Institution
National Cheng Kung University
Education•Tainan City, Taiwan•
About: National Cheng Kung University is a education organization based out in Tainan City, Taiwan. It is known for research contribution in the topics: Population & Thin film. The organization has 49723 authors who have published 69799 publications receiving 1437420 citations. The organization is also known as: NCKU.
Topics: Population, Thin film, Microstructure, Dielectric, Heat transfer
Papers published on a yearly basis
Papers
More filters
••
TL;DR: This paper shows for the first time the link between expression of GFP and induction of apoptosis, and should promote studies of G FP cytotoxicity and attempts to isolate new non-toxic mutants ofGFP.
541 citations
••
TL;DR: The agreement among the models and experimental data indicated that the adsorption and diffusion of arsenate and arsenite can be simulated by the proposed model.
534 citations
••
University of California, Berkeley1, Golder Associates2, University of Southampton3, Yunnan University4, Kansas Department of Agriculture, Division of Water Resources5, Brigham Young University6, Compagnie Nationale du Rhône7, Kyoto University8, National Cheng Kung University9, Wuhan University10, Tsinghua University11, Colorado State University12
TL;DR: In this article, the authors summarized collective experience from five continents in managing reservoir sediments and mitigating downstream sediment starvation, and recommended that these sediment management approaches be utilized where possible to sustain reservoir capacity and minimize environmental impacts of dams.
Abstract: By trapping sediment in reservoirs, dams interrupt the continuity of sediment transport through rivers, resulting in loss of reservoir storage and reduced usable life, and depriving downstream reaches of sediments essential for channel form and aquatic habitats. With the acceleration of new dam construction globally, these impacts are increasingly widespread. There are proven techniques to pass sediment through or around reservoirs, to preserve reservoir capacity and to minimize downstream impacts, but they are not applied in many situations where they would be effective. This paper summarizes collective experience from five continents in managing reservoir sediments and mitigating downstream sediment starvation. Where geometry is favorable it is often possible to bypass sediment around the reservoir, which avoids reservoir sedimentation and supplies sediment to downstream reaches with rates and timing similar to pre-dam conditions. Sluicing (or drawdown routing) permits sediment to be transported through the reservoir rapidly to avoid sedimentation during high flows; it requires relatively large capacity outlets. Drawdown flushing involves scouring and re-suspending sediment deposited in the reservoir and transporting it downstream through low-level gates in the dam; it works best in narrow reservoirs with steep longitudinal gradients and with flow velocities maintained above the threshold to transport sediment. Turbidity currents can often be vented through the dam, with the advantage that the reservoir need not be drawn down to pass sediment. In planning dams, we recommend that these sediment management approaches be utilized where possible to sustain reservoir capacity and minimize environmental impacts of dams.
531 citations
••
TL;DR: This survey introduces the fundamental theories of PHy-security, covering confidentiality and authentication, and provides an overview on the state-of-the-art works on PHY-security technologies that can provide secure communications in wireless systems, along with the discussions on challenges and their proposed solutions.
Abstract: Physical layer security (PHY-security) takes the advantages of channel randomness nature of transmission media to achieve communication confidentiality and authentication. Wiretap coding and signal processing technologies are expected to play vital roles in this new security mechanism. PHY-security has attracted a lot of attention due to its unique features and the fact that our daily life relies heavily on wireless communications for sensitive and private information transmissions. Compared to conventional cryptography that works to ensure all involved entities to load proper and authenticated cryptographic information, PHY-security technologies perform security functions without considering about how those security protocols are executed. In other words, it does not require to implement any extra security schemes or algorithms on other layers above the physical layer. This survey introduces the fundamental theories of PHY-security, covering confidentiality and authentication, and provides an overview on the state-of-the-art works on PHY-security technologies that can provide secure communications in wireless systems, along with the discussions on challenges and their proposed solutions. Furthermore, at the end of this paper, the open issues are identified as our future research directions.
530 citations
••
01 Aug 2008
TL;DR: A simple and robust skeleton extraction method based on mesh contraction that generates valuable information about the object's geometry, in particular, the skeleton-vertex correspondence and the local thickness, which are useful for various applications.
Abstract: Extraction of curve-skeletons is a fundamental problem with many applications in computer graphics and visualization. In this paper, we present a simple and robust skeleton extraction method based on mesh contraction. The method works directly on the mesh domain, without pre-sampling the mesh model into a volumetric representation. The method first contracts the mesh geometry into zero-volume skeletal shape by applying implicit Laplacian smoothing with global positional constraints. The contraction does not alter the mesh connectivity and retains the key features of the original mesh. The contracted mesh is then converted into a 1D curve-skeleton through a connectivity surgery process to remove all the collapsed faces while preserving the shape of the contracted mesh and the original topology. The centeredness of the skeleton is refined by exploiting the induced skeleton-mesh mapping. In addition to producing a curve skeleton, the method generates other valuable information about the object's geometry, in particular, the skeleton-vertex correspondence and the local thickness, which are useful for various applications. We demonstrate its effectiveness in mesh segmentation and skinning animation.
530 citations
Authors
Showing all 49872 results
Name | H-index | Papers | Citations |
---|---|---|---|
Yi Chen | 217 | 4342 | 293080 |
Yang Yang | 164 | 2704 | 144071 |
R. E. Hughes | 154 | 1312 | 110970 |
Mercouri G. Kanatzidis | 152 | 1854 | 113022 |
Thomas J. Smith | 140 | 1775 | 113919 |
Hui Li | 135 | 2982 | 105903 |
Gerald M. Reaven | 133 | 799 | 80351 |
Chi-Huey Wong | 129 | 1220 | 66349 |
Joseph P. Vacanti | 119 | 441 | 50739 |
Kai Nan An | 109 | 953 | 51638 |
Ding-Shinn Chen | 104 | 774 | 46068 |
James D. Neaton | 101 | 331 | 64719 |
David C. Christiani | 100 | 1052 | 55399 |
Jo Shu Chang | 99 | 639 | 37487 |
Yu Shyr | 98 | 542 | 39527 |