A new distribution principle of bus protection is presented.The protection system description,its design features,hardware structure,construction of data communication network are given.Dynamic simulation experiments ...A new distribution principle of bus protection is presented.The protection system description,its design features,hardware structure,construction of data communication network are given.Dynamic simulation experiments show its distinguishing advantages over traditional centralized principle.展开更多
From the pyramids of Giza to the tombs of Thebes at Luxor, the glorious ancient Egyptian history has produced remarkable architecture. Sadly, tourists, numbering nearly four million per year, have taken a heavy toll o...From the pyramids of Giza to the tombs of Thebes at Luxor, the glorious ancient Egyptian history has produced remarkable architecture. Sadly, tourists, numbering nearly four million per year, have taken a heavy toll on many of these ancient structures. Of particular concern are many of tombs located opposite Luxor on the western bank of the Nile. Digital reconstruction of these tombs has the potential of helping to document and preserve these important historical structures. Issues concernng new and unique problems involving the photographing and digital reconstruction of these tombs are addressed. Techniques for removing image distortions, recovering 3-D shapes and correcting for lighting imbalances are discussed. A complete reconstruction of the tomb of Sennediem is shown.展开更多
To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in ...To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression.展开更多
To improve the performance of chaotic secure communication,three simplified chaotic systems with one variable parameter were investigated.Basic properties were analyzed including symmetry,dissipation and topological s...To improve the performance of chaotic secure communication,three simplified chaotic systems with one variable parameter were investigated.Basic properties were analyzed including symmetry,dissipation and topological structure.Complex dynamical behaviors of the systems including chaos and periodic orbits were verified by numerical simulations,Lyapunov exponents and bifurcation diagrams.Interestingly,the three systems were integrated in a common circuit,and their dynamical behaviors were easily observed by adjusting regulable resistors R28,R14 and R17,respectively,and the relations between the variable resistor and the system parameter were deduced.The circuit experiment results agree well with the simulation results.Finally,a secure communication scheme based on chaos shift keying(CSK) was presented,which lays an experiment foundation for chaotic digital secure communication.展开更多
Empirical relationship was developed to predict the fatigue life of gas metal arc welded (GMAW) cruciform joints failing from root region. High strength, age hardenable aluminium alloy of AA7075-T6 grade was used as...Empirical relationship was developed to predict the fatigue life of gas metal arc welded (GMAW) cruciform joints failing from root region. High strength, age hardenable aluminium alloy of AA7075-T6 grade was used as the base material. The design of experiments concept was used to optimize the required number of fatigue testing experiments. Fatigue experiment was conducted in a servo hydraulic controlled fatigue testing machine under constant amplitude loading. The empirical relationship was developed. By using the developed empirical relationship, the fatigue life of GMAW cruciform joints failing from root region was predicted at 95% confidence level. The effect of cruciform joint dimensions on fatigue life was discussed in detail.展开更多
Debris flow is the flow of a solid-fluid mixture and in this investigation it is treated as the flow of a continuum in routing. A numerical model is proposed describing debris flow including erosion and deposition pro...Debris flow is the flow of a solid-fluid mixture and in this investigation it is treated as the flow of a continuum in routing. A numerical model is proposed describing debris flow including erosion and deposition processes with suitable boundary con-ditions. The numerical model is applied to evaluate the effects of protection structures against debris flow caused by heavy rainfall on the Shen-Mu Stream of Nantou County located in central Taiwan. Simulation results indicated that the proposed model can offer useful pre-planning guidelines for engineers.展开更多
The Quality 4.0 concept is derived from the industrial fourth revolution,i.e.,Industry 4.0.Quality 4.0 is the future of quality,where new digital and disruptive technologies are used to maintain quality in organizatio...The Quality 4.0 concept is derived from the industrial fourth revolution,i.e.,Industry 4.0.Quality 4.0 is the future of quality,where new digital and disruptive technologies are used to maintain quality in organizations.It is also suitable for traditional Chinese medicine(TCM)to maintain quality.This quality revolution aims to improve industrial and service sectors’quality by incorporating emerging technologies to connect physical systems with the natural world.The proposed digital philosophy can update and enhance the entire TCM treatment methodology to become more effective and attractive in the current competitive structure of the pharmaceutical and clinical industries.Thus,in healthcare,this revolution empowers quality treatment during the COVID-19 pandemic.There is a major requirement in healthcare to maintain the quality of medical tools,equipment,and treatment processes during a pandemic.Digital technologies can widely be used to provide innovative products and services with excellent quality for TCM.In this paper,we discuss the significant role of Quality 4.0 and how it can be used to maintain healthcare quality and fulfill challenges during the pandemic.Additionally,we discuss 10 significant applications of Quality 4.0 in healthcare during the COVID-19 pandemic.These technologies will provide unique benefits to maintain the quality of TCM throughout the treatment process.With Quality 4.0,quality can be maintained using innovative and advanced digital technologies.展开更多
with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced ...with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality.展开更多
A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital p...A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital products in digital library, digital watermarking has been proposed as a solution to this problem. This letter describes potential situations that nonlinear theory can be used to enhance robustness and security of the watermark in digital library. Some nonlinear watermark techniques have been enumerated. Experimental results show that the proposed scheme is superior to the general watermark scheme both in security and robustness in digital library.展开更多
