RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • A Study on the Implications of China’s Personal Information Protection Act on Chinese and Korean Businesses

        Zhiyuan Tang(Zhiyuan Tang),Luyao Wang(Luyao Wang) 동아시아무역학회 2022 Journal of East Asian Trade(JEAT) Vol.4 No.1

        Purpose – This paper discusses the legislative process and necessity of China’s Personal Information Protection Law, examines the main contents of China’s Personal Information Protection Law, and studies its impact on Chinese and Korean enterprises. Thus, China’s future data protection legal system can be better understood. Design/Methodology/Approach – In October 2020, China convened the 13th National People’s Congress to deliberate and promulgate the draft Personal Information Protection Law of the People’s Republic of China 2020. The draft privacy law is China’s first specialized legislation on personal information protection, drawing global attention. Furthermore, president Xi Jinping made clear his commitment to protecting personal information by reiterating the need for “cyber security and personal information security for people” and “protecting their legitimate rights and interests in cyberspace” after the 2019 National Cyber Week. The Personal Information Protection Act of China was enacted on November 1, 2021, as personal information protection was also a real concern among the Chinese people in the highly information-oriented era. Findings – China already has an independent and unified Personal Information Protection Act, which officially promulgates and enforces the Personal Information Protection Act this year following cybersecurity, cybersecurity, and criminal law provisions. Furthermore, in October 2020, China began a full-fledged legislative process by releasing a draft Personal Information Protection Act and collecting opinions. Research Implications – China’s Personal Information Protection Act is expected to play an important role for Chinese companies and Korean companies with subsidiaries in China due to offshore applications. Therefore, it is necessary to continue to pay attention to the revision and enforcement rules of the Personal Information Protection Act so that Chinese and Korean companies can respond quickly after it is promulgated and enforced. Therefore, this paper summarizes the background of China’s Personal Information Protection Act and the main contents of the 2021 edition of the Personal Information Protection Act.

      • KCI등재

        Weak fault detection method of rolling bearing based on testing signal far away from fault source

        Zhiyuan He,Guo Chen,Tengfei Hao,Chunyu Teng,Minli Hou,Zhenjie Chen 대한기계학회 2020 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.34 No.3

        In some cases, because of the complex internal structure of the machines, the positions of the vibration sensors are far away from the rolling bearings, such as in an aeroengine, causing the fault features to become extremely weak, which brings great challenge to the detection of rolling bearings. To address this problem, an integrated detection method is proposed. First, a method named MEDL is proposed to determine the optimal filter length in minimum entropy deconvolution (MED) to enhance the periodic fault impulse component in the weak signal, which accuracy is 1. After that, the MEDL is combined with variational mode decomposition (VMD) and autocorrelation to extract fault features from strong background noise. A series of fault simulation experiments for rolling bearings were conducted by using an aeroengine rotor experimental rig with casing. The results verify that the accuracy of the integrated detection method is 100 % in different measuring points, speeds and fault types. At the same time, it compared with spectral kurtosis (SK) and empirical wavelet transform (EWT). It proves that the integrated detection method is more robust in extracting the weak fault characteristic of rolling bearings from the casing signals effectively.

      • KCI등재

        Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing

        ( Zhiyuan Zhao ),( Jianhua Wang ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.6

        With the development of wireless access technologies and the popularity of mobile intelligent terminals, cloud computing is expected to expand to mobile environments. Attribute-based encryption, widely applied in cloud computing, incurs massive computational cost during the encryption and decryption phases. The computational cost grows with the complexity of the access policy. This disadvantage becomes more serious for mobile devices because they have limited resources. To address this problem, we present an efficient verifiable outsourced scheme based on the bilinear group of prime order. The scheme is called the verifiable outsourced computation ciphertext-policy attribute-based encryption scheme (VOC-CP-ABE), and it provides a way to outsource intensive computing tasks during encryption and decryption phases to CSP without revealing the private information and leaves only marginal computation to the user. At the same time, the outsourced computation can be verified by two hash functions. Then, the formal security proofs of its (selective) CPA security and verifiability are provided. Finally, we discuss the performance of the proposed scheme with comparisons to several related works.

      • Research on Strengthening the Management of Forest and Grassland Fire Prevention Ability in Ethnic Areas of Southwest China

        Zhiyuan Tang 동아시아무역학회 2023 Journal of East Asian Trade(JEAT) Vol.5 No.2

        Purpose - Nowadays, forest and grassland fires are very serious in the world, and the area of forests and grasslands burned each year is close to one thousandth of the world’s existing forest and grassland area. The serious impact of fires on ecology not only affects the development of the world economy, but also seriously damages the human living environment. Design/Methodology/Approach - How to strengthen the construction of forest and grassland fire prevention capabilities has undoubtedly become an urgent problem that countries around the world need to solve. Findings - Wu Yingda et al. (2022) summarized their research and concluded that in 1988, China issued and implemented the “Forest Fire Prevention Regulations”. In 2010, the Ministry of Agriculture issued the “National Grassland Fire Emergency Plan”. In 2012, the General Office of the State Council issued the “National Forest Fire Emergency Plan”. Research Implications - Liu Yongbi (2001) believes that these factors have led to complex fire prevention work in the southwestern region, especially in ethnic minority areas, and difficulties in fire source management and prediction. Based on this, how to scientifically and effectively prevent and manage forest and grassland fires in southwestern ethnic minority areas, and find more practical and feasible forest and grassland fire prevention strategies is an important way for China to make breakthroughs in forest and grassland fire prevention work in southwestern ethnic areas, and even the entire southwestern region.

