1 - 20
Next
- Euro-China Conference on Intelligent Data Analysis and Applications (1st : 2014 : Shenzhen, China)
- Cham : Springer, 2014.
- Description
- Book — 1 online resource (2 volumes) : illustrations.
- Berlin ; New York : Springer, ©2013.
- Description
- Book — 1 online resource : illustrations Digital: text file.PDF.
- Summary
-
- An Image Data Hiding Scheme Based on Vector Quantization and Graph Coloring / Shuai Yue, Zhi-Hui Wang and Chin-Chen Chang
- The Copyright Protection System for Android Platform / Yueh-Hong Chen and Hsiang-Cheh Huang
- Reversible Data Hiding by Coefficient Adjustment Algorithm / Ching-Yu Yang and Wu-Chih Hu
- ICA-Based Image and Video Watermarking / Jiande Sun and Ju Liu
- Content Based Invariant Image Watermarking with High Capacity / Leida Li, Jianying Zhang and Baolong Guo
- Single Bitmap Block Truncation Coding of Color Images Using Cat Swarm Optimization / Shi-Yu Cui, Zhi-Hui Wang, Pei-Wei Tsai, Chin-Chen Chang and Shuai Yue
- Application of Genetic-Based Wavelet Packet Watermarking for Copyright Protection / Hsiang-Cheh Huang and Yueh-Hong Chen
- Lossless Text Steganography in Compression Coding / Chin-Feng Lee and Hsing-Ling Chen
- A Fast and Low-Distortion Capacity Adaptive Synchronized Acoustic-to-Acoustic Steganography Scheme / Xuping Huang, Yoshihiko Abe and Isao Echizen
- Video Watermarking with Shot Detection.
- International Conference on Intelligent Information Hiding and Multimedia Signal Processing (4th : 2008 : Harbin Shi, China)
- [Piscataway, N.J.] : IEEE Xplore, c2008.
- Description
- Book
- Berlin ; New York : Springer, 2007.
- Description
- Book — 1 online resource (xvi, 400 pages) : illustrations Digital: text file.PDF.
- Summary
-
- An introduction to intelligent multimedia data hiding / Hsiang-Cheh Huang [and others]
- Digital video coding -- techniques and standards / Feng Pan
- Advances of MPEG scalable video coding standard / Wen-Hsiao Peng [and others]
- A bit-level visual secret sharing scheme for multi-secret images using rotation and reversion operations / Chin-Chen Chang, Tzu-Chuen Lu, Yi-Hsuan Fan
- Adaptive data hiding scheme for palette images / Chin-Chen Chang, Yu-Zheng Wang, Yu-Chen Hu
- GIS watermarking : hiding data in 2D vector maps / Xia-Mu Niu, Cheng-Yong Shao, Xiao-Tong Wang
- Adaptive embedding and detection for improved video watermarking / Isao Echizen [and others]
- Steganographic methods focusing on BPCS steganography / Hideki Noda, Michiharu Niimi, Eiji Kawaguchi
- Intelligent video event detection for surveillance systems / Hong-Yuan Mark Liao [and others]
- Print-to-Web linking technology using a mobile phone camera and its applications in Japan / Zheng Liu
- Multipurpose image watermarking algorithms and applications / Zhe-Ming Lu, Hans Burkhardt, Shu-Chuan Chu
- Tabu search based multi-watermarking over lossy networks / Hsiang-Cheh Huang [and others]
- Reversible watermarking techniques / Shao-Wei Weng, Yao Zhao, Jeng-Shyang Pan.
(source: Nielsen Book Data)
- Li, Meiling, author.
- Switzerland : Springer, 2016.
- Description
- Book — 1 online resource (xii, 160 pages) : illustrations (some color)
- Summary
-
- Introduction
- CSS Technology
- The Relationship Among the Performance Parameters in CSS
- The Censoring Based CSS
- CSS Technology With Relay
- CSS Based on Soft Combination
- The SS Application in ICIC.
- International Conference on Intelligent Information Hiding and Multimedia Signal Processing (6th : 2010 : Darmstadt, Germany)
- Los Alamitos, Calif. : IEEE, c2010.
- Description
- Book — 1 online resource (xxvi, 746 p.) : ill. (some col.)
- Berlin ; New York : Springer, 2007.
- Description
- Book — xvi, 400 p. : ill.
