RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      • 좁혀본 항목

      • 좁혀본 항목 보기순서

        • 원문유무
        • 음성지원유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재SCOPUS

        Study and Design of High Strength and Low Heat Generation Polymer Composites by Molecular Dynamics Simulation

        Rui-Rui,Zhang,Bin,Wu,Peng,Chen,Jia-Sheng,Qian 한국고분자학회 2020 폴리머 Vol.44 No.6

        The molecular dynamics simulation was used to study and design a polymer composites system with excellent mechanical strength and less heat generation in a dynamic process. A series of system factors such as filler loading, surface modification onto filler, and network of cross-linking filler particles on mechanical and heat generation of polymer composites are systematically considered. It is found that the surface grafting onto fillers can restrain the heat generation of polymer composite in the dynamic process, while it shows less effect on the mechanical property. A network of crosslinking filler particles can be fabricated by a combination of grafting chains onto fillers. By filling such a network into the polymer, the mechanical and heat generation properties of polymer composites are significantly improved. Simulation results can help experimental fabrication of polymer composites with excellent mechanical and heat generation properties.

      • KCI등재SCOPUS

        A Multi-level Perception Security Model Using Virtualization

        ( Rui Lou ), ( Liehui Jiang ), ( Rui Chang ), ( Yisen Wang ) 한국인터넷정보학회 2018 KSII Transactions on Internet and Information Syst Vol.12 No.11

        Virtualization technology has been widely applied in the area of computer security research that provides a new method for system protection. It has been a hotspot in system security research at present. Virtualization technology brings new risk as well as progress to computer operating system (OS). A multi-level perception security model using virtualization is proposed to deal with the problems of over-simplification of risk models, unreliable assumption of secure virtual machine monitor (VMM) and insufficient integration with virtualization technology in security design. Adopting the enhanced isolation mechanism of address space, the security perception units can be protected from risk environment. Based on parallel perceiving by the secure domain possessing with the same privilege level as VMM, a mechanism is established to ensure the security of VMM. In addition, a special pathway is set up to strengthen the ability of information interaction in the light of making reverse use of the method of covert channel. The evaluation results show that the proposed model is able to obtain the valuable risk information of system while ensuring the integrity of security perception units, and it can effectively identify the abnormal state of target system without significantly increasing the extra overhead.

      • KCI등재

        Molecular Dynamics Simulation to Investigate the Rake Angle Effects on Nanometric Cutting of Single Crystal Ni3Al

        Rui-cheng,Feng,Yong-nian,Qi,Zong-xiao,Zhu,Wen-yuan,Song,Hai-yan,Li,Mao-mao,Wang,Zhi-yuan,Rui,Feng-shou,Gu 한국정밀공학회 2020 International Journal of Precision Engineering and Vol.21 No.4

        Molecular dynamics, an eff ective method to gain an insight into nanometric behaviour of materials, was employed to studythe nano-cutting behaviour of single crystal Ni 3 Al in nanometric scale. In this paper, comparisons were made for compressive/tensile stress, subsurface damage and surface roughness with three rake angles of a diamond tool. Subsurface damage waspartitioned by region and studied with work hardening in detail. A model for precise characterization of surface roughnesswas established with consideration of local surface fl uctuation. Simulation results showed that the chip thickness increasedas rake angle changed from negative to positive, and the boundary formed between tensile and compressive stress was inconsistent with the glide direction of stacking fault. Subsurface damage decreased as the increase of rake angle, and regularglide planes of stacking faults were found in front of the cutting tool. Further, the pinned dissociated 1/2 < 110 > superpartialdislocation with anti-phase boundary was demonstrated. The model was tested and characterized by implanted pits onperfect surface. Results showed that surface roughness can be well characterized, and an evident discrepancy was observedamong three rake angles, especially for 30° rake angle, which showed an distinct smooth surface compared with the others.

      • Design of a Bidirectional DC/AC Converter with Battery Charging/Discharging/Standing Balance Control

        Liang-Rui,Chen,Bo-Rui,Xu,Chuan-Sheng,Liu,Shao-wei,Peng,Chia-Hsuan,Wu 전력전자학회 2019 ICPE(ISPE)논문집 Vol.2019 No.5

        Battery cells connected in series have been widely used in high-voltage and high-power applications. In this paper, a single-phase battery energy storage system with battery balance charging, battery balance discharging, and power factor correction capabilities was developed. A prototype suitable for a single-phase 110V power supply was designed and implemented for verification. To verify its performance, three 48V/7Ah battery modules were used as normal batteries, and a 48V/5Ah battery module was used as a retired battery. The experimental results showed that the battery energy storage system has excellent battery balancing capability. Compared with that of the conventional system without balanced control, the balancing performance of the proposed system is increased by about 15.25% and 26.92%, respectively, when the system was operated in the converter and rectifier modes. In addition, the proposed system also had battery fault tolerance, and was compatible with recycled batteries and an independent power supply.

