Resource Type

Journal Article 9

Year

2021 1

2020 1

2019 2

2017 1

2016 1

2012 1

2006 1

2001 1

open ︾

Keywords

Copyright protection 2

30o-120o 1

4D printing 1

Audio watermarking 1

Blockchain 1

Copyright Laws 1

Data hiding 1

De-correlation 1

E-waste 1

Fuling Shale Gas Field 1

Longmaxi Formation 1

Machine learning 1

Manufacturing 1

Mechanics of materials 1

Multi-resolution decomposition 1

Regulatory Policy 1

Repair-Reuse-Remanufacture 1

Security 1

Sichuan Basin 1

Singular value decomposition (SVD) 1

open ︾

Search scope:

排序: Display mode:

Zero E-waste: Regulatory impediments and blockchain imperatives

Mengjun Chen, Oladele A. Ogunseitan

Frontiers of Environmental Science & Engineering 2021, Volume 15, Issue 6, doi: 10.1007/s11783-021-1402-x

Abstract: . • International harmonization of copyright laws will aid repair and remanufacture. • Blockchain–digitalIncreasingly, 3re implementation is restricted by regulatory difficulties, particularly the invocation of copyrightlaws.international consensuses on judicial definitions, such as 3re, refurbish fake/counterfeit product and copyright

Keywords: Blockchain     E-waste     Regulatory Policy     Copyright Laws     Repair-Reuse-Remanufacture     Toxicity    

Initiation and propagation laws of the glass cracks in specimens subjected to normal loading under the

WAN Zhen-ping, LIU Ya-jun, TANG Yong, YE Bang-yan

Frontiers of Mechanical Engineering 2006, Volume 1, Issue 2,   Pages 194-198 doi: 10.1007/s11465-005-0011-x

Abstract: surfaces and to facilitate tool design and cutting parameter selection, the initiation and propagation lawsResearch results show that initiation and propagation laws are the same with interior symmetric wedgeangles of 30o-120o, while the laws are different with interior symmetric wedge angles equal to or more

Keywords: different     30o-120o     relationship     initiation     cutting parameter    

Three Basic Laws for the Network Era and Capacity Evolution for Backbone Networks

Wei Leping

Strategic Study of CAE 2001, Volume 3, Issue 5,   Pages 12-16

Abstract: Then, the paper discussed implications, effects and technical limits for the three basic laws which guide

Keywords: network     capacity     backbone network    

Discovery of Fuling Shale Gas Field and its prospects

Xusheng GUO, Yuping LI, Jinlei LI, Minggang FENG, Hua DUAN

Frontiers in Energy 2019, Volume 13, Issue 2,   Pages 354-366 doi: 10.1007/s11708-018-0581-z

Abstract: A series of breakthroughs have been made in the understanding, evaluation, and exploration of shale gas from discovery, environmental protection to efficient exploration in the discovering of Fuling Gas Field. By revealing the positive correlation between organic carbon content and siliceous mineral content of shale deposited in deep shelf, dynamic preservation mechanism of “early retention and late deformation,” it is clarified that the shales deposited in deep shelf are the most favorable for shale gas generation, storage and fracturing. The preserving conditions determine the levels of shale gas accumulation, thus the evaluation concept of taking the quality of the shale as the base and the preserving conditions as key is proposed, the evaluation system for strategic selection of favorable zones is established for marine shale gas exploration in Southern China. Moreover, the “sweet point” seismic forecasting technologies for marine shale gas, the “six properties” logging technologies for evaluating shale gas layers, the technologies for quick and efficient drilling of horizontal well groups, and the fracturing technologies for composite fractures for horizontal wells are invented. The paper discussed the exploration prospect of shale gas in the shales of Wufeng-Longmaxi Formation in great depth in Sichuan Basin, shale gas exploration in the outer region of the south, and continental shale gas exploration in China.

Keywords: shale gas     accumulation laws     exploration technologies     Longmaxi Formation     Fuling Shale Gas Field     Sichuan    

Laws of 4D Printing Article

Farhang Momeni, Jun Ni

Engineering 2020, Volume 6, Issue 9,   Pages 1035-1055 doi: 10.1016/j.eng.2020.01.015

Abstract:

