scispace - formally typeset
Search or ask a question
Institution

National Cheng Kung University

EducationTainan City, Taiwan
About: National Cheng Kung University is a education organization based out in Tainan City, Taiwan. It is known for research contribution in the topics: Population & Thin film. The organization has 49723 authors who have published 69799 publications receiving 1437420 citations. The organization is also known as: NCKU.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper shows for the first time the link between expression of GFP and induction of apoptosis, and should promote studies of G FP cytotoxicity and attempts to isolate new non-toxic mutants ofGFP.

541 citations

Journal ArticleDOI
TL;DR: The agreement among the models and experimental data indicated that the adsorption and diffusion of arsenate and arsenite can be simulated by the proposed model.

534 citations

Journal ArticleDOI
TL;DR: In this article, the authors summarized collective experience from five continents in managing reservoir sediments and mitigating downstream sediment starvation, and recommended that these sediment management approaches be utilized where possible to sustain reservoir capacity and minimize environmental impacts of dams.
Abstract: By trapping sediment in reservoirs, dams interrupt the continuity of sediment transport through rivers, resulting in loss of reservoir storage and reduced usable life, and depriving downstream reaches of sediments essential for channel form and aquatic habitats. With the acceleration of new dam construction globally, these impacts are increasingly widespread. There are proven techniques to pass sediment through or around reservoirs, to preserve reservoir capacity and to minimize downstream impacts, but they are not applied in many situations where they would be effective. This paper summarizes collective experience from five continents in managing reservoir sediments and mitigating downstream sediment starvation. Where geometry is favorable it is often possible to bypass sediment around the reservoir, which avoids reservoir sedimentation and supplies sediment to downstream reaches with rates and timing similar to pre-dam conditions. Sluicing (or drawdown routing) permits sediment to be transported through the reservoir rapidly to avoid sedimentation during high flows; it requires relatively large capacity outlets. Drawdown flushing involves scouring and re-suspending sediment deposited in the reservoir and transporting it downstream through low-level gates in the dam; it works best in narrow reservoirs with steep longitudinal gradients and with flow velocities maintained above the threshold to transport sediment. Turbidity currents can often be vented through the dam, with the advantage that the reservoir need not be drawn down to pass sediment. In planning dams, we recommend that these sediment management approaches be utilized where possible to sustain reservoir capacity and minimize environmental impacts of dams.

531 citations

Journal ArticleDOI
TL;DR: This survey introduces the fundamental theories of PHy-security, covering confidentiality and authentication, and provides an overview on the state-of-the-art works on PHY-security technologies that can provide secure communications in wireless systems, along with the discussions on challenges and their proposed solutions.
Abstract: Physical layer security (PHY-security) takes the advantages of channel randomness nature of transmission media to achieve communication confidentiality and authentication. Wiretap coding and signal processing technologies are expected to play vital roles in this new security mechanism. PHY-security has attracted a lot of attention due to its unique features and the fact that our daily life relies heavily on wireless communications for sensitive and private information transmissions. Compared to conventional cryptography that works to ensure all involved entities to load proper and authenticated cryptographic information, PHY-security technologies perform security functions without considering about how those security protocols are executed. In other words, it does not require to implement any extra security schemes or algorithms on other layers above the physical layer. This survey introduces the fundamental theories of PHY-security, covering confidentiality and authentication, and provides an overview on the state-of-the-art works on PHY-security technologies that can provide secure communications in wireless systems, along with the discussions on challenges and their proposed solutions. Furthermore, at the end of this paper, the open issues are identified as our future research directions.

530 citations

Journal ArticleDOI
01 Aug 2008
TL;DR: A simple and robust skeleton extraction method based on mesh contraction that generates valuable information about the object's geometry, in particular, the skeleton-vertex correspondence and the local thickness, which are useful for various applications.
Abstract: Extraction of curve-skeletons is a fundamental problem with many applications in computer graphics and visualization. In this paper, we present a simple and robust skeleton extraction method based on mesh contraction. The method works directly on the mesh domain, without pre-sampling the mesh model into a volumetric representation. The method first contracts the mesh geometry into zero-volume skeletal shape by applying implicit Laplacian smoothing with global positional constraints. The contraction does not alter the mesh connectivity and retains the key features of the original mesh. The contracted mesh is then converted into a 1D curve-skeleton through a connectivity surgery process to remove all the collapsed faces while preserving the shape of the contracted mesh and the original topology. The centeredness of the skeleton is refined by exploiting the induced skeleton-mesh mapping. In addition to producing a curve skeleton, the method generates other valuable information about the object's geometry, in particular, the skeleton-vertex correspondence and the local thickness, which are useful for various applications. We demonstrate its effectiveness in mesh segmentation and skinning animation.

530 citations


Authors

Showing all 49872 results

NameH-indexPapersCitations
Yi Chen2174342293080
Yang Yang1642704144071
R. E. Hughes1541312110970
Mercouri G. Kanatzidis1521854113022
Thomas J. Smith1401775113919
Hui Li1352982105903
Gerald M. Reaven13379980351
Chi-Huey Wong129122066349
Joseph P. Vacanti11944150739
Kai Nan An10995351638
Ding-Shinn Chen10477446068
James D. Neaton10133164719
David C. Christiani100105255399
Jo Shu Chang9963937487
Yu Shyr9854239527
Network Information
Related Institutions (5)
National Taiwan University
130.8K papers, 3.3M citations

98% related

National University of Singapore
165.4K papers, 5.4M citations

93% related

University of Hong Kong
99.1K papers, 3.2M citations

92% related

Nanyang Technological University
112.8K papers, 3.2M citations

92% related

Zhejiang University
183.2K papers, 3.4M citations

91% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202373
2022315
20213,425
20203,154
20192,895
20182,764