Resource Type

Journal Article 13

Year

2023 1

2022 1

2020 1

2019 2

2018 2

2017 1

2015 2

2012 2

2006 1

open ︾

Keywords

28 days compressive strength 1

4-nitrophenol 1

ANFIS 1

Adaptive watermarking 1

Color medical image 1

Data recovery 1

Data reliability and availability 1

Digital image forensics 1

Distributed storage system 1

Encryption 1

Fractional transform 1

IEEE 802.16 1

Image-tampering detection 1

Multimedia security 1

Process-variation-robust 1

Quaternion 1

Replica bit-line (RBL) delay 1

Sense amplifier (SA) 1

Single-node failure 1

open ︾

Search scope:

排序: Display mode:

Analysis of foundation sliding of an arch dam considering the hydromechanical behavior

Maria Luísa Braga FARINHA, José Vieira de LEMOS, Emanuel MARANHA DAS NEVES

Frontiers of Structural and Civil Engineering 2012, Volume 6, Issue 1,   Pages 35-43 doi: 10.1007/s11709-012-0142-1

Abstract: This paper presents the application of a methodology which can be used to assess arch dam foundation stability, using the discrete element method (DEM) and the code 3DEC. A global three-dimensional model of a dam foundation was developed, in which some discontinuities were simulated and both the grout and drainage curtains were represented. The model, calibrated taking into account recorded data, was used to carry out nonlinear mechanical analysis. The same model was employed to perform a hydraulic analysis, based on equivalent continuum concepts, which allowed the water pressure pattern within the foundation to be obtained. These water pressures were applied on discontinuities involved in the possible sliding mechanism along the dam/foundation interface, and the safety of the dam/foundation system was evaluated using a process of reduction of strength characteristics, with the aim of calculating the minimum safety factors that ensure stability. Results were compared with those obtained with the usual bi-linear uplift pressure distribution at the base of the dam, commonly used in concrete dam design. The relevance of carrying out hydraulic analysis in arch dam foundation failure studies is highlighted.

Keywords: concrete dams     rock foundations     hydromechanical behavior     failure analysis    

A simple multi-wave algorithm for the uncapacitated facility location problem

Fred GLOVER, Saïd HANAFI, Oualid GUEMRI, Igor CREVITS

Frontiers of Engineering Management 2018, Volume 5, Issue 4,   Pages 451-465 doi: 10.15302/J-FEM-2018038

Abstract:

The multi-wave algorithm (Glover, 2016) integrates tabu search and strategic oscillation utilizing repeated waves (nested iterations) of constructive search or neighborhood search. We propose a simple multi-wave algorithm for solving the Uncapacitated Facility Location Problem (UFLP) to minimize the combined costs of selecting facilities to be opened and of assigning each customer to an opened facility in order to meet the customers’ demands. The objective is to minimize the overall cost including the costs of opening facilities and the costs of allocations. Our experimental tests on a standard set of benchmarks for this widely-studied class of problems show that our algorithm outperforms all previous methods.

Keywords: discrete optimization     UFLP     multi-wave optimization     strategic oscillation     tabu search    

Synthesis of spherical parallel manipulator for dexterous medical task

Abdelbadia CHAKER, Abdelfattah MLIKA, Med Amine LARIBI, Lotfi ROMDHANE, Sa?d ZEGHLOUL

Frontiers of Mechanical Engineering 2012, Volume 7, Issue 2,   Pages 150-162 doi: 10.1007/s11465-012-0325-4

Abstract:

This paper deals with the design and the analysis of a spherical parallel manipulator (SPM) for a haptic minimally invasive surgery application. First the medical task was characterized with the help of a surgeon who performed a suture technique called anastomosis. A Vicon system was used to capture the motion of the surgeon, which yielded the volume swept by the tool during the anastomosis operation. The identified workspace can be represented by a cone with a half vertex angle of 26°. A multi objective optimization procedure based on genetic algorithms was then carried out to find the optimal SPM. Two criteria were considered, i.e., task workspace and mechanism dexterity. The optimized SPM was then analyzed to determine the error on the orientation of the end effector as a function of the manufacturing errors of the different links of the mechanism.

