RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Predicting surface quality of γ-TiAl produced by additive manufacturing process using response surface method

        Abdulrahman Al-Ahmari,Mohammad Ashfaq,Abdullah Alfaify,Basem Abdo,Abdulrahman Alomar,Abdelnaser Dawud 대한기계학회 2016 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.30 No.1

        Electron beam melting (EBM) has been found to be a promising technology for producing complex shaped parts from gamma titaniumaluminide alloys (γ-TiAl). The parts produced by this process are projected to have dimensions very close to the desired final shapes. However, the surface roughness of the parts produced by EBM is excessively rough. In many applications, it is necessary to improve thequality of manufactured parts using a convenient post process. This paper determines process parameters of end milling when it is usedas a post process for the parts produced by EBM. Design of experiments has been used to study the effect of the selected input parametersof end milling (spindle speed, feed rate, depth of cut and coolant type) on the surface roughness of γ-TiAl parts. Response surface methodologyis used to develop a predictive model for surface roughness. Effects of the selected milling process are investigated. This paperalso optimizes the selected process parameters to minimize the value of the obtained surface roughness.

      • KCI등재

        Dynamic Output Feedback Robust MPC for LPV Systems Subject to Input Saturation and Bounded Disturbance

        Xubin Ping,Zhiwu Li,Abdulrahman Al-Ahmari 제어·로봇·시스템학회 2017 International Journal of Control, Automation, and Vol.15 No.3

        For linear parameter varying (LPV) systems with unknown scheduling parameters and bounded disturbance,a synthesis approach of dynamic output feedback robust model predictive control (OFRMPC) with inputsaturation is investigated. By pre-specifying partial controller parameters, a main optimization problem is solvedby convex optimization to reduce the on-line computational burden. The main optimization problem guarantees thatthe estimated state and estimation error converge within the corresponding invariant sets such that recursive feasibilityand robust stability are guaranteed. The consideration of input saturation in the main optimization problemimproves the control performance. Two numerical examples are given to illustrate the effectiveness of the approach.

      • KCI등재

        Filtering and Intrusion Detection Approach for Secured Reconfigurable Mobile Systems

        Rim Idriss,Adlen Loukil,Mohamed Khalgui,Zhiwu Li,Abdulrahman Al-Ahmari 대한전기학회 2017 Journal of Electrical Engineering & Technology Vol.12 No.5

        This paper deals with reconfigurable secured mobile systems where the reconfigurability has the potential of providing a required adaptability to change the system requirements. The reconfiguration scenario is presented as a run-time automatic operation which allows security mechanisms and the addition-removal-update of software tasks. In particular, there is a definite requirement for filtering and intrusion detection mechanisms that will use fewer resources and also that will improve the security on the secured mobile devices. Filtering methods are used to control incoming traffic and messages, whereas, detection methods are used to detect malware events. Nevertheless, when different reconfiguration scenarios are applied at run-time, new security threats will be emerged against those systems which need to support multiple security objectives: Confidentiality, integrity and availability. We propose in this paper a new approach that efficiently detects threats after reconfigurable scenarios and which is based on filtering and intrusion detection methods. The paper’s contribution is applied to Android where the evaluation results demonstrate the effectiveness of the proposed middleware in order to detect the malicious events on reconfigurable secured mobile systems and the feasibility of running and executing such a system with the proposed solutions.

      • SCIESCOPUSKCI등재

        Filtering and Intrusion Detection Approach for Secured Reconfigurable Mobile Systems

        Idriss, Rim,Loukil, Adlen,Khalgui, Mohamed,Li, Zhiwu,Al-Ahmari, Abdulrahman The Korean Institute of Electrical Engineers 2017 Journal of Electrical Engineering & Technology Vol.12 No.5

        This paper deals with reconfigurable secured mobile systems where the reconfigurability has the potential of providing a required adaptability to change the system requirements. The reconfiguration scenario is presented as a run-time automatic operation which allows security mechanisms and the addition-removal-update of software tasks. In particular, there is a definite requirement for filtering and intrusion detection mechanisms that will use fewer resources and also that will improve the security on the secured mobile devices. Filtering methods are used to control incoming traffic and messages, whereas, detection methods are used to detect malware events. Nevertheless, when different reconfiguration scenarios are applied at run-time, new security threats will be emerged against those systems which need to support multiple security objectives: Confidentiality, integrity and availability. We propose in this paper a new approach that efficiently detects threats after reconfigurable scenarios and which is based on filtering and intrusion detection methods. The paper's contribution is applied to Android where the evaluation results demonstrate the effectiveness of the proposed middleware in order to detect the malicious events on reconfigurable secured mobile systems and the feasibility of running and executing such a system with the proposed solutions.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