http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Jian Rong,Tao Zhang,Fengxian Qiu,Mingliang Chen 한국화학공학회 2017 Korean Journal of Chemical Engineering Vol.34 No.1
Hierarchical porous NiO/Al2O3 composites were successfully prepared by two-steps. First, the core-shell structured Al2O3 microspheres were prepared via a template-free hydrothermal route using KAl(SO4)2·12H2O and Al2(SO4)3·18H2O as aluminum source. Then, the NiO/Al2O3 composites with micro- and nano-hierarchical structures were prepared by a hydrothermal method combining the subsequent calcination process. The obtained characterization result presented that the morphology of hierarchical Al2O3 microsphere tuned to irregular platelets by simply varying Ni/Al ratios. The BET analysis showed that the special surface area from 52.12m2 g−1 to 214.8m2 g−1 after two hydrothermal complex process. Effects of Ni/Al ratio, adsorbent dosage, Congo red (CR) concentration, coexisting ions, adsorption time and temperature were investigated. The obtained results indicated that NiO/Al2O3 composite had the high adsorption efficiency (99.6%) and great adsorption capacity (186.9mg g−1) under the optimum conditions. The adsorption isotherm and kinetics data were found to be well fitted and in good agreement with the Langmuir isotherm model and pseudo-second order model, respectively. The hierarchical porous NiO/Al2O3 composites presented remarkably higher adsorption efficiency during five recycling, which showed their potential as the highly efficient adsorbent for removal of CR in wastewater.
Space-selective Precipitation and Control of Functional Crystals in Glasses by a Femtosecond Laser
Jianrong Qiu,Bin Zhu,Ye Dai 한국세라믹학회 2007 세라미스트 Vol.10 No.3
Femtosecond laser micro-processing received much attention in the past decade. The nature of ultra-short light-matter interaction permits femtosecond laser to overcome the diffraction limit and realize precise micro-processing. The ultrahigh light intensity of the femtosecond laser allows sapece-selective microscopic modifications to materials based on multiphoton processes. In this paper, we review our recent research development on space-selective precipitation and control of functional crystals in glasses by an infrared femtosecond laser. The technique will open new possibilities in the fabrication of micro-optical components with various optical functions.
( Jianrong Bao ),( Dan He ),( Xiaorong Xu ),( Bin Jiang ),( Minhong Sun ) 한국인터넷정보학회 2016 KSII Transactions on Internet and Information Syst Vol.10 No.11
Currently, the quantize-and-forward (QF) scheme with high order modulation and quantization has rather high complexity and it is thus impractical, especially in multiple relay cooperative communications. To overcome these deficiencies, an improved low complex QF scheme is proposed by the combination of the low order binary phase shift keying (BPSK) modulation and the 1-bit and 2-bit quantization, respectively. In this scheme, the relay selection is optimized by the best relay position for best bit-error-rate (BER) performance, where the relays are located closely to the destination node. In addition, an optimal power allocation is also suggested on a total power constraint. Finally, the BER and the achievable rate of the low order 1-bit, 2-bit and 3-bit QF schemes are simulated and analyzed. Simulation results indicate that the 3-bit QF scheme has about 1.8~5 dB, 4.5~7.5 dB and 1~2.5 dB performance gains than those of the decode-and-forward (DF), the 1-bit and 2-bit QF schemes, at BER of 10<sup>-2</sup>, respectively. For the 2-bit QF, the scheme of the normalized Source-Relay (S-R) distance with 0.9 has about 5dB, 7.5dB, 9dB and 15dB gains than those of the distance with 0.7, 0.5, 0.3 and 0.1, respectively, at BER of 10<sup>-3</sup>. In addition, the proposed optimal power allocation saves about 2.5dB much more relay power on an average than that of the fixed power allocation. Therefore, the proposed QF scheme can obtain excellent features, such as good BER performance, low complexity and high power efficiency, which make it much pragmatic in the future cooperative communications.
