RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Security Cooperation Model Based on Topology Control and Time Synchronization for Wireless Sensor Networks

        Zhaobin Liu,Wenzhi Liu,Qiang Ma,Gang Liu,Liang Zhang,Ligang Fang,Victor S. Sheng 한국통신학회 2019 Journal of communications and networks Vol.21 No.5

        To address malicious attacks generated from wirelesssensor networks (WSNs), in this paper, we study the difficulty ofdetecting uncoordinated behavior by using a model that is unreliableand has uncontrollable accuracy, trustless control, and an inextensibleprotocol. A security collaboration model involving coupledstate vectors associated with topology control and time synchronizationis proposed. The networks achieve synchronizationusing weights and by controlling the number of goals. The simplecalculation of time synchronization values between neighboringnodes serves as the basis for judging the behavior of the nodetopology control. The coupling state vector calculation is the coreof the model. The topology coupling strength rate, signal intensityreduction, clock drift, and clock delay are combined to form a comprehensivemodel. The network energy consumption is reduced byupdating the coupling state vector regularly. The coupling cooperationthreshold is set to make security decisions and effectivelydistinguish between attack nodes and dead nodes. Thus, to ensurethe security and reliability of the network, we present a securitycooperation collection tree protocol (SC-CTP) scheme that maintainsa trusted environment and isolates misbehaving nodes. Thesimulation results show that the model can detect malicious nodeseffectively, has a high detection rate, and greatly reduces the energyconsumption of the whole network. In order to verify the effectivenessof the proposed model, a large-scale wireless sensor networkwith 200 nodes was deployed on a campus. The proposed modelwas applied to optimize the deployment of key nodes on the campus. Furthermore, a candidate set of these nodes were selected toachieve coupling cooperation of key goals. This test verified the reliabilityof the model, its customizable accuracy, and the reliabilityof the control.

      • Research and Performance Evaluation of aNew MD I/O Algorithm Based on Embedded Linux

        Zhaobin LIU 한국멀티미디어학회 2006 한국멀티미디어학회 국제학술대회 Vol.2006 No.-

        Based on the analysis of device driver characters of embedded Linux, this paper presented a novel RAID algorithm to improve the storage I/O performance. We have also ameliorated and optimized the mode of RAID automatic startup, the consolidation of RAID driver and raidtools and the process management etc. At last, we have realized one RAIDS storage subsystem, and have also given the performance analysis of it.

      • Performance Evaluation of multimedia storage based on virtual Storage system

        Zhaobin Liu,Fei Wu 한국멀티미디어학회 2006 한국멀티미디어학회 국제학술대회 Vol.2006 No.-

        Recently, multimedia application has been widely applied to national television, entertainment industry and so on. Many conventional storage architectures were used for streaming media system. However, the scalability of these architectures is inadequate. A truly scalable storage solution should exhibit an efficient load balancing strategy, while at the same time providing both storage and bandwidth expandability. On the basis of an analysis between the different storage network systems, this paper introduces a novel, Virtual Storage network System called VSS that can effectively consolidate the most prototypes of storage networking as the multimedia storage system. We mainly describe the scalability of emerging storage networking system to scale both the storage capacity and the number of simultaneous clients. Through the model we can get the factors that affect the system performance and determine how to improve the performance of the storage networking system.

      • KCI등재

        Genome-wide identification of WRKY transcription factors in kiwifruit (Actinidia spp.) and analysis of WRKY expression in responses to biotic and abiotic stresses