The current study explores how the ideological struggle is unfolded in the movie Forrest Gump (1994). Through a critical examination of the text structure of the plot and the language used by four main characters, i...The current study explores how the ideological struggle is unfolded in the movie Forrest Gump (1994). Through a critical examination of the text structure of the plot and the language used by four main characters, it demonstrates that conservatism has gained great victory over liberalism in the following way: Those with conservative values are highlighted repeatedly in a favorable way, while those who preach liberal values are frequently associated with tragic events, and ultimately, the latter all converted into conservatives in one way or another, which indicates a reconciliation between the two opposing ideologies. This study might shed light on how visual media can be geared towards political justifications, and bring audience to the level of conscious awareness of that effect展开更多
This research studies the reliability of an activated carbon permeable reactive barrier in removing cadmium from a contaminated shallow aquifer.Laboratory tests have been performed to characterize the equilibrium and ...This research studies the reliability of an activated carbon permeable reactive barrier in removing cadmium from a contaminated shallow aquifer.Laboratory tests have been performed to characterize the equilibrium and kinetic adsorption properties of the activated carbon in cadmium-containing aqueous solutions.A 2D numerical model has been used to describe pollutant transport within a groundwater and the pollutant adsorption on the permeable reactive barrier(PRB).In particular,it has been considered the case of a PAB used to protect a lake or downstream from Cd(II)contaminated groundwater.Numerical results show that the PAB can achieve a long-term efficiency by preventing lake or downstream pollution for several months.展开更多
The head-on collision process between ship and concrete pile supported protective system is simulated by software LS-DYNA. The influences of pile non-linearity and soil non-linearity on impact force, ship crush depth ...The head-on collision process between ship and concrete pile supported protective system is simulated by software LS-DYNA. The influences of pile non-linearity and soil non-linearity on impact force, ship crush depth and the cap displacement of pile supported protective system are discussed. It's shown that for both severe impact case and non-severe impact case, the non-linearity of pile material influence the impact force history, ship crush depth. The non-linearity of pile material and soil has remarkable influence on the cap displacement especially for severe impact case. These issues should not be ignored in the analysis of pile supported protective system subjected to ship impact.展开更多
Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Du...Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Due to the insecure nature of the wireless link and their dynamically changing topology, wireless ad-hoc networks require a careful and security-oriented approach for designing routing protocols. In this paper, an AODV-based secure routing protocol- ENAODV is presented. A speed-optimized digital signature algorithm is integrated into the routing protocol. The protocol algorithm is implemented with NS-2. The security of the protocol is analyzed. The simulating results show that the performances of ENAODV protocol, such as average node energy consumption, packet delay and packet delivery is nearly the same as standard AODV protocol.展开更多
文摘A new distribution principle of bus protection is presented.The protection system description,its design features,hardware structure,construction of data communication network are given.Dynamic simulation experiments show its distinguishing advantages over traditional centralized principle.
文摘From the pyramids of Giza to the tombs of Thebes at Luxor, the glorious ancient Egyptian history has produced remarkable architecture. Sadly, tourists, numbering nearly four million per year, have taken a heavy toll on many of these ancient structures. Of particular concern are many of tombs located opposite Luxor on the western bank of the Nile. Digital reconstruction of these tombs has the potential of helping to document and preserve these important historical structures. Issues concernng new and unique problems involving the photographing and digital reconstruction of these tombs are addressed. Techniques for removing image distortions, recovering 3-D shapes and correcting for lighting imbalances are discussed. A complete reconstruction of the tomb of Sennediem is shown.
文摘To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression.
基金Projects(611061006,61073187) supported by the National Nature Science Foundation of China
文摘To improve the performance of chaotic secure communication,three simplified chaotic systems with one variable parameter were investigated.Basic properties were analyzed including symmetry,dissipation and topological structure.Complex dynamical behaviors of the systems including chaos and periodic orbits were verified by numerical simulations,Lyapunov exponents and bifurcation diagrams.Interestingly,the three systems were integrated in a common circuit,and their dynamical behaviors were easily observed by adjusting regulable resistors R28,R14 and R17,respectively,and the relations between the variable resistor and the system parameter were deduced.The circuit experiment results agree well with the simulation results.Finally,a secure communication scheme based on chaos shift keying(CSK) was presented,which lays an experiment foundation for chaotic digital secure communication.
文摘Empirical relationship was developed to predict the fatigue life of gas metal arc welded (GMAW) cruciform joints failing from root region. High strength, age hardenable aluminium alloy of AA7075-T6 grade was used as the base material. The design of experiments concept was used to optimize the required number of fatigue testing experiments. Fatigue experiment was conducted in a servo hydraulic controlled fatigue testing machine under constant amplitude loading. The empirical relationship was developed. By using the developed empirical relationship, the fatigue life of GMAW cruciform joints failing from root region was predicted at 95% confidence level. The effect of cruciform joint dimensions on fatigue life was discussed in detail.
