RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Removal of heat stable salts (HSS) from spent alkanolamine wastewater using electrodialysis

        Yaoming Wang,Wei Li,Haiyang Yan,Tongwen Xu 한국공업화학회 2018 Journal of Industrial and Engineering Chemistry Vol.57 No.-

        The formation of heat stable salts (HSS) is a tough problem for aqueous alkanolamines solution in gasprocessing industry. In this study, a self-made electrodialysis stack was assembled to remove the HSSfrom spent amine wastewater. Results indicated that the optimum current density is 15 mA/cm2. Anincrease in pH is beneficial for amine recovery but is harmful to the lifespan of membranes. The EDprocess cost is estimated to be 14.6 $/t with the energy consumption of 39.4 kWh/T. Comparison with theconventional neutralization or replacement methods, ED is not only energy-saving but alsoenvironmentally friendly for the removal of HSS from the spent amine wastewater.

      • KCI등재

        Degradation of 1,4-dioxane by Newly Isolated Acinetobacter sp. M21 with Molasses as the Auxiliary Substrate

        Peng Wang,Tingchen Cui,Yadong Yang,Jialu Li,Yaoming Su,Na Liu,Hong-Mei Li 한국생물공학회 2022 Biotechnology and Bioprocess Engineering Vol.27 No.3

        The elimination of 1,4-dioxane (dioxane), a persistent organic pollutant, is a great challenge owing to its high hydrophilicity and chemical stability. Cometabolic bioremediation technology is an effective approach to remove many organic pollutants. Because of its eco-friendly and inexpensive properties, molasses is widely used as an auxiliary biomaterial to clean up compound-contaminated sites. In this study, a newly isolated bacterium Acinetobacter sp. M21 could effectively remove dioxane using molasses without any apparent lag phase. Under the optimized molasses dosage of 0.3%, M21 could remove 500 mg/L dioxane by 60.0 ± 2.8% within 20 days with a maximum dioxane degradation rate of 1.3 ± 0.2 mg-dioxane/L/h in the first day, and exhibited extraordinary dioxane tolerance up to 1,000 mg/L, while so high dose of dioxane negatively affected the cell growth. The degradation pathway of dioxane was also determined, and was supported by the detection of 2-hydroxyethoxyacetic acid as the key metabolite of dioxane. High level degradation activity of M21 to 20 mg/L dioxane was maintained over a variable of pH (5-11), temperatures (15-45°C), and salinities (up to 8%, as NaCl wt). This is the first report linking the cometabolism of dioxane and molasses by Acinetobacter sp. M21, a bacterium that shows great potential for field dioxane bioremediation.

      • A New Collusion Attack Using Interpolation for Multimedia Fingerprinting

        Conghuan Ye,Zenggang Xiong,Yaoming Ding,Xuemin Zhang,Guangwei Wang,Fang Xu 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.5

        Digital fingerprinting is a special digital watermarking technology that can deter legal user to redistribute multimedia content to others. With traitor tracing, it can detect illegal users who use multimedia content illegally. However, collusion attack can avoid some illegal users being detected. With different fingerprinted copies, collusion attack can produce a new colluded fingerprinted copy for get rid of the fingerprint information from the colluded copy, so digital fingerprinting technique should deter collusion attacks. In order to improve the performance of new digital fingerprinting technique in future, this paper presents a new collusion attack approach based on interpolation. The proposed interpolation collusion attack scheme comes from the idea of image fusion. The experimental results demonstrate that the proposed interpolation collusion attack method outperform average attack and maximum attack.

      • Joint Fingerprinting/Encryption for Medical Image Security

        Conghuan Ye,Zenggang Xiong,Yaoming Ding,Xueming Zhang,Guangwei Wang,Fang Xu 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.1

        Electronic health records (EHRs) facilitates the healthcare process. However, it can also cause serious security and privacy problems. While various conventional encryption mechanisms can solve some aspects of these problems, they cannot address the illegal distribution of decrypted medical images. To protect decrypted medical images from being illegally distributed by an authorized staff member, the scheme proposed in this paper provides a joint fingerprinting and encryption (JFE) scheme based on GoL (Game of Life) and DNA computing with the purpose of protecting medical media distribution. In this study, GoL and DNA are used to confuse in DWT domain and diffusion in spatial domain respectively, and fingerprints are embedded into the HL and LH subbands of DWT domain. The use of fingerprinting along with encryption can provide a double-layer of protection to medical image. Experimental results show the effectiveness of the proposed scheme.

