- Digital Media Forensic Detection
- Advanced Steganography and Watermarking Techniques
- Power Systems and Technologies
- Chaos-based Image/Signal Encryption
- Scheduling and Optimization Algorithms
- Visual Attention and Saliency Detection
- Advanced Authentication Protocols Security
- Advanced Data Compression Techniques
- Smart Grid and Power Systems
- Digital Rights Management and Security
- Manufacturing Process and Optimization
- IPv6, Mobility, Handover, Networks, Security
- Advanced Manufacturing and Logistics Optimization
Xi’an University of Posts and Telecommunications
2021-2022
Nanchang University
2018
Northeast Electric Power University
2013-2014
In the fierce market competition environment, to maximize production efficiency, manufacturing enterprises mostly adopt many varieties of small batch and discrete mode production. The process has very strong flexibility. But are lack scheduling management or parallel machine unit adopts method static quota system, so flexible resource in enterprise system began reveal inadequate it reduce efficiency enterprise. This paper provide Nested Partition Method for problem, establishing mathematic...
Welcome to the WIT Press eLibrary - home of Transactions Wessex Institute collection, providing on-line access papers presented at Institute's prestigious international conferences and from its State-of-the-Art in Science & Engineering publications.
As the development of Internet, E-commerce gradually becomes a new form business activities; security traditional cryptographic technique application method is under threat too. Not only domestic scholars but also foreign are all devoting themselves to study solutions faced application. Using with and very important practical significance. This paper studied problems e-commerce transactions analyzed combining password techniques from technology angle; moreover aimed at characteristics...
The embedding capacity of the traditional reversible information hiding algorithm based on asymmetric prediction error histogram is limited by number pixels at peak point, available in image are not fully utilized, resulting increase invalid shift points, which makes visual quality camouflage poor. In this paper, a new multi-bit translation proposed, aims to greatly improve carrier with minimal impact quality. more use correlation between adjacent pixels, so that value concentrated near and...
This paper proposes a new symmetric information hiding scheme, aiming to increase the degree of disguise and security. scheme utilizes randomness image cover itself generate secret key which has high randomness, so as improve effect stego-objects security scheme. In addition, this also test method, can give more accurate quantitative results is suitable for testing cover. Experimental studies show that method stego-object steganographic algorithm, enhance robustness some extent.