        Zhaobin Jing,Zhande Liu 한국유전학회 2018 Genes & Genomics Vol.40 No.4

        As one of the largest transcriptional factor families in plants, WRKY transcription factors play important roles in various biotic and abiotic stress responses. To date, WRKY genes in kiwifruit (Actinidia spp.) remain poorly understood. In our study, o total of 97 AcWRKY genes have been identified in the kiwifruit genome. An overview of these AcWRKY genes is analyzed, including the phylogenetic relationships, exon–intron structures, synteny and expression profiles. The 97 AcWRKY genes were divided into three groups based on the conserved WRKY domain. Synteny analysis indicated that segmental duplication events contributed to the expansion of the kiwifruit AcWRKY family. In addition, the synteny analysis between kiwifruit and Arabidopsis suggested that some of the AcWRKY genes were derived from common ancestors before the divergence of these two species. Conserved motifs outside the AcWRKY domain may reflect their functional conservation. Genome-wide segmental and tandem duplication were found, which may contribute to the expansion of AcWRKY genes. Furthermore, the analysis of selected AcWRKY genes showed a variety of expression patterns in five different organs as well as during biotic and abiotic stresses. The genome-wide identification and characterization of kiwifruit WRKY transcription factors provides insight into the evolutionary history and is a useful resource for further functional analyses of kiwifruit.

      • Differential Privacy via Weighted Sampling Set Cover

        Zhonglian Hu,Zhaobin Liu,Yangyang Xu,Zhiyang Li 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.4

        Differential privacy is a security guarantee model which widely used in privacy preserving data publishing, but the query result can’t be used in data research directly, especially in high-dimensional datasets. To address this problem, we propose a dimensionality reduction method. The core idea of this method is using a series of low-dimensional datasets to reconstruct a high-dimensional dataset, it improves data availability eventually. The main issue of this method is the reconstruction integrity, so a special sampling via set cover model is proposed in this article, which builds a multidimensional composite marginal tables set as a new middleware in differential privacy model. As a result, any form of disjunctive queries can be answered, and the accuracy of data query is improved. The experiment results also show the effectiveness of our method in practice.

      • Candidate Pruning-Based Differentially Private Frequent Itemsets Mining

        Yangyang Xu,Zhaobin Liu,Zhonglian Hu,Zhiyang Li 보안공학연구지원센터 2016 International Journal of Database Theory and Appli Vol.9 No.7

        Frequent Itemsets Mining(FIM) is a typical data mining task and has gained much attention. Due to the consideration of individual privacy, various studies have been focusing on privacy-preserving FIM problems. Differential privacy has emerged as a promising scheme for protecting individual privacy in data mining against adversaries with arbitrary background knowledge. In this paper, we present an approach to exploring frequent itemsets under rigorous differential privacy model, a recently introduced definition which provides rigorous privacy guarantees in the presence of arbitrary external information. The main idea of differentially privacy FIM is perturbing the support of item which can hide changes caused by absence of any single item. The key observation is that pruning the number of unpromising candidate items can effectively reduce noise added in differential privacy mechanism, which can bring about a better tradeoff between utility and privacy of the result. In order to effectively remove the unpromising items from each candidate set, we use a progressive sampling method to get a super set of frequent items, which is usually much smaller than the original item database. Then the sampled set will be used to shrink candidate set. Extensive experiments on real data sets illustrate that our algorithm can greatly reduce the noise scale injected and output frequent itemsets with high accuracy while satisfying differential privacy.

      • KCI등재

        Investigating chip morphology and its characteristics in the high-speed milling of a Ti-6Al-4V thin plate

        Lida Zhu,Jijiang Wu,Zhaobin Li,Changfu Liu 대한기계학회 2015 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.29 No.10

        Titanium alloy thin-plates have been widely used in the aerospace, automotive and biomedical industries, to name a few. The chipmorphologies and material properties of the thin plate were investigated under different cutting parameters in this paper. First, to furtherunderstand the variability and inherent rules of chip morphology, the characteristics of multi-surface chips (free, back, and cross-sectionsurfaces) were observed and studied by using a scanning electron microscope. The sawtooth frequency and degree of segmentation wereanalyzed through the geometrical characteristics of a serrated chip. Second, variations in the chip microhardness and the wear of the millcutter were measured and investigated under different machining parameters. Results show that the hardenability increases with the increasein cutting speed and the shear band shows higher microhardness than in other parts. In addition, the degree of insert wear decreaseswith proper cutting speed and feed. Some key conclusions and future work about high-speed milling thin-plate Ti-6Al-4V aregiven.

