RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Adaptive Application Component Mapping for Parallel Computation Offloading in Variable Environments

        ( Wenhao Fan ),( Yuan`an Liu ),( Bihua Tang ) 한국인터넷정보학회 2015 KSII Transactions on Internet and Information Syst Vol.9 No.11

        Distinguished with traditional strategies which offload an application`s computation to a single server, parallel computation offloading can promote the performance by simultaneously delivering the computation to multiple computing resources around the mobile terminal. However, due to the variability of communication and computation environments, static application component multi-partitioning algorithms are difficult to maintain the optimality of their solutions in time-varying scenarios, whereas, over-frequent algorithm executions triggered by changes of environments may bring excessive algorithm costs. To this end, an adaptive application component mapping algorithm for parallel computation offloading in variable environments is proposed in this paper, which aims at minimizing computation costs and inter-resource communication costs. It can provide the terminal a suitable solution for the current environment with a low incremental algorithm cost. We represent the application component multi-partitioning problem as a graph mapping model, then convert it into a pathfinding problem. A genetic algorithm enhanced by an elite-based immigrants mechanism is designed to obtain the solution adaptively, which can dynamically adjust the precision of the solution and boost the searching speed as transmission and processing speeds change. Simulation results demonstrate that our algorithm can promote the performance efficiently, and it is superior to the traditional approaches under variable environments to a large extent.

      • Application Multi-partitioning for Offloading Computation to Multiple Computing Resources around Mobile Terminals

        Wenhao Fan,Bihua Tang,Yuan’an Liu 보안공학연구지원센터 2016 International Journal of Grid and Distributed Comp Vol.9 No.6

        Different with traditional approaches that offload computation to a single remote server, the performance of an application can be further enhanced by simultaneously distributing its computing tasks to multiple computing resources around the mobile terminal. How to effectively multiply partition application components is critical for parallel computation offloading. In this paper, an application multi-partitioning scheme is proposed, which optimally offloads application's components to surrounding resources. A graph mapping model is converted and set up to represent components and resources as undirected graphs, and the A* algorithm is employed to efficiently search the optimal mapping from component graph to resource graph, which minimizes computing costs and inter-resource communication costs. Simulation results demonstrate that the performance can be efficiently promoted by our algorithm, which outperforms the traditional approaches to a large degree.

      • An API Calls Monitoring-based Method for Effectively Detecting Malicious Repackaged Applications

        Wenhao Fan,Yuan’an Liu,Bihua Tang 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.8

        The number of mobile applications on Android platform has largely increased in recent years. The security problems, as one of the outcomes induced by the popularity of Android, become more and more critical. Malicious repackaged applications (MRAs) perform malicious behaviors through malware developers embedding malicious codes into the benign origin applications (BOAs), which threat the security of users’ finance and privacy. In this paper, a method based on API calls monitoring is proposed to effectively detect MRAs. We discuss the characteristics of behaviors and analyze the differences in API calls between MRAs and their BOAs. A MRA detection model is established, which builds up the super-sphere for each BOA via a SVDD algorithm. The model can detect the abnormal behaviors of MRAs which deviate the normal behaviors of corresponding BOAs. Experiments are carried out on imitated and real MRAs, where the results demonstrate the effectiveness of our method for detecting the singly and multiply contaminated BOAs.

      • Energy Efficient Traffic Allocation for Resource-constrained Multi-homed WSN Gateway

        Wenhao Fan,Bihua Tang,Yuan’an Liu 보안공학연구지원센터 2015 International Journal of Smart Home Vol.9 No.10

        WSN (Wireless Sensor Network) gateway acts as a bridge between WSN and external networks. Currently, rapid growing demands from various IoTs (Internet of Things) applications are posing critical challenges to the data transmission capability of such gateway. As a promising solution, multi-homed WSN gateway, which is equipped with multiple network interfaces, can obtain enhanced parallel data transmission by jointly utilizing multiple RATs (Radio Access Technologies). However, the multi-homed gateway is a resource-constrained device, so it’s crucial to guarantee the efficiency for both data throughput and resource consumption. Delay and buffer size, simulation results validate that the proposed algorithm can allocate To this end, an energy efficient traffic allocation algorithm for resource-constrained multi-homed WSN gateway is proposed in this paper, which aims at minimizing the gateway's power consumption while guaranteeing the transmission the traffic optimally for the gateway with different constraints and configurations, and it can significantly promote the gateway's energy efficiency in comparison to the traditional method.

