Zobrazeno 1 - 10
of 74
pro vyhledávání: '"Bo-yuan HUANG"'
Autor:
Bo-Yuan Huang
Publikováno v:
Wenshan Review of Literature & Culture; Jun2023, Vol. 16 Issue 2, p137-143, 7p
Publikováno v:
Journal of Surveillance, Security and Safety. 3:41-54
Aim: In visual cryptography, a secret image is encrypted into two meaningless random images called shares. These two shares can be stacked to recover the secret image without any calculations. However, because of the alignment problem in the decrypti
Publikováno v:
Chinese Medical Journal, Vol 130, Iss 6, Pp 741-743 (2017)
Externí odkaz:
https://doaj.org/article/5bd4e566a2124c5d885406a66cbed9ca
Autor:
Hong-bo ZHANG, Lin-sen MU, Yan-hui SUN, Xiao-jun ZENG, Yu-chen JI, Jie-fei LI, Meng-kai LI, Bo-yuan HUANG, Fei YUAN, Hui SHEN, Shi-chao GUO
Publikováno v:
Chinese Journal of Contemporary Neurology and Neurosurgery, Vol 15, Iss 9, Pp 735-738 (2015)
Objective To establish database for brain tumor patients with mood disorders and to explore the status and epidemiological characteristics of emotional function. Methods By using computer software, establish database of brain tumor with affective dis
Externí odkaz:
https://doaj.org/article/b8347b644f0d4fb4ad03bd4de5c67f45
Autor:
Bo-Yuan Huang, Justie Su-Tzu Juan
Publikováno v:
Multimedia Tools and Applications. 79:7705-7729
With rapid developments in network technology, information security is becoming increasingly crucial. To ensure that secret images are not being stolen during transmission, a good countermeasure is to encrypt them before transmission. Visual secret s
Autor:
Wen-Cheng Chen, Bo-Yuan Huang, Ssu-Meng Huang, Shih-Ming Liu, Kai-Chi Chang, Chia-Ling Ko, Chih-Lung Lin
Publikováno v:
Biomaterials Advances. 144:213228
A polyvinylidene fluoride (PVDF) piezoelectric membrane containing carbon nanotubes (CNTs) and graphene oxide (GO) additives was prepared, with special emphasis on the piezoelectric activity of the aligned fibers. Fibroblast viability on membranes wa
Publikováno v:
2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD).
Publikováno v:
Cryptography, Vol 2, Iss 4, p 28 (2018)
Visual cryptography (VC) encrypts a secret image into n shares (transparency). As such, we cannot see any information from any one share, and the original image is decrypted by stacking all of the shares. The general (k, n)-threshold secret sharing s
Externí odkaz:
https://doaj.org/article/39c6cda08e854555b48ff4574cb99131
Publikováno v:
Cryptography, Vol 2, Iss 3, p 24 (2018)
In (2, 2)-visual secret sharing (VSS) schemes, a common type of (k, n)-threshold VSS schemes, secret information can be decoded directly through only two shares by using a human vision system. Several studies have analyzed methods of simplifying the
Externí odkaz:
https://doaj.org/article/354680d73ccb4e4fb5752fc8207062bd
Publikováno v:
PLoS ONE, Vol 10, Iss 8, p e0134715 (2015)
PurposeGlioblastoma multiforme (GBM) is the most malignant primary type of brain tumor in adults. There has been increased focus on the immunotherapies to treat GBM patients, the therapeutic value of natural killer (NK) cells is still unknown. Progra
Externí odkaz:
https://doaj.org/article/c97b5587bbf844489dd95526591c9e7c