- Advanced Steganography and Watermarking Techniques
- Chaos-based Image/Signal Encryption
- Digital Media Forensic Detection
- Image Retrieval and Classification Techniques
- Advanced Image and Video Retrieval Techniques
- Advanced Authentication Protocols Security
- Internet Traffic Analysis and Secure E-voting
- Cryptography and Data Security
- Handwritten Text Recognition Techniques
- Traffic Prediction and Management Techniques
- Face recognition and analysis
- Microgrid Control and Optimization
- Video Analysis and Summarization
- Vehicle License Plate Recognition
- Generative Adversarial Networks and Image Synthesis
- Image Processing and 3D Reconstruction
- Transportation Planning and Optimization
- Photovoltaic System Optimization Techniques
- User Authentication and Security Systems
- Advanced Malware Detection Techniques
- Advanced Image Processing Techniques
- Medical Image Segmentation Techniques
- Multilevel Inverters and Converters
- Digital Imaging for Blood Diseases
- Automated Road and Building Extraction
National Chin-Yi University of Technology
2020-2023
National Taichung University of Science and Technology
2005-2021
National Chung Cheng University
2002-2010
I-Shou University
2005
This paper presents the calculation of optimum installation angle for fixed solar-cell panels based on genetic algorithm (GA) and simulated-annealing (SA) method. The output power panel is highly affected by sunlight incident its efficiency can be improved if properly installed with angle. relationship between radiation intensity surface also presented in this paper. Both GA SA climatic data are utilized to calculate different locations Taiwan. best monthly annual angles obtained computer...
Parkinson's disease is a progressive neurodegenerative disorder that has higher probability of occurrence in middle-aged and older adults than the young. With use computer-aided diagnosis (CAD) system, abnormal cell regions can be identified, this identification help medical personnel to evaluate chance disease. This study proposes hierarchical correlation histogram analysis based on grayscale distribution degree pixel intensity by constructing histogram, improves adaptive contrast...
The objective of this paper is to propose an improved dc bus voltage regulation strategy for the grid-connected PV/Wind power generation system. proposed can reduce variation and size capacitor bank, significantly. Also, change injected ac current amplitude will be moderate quality utility improved. A 1.2 kW prototype system built tested verify feasibility strategy. Hardware experimental results are shown confirm performance
Visual cryptography (VC) schemes hide the secret image into two or more images which are called shares. The can be recovered simply by stacking shares together without any complex computation involved. very safe because separately they reveal nothing about image. In this paper, a color visual scheme producing meaningful is proposed. These will not arouse attention of hackers. proposed utilizes halftone technique, cover coding table and to generate decrypted together. Experimental results...
With the rise of blockchain technology, peer-to-peer (P2P) network system has once again caught people's attention to equipping a with big storage capacity. In traditional P2P file-sharing systems, such as InterPlanetary File System (IPFS), data stored in other nodes cannot be revoked by owner and can only removed themselves. To comply criteria European Union's General Data Protection Regulation, it is important ensure that personal completely their owners. improve privacy security system,...
In this paper, the proposed scheme detects database tampering by embedding important characteristics of original database. The association rule frequent pattern tree (FP-tree) data mining is utilized to determine relationship existing among protected attributes and others in Meanwhile, support vector regression (SVR) applied predict each attribute value. By applying difference expansion (DE) differences between predicted values, owner can embed digital watermark If distorted, SVR function...
In the past few years, with development of information technology and focus on security, many studies have gradually been aimed at data hiding technology. The embedding extraction algorithms are mainly used by to hide that requires secret transmission into a multimedia carrier so cannot be realized achieve secure communication. Among them, reversible (RDH) is for applications demand as well original recovery without distortion, such remote medical diagnosis or military transmission. this...
In recent years, there has been a lot of research in license plate recognition, and many recognition systems have proposed used.In the past, system was key element applications such as traffic control parking lots access control.In this article, authors present current elaborate on use e-Government.License involves three main components: detection, character segmentation recognition.The consider all components thoroughly deal with issue how to apply e-Government order improve performance.
Password authentication, which is widely used for authenticated method, also important protocol by requiring a username and password before being allowed access to resources. In 2001, Lin et al. proposed the optimal strong-password authentication protocol, called (OSPA) one-time method verifying with different verifier every time affirming its identity. However, Chen-Ku Tsuji-Shimizu pointed respectively out that OSPA vulnerable stolen-verifier attack impersonation attack. this paper, we...
This paper presents a digital watermarking technology for guaranteeing the database integrity. The proposed scheme based on fragile technique, exploits trained support vector regression (SVR) predicting function to distribute watermark over particular numeric attributes achieve embedding and detecting by same SVR function. If absolute value of difference between predicted attribute is more than designed fixed value, like one, then content will be tampered with.