Search scope:
排序: Display mode:
Zero E-waste: Regulatory impediments and blockchain imperatives
Mengjun Chen, Oladele A. Ogunseitan
Frontiers of Environmental Science & Engineering 2021, Volume 15, Issue 6, doi: 10.1007/s11783-021-1402-x
Keywords: Blockchain E-waste Regulatory Policy Copyright Laws Repair-Reuse-Remanufacture Toxicity
WAN Zhen-ping, LIU Ya-jun, TANG Yong, YE Bang-yan
Frontiers of Mechanical Engineering 2006, Volume 1, Issue 2, Pages 194-198 doi: 10.1007/s11465-005-0011-x
Keywords: different 30o-120o relationship initiation cutting parameter
Three Basic Laws for the Network Era and Capacity Evolution for Backbone Networks
Wei Leping
Strategic Study of CAE 2001, Volume 3, Issue 5, Pages 12-16
Keywords: network capacity backbone network
Discovery of Fuling Shale Gas Field and its prospects
Xusheng GUO, Yuping LI, Jinlei LI, Minggang FENG, Hua DUAN
Frontiers in Energy 2019, Volume 13, Issue 2, Pages 354-366 doi: 10.1007/s11708-018-0581-z
Keywords: shale gas accumulation laws exploration technologies Longmaxi Formation Fuling Shale Gas Field Sichuan
Laws of 4D Printing Article
Farhang Momeni, Jun Ni
Engineering 2020, Volume 6, Issue 9, Pages 1035-1055 doi: 10.1016/j.eng.2020.01.015
Three-dimensional (3D) printing is an additive manufacturing process. Accordingly, four-dimensional (4D) printing is a manufacturing process that involves multiple research fields. 4D printing conserves the general attributes of 3D printing (such as material waste reduction, and elimination of molds, dies, and machining) and further enables the fourth dimension of products to provide intelligent behavior over time. This intelligent behavior is encoded (usually by an inverse mathematical problem) into stimuliresponsive multi-materials during printing, and is enabled by stimuli after printing. The main difference between 3D- and 4D-printed structures is the presence of one additional dimension, which provides for smart evolution over time. However, currently there is no general formula for modeling and predicting this additional dimension. Herein, by starting from fundamentals, we derive and validate a general biexponential formula with a particular format that can model the time-dependent behavior of nearly all 4D (hydro-, photochemical-, photothermal-, solvent-, pH-, moisture-, electrochemical-, electrothermal-, ultrasound-, etc. responsive) structures. We show that two types of time constants are needed to capture the correct time-dependent behavior of 4D multi-materials. We introduce the concept of mismatch-driven stress at the interface of active and passive materials in 4D multi-material structures, leading to one of the two time constants. We develop and extract the other time constant from our unified model of time-dependent behavior of nearly all stimuli-responsive materials. Our results starting from the most fundamental concepts and ending with governing equations can serve as general design principles for future research in the field of 4D printing, where time-dependent behaviors should be properly understood, modeled, and predicted.
Keywords: Manufacturing Stimuli-responsive materials Mechanics of materials Time constant 4D printing
A robust intelligent audio watermarking scheme using support vector machine Article
Mohammad MOSLEH,Hadi LATIFPOUR,Mohammad KHEYRANDISH,Mahdi MOSLEH,Najmeh HOSSEINPOUR
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 12, Pages 1320-1330 doi: 10.1631/FITEE.1500297
Keywords: Audio watermarking Copyright protection Singular value decomposition (SVD) Machine learning Support
National Health Education, Medical Education and Healthcare Legal System in China
Liu Xiaoyun,Chang Chun,Hou Jianlin,Yang Jian,Tian Chuansheng,Ji Ying,Hu Dan,Meng Qingyue and Wang Longde
Strategic Study of CAE 2017, Volume 19, Issue 2, Pages 50-54 doi: 10.15302/J-SSCAE-2017.02.008
Keywords: national health health education medical education healthcare laws
The control factors and distribution laws of volcanic oil and gas reservoir in China
Hou Lianhua,Zhu Rukai,Zhao Xia,Pang Zhenglian,Luo Xia,Mao Zhiguo
Strategic Study of CAE 2012, Volume 14, Issue 6, Pages 77-86
There are mainly 3 sets of volcanic rocks in sedimentary basins of China: the strata of Carboniferous-Permian, the strata of Jurassic-Cretaceous and the strata of Palaeogene-Neogene. Volcanic rocks distributed widely and developed associated with hydrocarbon source rocks form good combination of source-reservoir-cap assemblage. In the eastern basins of China, intermediate-acidic volcanic rocks and primary type reservoir are mainly developed. In the western basins of China, mid-mafic volcanic rocks and weathering crust type reservoir are often developed. Almost all of the lithology and lithofacies of volcanic rocks can form effective reservoir. And the reservoir characteristic of weathering crust type is better than that of primary type. Lithological reservoir and fault-lithological reservoir are often developed in the eastern basins of China. Stratum reservoir, structure-stratum reservoir and structure-lithological-stratum combined reservoir are often developed in the western basins of China. In Songliao Basin, deep continued settlement faults control the distribution of gas regional; hydrocarbon generation faults trough controls the gas distribution in the fault depression; fault structure regions near the hydrocarbon generation faults trough are the gas enriched accumulation region, and high-quality volcanic reservoir controls gas accumulation. In the north part of Xinjiang area, the Carboniferous residual hydrocarbon-generation sags control area distribution of oil and gas; weathering crust scale controls the hydrocarbon accumulating scale and degree; the type of weathering crust-stratum traps could control reservoir forming effectively; the positive tectonic background controls oil and gas migration and accumulation. This paper points out that the area of volcanic rocks for exploration is 3.6×105 km2 in China, and the predicted equivalent reserve in volcanic rocks is above 6×109 t.
