scispace - formally typeset
Search or ask a question
Author

Jeng-Shyang Pan

Bio: Jeng-Shyang Pan is an academic researcher from Shandong University of Science and Technology. The author has contributed to research in topics: Digital watermarking & Watermark. The author has an hindex of 50, co-authored 789 publications receiving 11645 citations. Previous affiliations of Jeng-Shyang Pan include National Kaohsiung Normal University & Technical University of Ostrava.


Papers
More filters
Journal ArticleDOI
TL;DR: This study proposes an adaptive parallel arithmetic optimization algorithm (APAOA) with a novel parallel communication strategy that can prevent the algorithm from falling into a local optimal solution of robot path planning.
Abstract: Path planning is one of the hotspots in the research of automotive engineering. Aiming at the issue of robot path planning with the goal of finding a collision-free optimal motion path in an environment with barriers, this study proposes an adaptive parallel arithmetic optimization algorithm (APAOA) with a novel parallel communication strategy. Comparisons with other popular algorithms on 18 benchmark functions are committed. Experimental results show that the proposed algorithm performs better in terms of solution accuracy and convergence speed, and the proposed strategy can prevent the algorithm from falling into a local optimal solution. Finally, we apply APAOA to solve the problem of robot path planning.

24 citations

Journal ArticleDOI
01 Mar 2020
TL;DR: A new type of algorithm that combines a new pigeon population algorithm named Parallel and Compact Pigeon-Inspired Optimization (PCPIO) with MPPT to solve the problem that MPPT cannot reach the near global maximum power point.
Abstract: The conventional maximum power point tracking (MPPT) method fails in partially shaded conditions, because multiple peaks may appear on the power–voltage characteristic curve. The Pigeon-Inspired Optimization (PIO) algorithm is a new type of meta-heuristic algorithm. Aiming at this situation, this paper proposes a new type of algorithm that combines a new pigeon population algorithm named Parallel and Compact Pigeon-Inspired Optimization (PCPIO) with MPPT, which can solve the problem that MPPT cannot reach the near global maximum power point. This hybrid algorithm is fast, stable, and capable of globally optimizing the maximum power point tracking algorithm. Therefore, the purpose of this article is to study the performance of two optimization techniques. The two algorithms are Particle Swarm Algorithm (PSO) and improved pigeon algorithm. This paper first studies the mechanism of multi-peak output characteristics of photovoltaic arrays in complex environments, and then proposes a multi-peak MPPT algorithm based on a combination of an improved pigeon population algorithm and an incremental conductivity method. The improved pigeon algorithm is used to quickly locate near the maximum power point, and then the variable step size incremental method INC (incremental conductance) is used to accurately locate the maximum power point. A simulation was performed on Matlab/Simulink platform. The results prove that the method can achieve fast and accurate optimization under complex environmental conditions, effectively reduce power oscillations, enhance system stability, and achieve better control results.

24 citations

Journal ArticleDOI
TL;DR: The problem of designing observer for a class of uncertain neutral systems with parametric and norm-bounded uncertainties is solved and robust observation and robust H"~ observation methods are developed by using linear state-delayed observers.

24 citations

01 Jan 2017
TL;DR: A comprehensive survey of various clustering formation approaches with their objectives, characteristics, etc is presented and the classifications of uneven clustering methods are carried out and compared them based on various cluster properties, Cluster Head (CH) properties, and clustering process.
Abstract: Clustering formation is the modern energy efficient techniques in the designing and implementing Wireless sensor networks (WSN). Clustering provides various advantages like energy efficiency, lifetime, scalability, and less delay; but it leads to hot spot problem. The proposed unequal clustering is to overcome this issue. In uneven clustering, the cluster size varies proportionally to the distance to the base station (BS). In this paper, a comprehensive survey of various clustering formation approaches with their objectives, characteristics, etc. is presented. Also, the classifications of uneven clustering methods are carried out and compared them based on various cluster properties, Cluster Head (CH) properties, and clustering process.

24 citations

Journal ArticleDOI
04 Jun 2020-Symmetry
TL;DR: This paper secure an encrypted fingerprint template by a symmetric peer-to-peer network and symmetric encryption, and adopts the method of template hashing, which is cost-effective and efficient.
Abstract: Biometrics, with its uniqueness to every individual, has been adapted as a security authentication feature by many institutions. These biometric data are processed into templates that are saved on databases, and a central authority centralizes and controls these databases. This form of storing biometric data, or in our case fingerprint template, is asymmetric and prone to three main security attacks, such as fake template input, template modification or deletion, and channel interception by a malicious attacker. In this paper, we secure an encrypted fingerprint template by a symmetric peer-to-peer network and symmetric encryption. The fingerprint is encrypted by the symmetric key algorithm: Advanced Encryption Standard (AES) algorithm and then is uploaded to a symmetrically distributed storage system, the InterPlanetary File system (IPFS). The hash of the templated is stored in a decentralized blockchain. The slow transaction speed of the blockchain has limited its use in real-life applications, such as large file storage, hence, the merge with IPFS to store just the hashes of large files. The encrypted template is uploaded to the IPFS, and its returned digest is stored on the Ethereum network. The implementation of IPFS prevents storing the raw state of the fingerprint template on the Ethereum network in order to reduce cost and also prevent identity theft. This procedure is an improvement of previous systems. By adopting the method of template hashing, the proposed system is cost-effective and efficient. The experimental results depict that the proposed system secures the fingerprint template by encryption, hashing, and decentralization.

24 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: It is proved the convergence of a recursive mean shift procedure to the nearest stationary point of the underlying density function and, thus, its utility in detecting the modes of the density.
Abstract: A general non-parametric technique is proposed for the analysis of a complex multimodal feature space and to delineate arbitrarily shaped clusters in it. The basic computational module of the technique is an old pattern recognition procedure: the mean shift. For discrete data, we prove the convergence of a recursive mean shift procedure to the nearest stationary point of the underlying density function and, thus, its utility in detecting the modes of the density. The relation of the mean shift procedure to the Nadaraya-Watson estimator from kernel regression and the robust M-estimators; of location is also established. Algorithms for two low-level vision tasks discontinuity-preserving smoothing and image segmentation - are described as applications. In these algorithms, the only user-set parameter is the resolution of the analysis, and either gray-level or color images are accepted as input. Extensive experimental results illustrate their excellent performance.

11,727 citations

Book
24 Oct 2001
TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Abstract: Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications.

2,849 citations

Proceedings Article
01 Jan 1999

2,010 citations

Posted Content
TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Abstract: In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier) can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.A POR may be viewed as a kind of cryptographic proof of knowledge (POK), but one specially designed to handle a large file (or bitstring) F. We explore POR protocols here in which the communication costs, number of memory accesses for the prover, and storage requirements of the user (verifier) are small parameters essentially independent of the length of F. In addition to proposing new, practical POR constructions, we explore implementation considerations and optimizations that bear on previously explored, related schemes.In a POR, unlike a POK, neither the prover nor the verifier need actually have knowledge of F. PORs give rise to a new and unusual security definition whose formulation is another contribution of our work.We view PORs as an important tool for semi-trusted online archives. Existing cryptographic techniques help users ensure the privacy and integrity of files they retrieve. It is also natural, however, for users to want to verify that archives do not delete or modify files prior to retrieval. The goal of a POR is to accomplish these checks without users having to download the files themselves. A POR can also provide quality-of-service guarantees, i.e., show that a file is retrievable within a certain time bound.

1,783 citations