Search scope:
排序: Display mode:
Analysis of foundation sliding of an arch dam considering the hydromechanical behavior
Maria Luísa Braga FARINHA, José Vieira de LEMOS, Emanuel MARANHA DAS NEVES
Frontiers of Structural and Civil Engineering 2012, Volume 6, Issue 1, Pages 35-43 doi: 10.1007/s11709-012-0142-1
Keywords: concrete dams rock foundations hydromechanical behavior failure analysis
A simple multi-wave algorithm for the uncapacitated facility location problem
Fred GLOVER, Saïd HANAFI, Oualid GUEMRI, Igor CREVITS
Frontiers of Engineering Management 2018, Volume 5, Issue 4, Pages 451-465 doi: 10.15302/J-FEM-2018038
The multi-wave algorithm (Glover, 2016) integrates tabu search and strategic oscillation utilizing repeated waves (nested iterations) of constructive search or neighborhood search. We propose a simple multi-wave algorithm for solving the Uncapacitated Facility Location Problem (UFLP) to minimize the combined costs of selecting facilities to be opened and of assigning each customer to an opened facility in order to meet the customers’ demands. The objective is to minimize the overall cost including the costs of opening facilities and the costs of allocations. Our experimental tests on a standard set of benchmarks for this widely-studied class of problems show that our algorithm outperforms all previous methods.
Keywords: discrete optimization UFLP multi-wave optimization strategic oscillation tabu search
Synthesis of spherical parallel manipulator for dexterous medical task
Abdelbadia CHAKER, Abdelfattah MLIKA, Med Amine LARIBI, Lotfi ROMDHANE, Sa?d ZEGHLOUL
Frontiers of Mechanical Engineering 2012, Volume 7, Issue 2, Pages 150-162 doi: 10.1007/s11465-012-0325-4
This paper deals with the design and the analysis of a spherical parallel manipulator (SPM) for a haptic minimally invasive surgery application. First the medical task was characterized with the help of a surgeon who performed a suture technique called anastomosis. A Vicon system was used to capture the motion of the surgeon, which yielded the volume swept by the tool during the anastomosis operation. The identified workspace can be represented by a cone with a half vertex angle of 26°. A multi objective optimization procedure based on genetic algorithms was then carried out to find the optimal SPM. Two criteria were considered, i.e., task workspace and mechanism dexterity. The optimized SPM was then analyzed to determine the error on the orientation of the end effector as a function of the manufacturing errors of the different links of the mechanism.
Keywords: spherical parallel manipulator (SPM) anastomosis haptic motion capture optimization workspace dexterity genetic algorithm manufacturing errors
IEEE 802.16 Mesh Network SA Management Mechanism Based on Multi-hops Mutual Authentication
Wang Xingjian,Hu Aiqun,Huang Yuhua
Strategic Study of CAE 2006, Volume 8, Issue 9, Pages 69-73
Keywords: IEEE 802.16 mesh node multi-hops mutual authentication self-modified routing
Power system design for constant current subsea observatories Regular Article
Yan-hu Chen, Sa Xiao, De-jun Li,yanhuchen@zju.edu.cn,sxiao@zju.edu.cn,li_dejun@zju.edu.cn
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 11, Pages 1505-1515 doi: 10.1631/FITEE.1800362
Keywords: 海底观测网;电能变换;散热
Kadriye Özlem Hamaloğlu, Ebru Sağ, Çiğdem Kip, Erhan Şenlik, Berna Saraço
Frontiers of Chemical Science and Engineering 2019, Volume 13, Issue 3, Pages 574-585 doi: 10.1007/s11705-019-1799-y
Keywords: small-sized gold nanoparticles magnetic titania microspheres sol-gel template synthesis plasmonic catalysis 4-nitrophenol
Ahmad Taher Azar, Hilaire Bertrand Fotsin, Soup Teoua Michael Ouagni,kouaneteoua@yahoo.fr,aazar@psu.edu.sa
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 9, Pages 1267-1412 doi: 10.1631/FITEE.1900430
SA-RSR: a read-optimal data recovery strategy for XOR-coded distributed storage systems Research Articles
Xingjun ZHANG, Ningjing LIANG, Yunfei LIU, Changjiang ZHANG, Yang LI
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 6, Pages 858-875 doi: 10.1631/FITEE.2100242
Keywords: Distributed storage system Data reliability and availability XOR-based erasure codes Single-node failure Data recovery
Pathirikkat GOPAKUMAR,M. JAYA BHARATA REDDY,Dusmata Kumar MOHANTA
Frontiers in Energy 2015, Volume 9, Issue 2, Pages 148-161 doi: 10.1007/s11708-015-0344-z
Keywords: phasor measurement units (PMUs) pragmatic PMU placement simulated annealing (SA) western region Indian
Faezehossadat KHADEMI,Mahmoud AKBARI,Sayed Mohammadmehdi JAMAL,Mehdi NIKOO
Frontiers of Structural and Civil Engineering 2017, Volume 11, Issue 1, Pages 90-99 doi: 10.1007/s11709-016-0363-9
Keywords: compressive strength multiple linear regression artificial neural network ANFIS sensitivity analysis (SA
Recent Advances in Passive Digital Image Security Forensics: A Brief Review Review
Xiang Lin, Jian-Hua Li, Shi-Lin Wang, Alan-Wee-Chung Liew, Feng Cheng, Xiao-Sa Huang
Engineering 2018, Volume 4, Issue 1, Pages 29-39 doi: 10.1016/j.eng.2018.02.008
With the development of sophisticated image editing and manipulation tools, the originality and authenticity of a digital image is usually hard to determine visually. In order to detect digital image forgeries, various kinds of digital image forensics techniques have been proposed in the last decade. Compared with active forensics approaches that require embedding additional information, passive forensics approaches are more popular due to their wider application scenario, and have attracted increasing academic and industrial research interests. Generally speaking, passive digital image forensics detects image forgeries based on the fact that there are certain intrinsic patterns in the original image left during image acquisition or storage, or specific patterns in image forgeries left during the image storage or editing. By analyzing the above patterns, the originality of an image can be authenticated. In this paper, a brief review on passive digital image forensic methods is presented in order to provide a comprehensive introduction on recent advances in this rapidly developing research area. These forensics approaches are divided into three categories based on the various kinds of traces they can be used to track—that is, traces left in image acquisition, traces left in image storage, and traces left in image editing. For each category, the forensics scenario, the underlying rationale, and state-of-the-art methodologies are elaborated. Moreover, the major limitations of the current image forensics approaches are discussed in order to point out some possible research directions or focuses in these areas.