文摘Debris flow is the flow of a solid-fluid mixture and in this investigation it is treated as the flow of a continuum in routing. A numerical model is proposed describing debris flow including erosion and deposition processes with suitable boundary con-ditions. The numerical model is applied to evaluate the effects of protection structures against debris flow caused by heavy rainfall on the Shen-Mu Stream of Nantou County located in central Taiwan. Simulation results indicated that the proposed model can offer useful pre-planning guidelines for engineers.
文摘The Quality 4.0 concept is derived from the industrial fourth revolution,i.e.,Industry 4.0.Quality 4.0 is the future of quality,where new digital and disruptive technologies are used to maintain quality in organizations.It is also suitable for traditional Chinese medicine(TCM)to maintain quality.This quality revolution aims to improve industrial and service sectors’quality by incorporating emerging technologies to connect physical systems with the natural world.The proposed digital philosophy can update and enhance the entire TCM treatment methodology to become more effective and attractive in the current competitive structure of the pharmaceutical and clinical industries.Thus,in healthcare,this revolution empowers quality treatment during the COVID-19 pandemic.There is a major requirement in healthcare to maintain the quality of medical tools,equipment,and treatment processes during a pandemic.Digital technologies can widely be used to provide innovative products and services with excellent quality for TCM.In this paper,we discuss the significant role of Quality 4.0 and how it can be used to maintain healthcare quality and fulfill challenges during the pandemic.Additionally,we discuss 10 significant applications of Quality 4.0 in healthcare during the COVID-19 pandemic.These technologies will provide unique benefits to maintain the quality of TCM throughout the treatment process.With Quality 4.0,quality can be maintained using innovative and advanced digital technologies.
文摘with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality.
基金Supported in part by the National Natural Science Foundation of China (No.60072044).
文摘A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital products in digital library, digital watermarking has been proposed as a solution to this problem. This letter describes potential situations that nonlinear theory can be used to enhance robustness and security of the watermark in digital library. Some nonlinear watermark techniques have been enumerated. Experimental results show that the proposed scheme is superior to the general watermark scheme both in security and robustness in digital library.
文摘The current study explores how the ideological struggle is unfolded in the movie Forrest Gump (1994). Through a critical examination of the text structure of the plot and the language used by four main characters, it demonstrates that conservatism has gained great victory over liberalism in the following way: Those with conservative values are highlighted repeatedly in a favorable way, while those who preach liberal values are frequently associated with tragic events, and ultimately, the latter all converted into conservatives in one way or another, which indicates a reconciliation between the two opposing ideologies. This study might shed light on how visual media can be geared towards political justifications, and bring audience to the level of conscious awareness of that effect
基金Supported by Project of National Key Programof Technology R&D the11th Five-year Plan(Nos.2007BAB28B04-03,2006BAB04A09-02)China Geological Survey Program(No.2003104001)+2 种基金Jilin Province Key Project of Science and Technology(Nos.20020401,20080543)Jilin Province KeyProject of Water Resources(Nos.YN20060328,HDS20060629)NSFC Project(No.40672157)
文摘This research studies the reliability of an activated carbon permeable reactive barrier in removing cadmium from a contaminated shallow aquifer.Laboratory tests have been performed to characterize the equilibrium and kinetic adsorption properties of the activated carbon in cadmium-containing aqueous solutions.A 2D numerical model has been used to describe pollutant transport within a groundwater and the pollutant adsorption on the permeable reactive barrier(PRB).In particular,it has been considered the case of a PAB used to protect a lake or downstream from Cd(II)contaminated groundwater.Numerical results show that the PAB can achieve a long-term efficiency by preventing lake or downstream pollution for several months.
文摘The head-on collision process between ship and concrete pile supported protective system is simulated by software LS-DYNA. The influences of pile non-linearity and soil non-linearity on impact force, ship crush depth and the cap displacement of pile supported protective system are discussed. It's shown that for both severe impact case and non-severe impact case, the non-linearity of pile material influence the impact force history, ship crush depth. The non-linearity of pile material and soil has remarkable influence on the cap displacement especially for severe impact case. These issues should not be ignored in the analysis of pile supported protective system subjected to ship impact.
基金This work was supported by China Nature Science Fund .Serial No.60073059and60273078
文摘Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Due to the insecure nature of the wireless link and their dynamically changing topology, wireless ad-hoc networks require a careful and security-oriented approach for designing routing protocols. In this paper, an AODV-based secure routing protocol- ENAODV is presented. A speed-optimized digital signature algorithm is integrated into the routing protocol. The protocol algorithm is implemented with NS-2. The security of the protocol is analyzed. The simulating results show that the performances of ENAODV protocol, such as average node energy consumption, packet delay and packet delivery is nearly the same as standard AODV protocol.