RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Rational Design, Synthesis, and Biological Activity of N-(1,4-Benzoxazinone)Acetamide Derivatives as Potent Platelet Aggregation Inhibitors

        Yi Xiang,Xiu-Hua Wang,Quan Yang,Jia-Lian Tan,장희재,Hua Zuo,신동수 대한화학회 2018 Bulletin of the Korean Chemical Society Vol.39 No.2

        Inappropriate thrombus formation within blood vessels is the leading cause of mortality in the industrialized world. Platelet aggregation activated by thrombin may have close relationship with thrombosis. Based on our studies on the pharmacophoric role of 1,4-benzoxazine-3(4H)-one for desirable platelet aggregation inhibitory activity, we identified N-(4-ethyl-3-oxo-3,4-dihydro-2H-benzo[b][1,4]oxazin-7-yl)-2-(4-methylpiperazin-1-yl)acetamide (BOAP-AM6) and N-(4-butyl-3-oxo-3,4-dihydro-2H-benzo[b][1,4]oxazin-7-yl)-2-(4-(4-fluorophenyl)piperazin-1-yl)acetamide (BOAP-AM21) as platelet aggregation inhibitors with an IC50 of 8.93 and 8.67 μM, respectively, as potent as the positive control aspirin. A combination of structure–activity relationships studies and molecular modeling revealed that the molecule BOAP-AM6 interacted with the amino acid residue TYR166 and ARG214 in the binding site of GPIIb/IIIa receptor through hydrogen bond and compound BOAP-AM21 acted on the amino acid residue ASN215 and ALA218, both through the same approach as the reported potent molecules 7a and 7b.

      • KCI등재

        Feasibility of Two-Screw Anterior Fixation for Odontoid Fractures in a Chinese Population: A Morphometric Study Based on Computed Tomography

        Yixiang Ai,Dereje Gobena Alemayehu,Genwen Mao,Yaping Liang,Ran Cao,Jiale Hu,Yimin Yang,Zhiwei Ren 대한정형외과학회 2023 Clinics in Orthopedic Surgery Vol.15 No.6

        Background: To evaluate the feasibility of treating odontoid fractures in the Chinese population with two cortical screws based on computed tomography (CT) scans and describe a new measurement strategy to guide screw insertion in treating these fractures. Methods: A retrospective review of cervical computed tomographic scans of 128 patients (aged 18–76 years; men, 55 [43.0%]) was performed. The minimum external transverse diameter (METD), minimum external anteroposterior diameter (MEAD), maximum screw length (MSL), and screw projection back angle (SPBA) of the odontoid process were measured on coronal and sagittal CT images. Results: The mean values of METD and MEAD were 10.0 ± 1.1 mm and 12.0 ± 1.0 mm, respectively, in men and 9.2 ± 1.0 mm and 11.0 ± 1.0 mm, respectively, in women. Both measurements were significantly higher in men (p < 0.001). In total, 87 individuals (68%) had METD > 9.0 mm that could accommodate two 3.5-mm cortical screws. The mean MSL value and SPBA range were 34.4 ± 2.9 mm and 13.5°–24.2°, respectively, with no statistically significant difference between men and women. Conclusions: The insertion of two 3.5-mm cortical screws was possible for anterior fixation of odontoid fractures in 87 patients (68%) in our study, and there was a statistically significant difference between men and women.

      • Preventing Information Leakage in Secure Multiple XML Documents Publishing

        Yixiang Ding,Tao Peng,Minghua Jiang 보안공학연구지원센터 2008 International Journal of Security and Its Applicat Vol.2 No.1

        The Prevalent use of XML highlights an increasing need that publishing XML documents should meet precise security requirements, without revealing sensitive information to unauthorized users. We consider data-publishing applications where the publisher specifies what information is sensitive and should be protected. Hiding the sensitive information is no enough and the users can use common knowledge (e.g. “all patients in the same ward have the same disease”) to infer more data, which can cause leakage of sensitive information. We formulate the process how users can infer data using three types of common XML constraints and several functional dependencies. We develop a novel paradigm for finding a max partial document without causing information leakage when we publish several related XML documents, while allowing publishing as much data as possible. The experiments on real data sets show that effect of inference on data security, and how the paradigm can prevent leaking the sensitive information.

      • KCI등재

        PROMISE: A QR Code PROjection Matrix Based Framework for Information Hiding Using Image SEgmentation

        Yixiang Fang,Kai Tu,Kai Wu,Yi Peng,Yun-Qing Shi 한국인터넷정보학회 2023 KSII Transactions on Internet and Information Syst Vol.17 No.2

        As data sharing increases explosively, such information encoded in QR code is completely public as private messages are not securely protected. This paper proposes a new 'PROMISE' framework for hiding information based on the QR code projection matrix by using image segmentation without modifying the essential QR code characteristics. Projection matrix mapping, matrix scrambling, fusion image segmentation and steganography with SEL(secret embedding logic) are part of the PROMISE framework. The QR code could be mapped to determine the segmentation site of the fusion image as a binary information matrix. To further protect the site information, matrix scrambling could be adopted after the mapping phase. Image segmentation is then performed on the fusion image and the SEL module is applied to embed the secret message into the fusion image. Matrix transformation and SEL parameters should be uploaded to the server as the secret key for authorized users to decode the private message. And it was possible to further obtain the private message hidden by the framework we proposed. Experimental findings show that when compared to some traditional information hiding methods, better anti-detection performance, greater secret key space and lower complexity could be obtained in our work.

