Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Kai-Hsiang Tsao"'
Autor:
Kai-hsiang Tsao, 曹凱翔
102
Low-Power High-Speed graphics processing unit (GPU) is one of the key hardware components in modern mobile devices such as smart phones. In this thesis, we present several methods to improve the execution performance and reduce the power of
Low-Power High-Speed graphics processing unit (GPU) is one of the key hardware components in modern mobile devices such as smart phones. In this thesis, we present several methods to improve the execution performance and reduce the power of
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/8f222j
Autor:
Kai-Hsiang Tsao, 曹凱翔
95
In this research, the effects of different operating conditions with single-path, dual-path, treble-path serpentine and spiral flow fields on the cell performance are numerically analyzed. The operating conditions include the fuel flow rate,
In this research, the effects of different operating conditions with single-path, dual-path, treble-path serpentine and spiral flow fields on the cell performance are numerically analyzed. The operating conditions include the fuel flow rate,
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/01356988415286079522
Autor:
Kai-Hsiang Tsao, 曹凱翔
97
While visual secret sharing (VSS) has been extensively growing in academia, VSS by visual cryptography (VC-based VSS) is a well-known VSS approach. Unfortunately, VC-based VSS suffers some disadvantages including the need of magnifying the si
While visual secret sharing (VSS) has been extensively growing in academia, VSS by visual cryptography (VC-based VSS) is a well-known VSS approach. Unfortunately, VC-based VSS suffers some disadvantages including the need of magnifying the si
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/7amdkg
Publikováno v:
Displays. 39:80-92
For visual secret sharing (VSS), general access structure (GAS), which can freely define the qualified set and the forbidden set, provides dealers the ability to share secret information with the qualified set but not the forbidden set. In previous s
Publikováno v:
Journal of Visual Communication and Image Representation. 25:1543-1557
This new scheme benefits from a combination of two general VC codebooks.Participants need no extra share to verify the validity of the other.There is no extra pixel expansion derived to prevent cheating.The computation cost is low.Multi-factor cheati
Publikováno v:
Fundamenta Informaticae. 2009, Vol. 96 Issue 1-2, p61-70. 10p. 2 Diagrams, 4 Charts.
Publikováno v:
Signal Processing. 92:2229-2237
A visual secret sharing (VSS) technique constructed by random grids (RG) aims at encrypting a secret image into several shared ones and, later, reconstructing the secret by stacking the shared images to be recognized by the human visual system. The m
Autor:
Tzung-Her Chen, Kai-Hsiang Tsao
Publikováno v:
IEEE Transactions on Circuits and Systems for Video Technology. 21:1693-1703
Recently, the visual secret sharing (VSS) technique based on a random-grid algorithm (RGVSS), proposed by Kafri and Keren in 1987, has drawn attention in academia again. However, Kafri and Keren's scheme is not participant-friendly; that is to say, t
Autor:
Kai-Hsiang Tsao, Tzung-Her Chen
Publikováno v:
Journal of Systems and Software. 84:1197-1208
A new visual secret sharing (VSS) approach by random grids (RG-based VSS), proposed by Kafri and Keren (1987), has drawn close attention recently. With almost all advantages of visual cryptography-based VSS, RG-based VSS benefits more from keeping th
Autor:
Kai-Hsiang Tsao, Tzung-Her Chen
Publikováno v:
Pattern Recognition. 42:2203-2217
Recently, the visual secret sharing (VSS) technique by random grids (RG), proposed by Kafri and Keren in 1987, has drawn attention in academia again to remove the abovementioned drawbacks. However, Kafri and Keren's scheme is a 2-out-of-2 VSS scheme