- Summary
-
- Fundamentals of Multimedia Signal Processing and Information Hiding.- An Introduction to Intelligent Multimedia Data Hiding.- Advances in Multimedia Signal Processing.- Digital Video Coding - Techniques and Standards.- Advances of MPEG Scalable Video Coding Standard.- Various Data Hiding Techniques.- A Bit-Level Visual Secret Sharing Scheme for Multi-Secret Images Using Rotation and Reversion Operatations.- Adaptive Data Hiding Scheme for Palette Images.- GIS Watermarking: Hiding Data in 2D Vector Maps.- Adaptive Embedding and Detection for Improved Video Watermarking.- Steganographic Methods Focusing on BPCS Steganography.- Practical Applications of Intelligent Multimedia Signal Processing and Data Hiding Systems.- Intelligent Video Event Detection for Surveillance Systems.- Print-to-Web Linking Technology Using a Mobile Phone Camera and its Applications in Japan.- Multipurpose Image Watermarking Algorithms and Applications.- Tabu Search Based Multi-Watermarking over Lossy Networks.- Reversible Watermarking Techniques.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Li, Jun-Bao, author.
- New York : Springer, 2013.
- Description
- Book — 1 online resource (xv, 225 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Introduction.- Statistical Learning and Face Recognition.- Kernel Learning Foundation.- Kernel Principal Analysis Based Face Recognition.- Kernel Discriminant Analysis Based Face Recognition.- Kernel Manifold Learning Based Face Recognition.- Kernel Semi-supervised Based Face Recognition.- Kernel Learning Based Face Recognition for Smart Environment.- Kernel Optimization Based Face Recognition.- Kernel Construction for Face Recognition.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Wang, Feng-Hsing.
- Berlin : Springer, ©2009.
- Description
- Book — 1 online resource (xiv, 186 pages) : illustrations Digital: text file.PDF.
- Summary
-
- I Introduction and Background.- Introduction.- Digital Watermarking Techniques.- Intelligent Techniques
- II Intelligent Watermarking.- Spatial-Based Watermarking Schemes and Pixel Selection.- Discrete Cosine Transform Based Watermarking Scheme and Band Selection.- Vector Quantisation Based Watermarking Schemes and Codebook Partition.- Genetic Index Assignment.- Genetic Watermark Modification.- III Hybrid Systems of Digital Watermarking.- Watermarking Based on Multiple Description VQ.- Fake Watermark Embedding Scheme Based on Multi-Stage VQ.- Watermarking with Visual Cryptography and Gain-Shape VQ.- IV Summary.- 12 Conclusions and Future Directions.
- (source: Nielsen Book Data)
- International Conference on Genetic and Evolutionary Computing (7th : 2013 : Prague, Czech Republic)
- Cham : Springer, [2013]
- Description
- Book — 1 online resource (xii, 410 pages)
- Summary
-
- Forecast Models of Partial Differential Equations Using Polynomial Networks / Ladislav Zjavka
- PSO-2S Optimization Algorithm for Brain MRI Segmentation / Abbas El Dor, Julien Lepagnot, Amir Nakib andPatrick Siarry
- Task Scheduling in Grid Computing Environments / Yi-Syuan Jiang and Wei-Mei Chen
- A Swarm Random Walk Algorithm for Global Continuous Optimization / Najwa Altwaijry and Mohamed El Bachir Menai
- A Sampling-PSO-K-means Algorithm for Document Clustering / Nadjet Kamel, Imane Ouchen and Karim Baali
- A New Algorithm for Data Clustering Based on Cuckoo Search Optimization / Ishak Boushaki Saida, Kamel Nadjet and Bendjeghaba Omar
- Object Detection Using Scale Invariant Feature Transform / Thao Nguyen, Eun-Ae Park, Jiho Han, Dong-Chul Park and Soo-Young Min
- Nearest Feature Line and Extended Nearest Feature Line with Half Face / Qingxiang Feng, Lijun Yan, Tien-Szu Pan and Jeng-Shyang Pan
- Studying Common Developmental Genomes in Hybrid and Symbiotic Formations / Konstantinos Antonakopoulos
- Routing and Wavelength Assignment in Optical Networks from Maximum Edge-Disjoint Paths / Chia-Chun Hsu, Hsun-Jung Cho and Shu-Cherng Fang