Keywords: spherical parallel manipulator (SPM)     anastomosis     haptic     motion capture     optimization     workspace     dexterity     genetic algorithm     manufacturing errors    

IEEE 802.16 Mesh Network SA Management Mechanism Based on Multi-hops Mutual Authentication

Wang Xingjian,Hu Aiqun,Huang Yuhua

Strategic Study of CAE 2006, Volume 8, Issue 9,   Pages 69-73

Abstract: Aimed at the weakness both in security and efficiency of one-hop one-way authentication SA (securityassociation) mechanism employed by Mesh network, an multi-hops mutual authentication SA mechanism associated

Keywords: IEEE 802.16     mesh     node     multi-hops mutual authentication     self-modified routing    

Power system design for constant current subsea observatories Regular Article

Yan-hu Chen, Sa Xiao, De-jun Li,yanhuchen@zju.edu.cn,sxiao@zju.edu.cn,li_dejun@zju.edu.cn

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 11,   Pages 1505-1515 doi: 10.1631/FITEE.1800362

Abstract: Constant current power transmission is considered a good choice for subsea observatories due to its high resistance to shunt faults. A constant current subsea is planned to be constructed in the East China Sea. We discuss a constant current subsea system used for scientific experiments. The power system and its system are carefully designed. The power conversion method is challenging due to the use of constant current power, which is considerably different from traditional power systems. Thus, we adopt power compensation circuits in the conversion system to obtain a constant 48-V output for science users. A power management system that performs overvoltage protection and real-time monitoring and control of junction box is discussed. An innovative structure of a junction box is designed in consideration of a sealed working environment to extend the useful life of the junction box. Simulations and experiments reveal that the system has high efficiency and stability, especially in long-term applications.

Keywords: 海底观测网;电能变换;散热    

Magnetic-porous microspheres with synergistic catalytic activity of small-sized gold nanoparticles and titania matrix

Kadriye Özlem Hamaloğlu, Ebru Sağ, Çiğdem Kip, Erhan Şenlik, Berna Saraço

Frontiers of Chemical Science and Engineering 2019, Volume 13, Issue 3,   Pages 574-585 doi: 10.1007/s11705-019-1799-y

Abstract: Fe O nanoparticles immobilized on porous titania in micron-size range were decorated with small-sized gold nanoparticles and used as a plasmonic catalyst for the reduction of 4-nitrophenol. Monodisperse-porous magnetic titania microspheres were synthesized with bimodal pore-size distribution by the sol-gel templating method. Small-sized gold nanoparticles obtained by the Martin method were attached onto the aminated form of the magnetic titania microspheres. A significant enhancement in the catalytic activity was observed using the gold nanoparticle-decorated magnetic titania microspheres compared to gold nanoparticle-decorated magnetic silica microspheres because of the synergistic effect between small-sized gold nanoparticles and titania. The synergistic effect for gold nanoparticle-attached magnetic titania microspheres could be explained by surface plasmon resonance-induced transfer of hot electrons from gold nanoparticles to the conduction band of titania. Using the proposed catalyst, 4-nitrophenol could be converted to 4-aminophenol in an aqueous solution within 0.5 min. The 4-nitrophenol reduction rates were 2.5–79.3 times higher than those obtained with similar plasmonic catalysts. The selection of micron-size, magnetic, and porous titania microspheres as a support material for the immobilization of small-sized gold nanoparticles provided a recoverable plasmonic catalyst with high reduction ability.

Keywords: small-sized gold nanoparticles     magnetic titania microspheres     sol-gel template synthesis     plasmonic catalysis     4-nitrophenol    

Polynomial robust observer implementation based passive synchronization of nonlinear fractional-order systems with structural disturbances

Ahmad Taher Azar, Hilaire Bertrand Fotsin, Soup Teoua Michael Ouagni,kouaneteoua@yahoo.fr,aazar@psu.edu.sa

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 9,   Pages 1267-1412 doi: 10.1631/FITEE.1900430

Abstract: A robust polynomial observer is designed based on passive synchronization of a given class of r Colpitts (FOC) systems with mismatched uncertainties and disturbances. The primary objective of the proposed observer is to minimize the effects of unknown bounded disturbances on the estimation of errors. A more practicable output-feedback passive controller is proposed using an adaptive polynomial state observer. The distributed approach of a continuous frequency of the FOC is considered to analyze the stability of the observer. Then we derive some stringent conditions for the robust passive synchronization using Finsler’s lemma based on the fractional Lyapunov stability theory. It is shown that the proposed method not only guarantees the asymptotic stability of the controller but also allows the derived adaptation law to remove the uncertainties within the nonlinear plant’s dynamics. The entire system using passivity is implemented with details in PSpice to demonstrate the feasibility of the proposed control scheme. The results of this research are illustrated using computer simulations for the control problem of the r chaotic Colpitts system. The proposed approach depicts an efficient and systematic control procedure for a large class of nonlinear systems with the fractional derivative.

