RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Distribution of Bi–MnS Inclusions Existing in 1215MS Steels: Correlation with Thermal Physical Coefficient

        Jian‑bo Xie,Bei‑bei Liu,Xiang‑yu Wu,Jian‑xun Fu 대한금속·재료학회 2022 METALS AND MATERIALS International Vol.28 No.5

        This work aims to comprehensively summarize the types and distribution of the isolated Bi particles and MnS inclusions inthe Bi-bearing steels, to study the precipitated behavior of sulfide, and to study the effect of Bi particles on grain sizes andthe volume thermal expansion coefficients of the steels. Results show that the average percentage of the isolated Bi particles,semi-encapsulation, complete encapsulation, back-bridge, tiny encapsulation, cavity bridge Bi–MnS inclusions in the Bibearingsteels was 16.89%, 20.49%, 3.44%, 16.89%, 31.63%, 10.66%, respectively. The average equivalent diameters of thegrains in the 0 ppm, 130 ppm, 240 ppm, 760 ppm, 1200 ppm and 2300 ppm Bi content steels were 20.88, 20.17, 19.54, 18.13,13.98 and 13.25 μm, respectively. The precipitated equilibrium mass concentration product of the MnS (w[Mn]·w[S]) wascalculated to be 1.07, and the solid fraction fS value was 0.61. At 950 °C, the volume thermal expansion coefficient change(ΔVE) in 760 ppm Bi content steel was minimum 4 × 10–10%, while at 461.6 °C the ΔVE was maximum, 0.09%, which meansthat Bi affected the volume thermal expansion of the steel strongest in this temperature range.

      • KCI등재

        Disruption of ecdysis in Leptinotarsa decemlineata by knockdown of chitin deacetylase 1

        Jian-Jian Wu,Li-Li Mu,Zhong-Chao Chen,Kai-Yun Fu,Wen-Chao Guo,Chao Li,Guo-Qing Li 한국응용곤충학회 2019 Journal of Asia-Pacific Entomology Vol.22 No.2

        Chitin deacetylases (CDAs) catalyze N-deacetylation of chitin, a crucial process for chitin modification. In the present paper, LdCDA1 was identified in Leptinotarsa decemlineata. It was copiously expressed in larval foregut, hindgut and epidermis. Just before the molt in the first, second and third larval instars, the mRNA levels of LdCDA1 were high. In the fourth (final)-instar larvae, a peak occurred 4 days after ecdysis. In vivo results revealed that LdCDA1 transcriptionally responded, positively and negatively respectively, to 20-hydroxyecdysone and juvenile hormone titers. Moreover, knockdown of LdCDA1 significantly reduced foliage consumption, lengthened developing period and prevented growth in the final instar larvae. Three distinct lethal phenotypes were noted in the LdCDA1 RNAi larvae. About 30% of the RNAi larvae became moribund and finally died; approximately 50% of deformed pupae died as pharate adults; and around 20% of LdCDA1 depleted pupae finally emerged as abnormal adults and eventually died within 1 week after emergence. Furthermore, chitin content was low and the mRNA levels of five chitin biosynthesis transcripts (LdUAP1, LdUAP2, LdChSAa, LdChSAb and LdChSB) were significantly declined in the LdCDA1 RNAi larvae. In addition, glucose, trehalose and glycogen contents were increased in the LdCDA1 depleted hypomorphs, along with highly expressed genes coding for trehalose and glycogen synthesis enzymes. The findings provide a compelling piece of evidence that CDA1 is critical for chitin deposition in L. decemlineata. Moreover, LdCDA1 may be a potential target for control of the larvae.

      • KCI등재

        Stem Cell-Derived Exosomes: A New Method for Reversing Skin Aging

        Wu Jinyan,Wu Sai-Nan,Zhang Li-Ping,Zhao Xiansheng,Li Yue,Yang Quyang,Yuan Ruoyue,Liu Jian-Lan,Mao Hong-Ju,Zhu Ningwen 한국조직공학과 재생의학회 2022 조직공학과 재생의학 Vol.19 No.5