- Robust Self-organized Wireless Sensor Network: A Gene Regulatory Network Bio-Inspired Approach / Nour El-Mawass, Nada Chendeb and Nazim Agoulmine
- Automated Test Data Generation for Coupling Based Integration Testing of Object Oriented Programs Using Particle Swarm Optimization (PSO) / Shaukat Ali Khan and Aamer Nadeem
- Boosting Scheme for Detecting Region Duplication Forgery in Digital Images / Deng-Yuan Huang, Ta-Wei Lin, Wu-Chih Hu and Chih-Hung Chou
- Robust Watermarking Scheme for Colour Images Using Radius-Weighted Mean Based on Integer Wavelet Transform / Ching-Yu Yang
- A Novel Data Hiding Method Using Sphere Encoding / Ching-Min Hu, Ran-Zan Wang, Shang-Kuan Chen, Wen-Pinn Fang, Yu-Jie Chang and Yeuan-Kuen Lee
- Non-expanding Friendly Visual Cryptography / Wen-Pinn Fang, Ran-Zan Wang and Shang-Kuan Chen
- An Embedded 3D Face Recognition System Using a Dual Prism and a Camera / Chuan-Yu Chang, Chuan-Wang Chang and Min-Chien Chang
- Robust Watermarking for Multiple Images and Users Based on Visual Cryptography / Sheng-Shiang Chang, Chih-Hung Lin, Tzung-Her Chen and Kai-Siang Lin
- A Tailor-Made Encryption Scheme for High-Dynamic Range Images / Kai-Siang Lin, Tzung-Her Chen, Chih-Hung Lin and Sheng-Shiang Chang
- NBA All-Star Prediction Using Twitter Sentiment Analysis / Yi-Jen Su and Yue-Qun Chen
- Information Hiding Based on Binary Encoding Methods and Crossover Mechanism of Genetic Algorithms / Kuang Tsan Lin and Pei Hua Lin
- A Modified Method for Constructing Minimum Size Homogeneous Wireless Sensor Networks with Relay Nodes to Fully Cover Critical Square Grids / Bing-Hong Liu, Yue-Xian Lin, Wei-Sheng Wang and Chih-Yuan Lien
- Relative Location Estimation over Wireless Sensor Networks with Principal Component Analysis Technique / Shao-I Chu, Chih-Yuan Lien, Wei-Cheng Lin, Yu-Jung Huang, Chung-Long Pan and Po-Ying Chen
- Hierarchical Particle Swarm Optimization Algorithm of IPSVR Problem / Shang-Kuan Chen, Gen-Han Wu, Yen-Wu Ti, Ran-Zan Wang, Wen-Pinn Fang and Chian-Jhu Lu
- An Approach to Mobile Multimedia Digital Rights Management Based on Android / Zhen Wang, Zhiyong Zhang, Yanan Chang and Meiyu Xu
- A Path-Combination Based Routing Scheme for Cognitive Radio Networks / Li Zi, Zhao Hongyang and Pei Qingqi
- Digital Rights Management and Access Control in Multimedia Social Networks / Enqiang Liu, Zengliang Liu and Fei Shao
- Modeling of Human Saccadic Scanpaths Based on Visual Saliency / Lijuan Duan, Haitao Qiao, Chunpeng Wu, Zhen Yang and Wei Ma
- A Social Network Information Propagation Model Considering Different Types of Social Relationships / Changwei Zhao, Zhiyong Zhang, Hanman Li and Shiyang Zhao
- A Dynamic Intrusion Detection Mechanism Based on Smart Agents in Distributed Cognitive Radio Networks / Ma Lichuan, Min Ying and Pei Qingqi
- Bio-inspired Visual Attention Model and Saliency Guided Object Segmentation / Lijuan Duan, Jili Gu, Zhen Yang, Jun Miao, Wei Ma and Chunpeng Wu
- Tumor Cell Image Recognition Based on PCA and Two-Level SOFM / Lan Gan, Chunmei He, Lijuan Xie and Wenya Lv
- Face Recognition Based on Representation with Reject Option / Min Wang, Yuyao Wang, Jinrong Cui, Shu Liu and Yuan Tian
- The Fusion of SRC and SRRC Algorithms / Ke Yan and Jian Cao
- Posterior Probability Based Multi-classifier Fusion in Pedestrian Detection / Jialu Zhao, Yan Chen, Xuanyi Zhuang and Yong Xu
- Quantification-Based Ant Colony System for TSP / Ming Zhao, Jeng-Shyang Pan, Chun-Wei Lin and Lijun Yan
- Directional Discriminant Analysis for Image Feature Extraction / Lijun Yan, Jeng-Shyang Pan and Xiaorui Zhu
- Novel Matrix Based Feature Extraction Method for Face Recognition Using Gaborface Features / Qi Zhu, Yong Xu, Yuwu Lu, Jiajun Wen, Zizhu Fan and Zhengming Li
