Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Digital image watermarking based on discrete wavelet transform

    This paper aims at digital watermark which is a new popular research topic recently, presents some methods to embed digital watermark based on modifying frequency coefficients in discrete wavelet transform (DW...

    Wei Ding, Weiqi Yan, Dongxu Qi in Journal of Computer Science and Technology (2002)

  2. No Access

    Article

    Inhibition of proliferation of osteosarcoma by nano calcium phosphates: potential hard tissue repair after tumor extraction

    Spherical-or cylindrical-shaped nanosized calcium phosphate particles are considered as an integral part of biological hard tissues such as bone and tooth enamel. The size effects of these nanoparticles were e...

    Qinghong Hu, Yurong Cai, Zhongli Shi, Weiqi Yan in Frontiers of Materials Science in China (2007)

  3. No Access

    Article

    In vitro bioactivity and osteoblast-like cell test of zinc containing fluoridated hydroxyapatite films

    Zinc containing fluoridated hydroxyapatite (ZnFHA) films on Ti6Al4V substrates was prepared using sol–gel dip-coating method. The release of zinc ions from ZnFHA film was controlled mainly by the zinc content ...

    Shundong Miao, Wenjian Weng, Kui Cheng in Journal of Materials Science: Materials in… (2007)

  4. No Access

    Article

    Stimulating effect of silica-containing nanospheres on proliferation of osteoblast-like cells

    Silica and silica-based materials have been found widespread application for medical purposes, especially in the fields of bone tissue engineer. Nano-sized silica has been developed too and been considered to ...

    Jie Feng, Weiqi Yan, Zhongru Gou in Journal of Materials Science: Materials in… (2007)

  5. No Access

    Chapter

    Finite Element Modelling in Implant Dentistry

    The use of numerical methods such as FEA has been adopted in solving complicated geometric problems, for which it is very difficult to achieve an analytical solution. FEA is a technique for obtaining a solutio...

    Jian** Geng, Weiqi Yan, Wei Xu in Application of the Finite Element Method i… (2008)

  6. No Access

    Chapter

    Applications to Implant Dentistry

    Although the precise mechanisms are not fully understood, it is clear that there is an adaptive remodelling response of surrounding bone to stresses. Implant features causing excessive high or low stresses can...

    Jian** Geng, Wei Xu, Keson B. C. Tan in Application of the Finite Element Method i… (2008)

  7. Article

    Open Access

    Improved outcomes from the administration of progesterone for patients with acute severe traumatic brain injury: a randomized controlled trial

    Severe traumatic brain injury (TBI) has been increasing with greater incidence of injuries from traffic or sporting accidents. Although there are a number of animal models of TBI using progesterone for head in...

    Guomin **ao, **g Wei, Weiqi Yan, Weimin Wang, Zhenhui Lu in Critical Care (2008)

  8. No Access

    Chapter and Conference Paper

    Digital Image Splicing Using Edges

    In this paper we splice together an image which has been split up on a piece of paper by using duplication detection. The nearest pieces are connected using edge searching and matching. For the pieces that hav...

    Raymond Lau, Jonathan Weir, WeiQi Yan in Advances in Multimedia Information Process… (2009)

  9. No Access

    Chapter and Conference Paper

    Palmprint Recognition Based on Subspace Analysis of Gabor Filter Bank

    This paper introduces a new technique for palmprint recognition based on Fisher Linear Discriminant Analysis (FLDA) of Gabor filter bank. This method involves convolving a palmprint image with a bank of Gabor ...

    Moussadek Laadjel, Fatih Kurugollu in Advances in Multimedia Information Process… (2009)

  10. No Access

    Chapter

    Partial Palmprint Matching Using Invariant Local Minutiae Descriptors

    In forensic investigations, it is common for forensic investigators to obtain a photograph of evidence left at the scene of crimes to aid them catch the culprit(s). Although, fingerprints are the most popular ...