Keywords: Digital image forensics Image-tampering detection Multimedia security
Shou-biao TAN,Wen-juan LU,Chun-yu PENG,Zheng-ping LI,You-wu TAO,Jun-ning CHEN
Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 8, Pages 700-706 doi: 10.1631/FITEE.1400439
Keywords: Process-variation-robust Sense amplifier (SA) Replica bit-line (RBL) delay Timing variation
A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services Research Article
fatma.mohammed333@gmail.com,eng.waled.elshafai@gmail.com,elsayedelrabaie@gmail.com,nfsoliman@pnu.edu.sa
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 7, Pages 1045-1061 doi: 10.1631/FITEE.2200372
Keywords: Color medical image Quaternion Adaptive watermarking Encryption Fractional transform Three-dimensional chaotic logistic map (3D-CLM)
Title Author Date Type Operation
Analysis of foundation sliding of an arch dam considering the hydromechanical behavior
Maria Luísa Braga FARINHA, José Vieira de LEMOS, Emanuel MARANHA DAS NEVES
Journal Article
A simple multi-wave algorithm for the uncapacitated facility location problem
Fred GLOVER, Saïd HANAFI, Oualid GUEMRI, Igor CREVITS
Journal Article
Synthesis of spherical parallel manipulator for dexterous medical task
Abdelbadia CHAKER, Abdelfattah MLIKA, Med Amine LARIBI, Lotfi ROMDHANE, Sa?d ZEGHLOUL
Journal Article
IEEE 802.16 Mesh Network SA Management Mechanism Based on Multi-hops Mutual Authentication
Wang Xingjian,Hu Aiqun,Huang Yuhua
Journal Article
Power system design for constant current subsea observatories
Yan-hu Chen, Sa Xiao, De-jun Li,yanhuchen@zju.edu.cn,sxiao@zju.edu.cn,li_dejun@zju.edu.cn
Journal Article
Magnetic-porous microspheres with synergistic catalytic activity of small-sized gold nanoparticles and titania matrix
Kadriye Özlem Hamaloğlu, Ebru Sağ, Çiğdem Kip, Erhan Şenlik, Berna Saraço
Journal Article
Polynomial robust observer implementation based passive synchronization of nonlinear fractional-order systems with structural disturbances
Ahmad Taher Azar, Hilaire Bertrand Fotsin, Soup Teoua Michael Ouagni,kouaneteoua@yahoo.fr,aazar@psu.edu.sa
Journal Article
SA-RSR: a read-optimal data recovery strategy for XOR-coded distributed storage systems
Xingjun ZHANG, Ningjing LIANG, Yunfei LIU, Changjiang ZHANG, Yang LI
Journal Article
Pragmatic multi-stage simulated annealing for optimal placement of synchrophasor measurement units in smart power grids
Pathirikkat GOPAKUMAR,M. JAYA BHARATA REDDY,Dusmata Kumar MOHANTA
Journal Article
Multiple linear regression, artificial neural network, and fuzzy logic prediction of 28 days compressive strength of concrete
Faezehossadat KHADEMI,Mahmoud AKBARI,Sayed Mohammadmehdi JAMAL,Mehdi NIKOO
Journal Article
Recent Advances in Passive Digital Image Security Forensics: A Brief Review
Xiang Lin, Jian-Hua Li, Shi-Lin Wang, Alan-Wee-Chung Liew, Feng Cheng, Xiao-Sa Huang
Journal Article
Multi-stage dual replica bit-line delay technique for process-variation-robust timing of lowvoltageSRAMsense amplifier
Shou-biao TAN,Wen-juan LU,Chun-yu PENG,Zheng-ping LI,You-wu TAO,Jun-ning CHEN
Journal Article