Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (33)
  • Open Access

    ARTICLE

    Will Coal Price Fluctuations Affect Renewable Energy Substitution and Carbon Emission? A Computable General Equilibrium-Based Study of China

    Wenhui Zhao1, Yibo Yin1,*, Lu Mao2, Konglu Zhong3, Guanghui Yuan4, Hai Huang5, Yige Yang6

    Energy Engineering, Vol.118, No.4, pp. 1009-1026, 2021, DOI:10.32604/EE.2021.014650 - 31 May 2021

    Abstract Changes in the energy price system will determine the direction of evolution of the energy industry structure. As a country where coal is the dominant energy source, what is the effect of coal price fluctuations on China’s industry development costs and energy consumption structure? To investigate this problem, this paper utilized an economy–energy–environment computable general equilibrium model. In this study, four aspects were analyzed: Energy supply side, proportion of renewable energy consumption, macroeconomy, and changes in CO2 emissions. The results of this study show that an increase of 10%–20% in coal prices contributes to a shift More >

  • Open Access

    ERRATUM

    Erratum: Ancient Materials and Substitution Materials Used in Thai Historical Masonry Structure Preservation

    Natthanan Wonganan, Chainarong Athisakul*, Peerasit Mahasuwanchai, Weerachart Tangchirapat, Raktipong Sahamitmongkol, Sutat Leelataviwat

    Journal of Renewable Materials, Vol.9, No.10, pp. 1821-1821, 2021, DOI:10.32604/jrm.2021.017452 - 12 May 2021

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Rapid Identification of a Candidate Gene Related to Fiber Strength Using a Superior Chromosome Segment Substitution Line from Gossypium hirsutum × Gossypium barbadense via Bulked Segregant RNA-Sequencing

    Qi Zhang1,#, Pengtao Li2,#, Aiying Liu1, Shaoqi Li1, Quanwei Lu2, Qun Ge1, Junwen Li1, Wankui Gong1, Xiaoying Deng1, Haihong Shang1,3, Yuzhen Shi1,*, Youlu Yuan1,3,*

    Phyton-International Journal of Experimental Botany, Vol.90, No.3, pp. 837-858, 2021, DOI:10.32604/phyton.2021.014437 - 30 March 2021

    Abstract Cotton is the most widely cultivated commercial crop producing natural fiber around the world. As a critical trait for fiber quality, fiber strength principally determined during the secondary wall thickening period. Based on the developed BC5F3:5 CSSLs (chromosome segment substitution lines) from Gossypium hirsutum CCRI36 × G. barbadense Hai 1, the superior MBI9915 was chosen to construct the secondary segregated population BC7F2 with its recurrent parent CCRI36, which was subsequently subjected to Bulk segregant RNA-sequencing (BSR-seq) for rapid identification of candidate genes related to fiber strength. A total of 4 fiber-transcriptome libraries were separately constructed and sequenced, including… More >

  • Open Access

    ARTICLE

    Ancient Materials and Substitution Materials Used in Thai Historical Masonry Structure Preservation

    Natthanan Wonganan, Chainarong Athisakul*, Peerasit Mahasuwanchai, Weerachart Tangchirapat, Raktipong Sahamitmongkol, Sutat Leelataviwat

    Journal of Renewable Materials, Vol.9, No.2, pp. 179-204, 2021, DOI:10.32604/jrm.2021.013134 - 15 December 2020

    Abstract The historical structures of Thailand are some of the most fascinating ancient sites in Asia. Their architectures reveal past cultures, traditions, knowledge, and expertise. Masonry materials are the major materials used to construct the historical structures in Thailand. One of the essential problem of Thai historical structure preservation is a shortage of engineering properties data for the structural stability assessment. Moreover, the in-depth engineering properties and the suitable substitution materials for Thai historical preservation are rarely found. Therefore, the engineering properties of the ancient masonry materials have to be explored together with the development of… More >

  • Open Access

    ARTICLE

    Dynamic Expression Analysis and Introgressive Gene Identification of Fiber Length Using Chromosome Segment Substitution Lines from G. hirsutum × G. barbadense

    Pengtao Li1,2,#,*, Quanwei Lu1,#, Xianghui Xiao3, Rui Yang3, Xixi Duan1

    Phyton-International Journal of Experimental Botany, Vol.90, No.1, pp. 129-144, 2021, DOI:10.32604/phyton.2021.012928 - 20 November 2020

    Abstract Fiber length is a critical trait that principally determines cotton spinning quality, while Upland cotton as the most widely cultivated Gossypium species around the world subjects to the relatively ordinary fiber performance. Chromosome segment substitution lines (CSSLs) have been introduced in cotton breeding to take full advantages of superior fiber quality and high yield from Sea Island and Upland cotton, respectively, which serve as ideal materials for elucidating the genetic mechanism of complex quantitative traits. Here, three CSSLs derived from CCRI45 (G. hirsutum) × Hai1 (G. barbadense), two superior (MBI7561 and MBI7747) and one (MBI7285) with ordinary… More >