- Hybrid Digit-Serial Multiplier for Shifted Polynomial Basis of GF(2 m) / Chiou-Yng Lee, Wen-Yo Lee, Che Wun Chiou, Jeng-Shyang Pan and Cheng-Huai Ni
- Pipeline Design of Bit-Parallel Gaussian Normal Basis Multiplier over GF(2m) / Che Wun Chiou, Jim-Min Lin, Yu-Ku Li and Chiou-Yng Lee, Tai-Pao Chuang and Yun-Chi Yeh
- Symbolic Analysis Using Floating Pathological Elements / Hung-Yu Wang, Shung-Hyung Chang, Nan-Hui Chiang and Quoc-Minh Nguyen
- Vehicle Driving Video Sharing and Search Framework Based on GPS Data / Chuan-Yen Chiang, Shyan-Ming Yuan, Shian-Bo Yang, Guo-Heng Luo and Yen-Lin Chen
- Personalized Cloud Storage System: A Combination of LDAP Distributed File System / Chen-Ting Hsu, Guo-Heng Luo and Shyan-Ming Yuan.
- Euro-China Conference on Intelligent Data Analysis and Applications (6th : 2019 : Arad, Romania)
- Singapore : Springer, [2022]
- Description
- Book — 1 online resource : illustrations (some color) Digital: text file.PDF.
- Summary
-
- Trusted IoT Framework.- Utility-Oriented Pattern Analytic and Mining Techniques.- AI in Cyber Security: A boon & a bane.- Cleanroom Computing - Building Efficient and Secure Network Services.- Models and Methods of Design of Knowledge Based Fuzzy Neural Networks.- Seeing Is Believing.- Green Skyline Cities by Intelligent Rooftop Greenhouses.- The Unreasonable Effectiveness of Moore-Shannon Hammocks.- Designing Optical Sensors for the Internet of Things Era.- Adaptive density peak algorithm based on K-nearest neighbors with pre-screening strategy.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Smart Vehicular Technology, Transportation, Communication and Applications (3rd : 2019 : Arad, Romania)
- Singapore : Springer, 2021.
- Description
- Book — 1 online resource (xix, 294 pages : illustrations (some color)) Digital: text file.PDF.
- Summary
-
- Improving the Performance of QUATRE-EAR Using Linear Population Size Reduction
- Analysis of Dynamic Movement of Elevator Doors Based on Camera Videos
- Improved Firefly Optimization Algorithm Based on Cubic Mapping Model and Rough Set Theory
- Design and Implement Circuit of Wireless Charging of Parking Management System
- An Integrated System for Regional Environmental Parameters Business Data Distribution Based on Raspberry Pi
- Video Compressive Sensing Using Residual Spatial Domain Based on Mutual Information for Vehicle Video Compressive Algorithm
- Realization of Secure Mutual Authentication Testing for High-Level Biosafety Laboratory Management Software System
- Cryptanalysis of a Pairing-based Authentication Scheme for Smart Grid Communications
- Convolutional Neural Network Combined with Emotional Dictionary Apply in Chinese Text Emotional Classification
- Node Localization in Wireless Sensor Network by Ant Lion Optimization
- Cryptanalysis of an Authenticated Key Agreement Scheme for Fog-driven IoT Healthcare System
- A Multi-objective Optimization Model for Location Allocation of Railway Cargo Storage and Its Evolutionary Algorithm Design
- Adaptive Security for Automatic Protection of Data
- The Flying Car--A Solution for Green Transportation
- Artificial Intelligence in Medicine
- An Audit: IoT-Based Smart Cities
- Planning and Analysis of Underground Logistics System that Integrates with Urban Infrastructures
- Study on IC Process Parameter Control of MOVCD Using PID Algorithm
- Development of a Vehicle Monitoring System for Low-Emission Zone Application Based on OBD Technology
- 12306 Availability Zone Location Model Based on Analytic Hierarchy Process
- Prediction of Credit Risk in Electronic Commerce Financial Industry Based On Decision Tree Method
- Research on New Ticket System Architecture Based on Middle Platform
- Research on Order Matching Based on the Big Data of Rail-Water Combined Transportation
- A Data-Driven Car-Following Model that Considers Impacts of Car-Truck Combinations
- Research on Optimization Design of Blocking Section Length of High-Speed Railway.
