Jen-Chun Chang
National Taipei University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jen-Chun Chang.
international symposium on information theory | 2003
Jen-Chun Chang; Rong-Jaye Chen; Torleiv Kløve; Shi-Chun Tsai
Mappings of the set of binary vectors of a fixed length to the set of permutations of the same length are useful for the construction of permutation codes. In this article, several explicit constructions of such mappings preserving or increasing the Hamming distance are given. Some applications are given to illustrate the usefulness of the construction. In particular, a new lower bound on the maximal size of permutation arrays (PAs) is given.
IEEE Transactions on Information Theory | 2005
Jen-Chun Chang
In this correspondence, for any k ges 2, we first propose two constructions of (n,k) distance-increasing mappings (DIMs) from the set of binary vectors of length n to the set of permutations of the same length that strictly increase the Hamming distance by at least k except when it is obviously not possible. Next, we prove that for any k ges 2, there is a smallest positive integer nk such that an (n,k) DIM can be constructed for any n ges nk. An explicit upper bound on nk is also given
IEEE Transactions on Reliability | 1998
Jen-Chun Chang; Rong-Jaye Chen; Frank K. Hwang
An O(T n) algorithm is presented for the circular consecutive-weighted-k-out-of-n:F system, where T/spl les/min[n,[(k-/spl omega//sub max/)//spl omega//sub min/]+1]; /spl omega//sub max/, /spl omega//sub min/ are the maximum, minimum weights of all components. This algorithm is simpler and more efficient than the Wu and Chen O(min[n,k] n) algorithm. When all weights are unity, this algorithm is simpler than other O(k-n) published algorithms.
IEEE Transactions on Information Theory | 2006
Jen-Chun Chang
In this correspondence, for any k ges 2, we first propose two constructions of (n,k) distance-increasing mappings (DIMs) from the set of binary vectors of length n to the set of permutations of the same length that strictly increase the Hamming distance by at least k except when it is obviously not possible. Next, we prove that for any k ges 2, there is a smallest positive integer nk such that an (n,k) DIM can be constructed for any n ges nk. An explicit upper bound on nk is also given
Microelectronics Reliability | 2000
Frank K. Hwang; Lirong Cui; Jen-Chun Chang; Wen-Dar Lin
Abstract Zuo claimed that the comparison of Birnbaum importance between two components for a consecutive- k -out-of- n : G system is the same as that for the F -system. We show that this is not the case and give a correct relation between the two systems.
IEEE Transactions on Information Theory | 2008
Jyh-Shyan Lin; Jen-Chun Chang; Rong-Jaye Chen; Torleiv Kløve
Permutation arrays have found applications in powerline communication. One construction method for permutation arrays is to map good codes to permutations using a distance-preserving mappings (DPM). DPMs are mappings from the set of all q-ary vectors of a fixed length to the set of permutations of some fixed length (the same or longer) such that every two distinct vectors are mapped to permutations with the same or larger Hamming distance than that of the vectors. A DPM is called distance increasing (DIM) if the distances are strictly increased (except when the two vectors are equal). In this correspondence, we propose constructions of DPMs and DIMs from ternary vectors. The constructed DPMs and DIMs improve many lower bounds on the maximal size of permutation arrays.
intelligent information hiding and multimedia signal processing | 2009
Jen-Chun Chang; Hsin-Lung Wu
We study the problem how to construct an RFID mutual authentication protocol between tags and readers. Juels (in Journal on Selected Areas in Communications, 2006) proposed an open question which asks whether there exists a fully privacy-preserving RFID authentication protocol in which the time complexity of a successful authentication phase can be done in sub-linear time
Information Processing Letters | 2006
Jyh-Shyan Lin; Jen-Chun Chang; Rong-Jaye Chen
o(n)
international symposium on information theory | 2009
Jen-Chun Chang; Hsin-Lung Wu
where
Methodology and Computing in Applied Probability | 2001
Jen-Chun Chang; Rong-Jaye Chen; Frank K. Hwang
n