Skip to main content

and
  1. No Access

    Article

    The study on the estimation of vehicles speed using a dashboard camera

    Mobile and handheld electronic products such as smartphones and dashboard cameras are frequently used to record occurrences of traffic accidents nowadays. Most existing studies require at least one entire lane...

    Wen-Chao Yang, Jiajun Jiang, Austin Mao, Kai-An Su in Multimedia Tools and Applications (2024)

  2. No Access

    Article

    Oxidation and internal nitridation behaviors of a Ni-based superalloy Rene 65 during high-temperature homogenization

    Homogenization heat treatment is a key process to remove the micro-segregation and re-dissolve the undesired phases for wrought superalloy. The oxidation behavior of the wrought superalloy during the high-temp...

    **an-guang Zhang, Jia-jun Chen, Yang Zhou in Journal of Iron and Steel Research Interna… (2023)

  3. No Access

    Article

    Effects of Cu and In on the microstructure evolution and mechanical properties of Sn-20Bi/Cu solder joints

    The effects of Cu and In additives on the tensile strength, interfacial reaction, and shear strength of the Sn-20Bi solder system are investigated. The Sn-20Bi-xCu-yIn (x = 0.3, 0.5 wt.%, y = 1, 2, 3 wt.%) all...

    Da Qi, Wen chao Yang, Hong Zhao, Lei Zhang in Journal of Materials Science: Materials in… (2023)

  4. No Access

    Article

    Role of radiative and convective heat transfer during heating of an ingot product in a tubular furnace: experiment and simulation

    Convective heat transfer and radiative heat transfer are two essential heat transfer modes in the heating process of steel; it is important to understand the role of them during the heating process clearly. Th...

    Wen-chao Yang, Yang Zhou, Jian Zhang in Journal of Iron and Steel Research Interna… (2022)

  5. No Access

    Article

    A fast source camera identification and verification method based on PRNU analysis for use in video forensic investigations

    Due to the rapid development of digital and cloud technologies, everyone can easily shoot and spread digital videos via email or social media. However, it is difficult for law enforcement to trace the origin o...

    Wen-Chao Yang, Jiajun Jiang, Chung-Hao Chen in Multimedia Tools and Applications (2021)

  6. No Access

    Article

    Photoacoustic imaging-guided chemo-photothermal combinational therapy based on emissive Pt(II) metallacycle-loaded biomimic melanin dots

    Pt(II)-based metallacycles, as an important family of supramolecular coordination complexes (SCCs), have exhibited excellent antitumor activity at the cell level. However, the biomedical applications of Pt(II)...

    Chonglu Li, Pei-Pei Jia, Yu-Ling Xu, Feng Ding, Wen-Chao Yang in Science China Chemistry (2021)

  7. No Access

    Article

    The assembly of succinate dehydrogenase: a key enzyme in bioenergetics

    Succinate dehydrogenase (SDH) also known as complex II or succinate:quinone oxidoreductase is an enzyme involved in both oxidative phosphorylation and tricarboxylic acid cycle; the processes that generate ener...

    Behrooz Moosavi, Edward A. Berry, **ao-Lei Zhu in Cellular and Molecular Life Sciences (2019)

  8. No Access

    Article

    Microstructural Characteristics and Mechanical Behavior of Spark Plasma-Sintered Cu–Cr–rGO Copper Matrix Composites

    Copper matrix composites were prepared through spark plasma sintering (SPS) process, mixing fixed amount of reduced graphene oxide (rGO) with the different amounts of Cr. In the sintered bulk composites, the l...

    **n-Jiang Zhang, Zhong-Kui Dai, Xue-Ran Liu in Acta Metallurgica Sinica (English Letters) (2018)

  9. No Access

    Article

    Reversible DCT-based data hiding in stereo images

    Stereo images captured from a pair of CCDs simultaneously are widely used to create the illusion of 3D depth. Each pair of stereo images has many similar block pairs. In this paper, a novel reversible data hid...

    Wen-Chao Yang, Ling-Hwei Chen in Multimedia Tools and Applications (2015)

  10. No Access

    Article

    A steganographic method via various animations in PowerPoint files

    In a PowerPoint file, animation effects are used to emphasize objects, timing effects are used to control the presentation time, and slide transition effects are used to highlight particular slides. Thus, usin...

    Wen-Chao Yang, Ling-Hwei Chen in Multimedia Tools and Applications (2015)

  11. No Access

    Article

    Design of a low-alloy high-strength and high-toughness martensitic steel

    To develop a high strength low alloy (HSLA) steel with high strength and high toughness, a series of martensitic steels were studied through alloying with various elements and thermodynamic simulation. The mic...

    Yan-jun Zhao, Xue-** Ren, Wen-chao Yang in International Journal of Minerals, Metallu… (2013)

  12. No Access

    Article

    A visualization study of the near-wall behaviors of an oblique plate at different angles of attack

    A combined method of oil flow visualization and smoke visualization with a laser sheet was conducted on an oblique plate with 64° sweep under different angles of attack. The oil flow visualization results reve...

    Yun Liu, Wen Chao Yang, Ji Ming Yang in Journal of Visualization (2011)

  13. No Access

    Article

    Computational simulations of structural role of the active-site W374C mutation of acetyl-coenzyme-A carboxylase: Multi-drug resistance mechanism

    Herbicides targeting grass plastidic acetyl-CoA carboxylase (ACCase, EC 6.4.1.2) are selectively effective against graminicides. The intensive worldwide use of this herbicide family has selected for resistance...

    **ao-Lei Zhu, Wen-Chao Yang, Ning-** Yu, Sheng-Gang Yang in Journal of Molecular Modeling (2011)

  14. No Access

    Chapter and Conference Paper

    Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence

    The traditional verifying evidence method in court is to check the integrity of the chain of custody of evidence. However, since the digital image can be easily transferred by Internet, it is not easy for us t...

    Wen-Chao Yang, Che-Yen Wen, Chung-Hao Chen in Intelligence and Security Informatics (2008)