      • SCIESCOPUSKCI등재

        A Multi-level Perception Security Model Using Virtualization

        Lou,,Rui,Jiang,,Liehui,Chang,,Rui,Wang,,Yisen Korean Society for Internet Information 2018 KSII Transactions on Internet and Information Syst Vol.12 No.11

        Virtualization technology has been widely applied in the area of computer security research that provides a new method for system protection. It has been a hotspot in system security research at present. Virtualization technology brings new risk as well as progress to computer operating system (OS). A multi-level perception security model using virtualization is proposed to deal with the problems of over-simplification of risk models, unreliable assumption of secure virtual machine monitor (VMM) and insufficient integration with virtualization technology in security design. Adopting the enhanced isolation mechanism of address space, the security perception units can be protected from risk environment. Based on parallel perceiving by the secure domain possessing with the same privilege level as VMM, a mechanism is established to ensure the security of VMM. In addition, a special pathway is set up to strengthen the ability of information interaction in the light of making reverse use of the method of covert channel. The evaluation results show that the proposed model is able to obtain the valuable risk information of system while ensuring the integrity of security perception units, and it can effectively identify the abnormal state of target system without significantly increasing the extra overhead.

      • KCI등재SCOPUS

        The conceptual design of grid-connected wind turbine based on speed regulating differential mechanism

        Xiaoming,Rui,Rui,Su,Xin,Wu,Qidong,Yin 대한기계학회 2014 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.28 No.6

        In view of problems arising from the grid-connected wind turbine with the frequency converter, we propose a conceptual design ofgrid-connected wind turbine based on speed regulating differential mechanism (SRDM). The SRDM regulates its output speed andtorque self-adaptively referring to wind rotor and makes the synchronous generator (SG) keep a constant speed to output electricity insteady frequency without the normal frequency converter and it has excellent low voltage ride through (LVRT). This paper offers thekinematics and dynamics analysis of the designed wind turbine and builds the SIMULINK model based on FAST (fatigue, aerodynamics,structures and turbulence) software. The simulation of speed, torque and power of wind rotor under average wind speed of 12 m/s andturbulence intensity of 20% can verify the feasibility of the designed wind turbine.

      • KCI등재SCOPUS

        Priority-based Unequal Error Protection Scheme of Data partitioned H.264 video with Hierarchical QAM

        ( Chen Rui ), ( Wu Minghu ), ( Yang Jie ), ( Rui Xiongli ) 한국인터넷정보학회 2014 KSII Transactions on Internet and Information Syst Vol.8 No.11

        In this paper, we propose a priority-based unequal error protection scheme of data partitioned H.264/AVC video with hierarchical quadrature amplitude modulation. In order to map data with higher priority onto the most significant bits of QAM constellation points, a priority sorting method categorizes different data partitions according to the unequal importance factor of encoded video data in one group of pictures by evaluated the average distortion. Then we propose a hierarchical quadrature amplitude modulation arrangement with adaptive constellation distances, which takes into account the unequal importance of encoded video data and the channel status. Simulation results show that the proposed scheme improves the received video quality by about 2 dB in PSNR comparing with the state-of-the-art unequal error protection scheme, and outperforms EEP scheme by up to 5 dB when the average channel SNR is low.

      • KCI등재SCOPUS

        Roadway Engineering Mechanical Properties and Roadway Structural Instability Mechanisms in Deep Wells

        Xiang-Rui,Meng,Rui,Peng,Guang-Ming,Zhao,Ying-Ming,Li 대한토목학회 2018 KSCE JOURNAL OF CIVIL ENGINEERING Vol.22 No.5

        We proposed a new classification method for stress-bearing structures in very-deep roadways. We conducted tests for roadwayengineeringmechanical properties, including rock mechanical tests and ground stress measurement of two caverns in very-deepwells. We suggested a classification method for stress-bearing structures based on shear stress. Tests revealed that rock strength in theshear direction was the lowest; the stress distributions of acoustic emission and hollow inclusion were highly similar. Based on theroadway-engineering mechanical properties of two caverns and numerical simulation and in-situ tests, the key bearing structureswere classified based on the concentrated shear stress. In deep caverns, shear stress was more concentrated on the softer surroundingrock, the key bearing structure areas, and the more seriously fractured surrounding rocks. Using the loose circle in-situ test, wecompared the classification method of the key bearing structures with other classification methods. The results revealed agreementwith the classification methods used for the key bearing structures. The deformation in-situ test showed that the strata convergence ofconcentrated shear stress areas developed quickly. Therefore, the phenomena of concentrated shear stress and the expanded range ofkey bearing structures are the structural instability mechanisms of deep roadways.

      • KCI등재

        형용사 유형론과 중국어 형용사의 문법적 지위

        郭銳原(Rui Guo), 朴恩石(번역자) 중국어문논역학회 2014 中國語文論譯叢刊 Vol.0 No.35

        Guo Rui said “there has been differing opinions in terms of the grammatical nature of Chinese adjectives”. He said “the goal of this paper is to identify property words as modificative or predicative from a typological perspective”. He said “property words of 72 languages in the world are investigated according to the criteria of being marked or unmarked when functioning as attribute or predicate, and five types of grammatical nature of property words are differentiated”. He said “Chinese property words belong to the fourth type”. He said “namely Chinese property words can be classified into three types: a. predicative, b. modificative, c. both modificative and predicative”. He said “the best solution in the light of Chinese property words is to classify a. and c. as adjective, and classify c. as attributive”. He said “on the bases of the above analysis, the idea of correspondence between semantic categories and prototypes of parts of speech is suggested from the binary divergence of substance and property”. He said “the strength of degree and constancy is the main factor of coding constant property words as predicate or modifier, and the difference between languages mainly manifests in the processing of constant property words”.

      맨 위로 스크롤 이동