SA-RSR: a read-optimal data recovery strategy for XOR-coded distributed storage systems Research Articles

Xingjun ZHANG, Ningjing LIANG, Yunfei LIU, Changjiang ZHANG, Yang LI

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 6,   Pages 858-875 doi: 10.1631/FITEE.2100242

Abstract: In this paper, we propose a random search recovery algorithm, named SA-RSR, to speed up recovery of .SA-RSR uses a simulated annealing technique to search for an optimal recovery solution that reads andWe evaluate SA-RSR with a variety of in simulations and in a real storage system, Ceph.Experimental results in Ceph show that SA-RSR reduces the amount of data required for recovery by up

Keywords: Distributed storage system     Data reliability and availability     XOR-based erasure codes     Single-node failure     Data recovery    

Pragmatic multi-stage simulated annealing for optimal placement of synchrophasor measurement units in smart power grids

Pathirikkat GOPAKUMAR,M. JAYA BHARATA REDDY,Dusmata Kumar MOHANTA

Frontiers in Energy 2015, Volume 9, Issue 2,   Pages 148-161 doi: 10.1007/s11708-015-0344-z

Abstract: The proposed PMSSA is much faster than the conventional simulated annealing (SA) approach as it utilizes

Keywords: phasor measurement units (PMUs)     pragmatic PMU placement     simulated annealing (SA)     western region Indian    

Multiple linear regression, artificial neural network, and fuzzy logic prediction of 28 days compressive strength of concrete

Faezehossadat KHADEMI,Mahmoud AKBARI,Sayed Mohammadmehdi JAMAL,Mehdi NIKOO

Frontiers of Structural and Civil Engineering 2017, Volume 11, Issue 1,   Pages 90-99 doi: 10.1007/s11709-016-0363-9

Abstract: Finally, the sensitivity analysis (SA) for two different sets of parameters on the concrete compressive

Keywords: compressive strength     multiple linear regression     artificial neural network     ANFIS     sensitivity analysis (SA    

Recent Advances in Passive Digital Image Security Forensics: A Brief Review Review

Xiang Lin, Jian-Hua Li, Shi-Lin Wang, Alan-Wee-Chung Liew, Feng Cheng, Xiao-Sa Huang

Engineering 2018, Volume 4, Issue 1,   Pages 29-39 doi: 10.1016/j.eng.2018.02.008

Abstract:

With the development of sophisticated image editing and manipulation tools, the originality and authenticity of a digital image is usually hard to determine visually. In order to detect digital image forgeries, various kinds of digital image forensics techniques have been proposed in the last decade. Compared with active forensics approaches that require embedding additional information, passive forensics approaches are more popular due to their wider application scenario, and have attracted increasing academic and industrial research interests. Generally speaking, passive digital image forensics detects image forgeries based on the fact that there are certain intrinsic patterns in the original image left during image acquisition or storage, or specific patterns in image forgeries left during the image storage or editing. By analyzing the above patterns, the originality of an image can be authenticated. In this paper, a brief review on passive digital image forensic methods is presented in order to provide a comprehensive introduction on recent advances in this rapidly developing research area. These forensics approaches are divided into three categories based on the various kinds of traces they can be used to track—that is, traces left in image acquisition, traces left in image storage, and traces left in image editing. For each category, the forensics scenario, the underlying rationale, and state-of-the-art methodologies are elaborated. Moreover, the major limitations of the current image forensics approaches are discussed in order to point out some possible research directions or focuses in these areas.

Keywords: Digital image forensics     Image-tampering detection     Multimedia security    

Multi-stage dual replica bit-line delay technique for process-variation-robust timing of lowvoltageSRAMsense amplifier

Shou-biao TAN,Wen-juan LU,Chun-yu PENG,Zheng-ping LI,You-wu TAO,Jun-ning CHEN

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 8,   Pages 700-706 doi: 10.1631/FITEE.1400439

Abstract: A multi-stage dual replica bit-line delay (MDRBD) technique is proposed for reducing access time by suppressing the sense-amplifier enable (SAE) timing variation of low voltage static random-access memory (SRAM) applications. Compared with the traditional technique, this strategy, using statistical theory, reduces the timing variation by using multi-stage ideas, meanwhile doubling the replica bit-line (RBL) capacitance and discharge path simultaneously in each stage. At a supply voltage of 0.6 V, the simulation results show that the standard deviations of the SAE timing and cycle time with the proposed technique are 69.2% and 47.2%, respectively, smaller than that with a conventional RBL delay technique in TSMC 65 nm CMOS technology (Taiwan Semiconductor Manufacturing Company, Taiwan).