Jianrong Li,Jinsheng Chen,Yanke Yu,Chi He 한국공업화학회 2015 Journal of Industrial and Engineering Chemistry Vol.25 No.-
The Fe–Mn–Ce/CP catalyst prepared by the incipient-wetness impregnation method was investigated for elemental mercury (Hg0) removal in simulated coal-fired flue gas. The incorporation of Fe could remarkably enhance the SO2-resistance of Fe–Mn–Ce/CP catalyst at low temperature, and the existence of water vapor had negative impact on Hg0 removal efficiency. More than 95% of Hg0 could be removed at 100 8C under the conditions of 60 ppm HCl, 3% O2 (v/v), 5% H2O (v/v) and 400 ppm SO2. Hg-TPD results indicated that Hg0 adsorption amount decreased after the addition of H2O or SO2. The XPS results revealed that the incorporation of Fe could enhance the contents of high valence Mnx+ (i.e., Mn3+/Mn4+) and Ce3+ species in the composite catalysts, which are favorable for the oxidation process of elemental mercury. The surface characteristics were not the primary factor determining the catalytic activity. Overall, the catalytic performance of the Fe–Mn–Ce/CP catalyst was closely related to the Fe3+ state, high ratios of (Mn4+ + Mn3+)/Mn2+ and high content of not fully coordinated cerium species.
( Jianrong Bao ),( Bin Jiang ),( Chao Liu ),( Xianyang Jiang ),( Minhong Sun ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.7
In a single-source and multi-relay amplify-forward (AF) cooperative network, the outage probability and the power allocation are two key factors to influence the performance of an entire system. In this paper, an optimized AF relay selection by an exclusive method and near optimal power allocation (NOPA) is proposed for both good outage probability and power efficiency. Given the same power at the source and the relay nodes, a threshold for selecting the relay nodes is deduced and employed to minimize the average outage probability. It mainly excludes the relay nodes with much higher thresholds over the aforementioned threshold and thus the remainders of the relay nodes participate in cooperative forwarding efficiently. So the proposed scheme can improve the utility of the resources in the cooperative multi-relay system, as well as reduce the computational complexity. In addition, based on the proposed scheme, a NOPA is also suggested to approach sub-optimal power efficiency with low complexity. Simulation results show that the proposed scheme obtains about 2.1dB and 5.8dB performance gain at outage probability of 10<sup>-4</sup>, when compared with the all-relay-forward (6 participated relays) and the single-relay-forward schemes. Furthermore, it obtains the minimum outage probability among all selective relay schemes with the same number of the relays. Meanwhile, it approaches closely to the optimal exhaustive scheme, thus reduce much complexity. Moreover, the proposed NOPA scheme achieves better outage probability than those of the equal power allocation schemes. Therefore, the proposed scheme can obtain good outage probability, low computational complexity and high power efficiency, which makes it pragmatic efficiently in the single-source and multi-relay AF based cooperative networks.
A New Bionic Architecture of Information System Security Based on Data Envelopment Analysis
Jianrong Yao,Minxue Wei 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.3
With the extensively use of information system, the security issue of the system increasingly becomes a problem. With the defense structure, biological immune system can efficiently defense and obliterate the foreign pathogens. Based on the current research of biological immune system and information system security architecture, this paper comes up with a feasible method to apply the defense structure of biological immune system to information system security architecture. Summarizing common characteristics between the two systems, which proves the possibility of realizing the defense structure in the information system security architecture and come up with an achievable method to construct the three defensive lines. The realization of risk identification in the information system security architecture is analyzed with DEA which is used to identify the risk in the information system security architecture through the establishment of the ‘production frontiers’. A mathematical model of DEA is also developed using MATLAB to accomplish the risk analysis based on a set of real data from a company. Afterwards, this paper solves the problem that the previous studies are largely relying on the traditional safety analysis methods or the common risk assessment tools, which is lacking of effective protection technology to cope with the risk in the external environment and lay a foundation for achieving the bionic function of the information system security architecture.
A New Ensemble Model based Support Vector Machine for Credit Assessing
Jianrong Yao,Cheng Lian 보안공학연구지원센터 2016 International Journal of Grid and Distributed Comp Vol.9 No.6
With the rapid growth of internet finance, the credit assessing is becoming more and more important. An effective classification model will help financial institutions gain more profits and reduce the loss of bad debts. In this paper, we propose a new Support Vector Machine (SVM) based ensemble model (SVM-BRS) to address the issue of credit analysis. The model combines random subspace strategy and boosting strategy, which encourages diversity. SVM is considered as a state-of-art model to solve classification problem. Therefore, the proposed model has the potential to generate more accuracy classification. Accordingly, this study compares the ANN, LR, SVM, Bagging SVM, Boosting SVM techniques and experience shows that the new SVM based ensemble model can be used as an alternative method for credit assessing.