      • KCI등재

        Novel Multi-user Conjunctive Keyword Search Against Keyword Guessing Attacks Under Simple Assumptions

        ( Zhiyuan Zhao ),( Jianhua Wang ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.7

        Conjunctive keyword search encryption is an important technique for protecting sensitive personal health records that are outsourced to cloud servers. It has been extensively employed for cloud storage, which is a convenient storage option that saves bandwidth and economizes computing resources. However, the process of searching outsourced data may facilitate the leakage of sensitive personal information. Thus, an efficient data search approach with high security is critical. The multi-user search function is critical for personal health records (PHRs). To solve these problems, this paper proposes a novel multi-user conjunctive keyword search scheme (mNCKS) without a secure channel against keyword guessing attacks for personal health records, which is referred to as a secure channel-free mNCKS (SCF-mNCKS). The security of this scheme is demonstrated using the Decisional Bilinear Diffie-Hellman (DBDH) and Decision Linear (D-Linear) assumptions in the standard model. Comparisons are performed to demonstrate the security advantages of the SCF-mNCKS scheme and show that it has more functions than other schemes in the case of analogous efficiency.

      • KCI등재

        Different QoS Constraint Virtual SDN Embedding under Multiple Controllers

        ( Zhiyuan Zhao ),( Xiangru Meng ),( Siyuan Lu ),( Yuze Su ) 한국인터넷정보학회 2018 KSII Transactions on Internet and Information Syst Vol.12 No.9

        Software-defined networking (SDN) has emerged as a promising technology for network programmability and experiments. In this work, we focus on virtual network embedding in multiple controllers SDN network. In SDN virtualization environment, virtual SDN networks (vSDNs) operate on the shared substrate network and managed by their each controller, the placement and load of controllers affect vSDN embedding process. We consider controller placement, vSDN embedding, controller adjustment as a joint problem, together considering different quality of service (QoS) requirement for users, formulate the problem into mathematical models to minimize the average time delay of control paths, the load imbalance degree of controllers and embedding cost. We propose a heuristic method which places controllers and partitions control domains according to substrate SDN network, embeds different QoS constraint vSDN requests by corresponding algorithms, and migrates switches between control domains to realize load balance of controllers. The simulation results show that the proposed method can satisfy different QoS requirement of tenants, keep load balance between controllers, and work well in the acceptance ratio and revenue to cost ratio for vSDN embedding.

      • A Study on Judicial Intervention in China’s Corporate Impasse: Focusing on the Application of Judicial Dissolution of a Company

        Zhiyuan Tang 동북아경상학회 2023 동북아경상연구 Vol.4 No.2

        Purpose - As one of the great inventions of modern society, the company system is an important driving force for social progress. As a malpractice in the operation of the company, the deadlock of the company is harmful to the company itself, its shareholders, creditors and even the public. Design/Methodology/Approach - The judicial dissolution system in Article 183 of China’s current Company Law provides a legal basis for judicial intervention in the deadlock of the company and fills the legislative gap. Yet the corporate stalemate is not simply linked to judicial dissolution (Bao Weimin, 2005). Corporate deadlock is only one of the reasons why shareholders have the right to request judicial dissolution; judicial dissolution should not be the only solution to the deadlock. Findings - Forcing the dissolution of the company to resolve the deadlock is clearly wrong for shareholders who want to resolve the deadlock but do not want to destroy the company.However, China’s current Company Law provides too single judicial remedy, too general regulations and weak operability. Research Implications - This paper discusses the extension and connotation of corporate deadlock and analyses the rationality of judicial intervention (Wang Jianjian, 2013). This paper also analyzes the concept and characteristics of the company deadlock, and provides a standard for the determination of the company deadlock, limits the environment of the company deadlock to limited liability company and further limits the scope of the discussion.

      • KCI등재

        A New Study on the Gap Effect of an Airfoil with Active Flap Control Based on the Overset Grid Method

        Zhiyuan Hu,Guohua Xu,Yongjie Shi 한국항공우주학회 2021 International Journal of Aeronautical and Space Sc Vol.22 No.4

        Rotors with active flap control have considerable potential in reducing vibration and noise and improving aerodynamic performance. However, due to the movement of the flap, there are unavoidable gaps between the components that will lead to significant changes in the aerodynamic characteristics. Moreover, considering the difficulties in motion modeling and the accuracy of the simulation of the flow field in such a narrow gap, carrying out related research is challenging; thus, there has been inadequate targeted research, and that which does exist requires supplementation. To carry out this challenging flow field simulation, the overset assembly algorithm proposed by the author in previous research is adopted in the present study. It is used to successfully assemble the narrow gap, and the accuracy of the simulation is fully verified by comparing the results with the actual experimental results and a grid study. Furthermore, to compensate for the lack of research and experiments on the gap effect, cases considering a complete range of gap widths from an absence of a gap to a width of 10% of the chord length are set up and carried out under the following three case groups: steady cases with a fixed trailing-edge deflection angle, unsteady cases in which only the trailing-edge flap is flapping, and full-motion cases characterized by the periodic flap of the main airfoil and the trailing-edge flap. The results show that the gap increases the drag of the trailing-edge flap and decreases aerodynamic efficiency, especially at low speeds and high angles of attack. Nevertheless, when the gap is unavoidable, there is a range of the gap width that makes unapparent the decrease of aerodynamic efficiency. Moreover, the decrease of aerodynamic efficiency can be reduced as much as possible by a well-designed gap region geometry to ensure that the airfoil and the trailing-edge flap fit together when moving.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