Keywords: Process-variation-robust     Sense amplifier (SA)     Replica bit-line (RBL) delay     Timing variation    

A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services Research Article

fatma.mohammed333@gmail.com,eng.waled.elshafai@gmail.com,elsayedelrabaie@gmail.com,nfsoliman@pnu.edu.sa

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 7,   Pages 1045-1061 doi: 10.1631/FITEE.2200372

Abstract: algebra has been used to apply the fractional Fourier transform (FrFT) to color images in a comprehensive approach. However, the discrete fractional random transform (DFRNT) with adequate basic randomness remains to be examined. This paper presents a novel multistage privacy system for s based on discrete fractional Fourier transform (DQFrFT) watermarking and . First, we describe DFRNT (QDFRNT), which generalizes DFRNT to handle signals effectively, and then use QDFRNT to perform . To efficiently evaluate QDFRNT, this study derives the relationship between the QDFRNT of a signal and the four components of the DFRNT signal. Moreover, it uses the human vision system’s (HVS) masking qualities of edge, texture, and color tone immediately from the color host image to adaptively modify the watermark strength for each block in the using the QDFRNT-based and support vector machine (SVM) techniques. The limitations of watermark embedding are also explained to conserve watermarking energy. Second, 3D-CLM is employed to improve the system’s security and efficiency, allowing it to be used as a multistage privacy system. The proposed security system is effective against many types of channel noise attacks, according to simulation results.

Keywords: Color medical image     Quaternion     Adaptive watermarking     Encryption     Fractional transform     Three-dimensional chaotic logistic map (3D-CLM)    

Title Author Date Type Operation

Analysis of foundation sliding of an arch dam considering the hydromechanical behavior

Maria Luísa Braga FARINHA, José Vieira de LEMOS, Emanuel MARANHA DAS NEVES

Journal Article

A simple multi-wave algorithm for the uncapacitated facility location problem

Fred GLOVER, Saïd HANAFI, Oualid GUEMRI, Igor CREVITS

Journal Article

Synthesis of spherical parallel manipulator for dexterous medical task

Abdelbadia CHAKER, Abdelfattah MLIKA, Med Amine LARIBI, Lotfi ROMDHANE, Sa?d ZEGHLOUL

Journal Article

IEEE 802.16 Mesh Network SA Management Mechanism Based on Multi-hops Mutual Authentication

Wang Xingjian,Hu Aiqun,Huang Yuhua

Journal Article

Power system design for constant current subsea observatories

Yan-hu Chen, Sa Xiao, De-jun Li,yanhuchen@zju.edu.cn,sxiao@zju.edu.cn,li_dejun@zju.edu.cn

Journal Article

Magnetic-porous microspheres with synergistic catalytic activity of small-sized gold nanoparticles and titania matrix

Kadriye Özlem Hamaloğlu, Ebru Sağ, Çiğdem Kip, Erhan Şenlik, Berna Saraço

Journal Article

Polynomial robust observer implementation based passive synchronization of nonlinear fractional-order systems with structural disturbances

Ahmad Taher Azar, Hilaire Bertrand Fotsin, Soup Teoua Michael Ouagni,kouaneteoua@yahoo.fr,aazar@psu.edu.sa

Journal Article

SA-RSR: a read-optimal data recovery strategy for XOR-coded distributed storage systems

Xingjun ZHANG, Ningjing LIANG, Yunfei LIU, Changjiang ZHANG, Yang LI

Journal Article

Pragmatic multi-stage simulated annealing for optimal placement of synchrophasor measurement units in smart power grids

Pathirikkat GOPAKUMAR,M. JAYA BHARATA REDDY,Dusmata Kumar MOHANTA

Journal Article

Multiple linear regression, artificial neural network, and fuzzy logic prediction of 28 days compressive strength of concrete

Faezehossadat KHADEMI,Mahmoud AKBARI,Sayed Mohammadmehdi JAMAL,Mehdi NIKOO

Journal Article

Recent Advances in Passive Digital Image Security Forensics: A Brief Review

Xiang Lin, Jian-Hua Li, Shi-Lin Wang, Alan-Wee-Chung Liew, Feng Cheng, Xiao-Sa Huang

Journal Article

Multi-stage dual replica bit-line delay technique for process-variation-robust timing of lowvoltageSRAMsense amplifier

Shou-biao TAN,Wen-juan LU,Chun-yu PENG,Zheng-ping LI,You-wu TAO,Jun-ning CHEN

Journal Article

A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services

fatma.mohammed333@gmail.com,eng.waled.elshafai@gmail.com,elsayedelrabaie@gmail.com,nfsoliman@pnu.edu.sa

Journal Article