RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
        • 작성언어

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • In-situ synthesized ZnFe<sub>2</sub>O<sub>4</sub> firmly anchored to the surface of MWCNTs as a long-life anode material with high lithium storage performance

        Yang, Tianbo,Zhang, Wanxi,Li, Linlin,Jin, Bo,Jin, Enmei,Jeong, Sangmoon,Jiang, Qing Elsevier 2017 APPLIED SURFACE SCIENCE - Vol.425 No.-

        <P><B>Abstract</B></P> <P>Because of two different metal cations in the crystal structures, binary transition metal oxides possess a lot of unique properties. ZnFe<SUB>2</SUB>O<SUB>4</SUB> emerges from these transition metal oxides on account of its high theoretical capacity (1072mAhg<SUP>−1</SUP>). One-dimensional multi-walled carbon nanotubes (MWCNTs) would be a desirable conductive additive for ZnFe<SUB>2</SUB>O<SUB>4</SUB>, thereby improving the electrochemical performance of ZnFe<SUB>2</SUB>O<SUB>4</SUB>. In this work, we prepare ZnFe<SUB>2</SUB>O<SUB>4</SUB>/MWCNTs by solvothermal method with further heat-treatment. ZnFe<SUB>2</SUB>O<SUB>4</SUB> nanoparticles are firmly anchored to the surface of MWCNTs. ZnFe<SUB>2</SUB>O<SUB>4</SUB>/MWCNTs nanocomposite displays high specific capacity (1278mAhg<SUP>−1</SUP> at a current density of 200mAg<SUP>−1</SUP> after 200 cycles, and 565mAhg<SUP>−1</SUP> at a current density of 1500mAg<SUP>−1</SUP> after 500 cycles), and good rate performance (367mAhg<SUP>−1</SUP> even at a current density of 6000mAhg<SUP>−1</SUP> after 80 cycles). The superior electrochemical performance may promote ZnFe<SUB>2</SUB>O<SUB>4</SUB> to be a promising alternative anode in lithium-ion batteries.</P> <P><B>Highlights</B></P> <P> <UL> <LI> ZnFe<SUB>2</SUB>O<SUB>4</SUB> nanoparticles and ZnFe<SUB>2</SUB>O<SUB>4</SUB>/MWCNTs composites have been prepared by a facile solvothermal method. </LI> <LI> ZnFe<SUB>2</SUB>O<SUB>4</SUB> nanoparticles are firmly anchored to the surface of MWCNTs. MWCNTs can suppress the growth of ZnFe<SUB>2</SUB>O<SUB>4</SUB> nanoparticles. </LI> <LI> ZnFe<SUB>2</SUB>O<SUB>4</SUB>/MWCNTs nanocomposite displays high specific capacity at a high current density. </LI> </UL> </P>

      • SCIESCOPUSKCI등재

        Performance study of a simplified shape optimization strategy for blended-wing-body underwater gliders

        Li, Chengshan,Wang, Peng,Li, Tianbo,Dong, Huachao The Society of Naval Architects of Korea 2020 International Journal of Naval Architecture and Oc Vol.12 No.-

        Shape design optimization for Blended-wing-body Underwater Gliders (BWBUGs) is usually computationally expensive. In our previous work, a simplified shape optimization (SSO) strategy is proposed to alleviate the computational burden, which optimizes some of the Sectional Airfoils (SAs) instead of optimizing the 3-D shape of the BWBUG directly. Test results show that SSO can obtain a good result at a much smaller computational cost when three SAs are adopted. In this paper, the performance of SSO is investigated with a different number of SAs selected from the BWBUG, and the results are compared with that of the Direct Shape Optimization (DSO) strategy. Results indicate that SSO tends to perform better with more SAs or even outperforms the DSO strategy in some cases, and the amount of saved computational cost also increases when more SAs are adopted, which provides some reference significance and enlarges the applicability range of SSO.

