Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (785)
  • Open Access

    ARTICLE

    Influence of Water and Humidity on Wood Modification with Lactic Acid

    Charlotte Grosse1,2,*, Marion Noël1, Marie-France Thévenon3, Lauri Rautkari4, Philippe Gérardin2

    Journal of Renewable Materials, Vol.6, No.3, pp. 259-269, 2018, DOI:10.7569/JRM.2017.634176

    Abstract Impregnation of dry wood with pure lactic acid oligomers (OLAs) followed by heat treatment confers promising properties to wood because of OLA's good diffusion, in-situ polymerization and persistence in cell walls. Treatment provides drastic reduction of the equilibrium moisture content, high dimensional stability and good durability. The presence of water during treatment has been evaluated. Curing of OLA impregnated dry wood in humid atmosphere leads to a strong and global degradation of the material. OLA treatment of wet wood only impacts the water leaching rate negatively. Treatment of dry wood with OLA diluted in water More >

  • Open Access

    ARTICLE

    Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing

    Zhen Yang1,2, Yongfeng Huang1,2,*, Xing Li1,2, Wenyu Wang3

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 1-17, 2018, DOI:10.3970/cmc.2018.03697

    Abstract To cope with privacy leakage caused by multimedia outsourcing and sharing, data provenance is used to analyze leaked multimedia and provide reactive accountability. Existing schemes of multimedia provenance are based on watermarking protocols. In an outsourcing scenario, existing schemes face two severe challenges: 1) when data leakage occurs, there exists a probability that data provenance results can be repudiated, in which case data provenance tracking fails; and 2) when outsourced data are shared, data encryption transfer causes key management burden outside the schemes, and privacy leakage threatens users. In this paper, we propose a novel More >

  • Open Access

    ARTICLE

    A Survey of Image Information Hiding Algorithms Based on Deep Learning

    Ruohan Meng1,2,*, Qi Cui1,2, Chengsheng Yuan1,2,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.117, No.3, pp. 425-454, 2018, DOI:10.31614/cmes.2018.04765

    Abstract With the development of data science and technology, information security has been further concerned. In order to solve privacy problems such as personal privacy being peeped and copyright being infringed, information hiding algorithms has been developed. Image information hiding is to make use of the redundancy of the cover image to hide secret information in it. Ensuring that the stego image cannot be distinguished from the cover image, and sending secret information to receiver through the transmission of the stego image. At present, the model based on deep learning is also widely applied to the More >

  • Open Access

    ARTICLE

    Numerical Simulation of High Speed Rotating Waterjet Flow Field in a Semi Enclosed Vacuum Chamber

    Haojun Peng1,*, Ping Zhang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.114, No.1, pp. 59-73, 2018, DOI:10.3970/cmes.2018.114.059

    Abstract In this paper, a three dimension model is built according to real surface cleaner in airport runway rubber mark cleaning vehicle and numerical simulation of this model is carried out using Ansys Fluent software. After comparison and analysis the flow field between high speed rotating waterjet and static waterjet formerly studied by other researchers, the influences of different standoff distance from nozzle outlet to runway surface and rotation speed on rubber mark cleaning effect is simulated and analyzed. Results show the optimal operation parameters for the simulated model and quantitative advices are given for design, More >

  • Open Access

    ARTICLE

    Recent Developments About IPMCs (Ionic Polymer-Metal) Composites: A Review of Performances for Different Conditions

    Wenqi Zhang1, Yunqing Gu1,*, Jiegang Mou1

    FDMP-Fluid Dynamics & Materials Processing, Vol.14, No.4, pp. 243-258, 2018, DOI:10.32604/fdmp.2018.03836

    Abstract It is of great significance for the production of micro robots and new sensors to develop actuators with “muscle” properties. As a kind of electroactive polymers (EAPs), IPMC (ionic polymer-metal composite) can exhibit significant deformation for very low electrical excitation. These composites, known as the “artificial muscle”, can be regarded as intelligent bionic materials. With regard to the mechanism of deformation of IPMC, a large number of experimental studies have proved that the variety of electrodes and water contents relating to IPMC have great influence on its electro-mechanical and mechanical properties. Recent research results about… More >

