RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Temperature-dependent rheological behavior of cathode slurry for lithium-ion battery under steady and dynamic tests

        Zhao Bin,Yin Deshun,Gao Yunfei,Ren Jiangtao 한국유변학회 2023 Korea-Australia rheology journal Vol.35 No.3

        The rheological property of cathode slurry is commonly influenced by coating speed and mixing temperature, thereby leading to its storage stability and coating uniformity. In this study, the effect of the temperature of slurry on the rheological behaviors is investigated under various shear rates and temperatures based on steady and dynamic tests as well as theoretical models. In the flow experiments, the thixotropic behavior of the slurry is observed at all temperatures tested, and it is reduced with the increase in temperature. The experimental data is captured well by rheological models, and the model parameters are evaluated under the combined effects of shearing and temperature, resulting in two generalized state equations for the description of the flow properties of the slurry. In addition, microstructural rearrangement and polymeric entanglement at high temperatures cause viscosity and modulus to change, giving rise to complex rheological behavior in creep and oscillatory shear. Compared with slurry at 25 and 40 °C, both storage and loss moduli are dependent on oscillatory strain in the range of 0.1–1000% at 65 °C. The difference in characteristic strain corresponding to yielding and strain stiffening behavior is only observed at high temperatures, whereas relaxation times were independent of temperature in the oscillatory shear test. Understanding the effect of the temperature of slurry on rheological behaviors will be useful for improving the manufacturing efficiency of electrodes.

      • Designs and Simulations of Multi-factor in Trust Evaluation

        Zhao Bin,He Jingsha,Huang Na,Zhang Yixuan,Zhou Shiyi,Ji Jie 보안공학연구지원센터 2015 International Journal of Database Theory and Appli Vol.8 No.1

        Trust Model is an efficient way of resolving the trust problems in open networks in which trust evaluation is a key issue to be addressed in trust management. According to the design rules of trust models, the problem of the lack of dynamic adapt ability in trust evaluating, the lack of effective aggregation of trust and the lack of considerations to incentive mechanisms and so on, this paper introduced the bonus-penalty factor which shows how reliable is the direct trust of the recommend entities to the subject and evaluation reliability of the recommend entities which is used to decide whether the access object would adopt the recommendation of the recommend entities during the calculation of the recommend trust. The measurement of integrated trust solves the weight problem between direct trust and recommendatory trust by introducing balanced weight factor. Finally, we present designs of bonus-penalty function and balanced weight factor and simulations by Matlab software.

      • KCI등재

        Security Cooperation Model Based on Topology Control and Time Synchronization for Wireless Sensor Networks

        Zhaobin Liu,Wenzhi Liu,Qiang Ma,Gang Liu,Liang Zhang,Ligang Fang,Victor S. Sheng 한국통신학회 2019 Journal of communications and networks Vol.21 No.5

        To address malicious attacks generated from wirelesssensor networks (WSNs), in this paper, we study the difficulty ofdetecting uncoordinated behavior by using a model that is unreliableand has uncontrollable accuracy, trustless control, and an inextensibleprotocol. A security collaboration model involving coupledstate vectors associated with topology control and time synchronizationis proposed. The networks achieve synchronizationusing weights and by controlling the number of goals. The simplecalculation of time synchronization values between neighboringnodes serves as the basis for judging the behavior of the nodetopology control. The coupling state vector calculation is the coreof the model. The topology coupling strength rate, signal intensityreduction, clock drift, and clock delay are combined to form a comprehensivemodel. The network energy consumption is reduced byupdating the coupling state vector regularly. The coupling cooperationthreshold is set to make security decisions and effectivelydistinguish between attack nodes and dead nodes. Thus, to ensurethe security and reliability of the network, we present a securitycooperation collection tree protocol (SC-CTP) scheme that maintainsa trusted environment and isolates misbehaving nodes. Thesimulation results show that the model can detect malicious nodeseffectively, has a high detection rate, and greatly reduces the energyconsumption of the whole network. In order to verify the effectivenessof the proposed model, a large-scale wireless sensor networkwith 200 nodes was deployed on a campus. The proposed modelwas applied to optimize the deployment of key nodes on the campus. Furthermore, a candidate set of these nodes were selected toachieve coupling cooperation of key goals. This test verified the reliabilityof the model, its customizable accuracy, and the reliabilityof the control.