      • A Novel Similarity Measure for Generalized Trapezoidal Fuzzy Numbers and its Application to Decision-Making

        Yixiang Zhou 보안공학연구지원센터 2016 International Journal of u- and e- Service, Scienc Vol.9 No.3

        Similarity measures of fuzzy numbers have been widely applied in various areas. In the last decade, many similarity measures of generalized fuzzy numbers were proposed. However, there are two main limitations in existing similarity measures: 1) they cannot correctly calculate the degree of similarity between two generalized trapezoidal fuzzy numbers in some cases; and 2) the definitions of recently developed similarity measures are complicated and difficult to interpret. In this paper, a novel approach to similarity measurement between generalized trapezoidal fuzzy numbers is proposed. The proposed similarity measure has a simple definition and is easier to understand intuitively. Furthermore, we analyze its properties and compare it with existing similarity measures. The results show that the proposed measure outperforms existing similarity measures. Finally, we apply the proposed similarity measure to develop a fuzzy-logic-based approach for new product go/nogo decision-making at the front end. The proposed fuzzy software quality evaluation method is more flexible and more intelligent than existing methods due to the fact that it considers the degrees of confidence of evaluators’ opinions.

      • Isolation of primitive mouse extraembryonic endoderm (pXEN) stem cell lines

        Zhong, Yixiang,Choi, Taewoong,Kim, Minjae,Jung, Kyoung Hwa,Chai, Young Gyu,Binas, Bert Elsevier 2018 Stem cell research Vol.30 No.-

        <P><B>Abstract</B></P> <P>Mouse blastocysts contain the committed precursors of the extraembryonic endoderm (ExEn), which express the key transcription factor Oct4, depend on LIF/LIF-like factor-driven Jak/Stat signaling, and initially exhibit lineage plasticity. Previously described rat blastocyst-derived ExEn precursor-like cell lines (XENP cells/HypoSCs) also show these features, but equivalent mouse blastocyst-derived cell lines are lacking. We now present mouse blastocyst-derived cell lines, named primitive XEN (pXEN) cells, which share these and additional characteristics with the XENP cells/HypoSCs, but not with previously known mouse blastocyst-derived XEN cell lines. Otherwise, pXEN cells are highly similar to XEN cells by morphology, lineage-intrinsic differentiation potential, and multi-gene expression profile, although the pXEN cell profile correlates better with the blastocyst stage. Finally, we show that pXEN cells easily convert into XEN-like cells but not vice versa. The findings indicate that (i) pXEN cells are more representative than XEN cells of the blastocyst stage; (ii) mouse pXEN, rather than XEN, cells are homologs of rat XENP cells/HypoSCs, which we propose to call rat pXEN cells.</P> <P><B>Highlights</B></P> <P> <UL> <LI> We present novel mouse extraembryonic endoderm stem cell lines (pXEN cells). </LI> <LI> pXEN cells show preimplantation-stage features not shown by XEN cells. </LI> <LI> pXEN cells are easily converted into XEN-like cells but not vice versa. </LI> <LI> pXEN cells are homologous to previously described rat XENP cells/HypoSCs. </LI> </UL> </P> <P>Graphical abstract</P> <P>[DISPLAY OMISSION]</P>

      • KCI등재

        중국 무순지역 한국어 단모음의 세대 간 차이에 대한 음향음성학적 연구

        정의향(Zheng Yixiang)(鄭義香) 한국언어문학회 2011 한국언어문학 Vol.79 No.-

        This paper aims to use the machine of the experiment 4300B CSL to analyze the Korean monophthong in Phonetics. Until now, there are so many analysis on monophthong about the standard language of Korean in Phonetics, but less analysis about the Korean dialect. So this paper analyzes the monophthong of the musun Dialect through the informants. As the result, we can see the the old ages’ front vowel on [ㅣ], [ㅔ], [ㅐ] are stronger than the young ages. And the old ages’ mouth are bigger than the young ages when the speak the [ㅏ]. In the musun of Korea, all th people speak the [ㅚ]and [ㅟ]as a diphthong. The analysis of Study on the musun dialect may help to comprehend the monophthong system of the Korean musun dialect accurately.

      • KCI등재

        평북 철산지역어 어미의 공시형태론 - 어미의 기저형 설정을 중심으로

        정의향(Zheng Yixiang) 한국언어문학회 2008 한국언어문학 Vol.65 No.-

          In this paper we discussed with synchronic morphology of endings of Pyeonganbuk-do cheolsan dialect, focused on underlying representation of endings. The underlying of endings is divided into the underlying of declension endings and the underlying of conjugation endings. The underlying of declension endings is subdivided into unique underlying and complex underlying, and the underlying of conjugation endings also can be subdivided in the same way.<BR>  In Pyeonganbuk-do cheolsan, unique underlyings of declension endings, beginning by consonant, include /-마나/, /-꺼증/, /-토롬/, /-허구/, /-보담/, /-두/, /-과/etc. unique underlyings, beginning by vowel, include /-으루/, /-아/etc. Complex underlying of declension endings include /-{이, -에}/, /-{이, -에}서/, /-{이, -에}다/, /-이, -레/, /-{Ø, -ㄹ} etc. Unique underlying of conjugation endings, beginning by consonant, include /-간/, /-갓-/, /-구/, /-게/, /-네/, /-노/, /-나/, /-디/, /-다가/, /-더라/, /-두룩/etc. Unique underlyings, beginning by vowel, include /-으느꺼니/, /-으레/, /-으문/, /-으멘서/, /-을까/, /-을라구/, /-을수룩/, /-어두/, /-어서/etc. Complex underlying of declension endings include /-{{은, -는}-Ø}다/, /-{Ø, -ㅅ}우다레/, /-{Ø, -ㅅ}읍두다/, /-{으, 어}라/, /-{으, 어}야 / etc.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