Skip to main content

and
  1. Article

    The correlation between vertebral wedge-shaped changes in X-ray imaging at supine and standing positions and the efficacy of operative treatment of thoracolumbar spinal fracture in the elderly

    By analyzing a large number of surgical patients, we identified the roles of wedge-shaped changes in related surgeries.

    L Qian, J Pan, Z D Liu, L J Li, J Tan, L M Cheng, Z L Zeng, Y W Jia, X F Li in Spinal Cord (2013)

  2. No Access

    Chapter and Conference Paper

    Robust Blind Watermarking Scheme Using Wave Atoms

    In this paper, a robust blind watermarking scheme using Multiple Descriptions (MD) is proposed. The watermark is embedded in the Wave Atom Transform domain by modifying one of the scale bands. The detection an...

    H. Y. Leung, L. M. Cheng in Digital Watermarking (2011)

  3. Article

    Open Access

    Robust Watermarking Scheme Using Wave Atoms

    A robust blind watermarking scheme using wave atoms is proposed. The watermark is embedded in the wave atom transform domain by modifying one of the scale bands. The detection and extraction procedures do not ...

    H. Y. Leung, L. M. Cheng in EURASIP Journal on Advances in Signal Processing (2010)

  4. No Access

    Chapter and Conference Paper

    Study of Air Jet Penetration in a Fluidized Bed

    This work presents experimental and numerical simulation results on secondary air jet penetration into a dense phase of a 2-D fluidized bed. Velocity measuring method and non-intrusive methods based on images ...

    X. L. Zhou, L. M. Cheng, Q. H. Wang in Proceedings of the 20th International Conf… (2010)

  5. No Access

    Chapter and Conference Paper

    Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model

    In this paper, a robust non-blind watermarking scheme based on Curvelet transform is proposed. This work extends the work proposed by Leung [1] to increase the quality of watermarked image. The proposed algori...

    H. Y. Leung, L. M. Cheng, L. L. Cheng in Digital Watermarking (2009)

  6. No Access

    Article

    A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion

    In 1999, Guo et al. proposed a new probabilistic symmetric probabilistic encryption scheme based on chaotic attractors of neural networks. The scheme is based on chaotic properties of the Overstoraged Hopfield...

    K. C. Leung, S. L. Li, L. M. Cheng, C. K. Chan in Neural Processing Letters (2006)

  7. No Access

    Article

    The influence of precipitation on the work-hardening behavior of the aluminum alloys AA6111 and AA7030

    Tensile tests were conducted on the aluminum alloy, AA6111, after various artificial aging treatments in order to examine the influence of precipitation state on yield stress and work-hardening behavior. Durin...

    L. M. Cheng, W. J. Poole, J. D. Embury in Metallurgical and Materials Transactions A (2003)

  8. No Access

    Chapter and Conference Paper

    Software Generation of Random Numbers by Using Neural Network

    A new scalable random number generator is proposed. The proposed generator is based on the chaotic behavior of a clipped Hopfield neural network. By executing the neural network in a parallel architecture and ...

    Choi-Kuen Chan, Chi-Kwong Chan in Artificial Neural Nets and Genetic Algorithms (2001)

  9. Chapter

    Encryption System Based On Neural Network

    A new cryptoengine based on a clipped Hopfield neural network is proposed. Results show that the proposed cryptoengine, which is executed in a parallel architecture, is suitable for the practical implementatio...

    Choi-Kuen Chan, Chi-Kwong Chan, Lap-Piu Lee in Communications and Multimedia Security Iss… (2001)

  10. Chapter and Conference Paper

    Modelling the Crypto-Processor from Design to Synthesis

    In this paper, the modelling of a Crypto-processor in a FPGA chip based on the Rapid Prototy** of Application Specific Signal Processors (RASSP) design concept is described. By using this concept, the modell...

    W. P. Choi, L. M. Cheng in Cryptographic Hardware and Embedded Systems (1999)

  11. No Access

    Article

    A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks

    A new probabilistic symmetric-key encryption scheme based on chaotic-classified properties of Hopfield neural networks is described. In an overstoraged Hopfield Neural Network (OHNN) the phenomenon of chaotic-...

    Donghui Guo, L.M. Cheng, L.L. Cheng in Applied Intelligence (1999)