Skip to main content

previous disabled Page of 2
and
  1. No Access

    Book

  2. No Access

    Chapter

    Introduction and Background of Fiber-Reinforced Composite Materials

    In this chapter, a general introduction and background information pertinent to the manufacturing of fiber-reinforced composite materials is provided outlining the general analysis and properties of these type...

    Shuncong Zhong, Walter Nsengiyumva in Nondestructive Testing and Evaluation of F… (2022)

  3. No Access

    Chapter

    Visual Testing for Fiber-Reinforced Composite Materials

    In general, visual testing (VT) of fiber-reinforced composite structures (FRCS) is very important not only as an NDT technique in itself but also as a supplementary tool to any other instrumented NDT for the i...

    Shuncong Zhong, Walter Nsengiyumva in Nondestructive Testing and Evaluation of F… (2022)

  4. No Access

    Chapter

    Infrared Thermography Testing and Evaluation of Fiber-Reinforced Composite Materials

    Infrared thermography (IRT) aims at the detection of surface or subsurface features of composite materials (e.g., fiber misalignments, voids, slag inclusions, etc.), based on temperature differences on the tes...

    Shuncong Zhong, Walter Nsengiyumva in Nondestructive Testing and Evaluation of F… (2022)

  5. No Access

    Chapter

    Application of Acoustic Emission for the Inspection of Fiber-Reinforced Composite Materials

    Although the application of acoustic emission (AE) to the inspection of fiber-reinforced composite materials is highly beneficial due to its effectiveness in providing information about the incipient initiatio...

    Shuncong Zhong, Walter Nsengiyumva in Nondestructive Testing and Evaluation of F… (2022)

  6. No Access

    Chapter

    Conclusions, Current Developments, and Prospects in the NDT of Fiber-Reinforced Composites

    In recent years, composite materials have gained popularity in numerous high-tech and engineering applications, owing to their outstanding physico-mechanical properties. They were initially used as fairings/re...

    Shuncong Zhong, Walter Nsengiyumva in Nondestructive Testing and Evaluation of F… (2022)

  7. No Access

    Chapter

    Introduction to Nondestructive Testing and Evaluation of Fiber-Reinforced Composites

    This chapter discussed the different approaches used for the evaluation of the health status of composite materials using nondestructive testing and evaluation (NDT&E) techniques. The discussion started with t...

    Shuncong Zhong, Walter Nsengiyumva in Nondestructive Testing and Evaluation of F… (2022)

  8. No Access

    Chapter

    Ultrasonic Testing Techniques for Nondestructive Evaluation of Fiber-Reinforced Composite Structures

    The recent years have been characterized by significant breakthroughs in the development and utilization of ultrasonic-based NDT techniques for the detection and characterization of various types of flaws in a...

    Shuncong Zhong, Walter Nsengiyumva in Nondestructive Testing and Evaluation of F… (2022)

  9. No Access

    Chapter

    Terahertz Testing Technique for Fiber-Reinforced Composite Materials

    Terahertz (THz) systems constitute an effective tool for the NDT&E community for the testing and characterization of fiber-reinforced composite materials. However, their systems are still very complicated and ...

    Shuncong Zhong, Walter Nsengiyumva in Nondestructive Testing and Evaluation of F… (2022)

  10. No Access

    Chapter

    Other NDT Methods for Fiber-Reinforced Composite Structures

    To respond to the constantly growing utilization and complexity of fiber-reinforced composite materials, robust and reliable NDT techniques are constantly being developed. However, there have been no clear ins...

    Shuncong Zhong, Walter Nsengiyumva in Nondestructive Testing and Evaluation of F… (2022)

  11. No Access

    Chapter and Conference Paper

    Design of Quaternary Logic Circuits Based on Multiple-Valued Current Mode

    In order to improve the performance of arithmetic VLSI system, a novel structure of quaternary logic gates is proposed based on multiple-valued current mode (MVCM) by using dynamic source-coupled logic (SCL). ...

    Haixia Wu, Shunan Zhong, Qilong Cai in Electrical, Information Engineering and Me… (2012)

  12. No Access

    Article

    Extraction of color-intensity feature towards image authentication

    A color-intensity feature extraction method is proposed aimed at supplementing conventional image hashing algorithms that only consider intensity of the image. An image is mapped to a set of blocks represented...

    Ting-ting Liu 刘婷婷, Shuo-zhong Wang 王朔中 in Journal of Shanghai University (English Ed… (2010)

  13. No Access

    Article

    Parallel computation of unified finite-difference time-domain for underwater sound scattering

    In this work, we treat scattering objects, water, surface and bottom in a truly unified manner in a parallel finite-difference time-domain (FDTD) scheme, which is suitable for distributed parallel computing in...

    Yu-tian Feng 冯玉田, Shuo-zhong Wang 王朔中 in Journal of Shanghai University (English Edition) (2008)

  14. No Access

    Article

    Layered image inpainting based on image decomposition

    We propose a layered image inpainting scheme based on image decomposition. The damaged image is first decomposed into three layers: cartoon, edge, and texture. The cartoon and edge layers are repaired using an...

    Shrestha Kedar, Chuan Qin 秦川 in Journal of Shanghai University (English Ed… (2007)

  15. No Access

    Article

    Recent development of perceptual image hashing

    The easy generation, storage, transmission and reproduction of digital images have caused serious abuse and security problems. Assurance of the rightful ownership, integrity, and authenticity is a major concer...

    Wang Shuo-zhong PhD 王朔中, Zhang **n-peng 张新鹏 in Journal of Shanghai University (English Ed… (2007)

  16. No Access

    Article

    Steganography in binary image by checking data-carrying eligibility of boundary pixels

    We present a novel scheme for embedding secret data into a binary image without introducing noticeable artifacts. Unlike some block-based methods, the proposed scheme encodes the secret bits directly into boun...

    Guang-lan Liang 梁光岚, Shuo-zhong Wang 王朔中 in Journal of Shanghai University (English Ed… (2007)

  17. No Access

    Article

    Image block feature vectors based on a singular-value information metric and color-texture description

    In this work, image feature vectors are formed for blocks containing sufficient information, which are selected using a singular-value criterion. When the ratio between the first two SVs are below a given thre...

    Shuo-zhong Wang 王朔中, **ng Lu 路兴 in Journal of Shanghai University (English Ed… (2007)

  18. No Access

    Article

    Electrical impedance tomography using adaptive mesh refinement

    In electrical impedance tomography (EFT), distribution of the internal resistivity or conductivity of an unknown object is estimated using measured boundary voltage data induced by different current patterns w...

    Pei-min Yan Ph. D., Shuo-zhong Wang Ph. D. in Journal of Shanghai University (English Ed… (2006)

  19. No Access

    Article

    Undercover communication using image and text as disguise and countermeasures

    A brief survey of some representative techniques of steganography and steganalysis is presented. Various methods developed in the authors’ laboratory are introduced, including symmetric LSB embedding, secure s...

    Shuo-zhong Wang Ph. D., Chao Chen in Journal of Shanghai University (English Ed… (2006)

  20. No Access

    Article

    Spatial domain technique for visible watermarking

    A new technique for embedding visible watermarks into a digital image is described in this paper, which uses statistical properties of each pixel and its immediate surrounding pixels in the host image, and als...

    Peter Adjei Fordjour, Shuo-Zhong Wang Ph. D. in Journal of Shanghai University (English Ed… (2003)

previous disabled Page of 2