Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (24)
  • Open Access

    ARTICLE

    Effect of Phenolation, Lignin-Type and Degree of Substitution on the Properties of Lignin-Modified Phenol-Formaldehyde Impregnation Resins: Molecular Weight Distribution, Wetting Behavior, Rheological Properties and Thermal Curing Profiles

    Marion Thébault1, Larysa Kutuzova2, Sandra Jury1, Iris Eicher1, Edith-Martha Zikulnig-Rusch1, Andreas Kandelbauer2,*

    Journal of Renewable Materials, Vol.8, No.6, pp. 603-630, 2020, DOI:10.32604/jrm.2020.09616

    Abstract Here, the effects of substituting portions of fossil-based phenol in phenol formaldehyde resin by renewable lignin from two different sources are investigated using a factorial screening experimental design. Among the resins consumed by the wood-based industry, phenolics are one of the most important types used for impregnation, coating or gluing purposes. They are prepared by condensing phenol with formaldehyde (PF). One major use of PF is as matrix polymer for decorative laminates in exterior cladding and wet-room applications. Important requirements for such PFs are favorable flow properties (low viscosity), rapid curing behavior (high reactivity) and sufficient self-adhesion capacity (high residual… More >

  • Open Access

    ARTICLE

    Increasing Distance Increasing Bits Substitution (IDIBS) Algorithm for Implementation of VTVB Steganography

    Sahib Khan1, *, Arslan Arif1, Syed Tahir Hussain Rizvi2, Nasir Ahmad3

    CMES-Computer Modeling in Engineering & Sciences, Vol.117, No.1, pp. 1-16, 2018, DOI:10.31614/cmes.2018.04141

    Abstract Cryptography and steganography are two important and related fields of infor- mation security. But, steganography is slightly different in the sense that it hides the ex- istence of secret information from unauthorized users. It is one of the most appealing research domains, have applications like copyright protection, data integrity protection and manipulation detection. Several steganography techniques have been proposed in literature. But, in this work a new information hiding algorithm is presented. The proposed technique de-correlates frequency components of cover image using discrete cosine transform and uses the least significant bits of frequency components for hiding secret information. The tech-nique… More >

  • Open Access

    ARTICLE

    Comparative effectiveness of two nitrogen sources for corn fertilization

    Copperi MZ1, ME M,olesi2, MA Cantamutto2, MM Ron2

    Phyton-International Journal of Experimental Botany, Vol.82, pp. 99-106, 2013, DOI:10.32604/phyton.2013.82.099

    Abstract Corn has not only a high growth potential and a great capacity of biological response to suitable crop management but also may contribute to a better match of crops with environmental offer in Argentina. Nitrogen (N) fertilization must make provision for eventual N losses, and fertilization strategies must be designed so as to minimize their global incidence. The different quick-release N sources show similar efficiencies when they are incorporated, but in surface applications, sources that contain little or no amidic N have a better performance than urea (U). The objective of this paper was to make an evaluation of corn… More >

  • Open Access

    ARTICLE

    Reversible Natural Language Watermarking Using Synonym Substitution and Arithmetic Coding

    Lingyun Xiang1,2, Yan Li2, Wei Hao3,*, Peng Yang4, Xiaobo Shen5

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 541-559, 2018, DOI: 10.3970/cmc.2018.03510

    Abstract For protecting the copyright of a text and recovering its original content harmlessly, this paper proposes a novel reversible natural language watermarking method that combines arithmetic coding and synonym substitution operations. By analyzing relative frequencies of synonymous words, synonyms employed for carrying payload are quantized into an unbalanced and redundant binary sequence. The quantized binary sequence is compressed by adaptive binary arithmetic coding losslessly to provide a spare for accommodating additional data. Then, the compressed data appended with the watermark are embedded into the cover text via synonym substitutions in an invertible manner. On the receiver side, the watermark and… More >

Displaying 21-30 on page 3 of 24. Per Page