http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
( Guangwei Xu ),( Miaolin Lai ),( Xiangyang Feng ),( Qiubo Huang ),( Xin Luo ),( Li Li ),( Shan Li ) 한국인터넷정보학회 2021 KSII Transactions on Internet and Information Syst Vol.15 No.2
The cloud storage provides flexible data storage services for data owners to remotely outsource their data, and reduces data storage operations and management costs for data owners. These outsourced data bring data security concerns to the data owner due to malicious deletion or corruption by the cloud service provider. Data integrity verification is an important way to check outsourced data integrity. However, the existing data verification schemes only consider the case that a verifier launches multiple data verification challenges, and neglect the verification overhead of multiple data verification challenges launched by multiple verifiers at a similar time. In this case, the duplicate data in multiple challenges are verified repeatedly so that verification resources are consumed in vain. We propose a duplicate data verification algorithm based on multiple verifiers and multiple challenges to reduce the verification overhead. The algorithm dynamically schedules the multiple verifiers’ challenges based on verification time and the frequent itemsets of duplicate verification data in challenge sets by applying FP-Growth algorithm, and computes the batch proofs of frequent itemsets. Then the challenges are split into two parts, i.e., duplicate data and unique data according to the results of data extraction. Finally, the proofs of duplicate data and unique data are computed and combined to generate a complete proof of every original challenge. Theoretical analysis and experiment evaluation show that the algorithm reduces the verification cost and ensures the correctness of the data integrity verification by flexible batch data verification.
Effect of Short-Time Carburizing Treatment on Microstructure and Mechanical Properties of M50 Steel
Yinghua Wei,Xingfu Yu,Shuai Wang,Xiangyang Shen,Wenzeng Zhao,Yong Su,Yu Yang,Xiaochuan Feng 대한금속·재료학회 2023 METALS AND MATERIALS International Vol.29 No.6
By using scanning electron microscope (SEM), transmission electron microscope (TEM), X-Ray diffraction (XRD), and hardnessand rotational bending fatigue tests, the effect of short-time carburizing treatment on the microstructure and mechanicalproperties of bearing steel was studied. The results show that when the M50 steel is not carburized, the hardness is 750 HV,the rotational bending fatigue limit is 1100 MPa, and the impact absorption energy is 15.46 J. After short-time carburizationwith the carbon potential of 0.6%, the maximum hardness in the carburized area, the rotational bending fatigue limitand the impact absorption energy are all increased to be 807.7 HV, 1210 MPa and 16.72 J respectively. When the carbonpotential is further enhanced to be 0.8%, the maximum hardness of the carburized area of the steel is further enhanced to be813.4 HV, but the rotational bending fatigue strength and the impact absorption energy are both decreased to be 1125 MPaand 13.65 J respectively, which has close relations with the increasement of undissolved carbides and the precipitation ofacicular carbides.
Jianbo Gu,Xiang Wang,Chengze Xu,Xiangyang Feng,Siyuan Zhang 한국고분자학회 2023 Macromolecular Research Vol.31 No.6
In recent years, high refractive index polythiourethane materials have attracted increasing attention. In this study, the soft segment part of conventional polyurethane was replaced by ethylenedithiol, and a series of nanocomposite films containing Mercaptoethanol (ME) capped ZnS NPs were prepared by UV curing after the synthesis of the bifunctional linear prepolymer with hydroxyethyl acrylate as capping agent and trifunctional prepolymer with trimethylolpropane triacrylate as sulfhydrylate capping. ZnS NPs were well dispersed in the resin system, and the transmittance of the film decreased with the increase of ZnS content, but it did not float much and still has 80% transmittance at 40%. The addition of ZnS had a significant improvement on the refractive index. The RI of the system without the addition of particles was less than 1.5, the system with 40% was greater than 1.6. It was worth noting that the Abbe number was almost greater than 30, which was in the category of low dispersion.
Verification Control Algorithm of Data Integrity Verification in Remote Data sharing
Guangwei Xu,Shan Li,Miaolin Lai,Yanglan Gan,Xiangyang Feng,Qiubo Huang,Lili Yang,Wei Li 한국인터넷정보학회 2022 KSII Transactions on Internet and Information Syst Vol.16 No.2
Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.