(source: Nielsen Book Data)
- International Computer Symposium (2012 : Hualien, Taiwan)
- Heidelberg ; New York : Springer, ©2013.
- Description
- Book — 1 online resource
- Summary
-
- A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols / Yi-Pin Liao, Chih-Ming Hsiao
- A Dynamic Approach to Hash-Based Privacy-Preserving RFID Protocols / Chih-Yuan Lee, Hsin-Lung Wu, Jen-Chun Chang
- An Extension of Harn-Lin's Cheater Detection and Identification / Lein Harn, Changlu Lin
- Cryptanalysis on the User Authentication Scheme with Anonymity / Yung-Cheng Lee
- Deniable Authentication Protocols with Confidentiality and Anonymous Fair Protections / Shin-Jia Hwang, Yun-Hao Sung, Jen-Fu Chi
- A Novel Authentication Scheme Based on Torus Automorphism for Smart Card / Chin-Chen Chang, Qian Mao, Hsiao-Ling Wu
- Cryptanalysis of a Provably Secure Certificateless Short Signature Scheme / Yu-Chi Chen, Raylin Tso, Gwoboa Horng
- Impact of Identifier-Locator Split Mechanism on DDoS Attacks / Ying Liu, Jianqiang Tang, Hongke Zhang
- Detecting Web-Based Botnets with Fast-Flux Domains / Chia-Mei Chen, Ming-Zong Huang, Ya-Hui Ou.
- Improvements of Attack-Defense Trees for Threat Analysis / Ping Wang, Jia-Chi Liu
- Design and Implementation of a Linux Kernel Based Intrusion Prevention System in Gigabit Network Using Commodity Hardware / Li-Chi Feng, Chao-Wei Huang, Jian-Kai Wang
- Performance Evaluation on Permission-Based Detection for Android Malware / Chun-Ying Huang, Yi-Ting Tsai, Chung-Han Hsu
- Image Steganography Using Gradient Adjacent Prediction in Side-Match Vector Quantization / Shiau-Rung Tsui, Cheng-Ta Huang
- A Data Hiding Scheme Based on Square Formula Fully Exploiting Modification Directions / Wen-Chung Kuo
- Digital Watermarking Based on JND Model and QR Code Features / Hsi-Chieh Lee, Chang-Ru Dong, Tzu-Miao Lin
- Multi-dimensional and Multi-level Histogram-Shifting-Imitated Reversible Data Hiding Scheme / Zhi-Hui Wang, Chin-Chen Chang, Ming-Li Li
- A Threshold Secret Image Sharing with Essential Shadow Images / Ching-Nung Yang, Chih-Cheng Wu.
- Theoretical Analysis and Realistic Implementation of Secure Servers Switching System / Yu-Hong Chen, Kuang-Tse Chen, Lei Wang
- Design and Implementation of a Self-growth Security Baseline Database for Automatic Security Auditing / Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen
- Enhancing Cloud-Based Servers by GPU/CPU Virtualization Management / Tin-Yu Wu, Wei-Tsong Lee, Chien-Yu Duan
- Controlled Quantum Secure Direct Communication Based on Single Photons / Wei-Lin Chang, Fang-Jhu Lin, Guo-Jyun Zeng
- Construction of a Machine Guide Dog Using a Two-Mirror Omni-camera and an Autonomous Vehicle / Chih-Wei Huang, Wen-Hsiang Tsai
- Protection of Privacy-Sensitive Contents in Surveillance Videos Using WebM Video Features / Hsin-Hsiang Tseng, Wen-Hsiang Tsai
- A Study of Real-Time Hand Gesture Recognition Using SIFT on Binary Images / Wei-Syun Lin, Yi-Leh Wu, Wei-Chih Hung
- An Approach for Mouth Localization Using Face Feature Extraction and Projection Technique / Hui-Yu Huang, Yan-Ching Lin.