      • SCIESCOPUSKCI등재

        Performance study of a simplified shape optimization strategy for blended-wing-body underwater gliders

        Li, Chengshan,Wang, Peng,Li, Tianbo,Dong, Huachao The Society of Naval Architects of Korea 2020 International Journal of Naval Architecture and Oc Vol.12 No.1

        Shape design optimization for Blended-wing-body Underwater Gliders (BWBUGs) is usually computationally expensive. In our previous work, a simplified shape optimization (SSO) strategy is proposed to alleviate the computational burden, which optimizes some of the Sectional Airfoils (SAs) instead of optimizing the 3-D shape of the BWBUG directly. Test results show that SSO can obtain a good result at a much smaller computational cost when three SAs are adopted. In this paper, the performance of SSO is investigated with a different number of SAs selected from the BWBUG, and the results are compared with that of the Direct Shape Optimization (DSO) strategy. Results indicate that SSO tends to perform better with more SAs or even outperforms the DSO strategy in some cases, and the amount of saved computational cost also increases when more SAs are adopted, which provides some reference significance and enlarges the applicability range of SSO.

      • KCI등재

        Regulatory Mechanism of MicroRNA-145 in the Pathogenesis of Acute Aortic Dissection

        Tianbo Li,Chencheng Liu,Lingchao Liu,Han Xia,Yingbin Xiao,Xuefeng Wang,Yong Wang 연세대학교의과대학 2019 Yonsei medical journal Vol.60 No.4

        Purpose: Previous studies have confirmed that microRNAs play important roles in the pathogenesis of acute aortic dissection(AAD). Here, we aimed to explore the role of miR-145 and its regulatory mechanism in the pathogenesis of AAD. Materials and Methods: AAD tissue samples were harvested from patients with aortic dissection and normal donors. Rat aorticvascular smooth muscle cells (VSMCs) were transfected with miR-145 mimic/inhibitor or negative control mimic/inhibitor. Geneand protein expression was measured in human aortic dissection tissue specimens and VSMCs by qRT-PCR and Western blot. Luciferasereporter assay was applied to verify whether connective tissue growth factor (CTGF) was a direct target of miR-145 inVSMCs. Methyl thiazolyl tetrazolium assay was used to detect VSMC viability. Results: miR-145 expression was downregulated in aortic dissection tissues and was associated with the survival of patients withAAD. Overexpression of miR-145 promoted VSMC proliferation and inhibited cell apoptosis. Moreover, CTGF, which was increasedin aortic dissection tissues, was decreased by miR-145 mimic and increased by miR-145 inhibitor. Furthermore, CTGF wasconfirmed as a target of miR-145 and could reverse the promotion effect of miR-145 on the progression of AAD. Conclusion: miR-145 suppressed the progression of AAD by targeting CTGF, suggesting that a miR-145/CTGF axis may provide apotential therapeutic target for AAD.

      • Towards Attacks and Defenses of Anonymous Communication Systems

        Tianbo Lu,Puxin Yao1,Lingling Zhao,Yang Li,Feng Xie,Yamei Xia 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.1

        Anonymous communication system has been hot topic in the field of information security, and attack techniques against anonymous systems are endless. This paper first classifies and summarizes the study of attacks against anonymous communication system in recent years, then analyzes the trend of the research on different attack technologies; secondly, it provides a comparative analysis of defense capability the mainstream anonymous communication system to the various attacks; Finally, combining the advantages and disadvantages of different systems, the authors propose an improved node selection and router forwarding algorithms for anonymous communication systems, and design an architecture of anonymous communications software based on the algorithm.

      • F-Crowds : An Anonymity Scheme for P2P File-Sharing

        Tianbo Lu,Xinyuan Zhang,Xiaofeng Du,Yang Li 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.6

        The traditional encryption methods pay more attention to the confidentiality of the message content, but ignore the protection of identity information to the communicating parties. By encrypting, the contents of the communication acquired by attackers became relatively difficult, but they can still found the identity information of the two sides to communicate easily because in the TCP / IP protocol, the sender and receiver of the message are exposed. The anonymity communication technology, is used to solve this problem. The first anonymity communication technology can date back to 1981, Chaum proposed MIX [1] which is a very important technology for reference by a number of researchers of anonymity communication. The rapid development of the Internet has made things convenience to people, but also led to more personal information exposed to the public. As a result, a growing number of areas that required anonymity communication technology to protect the user's privacy. P2P file-sharing is not exception. P2P is undoubtedly the most popular way for file-sharing, but popular P2P file-sharing protocols, such as BitTorrent, can’t provide users anonymity communication service. Many people choose to build upon existing anonymous communication tools, such as Tor, to achieve anonymous P2P file transfer, but Tor primarily provides anonymous service for web browsing, instant message or other low latency applications. A large number of P2P file traffic will seriously threaten the service of Tor. Therefore, the anonymity communication service specifically for P2P file sharing system is very important. In this paper, we presents an anonymity communication scheme specifically for P2P file-sharing networks called F-Crowds which based on Crowds [2] to provide an adjustable anonymity service for P2P file-sharing.