      • KCI등재

        Genome-wide identification of WRKY transcription factors in kiwifruit (Actinidia spp.) and analysis of WRKY expression in responses to biotic and abiotic stresses

        Zhaobin Jing,Zhande Liu 한국유전학회 2018 Genes & Genomics Vol.40 No.4

        As one of the largest transcriptional factor families in plants, WRKY transcription factors play important roles in various biotic and abiotic stress responses. To date, WRKY genes in kiwifruit (Actinidia spp.) remain poorly understood. In our study, o total of 97 AcWRKY genes have been identified in the kiwifruit genome. An overview of these AcWRKY genes is analyzed, including the phylogenetic relationships, exon–intron structures, synteny and expression profiles. The 97 AcWRKY genes were divided into three groups based on the conserved WRKY domain. Synteny analysis indicated that segmental duplication events contributed to the expansion of the kiwifruit AcWRKY family. In addition, the synteny analysis between kiwifruit and Arabidopsis suggested that some of the AcWRKY genes were derived from common ancestors before the divergence of these two species. Conserved motifs outside the AcWRKY domain may reflect their functional conservation. Genome-wide segmental and tandem duplication were found, which may contribute to the expansion of AcWRKY genes. Furthermore, the analysis of selected AcWRKY genes showed a variety of expression patterns in five different organs as well as during biotic and abiotic stresses. The genome-wide identification and characterization of kiwifruit WRKY transcription factors provides insight into the evolutionary history and is a useful resource for further functional analyses of kiwifruit.

      • Research and Performance Evaluation of aNew MD I/O Algorithm Based on Embedded Linux

        Zhaobin LIU 한국멀티미디어학회 2006 한국멀티미디어학회 국제학술대회 Vol.2006 No.-

        Based on the analysis of device driver characters of embedded Linux, this paper presented a novel RAID algorithm to improve the storage I/O performance. We have also ameliorated and optimized the mode of RAID automatic startup, the consolidation of RAID driver and raidtools and the process management etc. At last, we have realized one RAIDS storage subsystem, and have also given the performance analysis of it.

      • KCI등재

        Enhancing mechanical properties of Mg-Gd-Y-Zn alloys via microalloying with Ce and La

        Zhaobin Zhang,Jonghyun Kim,Hongxin Liao,김기범,최태집,이태경,FuSheng Pan 대한금속·재료학회 2022 대한금속·재료학회지 Vol.60 No.9

        This study investigated the microstructure and mechanical properties of Mg-1Gd-1Y-1Zn (at.%) alloys containing designed amounts of Ce or La. The Mg5(Gd,Zn) phase formed in the as-cast Mg-Gd-Y-Zn- Ce/La alloys and disappeared after a homogenization treatment at 500°C for 24 h. The addition of Ce and La resulted in the formation of Ce(Mg,Zn)12 and La(Mg,Zn)12 phases, respectively. Except for that, the Ce or La addition had no significant effect on the morphology, volume fraction, and type of the long-period stacking ordered (LPSO) phases in the Mg-Gd-Y-Zn alloy. The grain size decreased with increasing microalloying content because the heavy Ce and La atoms impeded atomic migration across the boundaries. The solute drag effect led to the formation of the rare earth texture in the extruded Mg-Gd-Y-Zn-Ce/La alloys, whose extent decreased with increasing microalloying content. The mechanical strength was improved by the addition of Ce or La at the sacrifice of ductility. In particular, La exhibited a stronger reinforcement ability than Ce when it was added to the Mg-Gd-Y-Zn alloys. Among the investigated chemical compositions, the Mg-1Gd-1Y-1Zn- 0.3La alloy exhibited the highest strength because it had the finest grains, the highest volume fraction of the second phase, and the weakest texture intensity. Furthermore, the alloys showed an unusual yield asymmetry due to the difference in the deformation mode of the LPSO phase.