- Facial Expression Recognition Using Image Processing Techniques and Neural Networks / Hsi-Chieh Lee, Chia-Ying Wu, Tzu-Miao Lin
- Search Space Reduction in Pedestrian Detection for Driver Assistance System Based on Projective Geometry / Karlis Dimza, Te-Feng Su, Shang-Hong Lai
- Fast Multi-path Motion Estimation Algorithm with Computation Scalability / Kuang-Han Tai, Gwo-Long Li, Mei-Juan Chen
- Moving Objects Detection Based on Hysteresis Thresholding / Hsiang-Erh Lai, Chih-Yang Lin, Ming-Kai Chen
- Smart Video Camera Design -- Real-Time Automatic Person Identification / Chen-Ting Ye, Tzung-Dian Wu, You-Ren Chen
- A High Performance Parallel Graph Cut Optimization for Depth Estimation / Bo-Yen Chen, Bo-Cheng Charles Lai
- An Interactive 3D Modeling System Based on Fingertip Tracking / Jia-Wei Hung, I-Cheng Chang, Jiun-Wei Yu
- Comprehensive Evaluation for HE Based Contrast Enhancement Techniques / Ming-Zhi Gao, Zhi-Gang Wu, Lei Wang.
- Significance-Preserving-Guided Content-Aware Image Retargeting / Yu-Hsien Sung, Wen-Yu Tseng, Pao-Hung Lin
- Identifying Device Brand by Using Characteristics of Color Filter Array / Tang-You Chang, Guo-Shiang Lin
- Robust Video Copy Detection Based on Constrained Feature Points Matching / Duan-Yu Chen, Yu-Ming Chiu
- A Mass Detection System in Mammograms Using Grey Level Co-occurrence Matrix and Optical Density Features / Shen-Chuan Tai, Zih-Siou Chen, Wei-Ting Tsai
- Automatic Evaluation of Choroidal Neovascularization in Fluorescein Angiography / Kai-Shun Lin, Chia-Ling Tsai, Shih-Jen Chen
- 3D Spinal Cord and Nerves Segmentation from STIR-MRI / Chih Yen, Hong-Ren Su, Shang-Hong Lai
- Speeding Up the Decisions of Quad-Tree Structures and Coding Modes for HEVC Coding Units / Shen-Chuan Tai, Chia-Ying Chang
- Optimal GOP Size of H.264/AVC Temporal Scalable Coding / Wei-Lune Tang, Shih-Hsuan Yang
- Motion Estimation and DCT Coding Combined Scheme for H.264/AVC Codec / Wei-Jhe Hsu, Hsueh-Ming Hang, Yi-Fu Chen.
- Free View Point Real-Time Monitor System Based on Harris-SURF / Tzu-Ti Chang, Fang-Yi Yu, Wei-Tsong Lee
- Virtual Multiple-Perspective Display Using Pyramidal or Conical Showcase / Yu-Tsung Chiu
- Stroke Rehabilitation via a Haptics-Enhanced Virtual Reality System / Shih-Ching Yeh, Si-Huei Lee, Jia-Chi Wang
- Image-Based Wearable Tangible Interface / Jiung-Yao Huang, Yong-Zeng Yeo, Lin Huei
- The Creation of V-fold Animal Pop-Up Cards from 3D Models Using a Directed Acyclic Graph / Der-Lor Way, Yong-Ning Hu, Zen-Chung Shih
- MagMobile: Enhancing Social Interactions with Rapid View-Stitching Games of Mobile Devices / Da-Yuan Huang, Tzu-Wen Chang, Min-Lun Tsai
- Computer-Vision Based Hand Gesture Recognition and Its Application in Iphone / Hsi-Chieh Lee, Che-Yu Shih, Tzu-Miao Lin
- An Adaptive Video Program Recommender Based on Group User Profiles / Chun-Rong Su, Yu-Wei Li, Rui-Zhe Zhang
- Automatic Dancing Assessment Using Kinect / Ta-Che Huang, Yu-Chuan Cheng.
- A New View-Calibrated Approach for Abnormal Gait Detection / Kuo-Wei Lin, Shu-Ting Wang, Pau-Choo Chung
- Modeling and Recognizing Action Contexts in Persons Using Sparse Representation / Kai-Ting Chuang, Jun-Wei Hsieh, Yilin Yan
- Efficient Parallel Knuth-Morris-Pratt Algorithm for Multi-GPUs with CUDA / Kuan-Ju Lin, Yi-Hsuan Huang, Chun-Yuan Lin
- Energy-Efficient Scheduling Based on Reducing Resource Contention for Multi-core Processors / Yan-Wei Chen, Mei-Ling Chiang
- Effective Processor Allocation for Moldable Jobs with Application Speedup Model / Kuo-Chan Huang, Tse-Chi Huang
- Correctness of Self-stabilizing Algorithms under the Dolev Model When Adapted to Composite Atomicity Models / Chih-Yuan Chen, Cheng-Pin Wang
- Efficiently Extracting Change Data from Column Oriented NoSQL Databases / Yong Hu, Weiping Qu
- Approaches for Data Synchronization on Mobile Peer-to-Peer Networks / Chuan-Chi Lai
- On the Design of a Load Balancing Mechanism for ALE Middleware / Yi-Ting He, Yu-Chang Chen, Chua-Huang Huang.
