http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Niu, Jing,Shin, Young Jun,Son, Jaesung,Lee, Youngbin,Ahn, Jong-Hyun,Yang, Hyunsoo Optical Society of America 2012 Optics express Vol.20 No.18
<P>Shifting of the surface plasmon resonance wavelength induced by the variation of the thickness of insulating spacer between single layer graphene and Au nanoparticles is studied. The system demonstrates a blue-shift of 29 nm as the thickness of the spacer layer increases from 0 to 15 nm. This is due to the electromagnetic coupling between the localized surface plasmons excited in the nanoparticles and the graphene film. The strength of the coupling decays exponentially with a decay length of d/R = 0.36, where d is the spacer layer thickness and R is the diameter of the Au nanoparticles. The result agrees qualitatively well with the plasmon ruler equation. Interestingly, a further increment of the spacer layer thickness induces a red-shift of 17 nm in the resonance wavelength and the shift saturates when the thickness of the spacer layer increases above 20 nm.</P>
Niu-Jing Ma,Li-Xiong Gu,Chang-Li Peng 대한토목학회 2021 KSCE JOURNAL OF CIVIL ENGINEERING Vol.25 No.5
To make sure the tension adjustment in the cables of concrete cable-stayed bridges is conducted successfully, a new adjustment technique for the tension adjustment is presented, with the cable-girder temperature difference taken into account. The tensions are measured via frequency method. Prior to the tension adjustment, tensions and temperatures of all cables and girders are measured when the ambient temperature is stable, and this set of tensions is taken as reference tensions. During the tension adjustment, the relative variable quantities of the tensions are regarded as the control values, while the vertical displacement in the mid-span section of the main span is regarded as the verification value. After each pair of cables is adjusted, it is required to measure the temperatures of cables and girders as well as the vertical displacement variation in the mid-span section of the main span. To guarantee the structural behavior of entire bridge is controlled, at one-third cable points, two-third cable points and the farthest cable points, the frequencies of each pair of cables as well as the temperatures of each pair of cables and girders should be measured so as to recalculate the cable tensions. After that, these cable tensions are compared with the theoretical ones to ensure the structural behavior of entire bridge in control. Finally, Furong bridge, a concrete cable-stayed bridge with double inclined pylons, is taken as a sample application of this proposed technique. The results of cable tensions in this bridge illustrate the new adjustment technique is both accurate and efficient.
Effects of Impact Loads on Local Dynamic Behavior of Orthotropic Steel Bridge Decks
Niu-Jing Ma,Ronghui Wang 한국강구조학회 2021 International Journal of Steel Structures Vol.21 No.1
To investigate the local dynamic behavior of orthotropic steel bridge decks under impact loads, this paper proposed a type of combined plate-beam element for analysis of trapezoidal stiff ened plate and a type of 8-nodes solid-plate element for analysis of pavement. Besides, vehicle wheel loads are supposed to be triangular loads for convenience. Then, a model experiment was conducted to verify the accuracy of the proposed approach. Finally, River-sea-through channel of Hong Kong–Zhuhai– Macao Bridge is taken as an engineering case for computation analysis. The results are compared with those from FE software ANSYS. It shows that: fi rst, the proposed approach is both accurate and effi cient; second, bridge deck pavement has the eff ect of both self-weight and rigidity, which requires the bridge deck pavement be considered when analyzing the mechanical properties of bridge deck structure.
Thrombospondin-2 Couples Pressure-Promoted Chondrogenesis through NF-κB Signaling
Niu Jing,Feng Fan,Zhang Songbai,Zhu Yue,Song Runfang,Li Junrong,Zhao Liang,Wang Hui,Zhao Ying,Zhang Min 한국조직공학과 재생의학회 2023 조직공학과 재생의학 Vol.20 No.5
BACKGROUND: Our previous studies found that the mechanical stimulation promote chondrogenic differentiation of bone marrow mesenchymal stem cells (BMSCs), along with up-regulation of thrombospondin-2 (TSP-2). The aim of this study was to explore the effect of thrombospondin-2 (TSP-2) on the mechanical pressure-stimulated chondrogenic differentiation of BMSCs and the possible role of NF-jB signaling in the mechano-chemical coupling regulation toward chondrogenesis. METHODS: Rat BMSCs were isolated, cultured and identified. The time-dependent expressions of TSP-2 and Sox9 in BMSCs under a dynamic mechanical pressure of 0–120 kPa at 0.1 Hz for 1 h were tested by qPCR and Western blotting. The role of TSP-2 in chondrogenic differentiation of BMSCs under mechanical pressure was validated by using small interfering RNA. The impact of TSP-2 and mechanical pressure on chondrogenesis were detected and the downstream signaling molecules were explored using Western blotting. RESULTS: Mechanical pressure stimulation of 0–120 kPa for 1 h significantly upregulated the expression of TSP-2 in BMSCs. The expression of the chondrogenesis markers Sox9, Aggrecan, and Col-II were all upregulated under dynamic mechanical pressure or TSP-2 stimulation. Additional exogenous TSP-2 may potentiate the chondrogenic effect of mechanical stimulation. After knock down TSP-2, the upregulation of Sox9, Aggrecan and Col-II under mechanical pressure was inhibited. The NF-jB signaling pathway responded to both dynamic pressure and TSP-2 stimulation, and the cartilage-promoting effect was blocked by an NF-jB signaling inhibitor. CONCLUSION: TSP-2 plays an essential role in the chondrogenic differentiation of BMSCs under mechanical pressure. NF-jB signaling is involved in the mechano-chemical coupling of TSP-2 andmechanical pressure for the chondrogenic differentiation of BMSCs.