Three-dimensional (3D) printing is an additive manufacturing process. Accordingly, four-dimensional (4D) printing is a manufacturing process that involves multiple research fields. 4D printing conserves the general attributes of 3D printing (such as material waste reduction, and elimination of molds, dies, and machining) and further enables the fourth dimension of products to provide intelligent behavior over time. This intelligent behavior is encoded (usually by an inverse mathematical problem) into stimuliresponsive multi-materials during printing, and is enabled by stimuli after printing. The main difference between 3D- and 4D-printed structures is the presence of one additional dimension, which provides for smart evolution over time. However, currently there is no general formula for modeling and predicting this additional dimension. Herein, by starting from fundamentals, we derive and validate a general biexponential formula with a particular format that can model the time-dependent behavior of nearly all 4D (hydro-, photochemical-, photothermal-, solvent-, pH-, moisture-, electrochemical-, electrothermal-, ultrasound-, etc. responsive) structures. We show that two types of time constants are needed to capture the correct time-dependent behavior of 4D multi-materials. We introduce the concept of mismatch-driven stress at the interface of active and passive materials in 4D multi-material structures, leading to one of the two time constants. We develop and extract the other time constant from our unified model of time-dependent behavior of nearly all stimuli-responsive materials. Our results starting from the most fundamental concepts and ending with governing equations can serve as general design principles for future research in the field of 4D printing, where time-dependent behaviors should be properly understood, modeled, and predicted.

Keywords: Manufacturing     Stimuli-responsive materials     Mechanics of materials     Time constant     4D printing    

A robust intelligent audio watermarking scheme using support vector machine Article

Mohammad MOSLEH,Hadi LATIFPOUR,Mohammad KHEYRANDISH,Mahdi MOSLEH,Najmeh HOSSEINPOUR

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 12,   Pages 1320-1330 doi: 10.1631/FITEE.1500297

Abstract: Rapid growth in information technology and computer networks has resulted in the universal use of data transmission in the digital domain. However, the major challenge faced by digital data owners is protection of data against unauthorized cop-ying and distribution. Digital watermark technology is starting to be considered a credible protection method to mitigate the potential challenges that undermine the efficiency of the system. Digital audio watermarking should retain the quality of the host signal in a way that remains inaudible to the human hearing system. It should be sufficiently robust to be resistant against potential attacks. One of the major deficiencies of conventional audio watermarking techniques is the use of non-intelligent decoders in which some sets of specific rules are used for watermark extraction. This paper presents a new robust intelligent audio water-marking scheme using a synergistic combination of singular value decomposition (SVD) and support vector machine (SVM). The methodology involves embedding a watermark data by modulating the singular values in the SVD transform domain. In the extraction process, an intelligent detector using SVM is suggested for extracting the watermark data. By learning the destructive effects of noise, the detector in question can effectively retrieve the watermark. Diverse experiments under various conditions have been carried out to verify the performance of the proposed scheme. Experimental results showed better imperceptibility, higher robustness, lower payload, and higher operational efficiency, for the proposed method than for conventional techniques.

Keywords: Audio watermarking     Copyright protection     Singular value decomposition (SVD)     Machine learning     Support    

National Health Education, Medical Education and Healthcare Legal System in China

Liu Xiaoyun,Chang Chun,Hou Jianlin,Yang Jian,Tian Chuansheng,Ji Ying,Hu Dan,Meng Qingyue and Wang Longde

Strategic Study of CAE 2017, Volume 19, Issue 2,   Pages 50-54 doi: 10.15302/J-SSCAE-2017.02.008

Abstract: This paper also examines and analyzes existing medical and healthcare laws and regulations.

Keywords: national health     health education     medical education     healthcare laws    

The control factors and distribution laws of volcanic oil and gas reservoir in China

Hou Lianhua,Zhu Rukai,Zhao Xia,Pang Zhenglian,Luo Xia,Mao Zhiguo

Strategic Study of CAE 2012, Volume 14, Issue 6,   Pages 77-86

Abstract:

There are mainly 3 sets of volcanic rocks in sedimentary basins of China: the strata of Carboniferous-Permian, the strata of Jurassic-Cretaceous and the strata of Palaeogene-Neogene. Volcanic rocks distributed widely and developed associated with hydrocarbon source rocks form good combination of source-reservoir-cap assemblage. In the eastern basins of China, intermediate-acidic volcanic rocks and primary type reservoir are mainly developed. In the western basins of China, mid-mafic volcanic rocks and weathering crust type reservoir are often developed. Almost all of the lithology and lithofacies of volcanic rocks can form effective reservoir. And the reservoir characteristic of weathering crust type is better than that of primary type. Lithological reservoir and fault-lithological reservoir are often developed in the eastern basins of China. Stratum reservoir, structure-stratum reservoir and structure-lithological-stratum combined reservoir are often developed in the western basins of China. In Songliao Basin, deep continued settlement faults control the distribution of gas regional; hydrocarbon generation faults trough controls the gas distribution in the fault depression; fault structure regions near the hydrocarbon generation faults trough are the gas enriched accumulation region, and high-quality volcanic reservoir controls gas accumulation. In the north part of Xinjiang area, the Carboniferous residual hydrocarbon-generation sags control area distribution of oil and gas; weathering crust scale controls the hydrocarbon accumulating scale and degree; the type of weathering crust-stratum traps could control reservoir forming effectively; the positive tectonic background controls oil and gas migration and accumulation. This paper points out that the area of volcanic rocks for exploration is 3.6×105 km2 in China, and the predicted equivalent reserve in volcanic rocks is above 6×109 t.

