Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into ...Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image.The randomization strategies in data embedding techniques may utilize random domains,pixels,or region-of-interest for concealing secrets into a cover image,preventing information from being discovered by an attacker.The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility,but it is challenging.A systematic approach is used with a standard methodology to carry out this study.This review concentrates on the critical examination of several embedding strategies,incorporating experimental results with state-of-the-art methods emphasizing the robustness,security,payload capacity,and visual quality metrics of the stego images.The fundamental ideas of steganography are presented in this work,along with a unique viewpoint that sets it apart from previous works by highlighting research gaps,important problems,and difficulties.Additionally,it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography.展开更多
In order to realize on-line quantitative detection on SF6 and effective control of nlnning state of SF6 high voltage power supply system, a concentrated SF6 quantitative ultrasonic on-line deteetion system has been de...In order to realize on-line quantitative detection on SF6 and effective control of nlnning state of SF6 high voltage power supply system, a concentrated SF6 quantitative ultrasonic on-line deteetion system has been developed based on the actual demand of electric power system consumers. There are four major characteristics in this system. Firstly, the gas of maximum 64 detection points is transferred through the specific air path to the detection devices to he detected and analyzed, thereby the electrical lines and the complicated installation of the collectors can be avoided; secondly, the differential technique is used to shield the influence of environmental factors, which effectively improves the accuracy of the acoustic detection; thirdly, the SF6 coneentration is determined by the speed and phase in the ultrasonic wave trans- mission process, therefore there is no secondary pollution for the purely physical means; finally, the ma- ture embedded technique is applied in this system to improve its intelligence and stability.展开更多
This paper presents a debugging system for multi-pole array acoustic logging (MPAL) tools. The debugging system proposed in this study can debug the MPAL tool system, sub-system and local electronics. In the test eq...This paper presents a debugging system for multi-pole array acoustic logging (MPAL) tools. The debugging system proposed in this study can debug the MPAL tool system, sub-system and local electronics. In the test equipment, we have used principal and subordinate structures, and interconnected the host computer and the front-end machine via Ethernet. The front-end machine is based on the ARM7 (advanced reduced instruction set computing (RISC) machine) technique, the processor of which runs an embedded operating system, namely, uClinux OS. We have analyzed the system telecommunication, human-machine interface circuit, transmitter mandrel interface circuit, receiver mandrel interface circuit, and board-level test interface circuit. The software used in the system consists of the embedded front-computer software and the host application software. We have explained in detail the flow chart of the boot loader in the embedded front-computer software. The host application software is composed of four application subroutines, which match with the functional modules of the system hardware. A net communication program based on the server^client mode is implemented by means of socket programming and multi-thread programming. Test results indicate that the data transmission rate of the system is higher than 1 MB/s, which completely meets the current requirements of the data transmission rate between the tool system and the wireline telemetry device. Application of the debugging system, which includes multiple level test methods, shows that the proposed system can fully meet the test requirements of MPAL at various levels.展开更多
Based on the well logging knowledge graph of hydrocarbon-bearing formation(HBF),a Knowledge-Powered Neural Network Formation Evaluation model(KPNFE)has been proposed.It has the following functions:(1)extracting charac...Based on the well logging knowledge graph of hydrocarbon-bearing formation(HBF),a Knowledge-Powered Neural Network Formation Evaluation model(KPNFE)has been proposed.It has the following functions:(1)extracting characteristic parameters describing HBF in multiple dimensions and multiple scales;(2)showing the characteristic parameter-related entities,relationships,and attributes as vectors via graph embedding technique;(3)intelligently identifying HBF;(4)seamlessly integrating expertise into the intelligent computing to establish the assessment system and ranking algorithm for potential pay recommendation.Taking 547 wells encountered the low porosity and low permeability Chang 6 Member of Triassic in the Jiyuan Block of Ordos Basin,NW China as objects,80%of the wells were randomly selected as the training dataset and the remainder as the validation dataset.The KPNFE prediction results on the validation dataset had a coincidence rate of 94.43%with the expert interpretation results and a coincidence rate of 84.38%for all the oil testing layers,which is 13 percentage points higher in accuracy and over 100 times faster than the primary conventional interpretation.In addition,a number of potential pays likely to produce industrial oil were recommended.The KPNFE model effectively inherits,carries forward and improves the expert knowledge,nicely solving the robustness problem in HBF identification.The KPNFE,with good interpretability and high accuracy of computation results,is a powerful technical means for efficient and high-quality well logging re-evaluation of old wells in mature oilfields.展开更多