        Senescence is an inevitable natural life process that involves structural and functional degeneration of tissues and organs. Recently, the process of skin aging has attracted much attention. Determining a means to delay or even reverse skin aging has become a research hotspot in medical cosmetology and anti-aging. Dysfunction in the epidermis and fibroblasts and changes in the composition and content of the extracellular matrix are common pathophysiological manifestations of skin aging. Reactive oxygen species and matrix metalloproteinases play essential roles in this process. Stem cells are pluripotent cells that possess self-replication abilities and can differentiate into multiple functional cells under certain conditions. These cells also possess a strong ability to facilitate tissue repair and regeneration. Stem cell transplantation has the potential for application in anti-aging therapy. Increasing studies have demonstrated that stem cells perform functions through paracrine processes, particularly those involving exosomes. Exosomes are nano-vesicular substances secreted by stem cells that participate in cell-to-cell communication by transporting their contents into target cells. In this chapter, the biological characteristics of exosomes were reviewed, including their effects on extracellular matrix formation, epidermal cell function, fibroblast function and antioxidation. Exosomes derived from stem cells may provide a new means to reverse skin aging.

      • KCI등재

        Resonance Characteristics Analysis of Grid-connected Inverter Systems based on Sensitivity Theory

        Jian Wu,Wanqin Han,Tao Chen,Jiaqi Zhao,Binbin Li,Dianguo Xu 전력전자학회 2018 JOURNAL OF POWER ELECTRONICS Vol.18 No.3

        Harmonic resonance exists in grid-connected inverter systems. In order to determine the network components that contribute to harmonic resonance and the composition of the resonant circuit, sensitivity theory is applied to the resonance characteristic analysis. Based on the modal analysis, the theory of sensitivity is applied to derive a formula for determining the sensitivities of each network component parameter under a resonance circumstance that reflects the participation of the network component. The solving formula is derived for both parallel harmonic resonance and series harmonic resonance. This formula is adopted to a 4-node grid-connected test system. The analysis results reveal that for a certain frequency, the participation of parallel resonance and series resonance are not the same. Finally, experimental results demonstrate that the solving formula for sensitivity is feasible for grid-connected systems.

      • KCI등재

        CTNNB1 Mutation in Aldosterone Producing Adenoma

        Jian-Jhong Wang,Kang-Yung Peng,Vin-Cent Wu,Fen-Yu Tseng,Kwan-Dun Wu 대한내분비학회 2017 Endocrinology and metabolism Vol.32 No.3

        Discoveries of somatic mutations permit the recognition of subtypes of aldosterone-producing adenomas (APAs) with distinct clinical presentations and pathological features. Catenin β1 (CTNNB1) mutation in APAs has been recently described and discussed in the literature. However, significant knowledge gaps still remain regarding the prevalence, clinical characteristics, pathophysiology, and outcomes in APA patients harboring CTNNB1 mutations. Aberrant activation of the Wnt/β-catenin signaling pathway will further modulate tumorigenesis. We also discuss the recent knowledge of CTNNB1 mutation in adrenal adenomas.

      • SCIESCOPUSKCI등재

        Modal Analysis of Resonance and Stable Domain Calculation of Active Damping in Multi-inverter Grid-connected Systems

        Wu, Jian,Chen, Tao,Han, Wanqin,Zhao, Jiaqi,Li, Binbin,Xu, Dianguo The Korean Institute of Power Electronics 2018 JOURNAL OF POWER ELECTRONICS Vol.18 No.1

        Interaction among multiple grid-connected inverters has a negative impact on the stable operations and power quality of a power grid. The interrelated influences of inverter inductor-capacitor-inductor filters constitute a high-order power network, and consequently, excite complex resonances at various frequencies. This study first establishes a micro-grid admittance matrix, in which inverters use deadbeat control. Multiple resonances can then be evaluated via modal analysis. For the active damping method applied to deadbeat control, the sampling frequency and the stable domain of the virtual damping ratio are also presented by analyzing system stability in the discrete domain. Simulation and experimental results confirm the efficiency of modal analysis and stable domain calculation in multi-inverter grid-connected systems.

      • SCIESCOPUSKCI등재

        Current and power quality multi-objective control of virtual synchronous generators under unbalanced grid conditions

        Wu, Jian,Liu, Tong,Qiu, Tianyi,Xu, Dianguo The Korean Institute of Power Electronics 2020 JOURNAL OF POWER ELECTRONICS Vol.20 No.2

        In recent years, with the large-scale application of distributed power sources in the power grid, the power grid is moving toward low inertia and low damping. The virtual synchronous generator (VSG) has become a hot topic for scholars since it can simulate the moment of inertia, damping and frequency modulation of synchronous generators. Due to its unbalanced load distribution and the random variation of power loads, grid voltage is asymmetrical. Under grid voltage asymmetry, a VSG experiences output current imbalance and power oscillation. The grid current imbalance further reduces the transformer's three-phase voltage, which makes it unequal, cyclic, and very easy to cause electricity accidents. Aiming at this problem, this paper proposes three modes of current balance, reactive power balance and active power balance without changing the characteristics of VSGs. The output current balance and power are constant when the grid voltage is asymmetrical. The effectiveness and feasibility of the control strategy are verified by simulation and experimental results, which provides an effective scheme for balanced and stable operation of the grid.