  • Open Access

    ARTICLE

    Experimental and Theoretical Analysis of a Novel Cascade Solar Desalination Still

    M. Bouzaid1,*, O. Ansari1, M. Taha-Janan1, M. Oubrek1

    FDMP-Fluid Dynamics & Materials Processing, Vol.14, No.3, pp. 177-200, 2018, DOI:10.3970/fdmp.2018.00330

    Abstract Ocean water is characterized by very high salinity, which generally makes it unsuitable for human or animal's needs. The production of potable water from the ocean, therefore, requires a desalination process, which is often regarded as the crucial limitation to overcome towards widespread use of ocean water as the primary source of water for human consumption. In this study, we analyze both experimentally and theoretically the thermal performances and productivity of a solar still based on a novel form of absorber plate. The related system of energy equations consists of five heat exchange relationships in More >

  • Open Access

    ARTICLE

    Symmetric Learning Data Augmentation Model for Underwater Target Noise Data Expansion

    Ming He1,2, Hongbin Wang1,*, Lianke Zhou1, Pengming Wang3, Andrew Ju4

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 521-532, 2018, DOI:10.32604/cmc.2018.03710

    Abstract An important issue for deep learning models is the acquisition of training of data. Without abundant data from a real production environment for training, deep learning models would not be as widely used as they are today. However, the cost of obtaining abundant real-world environment is high, especially for underwater environments. It is more straightforward to simulate data that is closed to that from real environment. In this paper, a simple and easy symmetric learning data augmentation model (SLDAM) is proposed for underwater target radiate-noise data expansion and generation. The SLDAM, taking the optimal classifier… More >

  • Open Access

    ARTICLE

    Self-embedding Image Watermarking based on Combined Decision Using Pre-offset and Post-offset Blocks

    Daofu Gong1,2, Yan Chen1,2, Haoyu Lu1,*, Zhenyu Li3, Yibing Han1

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 243-260, 2018, DOI:10.32604/cmc.2018.03781

    Abstract To detect and recover random tampering areas, a combined-decision-based self-embedding watermarking scheme is proposed herein. In this scheme, the image is first partitioned into 2×2 size blocks. Next, the high 5 bits of a block’s average value is embedded into its offset block. The tampering type of block is detected by comparing the watermarks of its pre-offset and post-offset blocks. The theoretical analysis and experiments demonstrate that the proposed scheme not only has a lower ratio of false detection but also better performance with regard to avoiding random tampering. More >

  • Open Access

    ARTICLE

    Embedding Image Through Generated Intermediate Medium Using Deep Convolutional Generative Adversarial Network

    Chuanlong Li1,2,*, Yumeng Jiang3, Marta Cheslyar1

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 313-324, 2018, DOI:10.3970/cmc.2018.03950

    Abstract Deep neural network has proven to be very effective in computer vision fields. Deep convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of traditional image processing methods. Generative adversarial network (GAN) is becoming one of the highlights among these deep neural networks. GAN is capable of generating realistic images which are imperceptible to the human vision system so that the generated images can be directly used as intermediate medium for many tasks. One promising application of using GAN generated images would be image concealing which… More >

  • Open Access

    ARTICLE

    Reversible Natural Language Watermarking Using Synonym Substitution and Arithmetic Coding

    Lingyun Xiang1,2, Yan Li2, Wei Hao3,*, Peng Yang4, Xiaobo Shen5

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 541-559, 2018, DOI:10.3970/cmc.2018.03510

    Abstract For protecting the copyright of a text and recovering its original content harmlessly, this paper proposes a novel reversible natural language watermarking method that combines arithmetic coding and synonym substitution operations. By analyzing relative frequencies of synonymous words, synonyms employed for carrying payload are quantized into an unbalanced and redundant binary sequence. The quantized binary sequence is compressed by adaptive binary arithmetic coding losslessly to provide a spare for accommodating additional data. Then, the compressed data appended with the watermark are embedded into the cover text via synonym substitutions in an invertible manner. On the More >

Displaying 651-660 on page 66 of 785. Per Page