    Moussadek Laadjel, Ahmed Bouridane in Transactions on Data Hiding and Multimedia… (2010)

  11. No Access

    Chapter

    A Comprehensive Study of Visual Cryptography

    Visual cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. VC takes a binary image (the secret) and divides i...

    Jonathan Weir, WeiQi Yan in Transactions on Data Hiding and Multimedia Security V (2010)

  12. No Access

    Chapter

    Secure Masks for Visual Cryptography

    Visual cryptography provides a very powerful technique by which one secret can be distributed into two or more pieces known as shares. When the shares are printed on transparencies and then superimposed exactl...

    Jonathan Weir, WeiQi Yan in Transactions on Data Hiding and Multimedia Security V (2010)

  13. No Access

    Chapter and Conference Paper

    Plane Transform Visual Cryptography

    Plane transformation visual cryptography takes a unique approach to some of the current shortcomings of current visual cryptography techniques. Typically, the direction and placement of the encrypted shares is...

    Jonathan Weir, WeiQi Yan in Digital Watermarking (2011)

  14. No Access

    Chapter and Conference Paper

    A Novel Collusion Attack Strategy for Digital Fingerprinting

    Digital fingerprinting is a technology which aims to embed unique marks with traceability in order to identify users who use their multimedia content for unintended purpose. A cost-efficient attack against dig...

    Hefei Ling, Hui Feng, Fuhao Zou, Weiqi Yan, Zhengding Lu in Digital Watermarking (2011)

  15. No Access

    Article

    Fine-search for image copy detection based on local affine-invariant descriptor and spatial dependent matching

    Copies are somehow a subset of near-duplicates, but the approaches extensively employed in near-duplicate retrieval only obtain rough and imprecise query results. Therefore a fine-search scheme is proposed to ...

    Hefei Ling, Liyun Wang, Fuhao Zou, Weiqi Yan in Multimedia Tools and Applications (2011)

  16. No Access

    Article

    A comprehensive study of visual event computing

    This paper contains a survey on aspects of visual event computing. We start by presenting events and their classifications, and continue with discussing the problem of capturing events in terms of photographs,...

    WeiQi Yan, Declan F. Kieran, Setareh Rafatirad in Multimedia Tools and Applications (2011)

  17. No Access

    Chapter and Conference Paper

    Authenticating Visual Cryptography Shares Using 2D Barcodes

    One of the problems pertinent with many visual cryptography (VC) schemes is that of authentication. VC provides a way of sharing secrets between a number of participants. The secrets are in the form of an imag...

    Jonathan Weir, WeiQi Yan in Digital Forensics and Watermarking (2012)

  18. No Access

    Article

    The restoration of full-thickness cartilage defects with mesenchymal stem cells (MSCs) loaded and cross-linked bilayer collagen scaffolds on rabbit model

    Cartilage has a limited self-repair capability and the repair of large cartilage defects remains a challenge in clinic. This study aimed to investigate the effect of mesenchymal stem cells (MSCs) loaded three-...

    Yiying Qi, Tengfei Zhao, Ke Xu, Tianyang Dai, Weiqi Yan in Molecular Biology Reports (2012)

  19. No Access

    Article

    Mesenchymal stem cell-based treatment for cartilage defects in osteoarthritis

    Osteoarthritis (OA) is a common disorder and the restoration of the diseased articular cartilage in patients with OA is still a challenge for researchers and clinicians. Currently, a variety of experimental st...

    Yiying Qi, Gang Feng, Weiqi Yan in Molecular Biology Reports (2012)

  20. No Access

    Chapter

    Surveillance Privacy Protection

    Surveillance Privacy Protection (SPP) is a realistic issue in the world we are living in today. Due to the massive progress in technologies and systems, surveillance is becoming quite impossible to avoid. More...

    Nikki Gulzar, Basra Abbasi, Eddie Wu, Anil Ozbal in Intelligent Multimedia Surveillance (2013)

previous disabled Page of 2