Searched for: +
(1 - 20 of 38)

Pages

document
Li, Hai-Tao (author), Wang, Qi-bin (author), Zong, Zhi (author), Sun, Lei (author), Liang, Hui (author)
journal article 2014
document
Koster, Randal D. (author), Betts, Alan K. (author), Dirmeyer, Paul A. (author), Bierkens, Marc (author), Bennett, Katrina E. (author), Déry, Stephen J. (author), Evans, Jason P. (author), Fu, Rong (author), Hernandez, Felipe (author), Ruby Leung, L. (author), Liang, Xu (author), Masood, Muhammad (author), Savenije, Hubert (author), Wang, Guiling (author), Yuan, Xing (author)
Recent research in large-scale hydroclimatic variability is surveyed, focusing on five topics: (i) variability in general, (ii) droughts, (iii) floods, (iv) land-atmosphere coupling, and (v) hydroclimatic prediction. Each surveyed topic is supplemented by illustrative examples of recent research, as presented at a 2016 symposium honoring the...
journal article 2017
document
Liu, Jikai (author), Gaynor, Andrew T. (author), Chen, Shikui (author), Kang, Zhan (author), Suresh, Krishnan (author), Takezawa, Akihiro (author), Li, Lei (author), Kato, Junji (author), Tang, Jinyuan (author), Wang, C.C. (author), Cheng, Lin (author), Liang, Xuan (author), To, Albert. C. (author)
Manufacturing-oriented topology optimization has been extensively studied the past two decades, in particular for the conventional manufacturing methods, for example, machining and injection molding or casting. Both design and manufacturing engineers have benefited from these efforts because of the close-to-optimal and friendly-to-manufacture...
journal article 2018
document
Liang, Xinlian (author), Hyyppä, Juha (author), Kaartinen, Harri (author), Lehtomäki, Matti (author), Pyörälä, Jiri (author), Pfeifer, Norbert (author), Holopainen, Markus (author), Wang, Di (author), Wang, J. (author)
The last two decades have witnessed increasing awareness of the potential of terrestrial laser scanning (TLS) in forest applications in both public and commercial sectors, along with tremendous research efforts and progress. It is time to inspect the achievements of and the remaining barriers to TLS-based forest investigations, so further...
journal article 2018
document
Zhang, Weizhao (author), Bostanabad, Ramin (author), Liang, Biao (author), Su, Xuming (author), Zeng, Danielle (author), Bessa, M.A. (author), Wang, Yanchao (author), Chen, Wei (author), Cao, Jian (author)
Carbon fiber reinforced plastics (CFRPs) are attracting growing attention in industry because of their enhanced properties. Preforming of thermoset carbon fiber prepregs is one of the most common production techniques of CFRPs. To simulate preforming, several computational methods have been developed. Most of these methods, however, obtain...
journal article 2019
document
Liang, Hongqin (author), Liu, Pengfei (author), Wang, Tianlong (author), Wang, Haoyu (author), Zhang, Kailong (author), Cao, Yunqiang (author), An, Dong (author)
For a heavy-haul locomotive within a wheel repairing period, wheel polygonal wear with different operating mileages is obtained by field testing. The test results show that the maximum radial runout of the wheel can increase to 0.87 mm and accompany with the typical damage of wheel tread shelling. Taking the wheel polygons as input excitation...
journal article 2020
document
Yao, X. (author), Yang, Shizhao (author), Dong, H. (author), Wu, Shuang (author), Liang, X. (author), Wang, Wenlong (author)
Ferric-rich calcium sulfoaluminate (FR-CSA) cement is an eco-friendly cement. Fe<sub>2</sub>O<sub>3</sub> exists in different minerals of FR-CSA clinker, e.g., Ca<sub>4</sub>Al<sub>2</sub>Fe<sub>2</sub>O<sub>10</sub> (C<sub>4</sub>AF), Ca<sub>2</sub>Fe<sub>2</sub>O<sub>5</sub> (C<sub>2</sub>F), and Ca<sub>4</sub>Al<sub>6-2</sub><sub>x</sub>Fe...
journal article 2020
document
Lu, Jieyu (author), Qiu, Yubao (author), Wang, Xingxing (author), Liang, Wenshan (author), Xie, Pengfei (author), Shi, Lijuan (author), Menenti, M. (author), Zhang, Dongshui (author)
The High Mountain Asia (HMA) region, ranging from the Hindu Kush and Tien Shan in the west to the Himalaya in the south with an altitude between 2000 and 8844 m, holds the largest reservoir of glaciers and snow outside Earth Polar Regions. In the last decades, numerous glaciers and lake areas there have undergone tremendous changes with water...
journal article 2020
document
Liang, Danni (author), de Jong, Martin (author), Schraven, D.F.J. (author), Wang, Lili (author)
Many local governments engaging in sustainable urban development also have a growing interest in becoming inclusive too, brand themselves as such and develop policies to become inclusive cities. However, knowing what exactly this entails and how it can be achieved is not always quite straightforward and requires thorough theoretical and...
journal article 2021
document
Li, Wenting (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)
Multi-factor authentication (MFA) has been widely used to safeguard high-value assets. Unlike single-factor authentication (e.g., password-only login), t-factor authentication (tFA) requires a user always to carry and present t specified factors so as to strengthen the security of login. Nevertheless, this may restrict user experience in...