      • Performance Evaluation of multimedia storage based on virtual Storage system

        Zhaobin Liu,Fei Wu 한국멀티미디어학회 2006 한국멀티미디어학회 국제학술대회 Vol.2006 No.-

        Recently, multimedia application has been widely applied to national television, entertainment industry and so on. Many conventional storage architectures were used for streaming media system. However, the scalability of these architectures is inadequate. A truly scalable storage solution should exhibit an efficient load balancing strategy, while at the same time providing both storage and bandwidth expandability. On the basis of an analysis between the different storage network systems, this paper introduces a novel, Virtual Storage network System called VSS that can effectively consolidate the most prototypes of storage networking as the multimedia storage system. We mainly describe the scalability of emerging storage networking system to scale both the storage capacity and the number of simultaneous clients. Through the model we can get the factors that affect the system performance and determine how to improve the performance of the storage networking system.

      • KCI등재

        Multi-focus Image Fusion Based on Random Walk

        Wang Zhaobin,Wang Ziye,Cui Zijing,Chen Lina,Zhang Yaonan 대한전기학회 2021 Journal of Electrical Engineering & Technology Vol.16 No.6

        An effective multi-focus image fusion algorithm based on random walk is proposed in this paper. Random walk and guided filter have attracted extensive attention in image fusion. Random walk is usually used to solve probability problems and it has a good smoothing effect, and guided filter can preserve the gradient information of the image well. The combination of two algorithms can better retain the edge information of the input image. Six sets of source images and five existing methods are used in the experiment and the experimental results show that the proposed algorithm outperforms the existing methods in both subjective and objective evaluation.

      • KCI등재

        Crystallization Behaviors and Morphology of Novel Poly(octamethylene adipate-cooctamethylene succinate) and Poly(octamethylene adipate)

        Xiaojing Li,Zhaobin Qiu 한국고분자학회 2015 Macromolecular Research Vol.23 No.7

        Crystallization behaviors and morphology of novel biodegradable poly(octamethylene adipate-cooctamethylene succinate) (POAS) copolymers with different octamethylene succinate (OS) contents and their parent homopolymer poly(octamethylene adipate) (POA) were extensively investigated. Compared to POA, increasing the OS unit does not modify the crystal structures but slightly decreases the crystallinity values of POAS. The glass transition temperature values of POAS are greater than that of POA. Both the nonisothermal crystallization peak temperature and melting point temperature values of POAS decrease gradually with the increment of the OS unit. The overall isothermal melt crystallization rates of POAS decrease with increasing crystallization temperature and the OS content, while the crystallization mechanism does not change. The equilibrium melting point values of POAS are reduced with increasing the OS content, with respect to POA. The nucleation densities of POAS spherulites are reduce significantly; moreover, increasing crystallization temperature and the OS content reduces the spherulitic growth rates of POAS, relative to POA.

      • KCI등재

        FRChain: A Blockchain-based Flow-Rules-oriented Data Forwarding Security Scheme in SDN

        ( Weichen Lian ),( Zhaobin Li ),( Chao Guo ),( Zhanzhen Wei ),( Xingyuan Peng ) 한국인터넷정보학회 2021 KSII Transactions on Internet and Information Syst Vol.15 No.1

        As the next-generation network architecture, software-defined networking (SDN) has great potential. But how to forward data packets safely is a big challenge today. In SDN, packets are transferred according to flow rules which are made and delivered by the controller. Once flow rules are modified, the packets might be redirected or dropped. According to related research, we believe that the key to forward data flows safely is keeping the consistency of flow rules. However, existing solutions place little emphasis on the safety of flow rules. After summarizing the shortcomings of the existing solutions, we propose FRChain to ensure the security of SDN data forwarding. FRChain is a novel scheme that uses blockchain to secure flow rules in SDN and to detect compromised nodes in the network when the proportion of malicious nodes is less than one-third. The scheme places the flow strategies into blockchain in form of transactions. Once an unmatched flow rule is detected, the system will issue the problem by initiating a vote and possible attacks will be deduced based on the results. To simulate the scheme, we utilize BigchainDB, which has good performance in data processing, to handle transactions. The experimental results show that the scheme is feasible, and the additional overhead for network performance and system performance is less than similar solutions. Overall, FRChain can detect suspicious behaviors and deduce malicious nodes to keep the consistency of flow rules in SDN.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