      • The Prediction Research of Population Density Based on Deep Learning in Grain Stored Insects

        Wu Jian-Jun,Dang Hao,Li Miao,Sun Fu-Yan,Zhu Yu-Hua,Zhen Tong,Zou Bing-Qiang 보안공학연구지원센터 2016 International Journal of Hybrid Information Techno Vol.9 No.10

        Precision of pests, in stored grain insect population density, has been a hot and difficult research in pest detection and control system. The accuracy of prediction of pest density will directly affect to warehouse grain temperature and the food quality etc. In order to improve the accuracy, the paper which using the depth study method, established an insects density prediction mode with the depth of the belief network as the core. The model is applied to the algorithm of deep learning predictive control. According to the temperature and humidity of the grain obtained from the actual measurement and the initial density of the pest, we predicted the pest density. Simulation results show that the root mean square error is small between the predictive value and actual value, high prediction accuracy. The deep learning algorithm is applied to the population density of pests is effective.

      • Differentiating Technique: Constructing Efficient HIBE with Constant Size Ciphertext and Authorized Delegation

        Jian-Wu Zheng,Jing Zhao,Xin-Ping Guan 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.8

        As Hierarchical Identity Based Encryption (HIBE) system usually maps the true institutional structure of an organization or entity relationship between objects in real world, It is important that computation & communication complexity of private key, ciphertext, cryptographic computations and so on related to an entity in the hierarchy is independent to the hierarchy depth of the entity. Moreover, key escrow problem that any non-leaf entity in a hierarchical identity based cryptosystem can derive private keys for its descendants with use of its private key should be resolved, in order to prevent any entity from behaving on behalf of its descendants. In this paper, a new technique is introduced for composing a private key for each individual entity in HIBE system by differentiating between non-local identifiers and local identifiers of the identity of the entity. That we call Identifier Discrimination. With the technique, A selective identity secure HIBE system is constructed under Decisional Bilinear Diffie-Hellman (DBDH) assumption without using random oracles, where the private key and the ciphertext consist of constant number of group elements, and decryption requires only three bilinear map computations, regardless of the identity hierarchy depth. Moreover, in contrast to previous HIBE constructions, where private key for an entity can be derived by its ancestors with direct use of their private keys, key escrow problem inherent in identity based cryptosystems is resolved in our HIBE construction. Privilege of deriving private keys for an entity can be delegated to any of its ancestors through authorization by distributing specifically crafted values to the ancestor in our HIBE system, that we call Authorized Delegation.

      • On Resolving Key Escrow Problem in HIBE and HIBS

        Jian-Wu Zheng,Jing Zhao,Xin-Ping Guan 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.6

        In traditional hierarchical identity based cryptosystems (HIBC), non-leaf entities as level PKGs are usually capable of deriving private keys for their descendants with use of their private keys, non-leaf entities can therefore act (decrypt or sign) on the behalf of their arbitrary descendants. This is called key escrow problem of HIBC. In order to resolve key escrow problem, a new technique – Identifier Discrimination is proposed in this paper for composing private keys for entities in hierarchy. With the technique, an identity selective secure HIBE scheme is constructed under Decisional Bilinear Diffie- Helleman (DBDH) assumption in standard security model, in which any identity is incapable of deriving private keys for any of its descendants with use of its private key, and the privilege of generating private keys for each individual descendant is delegated by the root PKG through authorization, that we call Authorization Delegation. Moreover, a new hierarchical identity based signature (HIBS) scheme is constructed from our HIBE construction, by applying Naor transformation of an identity-based signature (IBS) out of an IBE. Because of the inability of deriving its descendants’ private keys with use its private key, an entity therefore cannot sign messages on behalf of any of its descendants, thus guaranteeing that authenticity and non-repudiation properties are achieved in our HIBS system.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