- Platform-as-a-Service Architecture for Parallel Video Analysis in Clouds / Tse-Shih Chen, Tsiao-Wen Huang
- A Translation Framework for Automatic Translation of Annotated LLVM IR into OpenCL Kernel Function / Chen-Ting Chang, Yu-Sheng Chen, I-Wei Wu
- Low Power Compiler Optimization for Pipelining Scaling / Jen-Chieh Chang, Cheng-Yu Lee
- An Editing System Converting a UML State Diagram to a PLC Program / Yung-Liang Chang, Chin-Feng Fan, Swu Yih
- Accurate Instruction-Level Alias Analysis for ARM Executable Code / Tat-Wai Chong, Peng-Sheng Chen
- A Two-Leveled Web Service Path Re-planning Technique / Shih-Chien Chou, Chih-Yang Chiang
- An Effective Flood Forecasting System Based on Web Services / Ya-Hui Chang, Pei-Shan Wu, Yu-Te Liu
- A Simulation Environment for Studying the Interaction Process between a Human and an Embedded Control System / Chin-Feng Fan, Cheng-Tao Chiang, Albert Yih
- A Flexible and Re-configurable Service Platform for Multi-user Mobile Games / Yu-Sheng Cheng, Chun-Feng Liao, Don-Lin Yang.
- High-Performance 128-Bit Comparator Based on Conditional Carry-Select Scheme / Shun-Wen Cheng, Jhen-Yuan Li, Wei-Chi Chen
- A Multiplier-Free Noise Trapped Touch Algorithm for Low Cost 4x4 Matrix Panel Design / Yu-Hsaing Yu, Qi-Wen Wang, Tsung-Ying Sun
- Design of a Dynamic Parallel Execution Architecture for Multi-core Systems / Shiang Huang, Jer-Min Jou, Cheng-Hung Hsieh
- A Distributed Run-Time Dynamic Data Manager for Multi-core System Parallel Execution / Wen-Hsien Chang, Jer-Min Jou
- A Novel Defragmemtable Memory Allocating Schema for MMU-Less Embedded System / Yu-Hsaing Yu, Jing-Zhong Wang
- Hardware Acceleration Design for Embedded Operating System Scheduling / Jian-He Liao, Jer-Min Jou, Cheng-Hung Hsieh
- Asynchronous Ring Network Mechanism with a Fair Arbitration Strategy for Network on Chip / Jih-Ching Chiu, Kai-Ming Yang, Chen-Ang Wong
- Energy-Aware Compiler Optimization for VLIW-DSP Cores / Yung-Cheng Ma, Tse-An Liu, Wen-Shih Chao
- On the Variants of Tagged Geometric History Length Branch Predictors / Yeong-Chang Maa, Mao-Hsu Yen.
(source: Nielsen Book Data)
- International Conference on Intelligent Information Hiding and Multimedia Signal Processing (5th : 2009 : Kyoto, Japan)
- Los Alamitos, Calif. : IEEE Computer Society, c2009.
- Description
- Book — 1 online resource : ill.
15. Information hiding and applications [2009]
- Berlin : Springer, ©2009.
- Description
- Book — 1 online resource (x, 227 pages) : illustrations (some color) Digital: text file.PDF.
- Summary
-
- The Optimized Copyright Protection System with Genetic Watermarking.- Dual-plane Correlation-based Video Watermarking for Immunity to Rotation, Scale, Translation, and Random Distortion.- Restoring Objects for Digital Inpainting.- A Secure Data Embedding Scheme Using Gray-code Computation and SMVQ Encoding.- Robust Image Watermarking Based on Scale-Space Feature Points.- Intelligent Perceptual Shaping in Digital Watermarking.- Semi-Fragile Image Authentication Method for Robust to JPEG, JPEG2000 Compressed and Scaled Images.- Genetic Fingerprinting for Copyright Protection of Multicast Media.- Lossless Data Hiding for Halftone Images.- Information Hiding by Digital Watermarking.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Intelligent Systems Design and Applications (8th : 2008 : Kao-hsiung shih, Taiwan)
- [Piscataway, N.J.] : IEEE Xplore, [2008]
- Description
- Book
17. Intelligent watermarking techniques [2004]
- River Edge, N.J. : World Scientific, ©2004.
