increasing; in same stress level, the less holes the less creep strain rate was recorded. The compressive-shear failure was produced along specimen diagonal line where the master surface of creep failure occurred, the more holes in a block, the higher chances of specimen failure and the more obvious master surface were.

      • KCI등재

        Secure Transmission Scheme Based on the Artificial Noise in D2D-Enabled Full-Duplex Cellular Networks

        ( Chen Yajun ),( Yi Ming ),( Zhong Zhou ),( Ma Keming ),( Huang Kaizhi ),( Ji Xinsheng ) 한국인터넷정보학회 2019 KSII Transactions on Internet and Information Syst Vol.13 No.10

        In this paper, a secure transmission scheme based on the artificial noise is proposed for D2D communications underlaying the full-duplex cellular network, and a secure power allocation scheme to maximize the overall secrecy rate of both the cellular user and D2D transmitter node is presented. Firstly, the full-duplex base station transmits the artificial noise to guarantee the secure communications when it receives signals of cellular uplinks. Under this secure framework, it is found that improving the transmission power of the cellular user or the D2D transmitter node will degrade the secrecy rate of the other, although will improve itself secrecy rate obviously. Hence, a secure power allocation scheme to maximize the overall secrecy rate is presented subject to the security requirement of the cellular user. However, the original power optimization problem is non-convex. To efficiently solve it, we recast the original problem into a convex program problem by utilizing the proper relaxation and the successive convex approximation algorithm. Simulation results evaluate the effectiveness of the proposed scheme.

      • KCI등재

        AKA-PLA: Enhanced AKA Based on Physical Layer Authentication

        ( Jing Yang ),( Xinsheng Ji ),( Kaizhi Huang ),( Ming Yi ),( Yajun Chen ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.7

        Existing authentication mechanisms in cellular mobile communication networks are realized in the upper layer by employing cryptographic techniques. Authentication data are broadcasted over the air in plaintext, enabling attackers to completely eavesdrop on the authentication and get some information about the shared secret key between legitimate nodes. Therefore, reusing the same secret key to authenticate several times results in the secret key`s information leakage and high attacking rate. In this paper, we consider the most representative authentication mechanism, Authentication and Key Agreement (AKA), in cellular communication networks and propose an enhanced AKA scheme based on Physical Layer Authentication (AKA-PLA). Authentication responses generated by AKA are no longer transmitted in plaintext but masked by wireless channel characteristics, which are not available to adversaries, to generate physical layer authentication responses by a fault-tolerant hash method. The authenticator sets the threshold according to the authentication requirement and channel condition, further verifies the identity of the requester based on the matching result of the physical layer authentication responses. The performance analyses show that the proposed scheme can achieve lower false alarm rate and missing rate, which are a pair of contradictions, than traditional AKA. Besides, it is well compatible with AKA.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