Search For:

Displaying 1-15 out of 15 total
Dynamic Optimization Project Study between the Traffic Organization and the Traffic Signal Control of Urban Traffic
Found in: Computer Science and Information Engineering, World Congress on
By Yu Quan, Liu Jin-guang, Liu Pei-hua, Rong Jian, Liu Xiao-ming
Issue Date:April 2009
pp. 182-186
Considering the traffic organization project and traffic signal control project of the small and medium-sized cities in China, based on the dynamic optimization theory of operations research, this paper puts forwards the method of optimization design betwe...
 
Novel Multi-bit Bitwise Adaptive Embedding Algorithms with Minimum Error for Data Hiding
Found in: Network and System Security, International Conference on
By Rong-Jian Chen, Yu-Cheng Peng, Jun-Jian Lin, Jui-Lin Lai, Shi-Jinn Horng
Issue Date:September 2010
pp. 306-311
This paper presents the novel multi-bit bitwise adaptive embedding algorithms for data hiding. These embedding algorithms can embed multi-bit (k-bit, k>=1 ) secret data into cover data only introduce minimum embedding error smaller than (2^(k-1)-1)*2^(i...
 
Floating Car Data Based Taxi Operation Characteristics Analysis in Beijing
Found in: Computer Science and Information Engineering, World Congress on
By Weng Jian-cheng, Zhai Ya-qiao, Zhao Xiao-juan, Rong Jian
Issue Date:April 2009
pp. 508-512
The urban floating car data (FCD) collection system is usually constructed base on the taxi dispatch system, and the taxies are service as the floating car. Thus, the floating car data (FCD) collected from the system also include the operation information ...
 
Anti-forensic Steganography Using Multi-bit Minimum Error Replacement with Flexible Bit Location
Found in: Computer, Consumer and Control, International Symposium on
By Rong-Jian Chen,Jui-Lin Lai,Shi-Jinn Horng
Issue Date:June 2012
pp. 175-178
Multi-bit minimum error replacement (MER) is a method that can embed multi-bit logo/secret data into k least-significant bits (LSBs) of cover data only introduces minimum embedding error (MEE). However, k-LSBs MER suffers from weak anti-forensics. Moreover...
 
Multi-bit Adaptive Embedding Algorithm for Anti-forensic Steganography
Found in: Biometrics and Security Technologies, International Symposium on
By Rong-Jian Chen,Shi-Jinn Horng
Issue Date:March 2012
pp. 82-89
Multi-bit minimum error replacement (MER) is a method that can embed multi-bit logo/secret data into k least-significant bits (LSBs) of cover data only introduces minimum embedding error (MEE). However, k-LSBs MER suffers from weak anti-forensics. Moreover...
 
Novel Multi-bit Watermarking Using Adaptive Embedding Algorithms with Minimum Error
Found in: Complex, Intelligent and Software Intensive Systems, International Conference
By Rong-Jian Chen, Jui-Lin Lai, Shi-Jinn Horng
Issue Date:July 2011
pp. 211-218
This paper presents the novel multi-bit watermarking using adaptive embedding algorithms with minimum error. These embedding algorithms can embed multi-bit (k-bit, k>=1 ) logo data into cover data only introduce minimum embedding errors which are restri...
 
Design a Portable Bio-Sensing System for Glucose Measurement
Found in: Complex, Intelligent and Software Intensive Systems, International Conference
By Jui-Lin Lai, Han-ning Wu, Hung-Hsi Chang, Rong-Jian Chen
Issue Date:July 2011
pp. 71-76
In the paper, the electrochemical sensor consists of the potantiostat with glucose test strip electrode and the automatic test system to readout the electronic signal related to the concentration of Glucose is proposed. The structure of an Op-based potenti...
 
Novel Multi-bit and Multi-image Steganography Using Adaptive Embedding Algorithms with Minimum Error
Found in: Innovative Mobile and Internet Services in Ubiquitous Computing, International Conference on
By Rong-Jian Chen, Jui-Lin Lai, Shi-Jinn Horng
Issue Date:July 2011
pp. 221-228
This paper presents a novel multi-bit and multi-image steganography system using adaptive embedding algorithms with minimum error. These embedding algorithms can embed multi-bit (k-bit, k>=1) secret data into cover data only introduce minimum embedding ...
 
Control Type Styles Option Research of Intersection Based on LOS
Found in: Intelligent Computation Technology and Automation, International Conference on
By Yu Quan,Jiang Tian-xiao,Deng Xiao-hui,Rong Jian
Issue Date:March 2011
pp. 380-383
The intersection is the critical node in city, and has important influence on traffic flow. Whether the intersection is controlled reasonably is the key to the safety and efficiency of the intersection. Because of the current urban intersection control typ...
 
The Spatial MIMO Channel Implement on FPGA
Found in: Electrical and Control Engineering, International Conference on
By Liang Guo-dong, Rong Jian
Issue Date:June 2010
pp. 2443-2446
The MIMO channel simulator for signal transmit-receive system is needed to research the signal multipath effect in mobile environment and the small scale Rayleigh fading channel mathematical model in real hardware environment. The paper designs a pipelinin...
 
An Improved Score Level Fusion in Multimodal Biometric Systems
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Shi-Jinn Horng, Yuan-Hsin Chen, Ray-Shine Run, Rong-Jian Chen, Jui-Lin Lai, Kevin Octavius Sentosal
Issue Date:December 2009
pp. 239-246
In a multimodal biometric system, the effective fusion method is necessary for combining information from various single modality systems. In this paper we examined the performance of sum rule-based score level fusion and Support Vector Machines (SVM)-base...
 
Architecture Design of High Efficient and Non-memory AES Crypto Core for WPAN
Found in: Network and System Security, International Conference on
By Rong-Jian Chen, Yu-Cheng Peng, Jui-Lin Lai, Shi-Jinn Horng
Issue Date:October 2009
pp. 36-43
This paper presents the architecture design of a high efficient and non-memory Advanced Encryption Standard (AES) crypto core to fit WPAN security requirement. The proposed basis transformation approach from Galois Field (28) to Galois Field GF(((22)2)2) c...
 
Novel Stream Cipher Using 2-D Hybrid CA and Variable Ordered Recursive CA Substitutions
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By Rong-Jian Chen, Jui-Lin Lai
Issue Date:October 2008
pp. 74-81
This paper presents a new stream cipher for data security, which is based on the replacement of data values using variable ordered recursive cellular automata (CA) substitutions. To achieve this aim, 2-D hybrid CA was built firstly, then 1st-ordered and 2n...
 
Image Encryption and Decryption Using SCAN Methodology
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Chao-Shen Chen, Rong-Jian Chen
Issue Date:December 2006
pp. 61-66
This paper proposed an image encryption and decryption process. Its encryption method is based on SCAN patterns generated by the SCAN methodology. The SCAN is a language-based two-dimensional spatial-accessing methodology which can efficiently specify and ...
 
An Extension of VPRS Model Based on Dominance Relation
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Li-rong Jian, Ming-yang Li
Issue Date:August 2007
pp. 113-118
An extension of variable precision rough set model is proposed based on dominance relation instead of indiscernibility relation, which can deal with possible inconsistency from decision tables with preference attributes, and obtain probabilistic decision r...
 
 1