A novel fabrication method of multi-core photonic crystal fibers is proposed on the basis of a fiber-embedded technique. A taper tower is used to modify the structures of the fiber preform, and four steps of fiber fab...A novel fabrication method of multi-core photonic crystal fibers is proposed on the basis of a fiber-embedded technique. A taper tower is used to modify the structures of the fiber preform, and four steps of fiber fabrication and different structures of fiber samples are given. The mode structures and beating characteristics of a photonic crystal fiber sample with two successive cores are investigated in detail with the help of a supercontinuum light source, a charge-coupled device (CCD) camera, and an optical spectrum analyzer. The test results show a clear beating phenomenon between two orthotropic polarization modes with a 2.8-nm peak interval in wavelength.展开更多
Since Tian Jun proposed the difference expansion embedding technique,based on which,many reversible watermarking techniques were proposed.However,these methods do not perform well when the payload is high.In this pape...Since Tian Jun proposed the difference expansion embedding technique,based on which,many reversible watermarking techniques were proposed.However,these methods do not perform well when the payload is high.In this paper,we proposed an expandable difference threshold controlled scheme for these three methods.Experiments show that our scheme improves the performance of these three methods for heavy payload.展开更多
In this paper,numerical sensitivity analysis with respect to the Reynolds number for the flow past obstacle problem is presented.To carry out such analysis,at each time step,we need to solve the incompressible Navier-...In this paper,numerical sensitivity analysis with respect to the Reynolds number for the flow past obstacle problem is presented.To carry out such analysis,at each time step,we need to solve the incompressible Navier-Stokes equations on irregular domains twice,one for the primary variables;the other is for the sensitivity variables with homogeneous boundary conditions.The Navier-Stokes solver is the augmented immersed interface method for Navier-Stokes equations on irregular domains.One of the most important contribution of this paper is that our analysis can predict the critical Reynolds number at which the vortex shading begins to develop in the wake of the obstacle.Some interesting experiments are shown to illustrate how the critical Reynolds number varies with different geometric settings.展开更多
基金This research was funded by the Ministry of Higher Education(MOHE)through Fundamental Research Grant Scheme(FRGS)under the Grand Number FRGS/1/2020/ICT01/UK M/02/4,and University Kebangsaan Malaysia for open access publication.
文摘Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image.The randomization strategies in data embedding techniques may utilize random domains,pixels,or region-of-interest for concealing secrets into a cover image,preventing information from being discovered by an attacker.The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility,but it is challenging.A systematic approach is used with a standard methodology to carry out this study.This review concentrates on the critical examination of several embedding strategies,incorporating experimental results with state-of-the-art methods emphasizing the robustness,security,payload capacity,and visual quality metrics of the stego images.The fundamental ideas of steganography are presented in this work,along with a unique viewpoint that sets it apart from previous works by highlighting research gaps,important problems,and difficulties.Additionally,it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography.
基金Supported by the National Natural Science Foundation of China (No. 10574038)
文摘In order to realize on-line quantitative detection on SF6 and effective control of nlnning state of SF6 high voltage power supply system, a concentrated SF6 quantitative ultrasonic on-line deteetion system has been developed based on the actual demand of electric power system consumers. There are four major characteristics in this system. Firstly, the gas of maximum 64 detection points is transferred through the specific air path to the detection devices to he detected and analyzed, thereby the electrical lines and the complicated installation of the collectors can be avoided; secondly, the differential technique is used to shield the influence of environmental factors, which effectively improves the accuracy of the acoustic detection; thirdly, the SF6 coneentration is determined by the speed and phase in the ultrasonic wave trans- mission process, therefore there is no secondary pollution for the purely physical means; finally, the ma- ture embedded technique is applied in this system to improve its intelligence and stability.