      • Joint Fingerprinting and Encryption in the DWT Domain for Secure M2M Communication

        Conghuan Ye,Zenggang Xiong,Yaoming Ding,Xueming Zhang,Guangwei Wang,Fang Xu 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.1

        Machine-to-machine (M2M) communication is viewed as one of the next frontiers in wireless communications. Because of unguarded communication, new security threats emerge. Considering that multimedia will be widely used in various applications over M2M network, it is very urgent to meet new security requirements for multimedia communication. This paper focuses on a joint fingerprinting and encryption (JFE) scheme in the DWT domain with the purpose of protecting multimedia distribution. A multimedia encryption scheme is first to scramble the multimedia content before distribution, and the fingerprinting scheme is then introduced to provide further protection. The goal of the proposed content distribution scheme is to provide secure content communication and deter the device from illegally redistributing the content. The proposed method, to the best of our knowledge, is the first JFE method in the DWT domain for secure M2M communication. The use of fingerprinting along with encryption can provide a double-layer of protection to digital media. Theory analysis and experimental results show the effectiveness of the proposed scheme.

      • Parallel Joint Fingerprinting and Encryption for Social Multimedia Sharing Based on Game of Life

        Conghuan Ye,Zenggang Xiong,Yaoming Ding,Xuemin Zhang,Guangwei Wang,Fang Xu,Kaibing Zhang 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.7

        The advent of online social network and mobile multimedia communication has made content sharing in social network easier and more efficient. It is very important to combine fingerprinting and encryption for social multimedia content protection. In this paper, a parallel JFE (joint fingerprinting and encryption) framework is proposed. Firstly, the multi-level social fingerprint code is produced using social network analysis, and followed by TSH (tree structure harr) wavelet decomposition for multimedia content. And then, fingerprints are embedded into all the LL, HL and LH subbands parallelly. At last, GoL(Game of Life) are used to for confusion for wavelet coefficients parallelly. The proposed parallel JFE method, to the best of our knowledge, is the first JFE method using GoL in the TSH wavelet domain for security and privacy. Theory analysis and experimental results demonstrate the effectiveness of the proposed JFE scheme.

      • Secure Multimedia Content Distribution for M2M Communication

        Conghuan Ye,Zenggang Xiong,Yaoming Ding,Xuemin Zhang,Guangwei Wang,Fang Xu 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.4

        Multimedia content distribution based on M2M communication is attracting increasing attentions nowadays. Considering that multimedia will be widely used in various applications over M2M network, the wide range of multimedia content and M2M devices has raised new security requirements for multimedia communication. In this paper, we focus on an aspect of DRM that involves secure multimedia distribution which combines multimedia encryption, copy detection, and digital fingerprinting to prevent widespread piracy. Multimedia encryption is used to encrypt multimedia content firstly before distribution, then, Copy detection is used to verify whether a protected multimedia content is a redistributed copy of its or no, At last, digital fingerprinting is introduced to protect multimedia content further. In this paper, we first use using encryption, fingerprinting and copy detection for secure distribution in M2M communication environments. The secure effect of the proposed scheme has been verified through theory analysis and experimental results.

      • KCI등재

        Exendin-4 ameliorates high glucoseinduced fibrosis by inhibiting the secretion of miR-192 from injured renal tubular epithelial cells

        Yijie Jia,Zongji Zheng,Meiping Guan,Qian Zhang,Yang Li,Ling Wang,Yaoming Xue 생화학분자생물학회 2018 Experimental and molecular medicine Vol.50 No.-

        Extracellular vesicles (EVs), which contain microRNA (miRNA), constitute a novel means of cell communication that may contribute to the inevitable expansion of renal fibrosis during diabetic kidney disease (DKD). Exendin-4 is effective for treating DKD through its action on GLP1R. However, the effect of exendin-4 on EV miRNA expression and renal cell communication during the development of DKD remains unknown. In this study, we found that EVs derived from HK-2 cells pre-treated with exendin-4 and high glucose (Ex-HG), which were taken up by normal HK-2 cells, resulted in decreased levels of FN and Col-I compared with EVs from HK-2 cells pre-treated with HG alone. Furthermore, we found that pretreatment with HG and exendin-4 may have contributed to a decrease in miR-192 in both HK-2 cells and EVs in a p53-dependent manner. Finally, we demonstrated that the amelioration of renal fibrosis by exendin-4 occurred through a miR-192-GLP1R pathway, indicating a new pathway by which exendin-4 regulates GLP1R. The results of this study suggest that exendin-4 inhibits the transfer of EV miR-192 from HG-induced renal tubular epithelial cells to normal cells, thus inhibiting GLP1R downregulation and protecting renal cells. This study reports a new mechanism by which exendin-4 exerts a protective effect against DKD.