Technique for Intrusion Detection based on Cutting-based Real-valued Negative Selection
Niu Ling,Feng Gao Feng,Ma Jing 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.9
A novel technique for intrusion detection based on cutting-based real-valued negative selection scheme is proposed in this paper. Different from the current typical techniques, the proposed one sets a much more strict and reasonable mechanism to generate and optimize the set of mutual detector. Concretely, firstly, the new generating detector must be necessary and it should not be detected by the current existing mutual ones. Besides, those detectors coinciding with the self-set will be cut and optimized into several qualified ones which have better detecting abilities. Experimental results demonstrate that the proposed technique has much higher detecting rates.
Knockout of Fatty Acid Synthase induces Endoplasmic Reticulum Stress in Porcine Early Embryos
Jing Guo,Ying-Jie Niu,Kyung-Tae Shin,Nam-Hyung Kim,Xiang-Shun Cui 한국동물생명공학회(구 한국동물번식학회) 2017 Reproductive & Developmental Biology(Supplement) Vol.41 No.2
Fatty acid synthase (FASN) is an enzyme that catalyzes the synthesis of long chain fatty acid. During development, FASN plays a role in growth rather than the energy storage pathways. In this study, we hypothesis that knockout of FASN may affect the early embryonic development through induction of the endoplasmic reticulum (ER) stress. The function of FASN was studied using the Crispr/Cas9 technology. We found that FASN knockout induced ER stress by generation of reactive oxygen species (ROS), further resulted in the activation of adaptive unfolded protein response (UPR), caused the splicing of XBP1. In addition, FASN knockout increased ATF4 and CHOP expression, influenced phosphorylation of PERK. At last, Ca2+ was released from the ER and then taken up by the mitochondrial and influenced mitochondrial function, initiated apoptosis. These results demonstrated that FASN knockout induced generation of ROS, which mediated the activation of UPR via the ER and subsequent apoptosis in porcine early embryos.
A Delayed Multiple Copy Retransmission Scheme for Data Communication in Wireless Networks
Niu, Zhisheng,Wu, Yi,Zhu, Jing The Korea Institute of Information and Commucation 2003 Journal of communications and networks Vol.5 No.3
In this paper, we propose a delayed multiple copy retransmission (DMCR) scheme for data communication in wireless networks, by which multiple copies of a lost link layer frame are retransmitted one-by-one with a retransmission delay in between. The number of the copies gradually increases with the number of retransmissions. Furthermore, for implementation of the DMCR scheme in practical mobile communication system, we also propose a dynamic retransmission scheme by interleaving and a new round-robin scheduling algorithm. We compare our scheme with the previous non-delayed retransmission schemes on the performance of frame loss probability, channel capacity and total transmission time. Numerical results show that the DMCR scheme can achieve higher performance. The effect of the delay time on endto-end TCP throughput is investigated as well.
A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure
( Jing Li ),( Licheng Wang ),( Jianhua Yan ),( Xinxin Niu ),( Yixian Yang ) 한국인터넷정보학회 2014 KSII Transactions on Internet and Information Syst Vol.8 No.12
A (n,t,n) secret sharing scheme is to share a secret among n group members, where each member also plays a role of a dealer,and any t shares can be used to recover the secret. In this paper, we propose a strong (k,t,n) verifiable multi-secret sharing scheme, where any k out of n participants operate as dealers. The scheme realizes both threshold structure and adversary structure simultaneously, and removes a trusted third party. The secret reconstruction phase is performed using an additive homomorphism for decreasing the storage cost. Meanwhile, the scheme achieves the pre-verification property in the sense that any participant doesn`t need to reveal any information about real master shares in the verification phase. We compare our proposal with the previous (n,t,n) secret sharing schemes from the perspectives of what kinds of access structures they achieve, what kinds of functionalities they support and whether heavy storage cost for secret share is required. Then it shows that our scheme takes the following advantages: (a) realizing the adversary structure, (b) allowing any k out of n participants to operate as dealers, (c) small sized secret share. Moreover, our proposed scheme is a favorable candidate to be used in many applications, such as secure multi-party computation and privacy preserving data mining, etc.