基金supported by National Science Foundation of China (61102102, 11134011, 11204380 and 11374371)Major National Science and Technology Projects (2011ZX05020-002)+2 种基金PetroChina Innovation Foundation (2014D-5006-0307)Science and Technology Project of CNPC (2014A-3912 and 2011B-4001)the Foundation of China University of Petroleum (KYJJ2012-05-07)
文摘This paper presents a debugging system for multi-pole array acoustic logging (MPAL) tools. The debugging system proposed in this study can debug the MPAL tool system, sub-system and local electronics. In the test equipment, we have used principal and subordinate structures, and interconnected the host computer and the front-end machine via Ethernet. The front-end machine is based on the ARM7 (advanced reduced instruction set computing (RISC) machine) technique, the processor of which runs an embedded operating system, namely, uClinux OS. We have analyzed the system telecommunication, human-machine interface circuit, transmitter mandrel interface circuit, receiver mandrel interface circuit, and board-level test interface circuit. The software used in the system consists of the embedded front-computer software and the host application software. We have explained in detail the flow chart of the boot loader in the embedded front-computer software. The host application software is composed of four application subroutines, which match with the functional modules of the system hardware. A net communication program based on the server^client mode is implemented by means of socket programming and multi-thread programming. Test results indicate that the data transmission rate of the system is higher than 1 MB/s, which completely meets the current requirements of the data transmission rate between the tool system and the wireline telemetry device. Application of the debugging system, which includes multiple level test methods, shows that the proposed system can fully meet the test requirements of MPAL at various levels.
基金Supported by the National Science and Technology Major Project(2016ZX05007-004)。
文摘Based on the well logging knowledge graph of hydrocarbon-bearing formation(HBF),a Knowledge-Powered Neural Network Formation Evaluation model(KPNFE)has been proposed.It has the following functions:(1)extracting characteristic parameters describing HBF in multiple dimensions and multiple scales;(2)showing the characteristic parameter-related entities,relationships,and attributes as vectors via graph embedding technique;(3)intelligently identifying HBF;(4)seamlessly integrating expertise into the intelligent computing to establish the assessment system and ranking algorithm for potential pay recommendation.Taking 547 wells encountered the low porosity and low permeability Chang 6 Member of Triassic in the Jiyuan Block of Ordos Basin,NW China as objects,80%of the wells were randomly selected as the training dataset and the remainder as the validation dataset.The KPNFE prediction results on the validation dataset had a coincidence rate of 94.43%with the expert interpretation results and a coincidence rate of 84.38%for all the oil testing layers,which is 13 percentage points higher in accuracy and over 100 times faster than the primary conventional interpretation.In addition,a number of potential pays likely to produce industrial oil were recommended.The KPNFE model effectively inherits,carries forward and improves the expert knowledge,nicely solving the robustness problem in HBF identification.The KPNFE,with good interpretability and high accuracy of computation results,is a powerful technical means for efficient and high-quality well logging re-evaluation of old wells in mature oilfields.
基金the China Scholarship Council(CSC) and the Research Foundation of Harbin Engineering University
文摘A novel fabrication method of multi-core photonic crystal fibers is proposed on the basis of a fiber-embedded technique. A taper tower is used to modify the structures of the fiber preform, and four steps of fiber fabrication and different structures of fiber samples are given. The mode structures and beating characteristics of a photonic crystal fiber sample with two successive cores are investigated in detail with the help of a supercontinuum light source, a charge-coupled device (CCD) camera, and an optical spectrum analyzer. The test results show a clear beating phenomenon between two orthotropic polarization modes with a 2.8-nm peak interval in wavelength.
基金the National High Technology Research and Development Program (863) of China (No.2007AA02Z452) the National Natural Science Foundation of China (Nos.30570511 and 30770589)
文摘Since Tian Jun proposed the difference expansion embedding technique,based on which,many reversible watermarking techniques were proposed.However,these methods do not perform well when the payload is high.In this paper,we proposed an expandable difference threshold controlled scheme for these three methods.Experiments show that our scheme improves the performance of these three methods for heavy payload.
基金The first and second authors are partially supported by US-ARO grant 49308-MAUS-AFSOR grant FA9550-06-1-0241+2 种基金The second author is also partially supported by US-NSF grant DMS-0911434the US-NIH grant 096195-01,and CNSF 11071123The third author is partially supported by the Hong Kong RGC Grant HKBU201710。
文摘In this paper,numerical sensitivity analysis with respect to the Reynolds number for the flow past obstacle problem is presented.To carry out such analysis,at each time step,we need to solve the incompressible Navier-Stokes equations on irregular domains twice,one for the primary variables;the other is for the sensitivity variables with homogeneous boundary conditions.The Navier-Stokes solver is the augmented immersed interface method for Navier-Stokes equations on irregular domains.One of the most important contribution of this paper is that our analysis can predict the critical Reynolds number at which the vortex shading begins to develop in the wake of the obstacle.Some interesting experiments are shown to illustrate how the critical Reynolds number varies with different geometric settings.