Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    VQ Coding in Data Hiding Using Correlated Neighboring Blocks in Security Performance

    With the continued expansion of the Internet and increased means of communication, it is inevitable that we send data via the Internet or other such media. The important issue of maintaining the confidentialit...

    Cheng-Ta Huang, De-En Sun, Yen-Lin Chen in Intelligence and Security Informatics (2017)

  2. No Access

    Chapter and Conference Paper

    A Survey on the Security of Multihop Ad Hoc Network

    With the development of wireless network, mobile Ad Hoc networks have been applied in many fields. But the security problem of Ad Hoc network has not been solved very well, and the security system of Ad Hoc ne...

    Yuan De-yu, Liu Tong, Wei Geng-yu, Wang Zhi-zhao in Trustworthy Computing and Services (2013)

  3. No Access

    Chapter and Conference Paper

    Bioinformatics Analysis of the Complete Nucleotide Sequence of Duck Plague Virus UL22 Gene

    UL22 gene, also named gH gene(GenBank accession No. EU195089) from duck plague virus (DPV) CHv strain which was isolated in our laboratory, is a 2505bp segment. The analysis about the characteristics of this g...

    Li-Sha Yang, An-Chun Cheng, Ming-Shu Wang in Information Computing and Applications (2012)

  4. No Access

    Chapter and Conference Paper

    Design and Analysis of Missile Two-Loop Autopilot with Angle of Attack Feedback

    In order to eliminate the static error of the classic two loop autopilot, the PI compensator is introduced into the control system. To enhance the robustness of two loop autopilot with PI compensator, an angle...

    Jiang Wang, Zhe Yang, De-fu Lin in System Simulation and Scientific Computing (2012)

  5. No Access

    Chapter and Conference Paper

    Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture

    In NSS’10, Shao and Chin pointed out that Hsiang and Shih’s dynamic ID-based remote user authentication scheme for multi-server environment has several security flaws and further proposed an improved version w...

    Ding Wang, Chun-guang Ma, De-li Gu, Zhen-shan Cui in Network and System Security (2012)

  6. No Access

    Chapter and Conference Paper

    An Quadtree Coding in E-chart

    With the development of IT and traffic logistics in sea, more function and performance of electronic chart (E-chart) in the navigation is needed. In the meantime, the requirement for high performance E-chart, ...

    Zhong-jie Zhang, **an Wu, De-peng Zhao in Information Computing and Applications (2010)

  7. No Access

    Chapter and Conference Paper

    Pattern Recognition Based on Stability of Discrete Time Cellular Neural Networks

    In this paper, some sufficient conditions are obtained to guarantee that discrete time cellular neural networks (DTCNNs) can have some stable memory patterns. These conditions can be directly derived from the ...

    Zhigang Zeng, De-Shuang Huang, Zengfu Wang in Advances in Neural Networks – ISNN 2004 (2004)

  8. No Access

    Chapter and Conference Paper

    Stability Analysis of Discrete-Time Cellular Neural Networks

    Discrete-time cellular neural networks (DTCNNs) are formulated and studied in this paper. Several sufficient conditions are obtained to ensure the global stability of DTCNNs with delays based on comparison met...

    Zhigang Zeng, De-Shuang Huang, Zengfu Wang in Advances in Neural Networks – ISNN 2004 (2004)

  9. No Access

    Chapter and Conference Paper

    A Novel Clustering Analysis Based on PCA and SOMs for Gene Expression Patterns

    This paper proposes a novel clustering analysis algorithm based on principal component analysis (PCA) and self-organizing maps (SOMs) for clustering the gene expression patterns. This algorithm uses the PCA te...

    Hong-Qiang Wang, De-Shuang Huang, **ng-Ming Zhao in Advances in Neural Networks - ISNN 2004 (2004)