http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Morphological Detection Method of Micron Wood Fiber Based on Skeleton Information
Honge Ren,Simiao Hu,Meng Zhu 보안공학연구지원센터 2016 International Journal of Multimedia and Ubiquitous Vol.11 No.5
In order to compensate for the lack of mathematical model support for the traditional study of fiber morphology, using polynomial fitting to build microns wood fiber morphological model based on skeleton information. The fiber morphological category can be distinguished by taking derivation of the fitting function. In order to overcome the disadvantages of common morphological detection, the measurement of fiber length and its degree of curvature by using skeleton information is carried out. The length of the skeleton is approximated as the true length of the wood fiber, and the projected length can be calculated according to the endpoint coordinates. Finally, the fiber's curl index was obtained. Through the experiment, it has verified rationality of the fiber morphology model, and it is proved that the measurement method based on skeleton information can be better to avoid the influence of wood fiber morphological changes to the length measuring accuracy, moreover the fiber curl index can be calculated to quantify the bending degree and the type of wood fiber. It is an effective morphological detection method.
Modified Smith Predictor Design and Its Applications to Long Time Delay Systems
Honge REN,Xuehai CAO,Jifeng GUO 보안공학연구지원센터 2015 International Journal of Signal Processing, Image Vol.8 No.5
For the system that can’t be described by the precise mathematical model and has long time delays, the conventional Smith predictor presents poor stability and large overshoot. Based on the conventional Smith predictor, an improved fuzzy adaptive PID-Smith predictor is proposed. It uses a fuzzy self-tuning PID controller as the primary controller instead of the traditional PID controller. In addition, a feedback loop and an adaptive regulator are imported to ensure the stability and enhance the adaptability of the variable environment. The simulation results show that the new scheme has excellent stability and robustness and can solve the problem of large overshoot in long time delay systems, even when the model mismatch rate comes to 40%.
Tree Image Segmentation Based on an Improved Two-Dimensional Otsu Algorithm
Honge Ren,Yang Zhou,Meng Zhu 보안공학연구지원센터 2016 International Journal of Hybrid Information Techno Vol.9 No.9
Influenced by light, houses, street lamps and other factors, tree images often contain noise and complex background information. The existing Otsu segmentation algorithms have deficiencies such as poor anti-noise capability, ignoring the class cohesion and so on. Based on the traditional gray value-neighborhood average gradient Otsu segmentation method, we propose an improved two-dimensional Otsu algorithm for tree image segmentation. The algorithm takes into account the between-class distance and within-class distance, which combined the average variance concept of two categories and proposed new threshold selection method, and reduce the interference of noise effectively. To achieve the best segmentation and reduce over-segmentation of background information, a method of removing small areas and morphological processing are used to optimize segmentation results. Experimental results show that the proposed algorithm has a good inhibition effect on noise and the effect of tree image segmentation is better than that of the traditional one.
Static Anomaly Detection Framework for Android-based Mobile Phones
Honge Ren,Xiyan Xu,Jian Zhang,Yali Chen 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.12
With the rapid development of wireless communication, mobile network, and embedded system technologies, android-based mobile devices show a number of useful functions and then they are attacked by hackers for obtaining some useful information. In this paper, an efficient static anomaly detection framework is shown for android-based mobile phones to improve their security. The proposed framework uses support vector machine to perform the anomaly detection and exploits the cloud computing platform to reduce the impact on android-based mobile phones. Experimental results show that the proposed framework is better than existing anomaly detection frameworks in terms of the detection precision and the detection time.
Secalonic acid D; A Cytotoxic Constituent from Marine Lichen-derived Fungus Gliocladium sp. T31
Hong Ren,Li Tian,Qianqun Gu,Weiming Zhu 대한약학회 2006 Archives of Pharmacal Research Vol.29 No.1
Secalonic acid D (SAD) was isolated as the major secondary metabolite of the marine lichenderived fungus Gliocladium sp. T31. Its structure was established on the basic of physicochemical and spectroscopic data. This is the first report on the isolation of SAD from this fungus, as well as its inhibitory effect on K562 cell cycle and its cytotoxicity against several tumor cell lines in vitro.
Hong Ren,Rui Liu,Li Chen,Tianjiao Zhu,Wei Ming Zhu,Qian Qun Gu 대한약학회 2010 Archives of Pharmacal Research Vol.33 No.4
Two new hetero-spirocyclic γ-lactams, azaspirofurans A (1) and B (2), had been isolated from a marine sediment-derived fungus Aspergillus sydowi D2-6. Their structures were determined by the chemical evidence and spectral analyses. Compound 1 exhibited cytotoxicity against A549 cell line with the IC50 value of 10 μM by MTT method.
On Ditransitive Constructions: A Neo-Transformational Approach
Ren Shan,Sung Shim Hong 한국 현대 언어학회 2009 언어연구 Vol.25 No.3
Ditransitive constructions in English have been extensively studied by many scholars such as Larson (1988/1990), Aoun & Li (1989), Pesetsky (1995), den Dikken (1995), Harley (2002), Emonds & Whitney (2006), etc., and the grammatical relationship between the double object construction and the dative construction has been one of the main research topics in the generative syntax for decades. This paper reviews the two different approaches, a Transformational and a non-Transformational (or Lexicalist) approach, to the relationship between Double Object Construction (henceforth DOC) and Dative Construction (henceforth DC). We show that the typological variations in Chinese ditransitive constructions can easily, with an appropriate minor modification/revision, be accounted for under the Larsonian VP-shell architecture, which is a transformational approach. Furthermore, based on the identical semantic entailments between Chinese DC and DOC constructions, we argue that Chinese DCs and DOCs are better analyzed if a transformationalist approach is adopted, which constitutes a cross-linguistic support for the phenomena. (Chungnam National University)
Methanol synthesis from CO2 hydrogenation over Cu/g-Al2O3 catalysts modified by ZnO, ZrO2 and MgO
Hong Ren,Cheng-Hua Xu,Hao-Yang Zhao,Ya-Xue Wang,Jie Liu,Jian-Ying Liu 한국공업화학회 2015 Journal of Industrial and Engineering Chemistry Vol.28 No.-
Cu/g-Al2O3 catalysts for methanol synthesis from CO2 are prepared and modified by metal oxides viaimpregnation in the present work. Results indicate that promoters modification leads to the formation ofsmall Cu0 particles with a high dispersion, improves catalytic performance of Cu-based catalysts inmethanol synthesis. Moreover, the activation temperature is another important factor on affecting theCu0 dispersion and particle size. The investigation on CO2 hydrogenation shows that methanol is mainlyfrom hydrogenation of activated CO2 with active hydrogen on Cu0 particles, which is inhibited by highreaction temperature due to improvement on reverse water-gas shift reaction and methanation
Nidurufin as a New Cell Cycle Inhibitor from Marine-derived Fungus Penicillium flavidorsum SHK1-27
Hong Ren,Wei-wei Liu 대한약학회 2011 Archives of Pharmacal Research Vol.34 No.6
A new cell cycle inhibitor, nidurufin (1), was isolated from the marine-derived fungus Penicillium flavidorsum SHK1-27. An evaluation of antitumor activity indicated that 1 induced in vitro cell cycle arrest at G_2/M transition in the K562 cell line in a concentration and timedependent manner, with an IC_50 value of 12.6 μM.