- Description
- Book — 1 online resource (1 volume (various pagings)) : illustrations Digital: data file.
- Summary
-
- Fundamentals of Watermarking and Intelligent Techniques
- Watermarking Techniques
- Advanced Watermarking Techniques
- Practical Issues in Watermarking and Copyright Protection.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- River Edge, N.J. : World Scientific, c2004.
- Description
- Book — 1 online resource (1 v. (various pagings)) : ill.
- Summary
-
- Fundamentals of Watermarking and Intelligent Techniques
- Watermarking Techniques
- Advanced Watermarking Techniques
- Practical Issues in Watermarking and Copyright Protection.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Intelligent Information Hiding and Multimedia Signal Processing (18th : 2022 : Kitakyushu, Japan)
- Singapore : Springer, 2023.
- Description
- Book — 1 online resource (425 p.).
- Summary
-
- Intro
- Preface
- Contents
- About the Editors
- 1 An Efficient Multilevel Threshold Image Segmentation Approach Based on Rafflesia Optimization Algorithm
- 1.1 Introduction
- 1.2 Multilevel Threshold Image Segmentation Problem
- 1.3 Rafflesia Optimization Algorithm
- 1.3.1 The Stage of Attracting Insects
- 1.3.2 The Stage of Swallowing Insects
- 1.3.3 The Stage of Spreading Seeds
- 1.4 ROA-Based Segmentation Process
- 1.5 Simulation
- 1.5.1 Peak Signal-to-Noise Ratio
- 1.5.2 Structural Similarity Index Measure
- 1.5.3 Feature Similarity Index Measurement
- 1.6 Conclusion
- 3.4 Experiment
- 3.4.1 Experimental Setup
- 3.4.2 Ablation Experiment
- 3.4.3 Comparisons with State-of-the-Art Methods
- 3.5 Conclusion
- References
- 4 Research on PLC Communication Technology in Intelligent Loading Control System
- 4.1 PLC Introduced
- 4.1.1 The Advantages of PLC
- 4.1.2 Application of PLC Communication Technology
- 4.1.3 PLC Application in Various Fields
- 4.1.4 Application of PLC in Intelligent Loading Control System
- 4.2 System Introduction
- 4.2.1 Overall System
- 4.2.2 Selection of PLC
- 4.3 PLC and PC Communication Technology
- 4.3.1 PLC Communication Module
- 4.3.2 Read and Write Function of Communication Between PC and PLC
- 4.3.3 Communication Convention Field Information
- 4.3.4 Status Change of PLC
- 4.3.5 PC to PLC Control Program
- 4.3.6 PLC Communication Program
- 4.4 Conclusion
- References
- 5 Combined Synchronization for Fractional-Order Chaotic Systems with Time Delay
- 5.1 Introduction
- 5.2 Background
- 5.3 Simulation Results
- 5.4 Conclusion
- References
- 6 A New Four-Dimensional Discrete Chaotic System Is Used for S-Box Masking
- 6.1 Introduction
- 6.2 Discrete Chaotic System
- 6.2.1 Logistic Map
- 6.2.2 Tent Map
- 6.2.3 Henon Map
- 6.3 New Four-Dimensional Discrete Chaotic System
- 6.3.1 Construction of Discrete Chaotic Systems
- 6.3.2 NIST Test
- 6.3.3 Resource Consumption
- 6.4 S-Box Masking Scheme
- 6.5 Correlation Power Analysis
- 6.6 Conclusion
- References
- 7 A Parallel Gannet Optimization Algorithm with Communication Strategies (PGOA)
- 7.1 Introduction
- 7.2 Related Work
- 7.2.1 Gannet Optimization Algorithm
- 7.2.2 Parallel Mechanisms
- 7.3 Parallel Gannet Optimization Algorithm
- 7.3.1 Initialization
- 7.3.2 Update
- International Conference on Industrial & Engineering Applications of Artificial Intelligence & Expert Systems (27th : 2014 : Kaohsiung, Taiwan)
- Cham : Springer, [2014]
- Description
- Book — 1 online resource (2 volumes) : illustrations.
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.