scispace - formally typeset
Search or ask a question
Author

Jeng-Shyang Pan

Bio: Jeng-Shyang Pan is an academic researcher from Shandong University of Science and Technology. The author has contributed to research in topics: Digital watermarking & Watermark. The author has an hindex of 50, co-authored 789 publications receiving 11645 citations. Previous affiliations of Jeng-Shyang Pan include National Kaohsiung Normal University & Technical University of Ostrava.


Papers
More filters
Book ChapterDOI
01 Jan 2020
TL;DR: In this article, the authors used open-type FTIR and integrated IoT mechanism to connect to the cloud, which is suitable for a variety of gaseous pollutants, such as TEOS, C2H4, and CO.
Abstract: Modern FABs use a large number of high-energy processes such as plasma, CVD, and ion implantation; the furnace is one of the important tools of semiconductor manufacturing. The FAB installed FTIR system due to the 12” furnace tools based on the aforementioned production management requirements. This study used open-type FTIR and integrated IoT mechanism to connect to the cloud, which is suitable for a variety of gaseous pollutants. This study set up two measuring points of furnace process tools in the 12” factory of Hsinchu Science Park in Taiwan. This study obtained FTIR measurements, and according to the OHSA regulations, this study is set in the cloud database for big data analysis and decision-making, when the upper limits of TEOS, C2H4, and CO are 0.6 ppm, 2.0 ppm, and 1.7 ppm and the lower limits of TEOS, C2H4, and CO are 0.4 ppm, 1.5 ppm, and 1 ppm. The application architecture of this study can be extended to other semiconductor processes, so that IoT integration and big data operations can be performed for all processes; this is an important step in promoting FAB intelligent production and an important contribution of this study.

4 citations

Book ChapterDOI
02 Aug 2016
TL;DR: Through this change, the network convergence has sped up, the location accuracy has improved, and wrong location and long time consuming, which caused by some complicated factors such as light conditions, fuzzy image, tilt, complex background and so on, have been resolved.
Abstract: Although the license plate recognition system has been widely used, the location and recognition rate is still affected by the clarity and illumination conditions. A license plate locating (LPL) method and a license plate characters recognition (LPCR) method, respectively, based on convolution neural network (CNN) and Length_Feature (LF), are proposed in this paper. Firstly, this paper changes the activation function of CNN, and extracts local feature to train the network. Through this change, the network convergence has sped up, the location accuracy has improved, and wrong location and long time consuming, which caused by some complicated factors such as light conditions, fuzzy image, tilt, complex background and so on, have been resolved. Secondly, the LF, which is proposed in this paper, is easier to understand and has less calculation and higher speed than transform domain features, and also has higher accuracy to recognize fuzzy and sloping characters than traditional geometric features.

4 citations

Proceedings ArticleDOI
18 Dec 2006
TL;DR: A novel matrix norm based Gaussian kernel which views images as matrices is proposed to solve the problem of large storage requirements and large computational effort for transforming images to vectors.
Abstract: Gaussian kernel is widely used in Support Vector Machines and many other kernel methods, and it is most often deemed to provide a local measure of similarity between vectors, which causes large storage requirements and large computational effort for transforming images to vectors owing to its viewing images as vectors. A novel matrix norm based Gaussian kernel (M-Gaussian kernel) which views images as matrices is proposed to solve the problem. Experiments conducted on ORL face database show the effectiveness of the proposed M-Gaussian kernel.

4 citations

Book ChapterDOI
08 May 2007
TL;DR: This paper presents a probabilistic simulation of the response of the solar wind turbine to high-energy particles and shows how the wind turbine’s response to low-frequency radio signals varies greatly in both the horizontal and the vertical.
Abstract: 1 Department of Electrical Engineering, National University of Kaohsiung, Kaohsiung 811, Taiwan, R.O.C. huang.hc@gmail.com 2 Department of Electronic Engineering, National Kaohsiung University of Applied Sciences, Kaohsiung 807, Taiwan, R.O.C. jspan@cc.kuas.edu.tw 3 California Institute of Technology & NASA’s Jet Propulsion Lab, Pasadena, CA, USA wai-chi.fang@jpl.nasa.gov 4 University of South Australia, Adelaide, Australia Lakhmi.Jain@unisa.edu.au

4 citations

Proceedings ArticleDOI
17 Jul 2017
TL;DR: A forgery attack and a data corruption attack are proposed to demonstrate the insecurity of the proposed privacy preserving public auditing mechanism, and a modified scheme based on their mechanism is proposed.
Abstract: Auditing mechanisms are received much attentions from researchers due to the developing of cloud storage. Recently, Wang et al. proposed a privacy preserving public auditing mechanism for shared cloud data with supporting group dynamic. However, we find some security flaws in their mechanism. In this paper, a forgery attack and a data corruption attack are proposed to demonstrate the insecurity. Then, we propose a modified scheme based on their mechanism. The security analysis is demonstrated that our improvement can resist the mentioned two attacks.

4 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: It is proved the convergence of a recursive mean shift procedure to the nearest stationary point of the underlying density function and, thus, its utility in detecting the modes of the density.
Abstract: A general non-parametric technique is proposed for the analysis of a complex multimodal feature space and to delineate arbitrarily shaped clusters in it. The basic computational module of the technique is an old pattern recognition procedure: the mean shift. For discrete data, we prove the convergence of a recursive mean shift procedure to the nearest stationary point of the underlying density function and, thus, its utility in detecting the modes of the density. The relation of the mean shift procedure to the Nadaraya-Watson estimator from kernel regression and the robust M-estimators; of location is also established. Algorithms for two low-level vision tasks discontinuity-preserving smoothing and image segmentation - are described as applications. In these algorithms, the only user-set parameter is the resolution of the analysis, and either gray-level or color images are accepted as input. Extensive experimental results illustrate their excellent performance.

11,727 citations

Book
24 Oct 2001
TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Abstract: Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications.

2,849 citations

Proceedings Article
01 Jan 1999

2,010 citations

Posted Content
TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Abstract: In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier) can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.A POR may be viewed as a kind of cryptographic proof of knowledge (POK), but one specially designed to handle a large file (or bitstring) F. We explore POR protocols here in which the communication costs, number of memory accesses for the prover, and storage requirements of the user (verifier) are small parameters essentially independent of the length of F. In addition to proposing new, practical POR constructions, we explore implementation considerations and optimizations that bear on previously explored, related schemes.In a POR, unlike a POK, neither the prover nor the verifier need actually have knowledge of F. PORs give rise to a new and unusual security definition whose formulation is another contribution of our work.We view PORs as an important tool for semi-trusted online archives. Existing cryptographic techniques help users ensure the privacy and integrity of files they retrieve. It is also natural, however, for users to want to verify that archives do not delete or modify files prior to retrieval. The goal of a POR is to accomplish these checks without users having to download the files themselves. A POR can also provide quality-of-service guarantees, i.e., show that a file is retrievable within a certain time bound.

1,783 citations