  • Open Access

    ARTICLE

    A Novel Approach of Image Steganography for Secure Communication Based on LSB Substitution Technique

    Shahid Rahman1, Fahad Masood2, Wajid Ullah Khan2, Niamat Ullah1, Fazal Qudus Khan3, Georgios Tsaramirsis3, Sadeeq Jan4, *, Majid Ashraf5

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 31-61, 2020, DOI:10.32604/cmc.2020.09186 - 20 May 2020

    Abstract Steganography aims to hide the messages from unauthorized persons for various purposes, e.g., military correspondence, financial transaction data. Securing the data during transmission is of utmost importance these days. The confidentiality, integrity, and availability of the data are at risk because of the emerging technologies and complexity in software applications, and therefore, there is a need to secure such systems and data. There are various methodologies to deal with security issues when utilizing an open system like the Internet. This research proposes a new technique in steganography within RGB shading space to achieve enhanced security… More >

  • Open Access

    ARTICLE

    Effect of Phenolation, Lignin-Type and Degree of Substitution on the Properties of Lignin-Modified Phenol-Formaldehyde Impregnation Resins: Molecular Weight Distribution, Wetting Behavior, Rheological Properties and Thermal Curing Profiles

    Marion Thébault1, Larysa Kutuzova2, Sandra Jury1, Iris Eicher1, Edith-Martha Zikulnig-Rusch1, Andreas Kandelbauer2,*

    Journal of Renewable Materials, Vol.8, No.6, pp. 603-630, 2020, DOI:10.32604/jrm.2020.09616 - 12 May 2020

    Abstract Here, the effects of substituting portions of fossil-based phenol in phenol formaldehyde resin by renewable lignin from two different sources are investigated using a factorial screening experimental design. Among the resins consumed by the wood-based industry, phenolics are one of the most important types used for impregnation, coating or gluing purposes. They are prepared by condensing phenol with formaldehyde (PF). One major use of PF is as matrix polymer for decorative laminates in exterior cladding and wet-room applications. Important requirements for such PFs are favorable flow properties (low viscosity), rapid curing behavior (high reactivity) and… More >

  • Open Access

    ARTICLE

    A Novel Approach to Steganography: Enhanced Least Significant Bit Substitution Algorithm Integrated with Self-Determining Encryption Feature

    Resul Das1,∗, Muhammet Baykara1, Gurkan Tuna2

    Computer Systems Science and Engineering, Vol.34, No.1, pp. 23-32, 2019, DOI:10.32604/csse.2019.34.023

    Abstract One of the most well-known and used algorithms for Steganography is Least Significant Bit (LSB) substitution. Although LSB has several advantages such as simplicity, efficiency, and easy-to-do implementation, it has some distinct disadvantages such as it openness to miscellaneous attacks. In this study, we aim to improve the traditional LSB algorithm by eliminating its main disadvantage, being easy to detect, and this way propose an enhanced LSB algorithm called E-LSB. We mainly aim to minimize differences which are due to encryption and image hiding steps in LSB algorithm and make it more difficult to notice… More >

  • Open Access

    ARTICLE

    Increasing Distance Increasing Bits Substitution (IDIBS) Algorithm for Implementation of VTVB Steganography

    Sahib Khan1, *, Arslan Arif1, Syed Tahir Hussain Rizvi2, Nasir Ahmad3

    CMES-Computer Modeling in Engineering & Sciences, Vol.117, No.1, pp. 1-16, 2018, DOI:10.31614/cmes.2018.04141

    Abstract Cryptography and steganography are two important and related fields of infor- mation security. But, steganography is slightly different in the sense that it hides the ex- istence of secret information from unauthorized users. It is one of the most appealing research domains, have applications like copyright protection, data integrity protection and manipulation detection. Several steganography techniques have been proposed in literature. But, in this work a new information hiding algorithm is presented. The proposed technique de-correlates frequency components of cover image using discrete cosine transform and uses the least significant bits of frequency components for… More >

  • Open Access

    ARTICLE

    Reversible Natural Language Watermarking Using Synonym Substitution and Arithmetic Coding

    Lingyun Xiang1,2, Yan Li2, Wei Hao3,*, Peng Yang4, Xiaobo Shen5

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 541-559, 2018, DOI:10.3970/cmc.2018.03510

    Abstract For protecting the copyright of a text and recovering its original content harmlessly, this paper proposes a novel reversible natural language watermarking method that combines arithmetic coding and synonym substitution operations. By analyzing relative frequencies of synonymous words, synonyms employed for carrying payload are quantized into an unbalanced and redundant binary sequence. The quantized binary sequence is compressed by adaptive binary arithmetic coding losslessly to provide a spare for accommodating additional data. Then, the compressed data appended with the watermark are embedded into the cover text via synonym substitutions in an invertible manner. On the More >

Displaying 21-30 on page 3 of 33. Per Page