Keywords: volcanic rock reservoir igneous reservoir reservoir formation control factors reservoir distribution law
Ablock-based secure and robustwatermarking scheme for color images based onmulti-resolution decomposition and de-correlation Research Articles
Muhammad IMRAN, Bruce A. HARVEY, Muhammad ATIF, Adnan Ali MEMON
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 7, Pages 946-963 doi: 10.1631/FITEE.1700667
This paper presents a block-based secure and robust watermarking technique for color images based on multi-resolution decomposition and de-correlation. The principal objective of the presented scheme is to simultaneously meet all the four requirements (robustness, security, imperceptibility, and capacity) of a good watermarking scheme. The contribution of this study is to basically achieve the four contradictory requirements that a good watermarking scheme must meet. To do so, different approaches are combined in a way that the four requirements are achieved. For instance, to obtain imperceptibility, the three color channels (red, green, and blue) are de-correlated using principal component analysis, and the first principal component (de-correlated red channel) is chosen for watermark embedding. Afterwards, to achieve robustness, the de-correlated channel is decomposed using a discrete wavelet transform (DWT), and the approximate band (the other three bands are kept intact to preserve the edge information) is further decomposed into distinct blocks. The random blocks are chosen based on a random generated key. The random selected blocks are further broken down into singular values and vectors. Based on the mutual dependency on singular values and vectors’ matrices, the values are modified depending on the watermarking bits, and their locations are saved and used as another key, required when the watermark is to be extracted. Consequently, two-level authentication levels ensure the security, and using both singular values and vectors increases the capacity of the presented scheme. Moreover, the involvement of both left and right singular vectors along with singular values in the watermarking embedding process strengthens the robustness of the proposed scheme. Finally, to compare the presented scheme with the state-of-the-art schemes in terms of imperceptibility (peak signal-to-noise ratio and structural similarity index), security (with numerous fake keys), robustness (normalized correlation and bit error rate), and capacity, the Gonzalez and Kodak datasets are used. The comparison shows significant improvement of the proposed scheme over existing schemes.
Keywords: Copyright protection Data hiding Multi-resolution decomposition De-correlation Security
Title Author Date Type Operation
Zero E-waste: Regulatory impediments and blockchain imperatives
Mengjun Chen, Oladele A. Ogunseitan
Journal Article
Initiation and propagation laws of the glass cracks in specimens subjected to normal loading under the
WAN Zhen-ping, LIU Ya-jun, TANG Yong, YE Bang-yan
Journal Article
Three Basic Laws for the Network Era and Capacity Evolution for Backbone Networks
Wei Leping
Journal Article
Discovery of Fuling Shale Gas Field and its prospects
Xusheng GUO, Yuping LI, Jinlei LI, Minggang FENG, Hua DUAN
Journal Article
A robust intelligent audio watermarking scheme using support vector machine
Mohammad MOSLEH,Hadi LATIFPOUR,Mohammad KHEYRANDISH,Mahdi MOSLEH,Najmeh HOSSEINPOUR
Journal Article
National Health Education, Medical Education and Healthcare Legal System in China
Liu Xiaoyun,Chang Chun,Hou Jianlin,Yang Jian,Tian Chuansheng,Ji Ying,Hu Dan,Meng Qingyue and Wang Longde
Journal Article
The control factors and distribution laws of volcanic oil and gas reservoir in China
Hou Lianhua,Zhu Rukai,Zhao Xia,Pang Zhenglian,Luo Xia,Mao Zhiguo
Journal Article