Guanghui Cao

ORCID: 0000-0001-9726-1271
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Cellular Automata and Applications
  • Rock Mechanics and Modeling
  • Geotechnical and Geomechanical Engineering
  • Coal Properties and Utilization
  • Geoscience and Mining Technology
  • Microbial Applications in Construction Materials
  • Chaos control and synchronization
  • Crop Yield and Soil Fertility
  • Material Properties and Processing
  • Vehicle License Plate Recognition
  • Geomechanics and Mining Engineering
  • Hydrocarbon exploration and reservoir analysis
  • Tailings Management and Properties
  • Digital Media Forensic Detection
  • Advanced Sensor and Energy Harvesting Materials
  • Lipid metabolism and biosynthesis
  • Embedded Systems and FPGA Design
  • Grouting, Rheology, and Soil Mechanics
  • Plant biochemistry and biosynthesis
  • Tactile and Sensory Interactions
  • Agriculture, Plant Science, Crop Management
  • Plant Reproductive Biology
  • Dielectric materials and actuators

Beijing Forestry University
2025

Liaoning University of Technology
2009-2024

China University of Mining and Technology
2023-2024

Beihang University
2014

Shanghai University
2012

Lanzhou Jiaotong University
2012

Chengdu University of Technology
2011

This paper proposes a technique for producing underground backfilling materials using enzyme-induced calcium carbonate precipitation (EICP) technology to address the growing ecological security concerns caused by coal mining. To augment mineralization impact of EICP, diverse levels organic substances, including yeast extract, peptone, and skimmed milk powder, were incorporated into cementing solution offer greater number nucleation sites carbonate. The results indicate that (1) based on...

10.3390/min14020153 article EN Minerals 2024-01-31

10.46793/match94-3.07125 article EN match Communications in Mathematical and in Computer Chemistry 2025-01-01

The utilization of CO2 mineralization fly ash (F) and coal gangue (G) technology is proposed in this research work to prepare underground backfilling materials. test process can be divided into pre-treatment post-treatment stages. In the stage, a sealed stirring vessel used conduct wet mineralization. ratios F G were selected as follows: 20%:60% (F2G6), 30%:50% (F3G5), 40%:40% (F4G4), 50%:30% (F5G3), 60%:20% (F6G2). prepared Φ50 mm × 100 cylindrical samples, with curing durations 3 d, 7 14...

10.3390/min14060566 article EN Minerals 2024-05-29

Understanding the complex mechanisms underlying sex differentiation in dioecious plants is fundamental to elucidating plant reproductive strategies and their adaptive responses environmental stresses. Pistacia chinensis, previously considered a strictly species, has been found exhibit monoecy, with closely linked stress during floral development. However, molecular remain poorly understood. This study explores influence of on focus heat shock proteins (Hsps). Biochemical analyses revealed...

10.3390/f16030395 article EN Forests 2025-02-23

Based on the Fisher–Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, SHA-3 algorithm used to calculate hash value of initial password, which as chaotic system. Second, sequence are scramble plaintext, sorting for secondary scrambling. Then, rules change plaintext pixel values, makes ciphertext more random resistant attacks, thus ensures that encrypted secure. Finally, we add statistics pixel-level diffusion ensure sensitivity. The...

10.1088/1674-1056/28/4/040504 article EN Chinese Physics B 2019-04-01

In the field of chaotic image encryption, algorithm based on correlating key with plaintext has become a new developing direction. However, for this kind algorithm, some shortcomings in resistance to reconstruction attack, efficient utilization resource, and reducing dynamical degradation digital chaos are found. order solve these problems further enhance security encryption disturbance feedback mechanism, we present scheme. running-key generation stage, by successively disturbing stream...

10.1155/2014/490179 article EN cc-by The Scientific World JOURNAL 2014-01-01

Most algorithms of image scrambling transformation based on Logistic map are currently dedicated to permutation rules and methods without considering design philosophy. In this paper, we propose a new bit algorithm the map. This with firmly mathematic theory is designed by following scientific course from practice. According characteristics chaotic sensitivity initial condition large key space, starting map, which can generate uniformly distributed random variable in interval at =4...

10.7498/aps.60.110508 article EN cc-by Acta Physica Sinica 2011-01-01

To improve image encryption mechanism and enhance the security of pixel value transformation, a new scheme is proposed based on quantum chaos. In phase key generation, running related to plaintext generated by cipher-text successively disturbing chaotic component. process encryption, polynomial multiplication in Galois field first introduced perform then encrypted again with feedback mechanism. The experiment results show that introduction implements one time running-key stream, minimization...

10.14257/ijsia.2014.8.4.08 article EN International Journal of Security and Its Applications 2014-07-31

Aiming at high fidelity image only can be encrypted in time domain, summarize the current all kind of encryption methods domain. That are chaos permutation, and hybrid algorithm. Then, this paper proposed block scrambling with after effect. In give formula correlation compare before permutation. After encryption, computing information entropy image. At last, according to security analysis, algorithm demonstrates strong resistance toward exterior attacks such as statistical differential attacks.

10.1109/cccm.2009.5267545 article EN 2009-08-01

A hybrid method of edge detection radar images and classification fused infrared microwave SAR is developed for automatic the main road network in a dense urban area. Fusion effectively reduces noise also removes possible confusion with non-road objects, i.e. linearly featured rivers classification. Possible candidates are further processed using morphological thinning algorithm. Road linking extension carried out hierarchically according to characteristics roads as well their connections....

10.1179/174313107x168981 article EN The Imaging Science Journal 2007-11-24

We propose a new image encryption algorithm with variable length running key based on modified tent map. This map can generate uniform distribution pseudo-random number sequence. In the proposed encryption, we employ strategy of which enlarges value space, one-time is resilient to known/chosen plaintext attack, cipher disturbance minimizes dynamical degradation digital chaos. Simulations have been carried out and results demonstrate strong survival ability our scheme.

10.1080/02564602.2015.1088412 article EN IETE Technical Review 2015-09-29

Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI

10.2139/ssrn.4752072 preprint EN 2024-01-01

Security and efficiency are two major themes of image encryption algorithm. To enhance the security together with improving operational efficiency, this paper proposes an algorithm based on a novel chaos high-strength primitives. Under framework confusion-diffusion, three core elements affecting security, namely, random number generator, confusion primitive, diffusion primitive thoroughly investigated. Regarding new chaos, 2D-SCM, is constructed result 0-1 test 0.9981. The adopts naturally...

10.1109/access.2024.3423691 article EN cc-by-nc-nd IEEE Access 2024-01-01

10.3724/sp.j.1087.2013.02501 article EN Journal of Computer Applications 2013-11-07
Coming Soon ...