      • NSDA : A Novel Node Selecting Optimal Algorithm Based on Dijkstra

        Tianbo Lu,Jiao Zhang,Lingling Zhao,Yang Li,Xiaoyan Zhang 보안공학연구지원센터 2016 International Journal of Future Generation Communi Vol.9 No.6

        This paper first represent the basic conceptions of anonymous communication, then introduce the fundamentals in Anonymous Communication. Afterwards, we went deep to the classification of anonymous network topological, therefore we could get a better understanding on P2P anonymous communication system. We also systematically analyzes the existing node-select algorithms. Furthermore, we propose and implement a new node selection algorithm based on Dijkstra algorithm, named NSDA algorithm. We give a belief description about the backgrounds and design of NSDA Algorithm. The algorithm can combine the node properties with link properties to select node, which can adjust the system performancing and anonymity. In order to evaluate the NSDA algorithm, we have done experiments in Network Simulator 3, and we also explain the reason why we choose Network Simulator 3 as the simulate tool. In the end, we analyze the characteristics of NSDA algorithm according to the results of experiments.

      • Security Model for Sensitive Information Systems and Its Applications in Sensor Networks

        Tianbo Lu,Xiaobo Guo,Lingling Zhao,Yang Li,Peng Lin,Binxing Fang 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.5

        The study of security models for sensitive information systems has been taken on for years, but still lag far away behind the progress of information security practice. During this century, the thought of seeking the system security to the source of system development lifecycle received huge improvement in the system and software assurance domain. This paper firstly expounds the understanding of information security by illustrating information security study development progress since pre-computer age and presents a description of cyberspace and cyberization security by summarizing the status quo of cyberization. Then a security model called PDRL, which includes six core security attributes of sensitive information systems, is proposed to protect the security of sensitive information systems in the whole system life-cycle. At last, this paper probes into further discussion about controllability attribute and proposes a controllability model in sensitive sensor networks, followed by a probability computing formula and the example for computing the controllability of sensitive sensor networks. By dividing each single element of sensitive information and each element-related operation into a corresponding classification, this paper makes a reasonable description of the quantitative description about controllability.

      • Towards a Framework for Assuring Cyber Physical System Security

        Tianbo Lu,Jinyang Zhao,Lingling Zhao,Yang Li,Xiaoyan Zhang 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.3

        Today, cyber physical systems (CPS) are becoming popular in power networks, healthcare devices, transportation networks, industrial process and infrastructures. As cyber physical systems are used more and more extensively and thoroughly, security of cyber physical systems has become the utmost important concern in system design, implementation and research. Many kinds of attacks arise (e.g. the Stuxnet worm), causing heavy losses and serious potential security risks. For the past few years, researchers are focusing their researches on different aspects of security of cyber physical systems. In this paper, we propose a security framework assuring the security of cyber physical systems and analyze main universities and institutes studying CPS security and their relations in three levels: CPS security objectives, CPS security approaches and security in specific CPS applications. Finally, a conclusion of this article is given.

      • A Systematic Review of Network Flow Watermarking In Anonymity Systems

        Tianbo Lu,Rui Guo,Lingling Zhao,Yang Li 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.3

        With the rapid development of internet technology, the connection between man and internet is closer and closer. When people is communicating with others through internet, some malicious intruders may want to eavesdrop or peep the communicators. In order to evade being watching, people use anonymous communication systems to communicate. The anonymity system can encrypt the content of communication and the identity of the communicators. But if the communicators want to know who is talking to them at the other end, they must correlate the outgoing and incoming flows to identify a host or a person. As an active traffic analysis approach, network flow watermarking technology can detect the correlation of flows, and then make the anonymous communicators accountable. While network flow watermarking technology achieves good detecting rate and low false positive rate, it could be an effective way to trace the communication connections and supervise anonymous communication. So it is a widely used way for tracing in anonymity systems. In this paper, we introduce some different schemes of network flow watermarking in anonymity systems and discuss some attacks against it. Finally, a conclusion will be given.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