journal article 2021
document
Tjiam, Kevin (author), Wang, R. (author), Chen, H. (author), Liang, K. (author)
Smart contracts on Ethereum enable billions of dollars to be transacted in a decentralized, transparent and trustless environment. However, adversaries lie await in the Dark Forest, waiting to exploit any and all smart contract vulnerabilities in order to extract profits from unsuspecting victims in this new financial system. As the...
conference paper 2021
document
Xu, Peng (author), Susilo, Willy (author), Wang, Wei (author), Chen, Tianyang (author), Wu, Qianhong (author), Liang, K. (author), Jin, Hai (author)
Dynamic searchable symmetric encryption (DSSE) has been widely recognized as a promising technique to delegate update and search queries over an outsourced database to an untrusted server while guaranteeing the privacy of data. Many efforts on DSSE have been devoted to obtaining a good tradeoff between security and performance. However, it...
journal article 2022
document
Ma, Yunjian (author), Liang, Hongjing (author), Zhao, Zexin (author), Wu, Bin (author), Lan, Dongming (author), Hollmann, F. (author), Wang, Yonghua (author)
Unspecific peroxygenases (UPOs, EC 1.11.2.1) are promising oxyfunctionalization catalysts because of their unique stereoselectivity. However, so far only a few UPOs have been reported. In this study, gene mining was used to identify a gene from Galerina marginata that coded for a novel UPO (GmaUPO). GmaUPO was expressed in Pichia pastoris X...
journal article 2022
document
Zhang, Jianguo (author), Jiang, Zaixing (author), Liang, Chao (author), Baars, T.F. (author), Wang, Y. (author), Abels, H.A. (author)
The middle Eocene Dongying sag in the Bohai Bay Basin of China has an estimated shale oil resource of approximately 1.1 billion t (8.06 billion bbl); flows of shale oil have been produced in the succession from tens of wells, where the daily production of a single well generally varies between 10 and 100 t (73.3–733 bbl). Therein, the mudrock...
journal article 2022
document
Xie, Jiahong (author), Cheng, Haibo (author), Zhu, Rong (author), Wang, Ping (author), Liang, K. (author)
To date there are few researches on the semantic information of passwords, which leaves a gap preventing us from fully understanding the passwords characteristic and security. We propose a new password probability model for semantic information based on Markov Chain with both generalization and accuracy, called WordMarkov, that can capture the...
conference paper 2022
document
Wang, Xingkai (author), Cao, Zhenfu (author), LIU, Z. (author), Liang, K. (author)
Gordon et al. (TCC 2015) systematically studied the security of Multi-client Verifiable Computation (MVC), in which a set of computationally-weak clients outsource the computation of a general function f over their private inputs to an untrusted server. They introduced the universally composable (UC) security of MVC and proposed a scheme...
conference paper 2022
document
Zheng, Yubo (author), Xu, Peng (author), Wang, Wei (author), Chen, Tianyang (author), Susilo, Willy (author), Liang, K. (author), Jin, Hai (author)
Many practical secure systems have been designed to prevent real-world attacks via maximizing the attacking cost so as to reduce attack intentions. Inspired by this philosophy, we propose a new concept named delay encryption with keyword search (DEKS) to resist the notorious keyword guessing attack (KGA), in the context of secure cloud-based...
conference paper 2022
document
Zhao, Zhendong (author), Chen, Xiaojun (author), Xuan, Yuexin (author), Dong, Ye (author), Wang, Dakui (author), Liang, K. (author)
Backdoor attack is a type of serious security threat to deep learning models. An adversary can provide users with a model trained on poisoned data to manipulate prediction behavior in test stage using a backdoor. The backdoored models behave normally on clean images, yet can be activated and output incorrect prediction if the input is stamped...
conference paper 2022
document
He, Xiaoxi (author), Cheng, Haibo (author), Xie, Jiahong (author), Wang, Ping (author), Liang, K. (author)
Passwords have been widely used in online authentication, and they form the front line that protects our data security and privacy. But the security of password may be easily harmed by insecure password generator. Massive reports state that users are always keen to generate new passwords by reusing or fine-tuning old secrets. Once an old...
conference paper 2022
document
Liang, Yansong (author), Wang, Ruizhi (author), Chen, Zhongsheng (author), Du, S. (author)
This paper presents a boost converter for thermo-electric energy harvesting with photovoltaic (PV)-assisted startup. The converter employs a new two-phase startup architecture and the PV cell is used in the first phase to provide an initial high voltage for startup. This high voltage drives the boost converter to charge a startup capacitor,...
conference paper 2022
Searched for: +
(1 - 20 of 38)

Pages