Search For:

Displaying 1-3 out of 3 total
A Method of Performance Evaluation by Using the Analytic Network Process and Balanced Score Car
Found in: Convergence Information Technology, International Conference on
By Ming-Chang Lee Ming-Cheng Wu,Hsiao-Wen Wang,Hsiu-Yuan Wang
Issue Date:November 2007
pp. 235-240
Performance evaluation is an important part of the enterprises' strategic management. The analytic hierarchy process (AHP) can provide an analytical means to determine the importance of the identified factors. The AHP method assumes that the factors presen...
A Novel Image Hashing Scheme Based on Wave Atoms
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Fang Liu,Lee-Ming Cheng
Issue Date:October 2011
pp. 125-128
In this paper, a sum-energy based image hashing scheme is proposed which satisfies three important criteria of image hashing, namely robustness, fragility and security. Compared with some other fixed standard representations, wave atoms are employed due to...
Second-Generation RFID
Found in: IEEE Security and Privacy
By Abdul (Ali) Razaq, Wai Tong Luk, Kam Man Shum, Lee Ming Cheng, Kai Ning Yung
Issue Date:July 2008
pp. 21-27
Current ultra-high frequency air interface protocols help users get the true benefits of second-generation RFID standards. However, these technologies also have some security drawbacks and limitations.