      • KCI등재

        Abnormal Behavior Recognition Based on Spatio-temporal Context

        Yuanfeng Yang,Lin Li,Zhaobin Liu,Gang Liu 한국정보처리학회 2020 Journal of information processing systems Vol.16 No.3

        This paper presents a new approach for detecting abnormal behaviors in complex surveillance scenes whereanomalies are subtle and difficult to distinguish due to the intricate correlations among multiple objects’behaviors. Specifically, a cascaded probabilistic topic model was put forward for learning the spatial contextof local behavior and the temporal context of global behavior in two different stages. In the first stage of topicmodeling, unlike the existing approaches using either optical flows or complete trajectories, spatio-temporalcorrelations between the trajectory fragments in video clips were modeled by the latent Dirichlet allocation(LDA) topic model based on Markov random fields to obtain the spatial context of local behavior in each videoclip. The local behavior topic categories were then obtained by exploiting the spectral clustering algorithm. Based on the construction of a dictionary through the process of local behavior topic clustering, the secondphase of the LDA topic model learns the correlations of global behaviors and temporal context. In particular,an abnormal behavior recognition method was developed based on the learned spatio-temporal context ofbehaviors. The specific identification method adopts a top-down strategy and consists of two stages: anomalyrecognition of video clip and anomalous behavior recognition within each video clip. Evaluation was performedusing the validity of spatio-temporal context learning for local behavior topics and abnormal behaviorrecognition. Furthermore, the performance of the proposed approach in abnormal behavior recognitionimproved effectively and significantly in complex surveillance scenes.

      • SCIESCOPUSKCI등재

        Effects of Daidzein on Body Weight Gain, Serum IGF-I Level and Cellular Immune Function in Intact Male Piglets

        Wang, Genlin,Zhang, Xiangying,Han, Zhaoyu,Liu, Zhaobin,Liu, Weirong Asian Australasian Association of Animal Productio 2002 Animal Bioscience Vol.15 No.7

        10 male piglets at 5-6 weeks old with similar body weight (BW) were randomly assigned into the experimental (EXP) and control (CON) groups. The animals in EXP received intro-muscular injection with daidzein (DA) at the dose of 0.5 mg DA per kg start BW on day 1. The same procedures were repeated once every 3 days for eight times. The animals in CON received the injection only with same volume of control peanut oil. The animals were weighted on day 14 and 28 and the blood samples were obtained at different stages of the treatment for determining IGF-I levels and blood parameters. At the end of the experiment, the thymus and spleen from all the animals were surgically taken out and weighted. The results showed that BW and average daily gain (ADG) were not significantly different between the groups in term of the whole period, but ADG between days 14-28 was higher in EXP than in CON (p<0.05). On days 18, 21 and 25, IGF-I levels in EXP group were 20.53% (p<0.05), 15.92% (p>0.05) and 23.46% (p<0.05), respectively, higher than those in CON. The weights of thymus and spleen, the ratios of their weights to BW and red blood count (RBC) did not significantly differ between the groups at all stages. White blood count (WBC) in EXP steadily increased from day 22, reached its apex on day 24, which was higher than in CON (p<0.05) and its own levels on day 20 and 22 (p<0.01 or p<0.05), and remained higher on the later time (p=0.058). The results of percentage of T-Lymphocytes also demonstrated similar trend to WBC, but TLymphocyte transformation rate (%) appeared no significant change between the groups. In conclusion, Daidzein could stimulate male piglet growth and elevate serum IGF-I levels at certain stages of the treatment. It could also increase WBC and T-Lymphocyte rates, but had no significant impacts on RBC and T-Lymphocyte transformation rate.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