      • KCI등재

        Long noncoding RNA NEAT1 is involved in the protective effect of Klotho on renal tubular epithelial cells in diabetic kidney disease through the ERK1/2 signaling pathway

        Yan-Lin Yang,Meng Xue,Yijie Jia,Fang Hu,Zongji Zheng,Ling Wang,Ze-Kun Si,Yaoming Xue 생화학분자생물학회 2020 Experimental and molecular medicine Vol.52 No.-

        Klotho, an antiaging protein, has been shown to play a protective role in renal tubular epithelial-mesenchymal transition (EMT) during the development of diabetic kidney disease (DKD). Long noncoding RNAs (lncRNAs) participate in the progression of EMT in many diseases. However, the effect of Klotho on lncRNAs during the development of DKD is still unknown. In this study, we found that Klotho overexpression in high-fat diet (HFD)- and streptozotocin (STZ)- induced DKD mice significantly inhibited the expression of lncRNA nuclear-enriched abundant transcript 1 (Neat1). We demonstrated that NEAT1 was significantly upregulated in both bovine serum albumin (BSA)-stimulated HK2 cells and mice with HFD- and STZ-induced diabetes. In addition, we observed that Klotho displays colocalization with NEAT1. Furthermore, overexpression of Klotho can inhibit the high expression of NEAT1 in BSA-stimulated HK2 cells, while silencing Klotho can further upregulate the expression of NEAT1. Silencing NEAT1 in HK2 cells resulted in inhibition of the EMT-related markers alpha smooth muscle actin (α-SMA) and vimentin (VIM) and the renal fibrosis-related markers transforming growth factor-β1 (TGF-β1) and connective tissue growth factor (CTGF). The effect of NEAT1 on DKD was partly mediated by regulation of the ERK1/2 signaling pathway. Finally, we found that silencing NEAT1 can reverse the activation of EMT and fibrosis caused by Klotho silencing in a manner dependent on the ERK1/2 signaling pathway. These findings reveal a new regulatory pathway by which Klotho regulates ERK1/2 signaling via NEAT1 to protect against EMT and renal fibrosis, suggesting that NEAT1 is a potential therapeutic target for DKD.

      • KCI등재

        Family History, Tobacco Smoking, and Risk of Ischemic Stroke

        Mengyu Fan,Jun Lv,Canqing Yu,Yu Guo,Zheng Bian,Songchun Yang,Ling Yang,Yiping Chen,Feifei Li,Yaoming Zhai,Ping Wang,Junshi Chen,Zhengming Chen,Lu Qi,Liming Li 대한뇌졸중학회 2019 Journal of stroke Vol.21 No.2

        Background and Purpose Both genetic factors and smoking are associated with ischemic stroke (IS) risk. However, little is known about the potential interaction of these factors. We aimed to assess whether smoking and a positive family history interact to increase the risk of IS. Methods The nationwide prospective study recruited 210,000 men and 300,000 women in 2004 to 2008 at ages 30 to 79 years. During 9.7 years of follow-up, we documented 16,923 and 20,656 incident IS cases in men and women without major chronic diseases at baseline, respectively. Multivariable Cox regression models were used to examine associations between family history and IS. Likelihood ratio tests were used to test the smoking-family history interactions on IS. Results About 67.8% (n=135,168) of men ever smoked regularly compared with 2.7% (n=7,775) of women. Among men, a significant interaction between family history and smoking on IS was observed (P for interaction=0.03), with more pronounced association between family history and IS among ever-regular smokers (hazard ratio [HR], 1.21; 95% confidence interval [CI], 1.16 to 1.27) than among never-smokers (HR, 1.11; 95% CI, 1.01 to 1.23). The association between family history and IS among ex-smokers after more than 10 years of cessation (HR, 1.01; 95% CI, 0.85 to 1.20) appeared similar to that among never-smokers. Among women, a similar but not significant interaction between family history and smoking on IS was observed. Ever-regular smokers who had a family history of stroke had the highest risk of IS. Conclusions Among Chinese men, the association of family history with IS was accentuated by smoking, and such accentuation tended to be lowered by cessation.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