Keywords: volcanic rock reservoir     igneous reservoir     reservoir formation control factors     reservoir distribution law    

Ablock-based secure and robustwatermarking scheme for color images based onmulti-resolution decomposition and de-correlation Research Articles

Muhammad IMRAN, Bruce A. HARVEY, Muhammad ATIF, Adnan Ali MEMON

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 7,   Pages 946-963 doi: 10.1631/FITEE.1700667

Abstract:

This paper presents a block-based secure and robust watermarking technique for color images based on multi-resolution decomposition and de-correlation. The principal objective of the presented scheme is to simultaneously meet all the four requirements (robustness, security, imperceptibility, and capacity) of a good watermarking scheme. The contribution of this study is to basically achieve the four contradictory requirements that a good watermarking scheme must meet. To do so, different approaches are combined in a way that the four requirements are achieved. For instance, to obtain imperceptibility, the three color channels (red, green, and blue) are de-correlated using principal component analysis, and the first principal component (de-correlated red channel) is chosen for watermark embedding. Afterwards, to achieve robustness, the de-correlated channel is decomposed using a discrete wavelet transform (DWT), and the approximate band (the other three bands are kept intact to preserve the edge information) is further decomposed into distinct blocks. The random blocks are chosen based on a random generated key. The random selected blocks are further broken down into singular values and vectors. Based on the mutual dependency on singular values and vectors’ matrices, the values are modified depending on the watermarking bits, and their locations are saved and used as another key, required when the watermark is to be extracted. Consequently, two-level authentication levels ensure the security, and using both singular values and vectors increases the capacity of the presented scheme. Moreover, the involvement of both left and right singular vectors along with singular values in the watermarking embedding process strengthens the robustness of the proposed scheme. Finally, to compare the presented scheme with the state-of-the-art schemes in terms of imperceptibility (peak signal-to-noise ratio and structural similarity index), security (with numerous fake keys), robustness (normalized correlation and bit error rate), and capacity, the Gonzalez and Kodak datasets are used. The comparison shows significant improvement of the proposed scheme over existing schemes.

Keywords: Copyright protection     Data hiding     Multi-resolution decomposition     De-correlation     Security    

Title Author Date Type Operation

Zero E-waste: Regulatory impediments and blockchain imperatives

Mengjun Chen, Oladele A. Ogunseitan

Journal Article

Initiation and propagation laws of the glass cracks in specimens subjected to normal loading under the

WAN Zhen-ping, LIU Ya-jun, TANG Yong, YE Bang-yan

Journal Article

Three Basic Laws for the Network Era and Capacity Evolution for Backbone Networks

Wei Leping

Journal Article

Discovery of Fuling Shale Gas Field and its prospects

Xusheng GUO, Yuping LI, Jinlei LI, Minggang FENG, Hua DUAN

Journal Article

Laws of 4D Printing

Farhang Momeni, Jun Ni

Journal Article

A robust intelligent audio watermarking scheme using support vector machine

Mohammad MOSLEH,Hadi LATIFPOUR,Mohammad KHEYRANDISH,Mahdi MOSLEH,Najmeh HOSSEINPOUR

Journal Article

National Health Education, Medical Education and Healthcare Legal System in China

Liu Xiaoyun,Chang Chun,Hou Jianlin,Yang Jian,Tian Chuansheng,Ji Ying,Hu Dan,Meng Qingyue and Wang Longde

Journal Article

The control factors and distribution laws of volcanic oil and gas reservoir in China

Hou Lianhua,Zhu Rukai,Zhao Xia,Pang Zhenglian,Luo Xia,Mao Zhiguo

Journal Article

Ablock-based secure and robustwatermarking scheme for color images based onmulti-resolution decomposition and de-correlation

Muhammad IMRAN, Bruce A. HARVEY, Muhammad ATIF, Adnan Ali MEMON

Journal Article