      • KCI등재

        A new strategy for stem cells therapy for erectile dysfunction: Adipose-derived stem cells transfect Neuregulin-1 gene through superparamagnetic iron oxide nanoparticles

        Jianxing Cheng,Zhongjie Zheng,Wenhao Tang,Jichun Shao,Hui Jiang,Haocheng Lin 대한비뇨의학회 2022 Investigative and Clinical Urology Vol.63 No.3

        Purpose: Our previous studies showed that nanotechnology improves derived adipose-derived stem cells (ADSCs) therapy for erectile dysfunction (ED). In this study, the Neuregulin-1(NRG1) gene was transfected into ADSCs with superparamagnetic iron oxide nanoparticles (SPION) further to improve the therapeutic effect of ADSCs on ED. Materials and Methods: ADSCs were isolated from epididymal adipose tissue of Sprague–Dawley rats. The optimal concentration of PEI-SPION (SPION modified with polyethyleneimine) was selected to construct the gene complex. After electrostatic binding of PEI-SPION and DNA, a PEI layer was wrapped to make the PEI-SPION-NRG1-PEI gene transfection complex. Different groups were set up for transfection tests. Lipo2000 transfection reagent was used as the control. PEI-SPION-NRG1-PEI in the experimental group was transfected under an external magnetic field. Results: When the concentration of PEI-SPION was 10 µg/mL, it had little cytotoxicity, and cell activity was not significantly affected. PEI-SPION-NRG1-PEI forms positively charged nanocomposites with a particle size of 72.6±14.9 nm when N/P ≥8. The PEI-SPION-NRG1-PEI gene complex can significantly improve the transfection efficiency of ADSCs, reaching 26.74%±4.62%, under the action of the external magnetic field. PCR and Western blot showed that the expression level of the NRG1 gene increased significantly, which proved that the transfection was effective. Conclusions: PEI-SPION can be used as a vector for NRG1 gene transfection into ADSCs. PEI-SPION-NRG1-PEI packaging has the highest transfection efficiency under the external magnetic field than the other groups. These findings may provide a new strategy for ADSCs therapy for ED.

      • KCI등재

        Functional profiling of the gut microbiomes in two different populations of the brown planthopper, Nilaparvata lugens

        Yunhua Zhang,Tao Tang,Wenhao Li,Tingwei Cai,Jian Hong Li,Hu Wan 한국응용곤충학회 2018 Journal of Asia-Pacific Entomology Vol.21 No.4

        Previous studies have demonstrated that gut symbionts are involved in the detoxification metabolism of insect hosts, but the relationship between gut symbionts and host detoxification metabolism of the brown planthopper (Nilaparvata lugens, BPH) remains unclear. In the present study, an indoor population (NlIP) and a field population (NlFP) of the BPH were used to characterize the functional profiling of the gut microbiome based on 16S rDNA sequencing. The results show that the NlIP and NlFP strains of N. lugens had different symbiont compositions, and Proteobacteria, Actinobacteria, and Firmicutes were the dominate phyla, accounting for > 75% of the total symbiont compositions. Additionally, the NlIP strain had more Pantoea and Stenotrophomonas, while the NlFP strain showed a higher Wolbachia, Actinobacteria, and Herbaspirillum relative abundance. Furthermore, functional content of the metagenome predicted by PICRUSt demonstrated no significant difference in metagenomic function between the NlIP and NlFP strains in the principal component analysis (PCA), and only three types of genes, namely, genes involved with metabolic diseases, poorly characterized genes, and genes involved in circulatory systems, were different between the strains based on KEGG pathway analysis, which also speculated that gut symbionts are not directly involved in the detoxification metabolism for insecticides in the BPH. These results will be helpful for further research into the mechanisms of gut symbionts involved in detoxification metabolism in the BPH.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