Zobrazeno 1 - 10
of 86
pro vyhledávání: '"Ting-Yi Chang"'
An Efficient Authenticated Elliptic Curve Cryptography Scheme for Multicore Wireless Sensor Networks
Autor:
Esau Taiwo Oladipupo, Oluwakemi Christiana Abikoye, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, Ting-Yi Chang, Cheng-Chi Lee, Dinh-Thuan Do
Publikováno v:
IEEE Access, Vol 11, Pp 1306-1323 (2023)
The need to ensure the longevity of Wireless Sensor Networks (WSNs) and secure their communication has spurred various researchers to come up with various WSN models. Prime among the methods for extending the life span of WSNs is the clustering of Wi
Externí odkaz:
https://doaj.org/article/8c914bdb05dd4432876884166726f70e
Autor:
Ludvig Löwemark, Alice Chien-Yi Liao, Yu-Hsuan Liou, Shital Godad, Ting-Yi Chang, Alexander Kunz
Publikováno v:
Scientific Reports, Vol 11, Iss 1, Pp 1-11 (2021)
Abstract Detecting clandestine, intermittent release of heavy metal pollution into natural and man-made water ways is challenging. Conventional chemical methods are both labor intensive and expensive. A recent approach combining ion-exchange resins w
Externí odkaz:
https://doaj.org/article/9d16a9152b754c36b0657575bdcebaa1
Publikováno v:
Symmetry, Vol 12, Iss 8, p 1374 (2020)
License plate recognition is widely used in our daily life. Image binarization, which is a process to convert an image to white and black, is an important step of license plate recognition. Among the proposed binarization methods, Otsu method is the
Externí odkaz:
https://doaj.org/article/e5f70337e6ab4d458be206a41a705707
Publikováno v:
Symmetry, Vol 10, Iss 4, p 84 (2018)
A three-party Authenticated Key Agreement (AKA) protocol in the distributed computing environment is a client that requests services from an application server through an authentication server. The authentication server is responsible for authenticat
Externí odkaz:
https://doaj.org/article/e30aeb6763ba456198bf70fb6836a1e9
Publikováno v:
Symmetry, Vol 9, Iss 8, p 134 (2017)
In this paper, we propose new password authenticated key exchange (PAKE) and protected password change (PPC) protocols without any symmetric or public-key cryptosystems. The security of the proposed protocols is based on the computational Diffie-Hell
Externí odkaz:
https://doaj.org/article/043abd174d7f4d84adf17e16e1c731dc
Autor:
Ting-Yi Chang, 張天奕
107
Anecdotal evidence demonstrated that experiences in natural scenes could reduce stress. Most literature focuses on the visual experience, with little research on other perceptions. Auditory perception is also an important sensory perception
Anecdotal evidence demonstrated that experiences in natural scenes could reduce stress. Most literature focuses on the visual experience, with little research on other perceptions. Auditory perception is also an important sensory perception
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/awjn9j
Autor:
Ting-Yi Chang, 張庭漪
105
Fluvial terraces are the residual expression showing how a river responds to the allogenic (climate change, tectonic movement and sea level eustacy) and autogenic controls. As a river reacts to the environmental changes, the channel adjusts
Fluvial terraces are the residual expression showing how a river responds to the allogenic (climate change, tectonic movement and sea level eustacy) and autogenic controls. As a river reacts to the environmental changes, the channel adjusts
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/9t7t4w
Autor:
Ting-Yi Chang, 張廷亦
100
With the population of smart phones, there seems to be significant potential in the development of mobile bank. However, there hasn’t been great performance as expected till today. Zaltman Metaphor Elicitation Technique (ZMET) is used in t
With the population of smart phones, there seems to be significant potential in the development of mobile bank. However, there hasn’t been great performance as expected till today. Zaltman Metaphor Elicitation Technique (ZMET) is used in t
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/76157974869183506077
Autor:
Ting-yi Chang, 張庭議
98
Discerning changes of customer behavior is a critical issue for enterprises to survive in an ever-evolving business environment. Especially with the development of information technology progress and the lower cost of data storage, many compa
Discerning changes of customer behavior is a critical issue for enterprises to survive in an ever-evolving business environment. Especially with the development of information technology progress and the lower cost of data storage, many compa
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/20620623560851257151
Autor:
Ting-yi Chang, 張婷貽
97
In recent years, to reach the goal of being free from corruption and transparent, the government departments set up the “Ethics Directions for Civil Servants” and instruct relevant lecture and courses to civil servants. However, the gover
In recent years, to reach the goal of being free from corruption and transparent, the government departments set up the “Ethics Directions for Civil Servants” and instruct relevant lecture and courses to civil servants. However, the gover
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/16466564074875124958