Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yen-Ping Chu is active.

Publication


Featured researches published by Yen-Ping Chu.


Journal of Systems and Software | 2005

A new multi-secret images sharing scheme using Largrange's interpolation

Jen-Bang Feng; Hsien-Chu Wu; Chwei-Shyong Tsai; Yen-Ping Chu

Secret sharing is to send shares of a secret to several participants, and the hidden secret can be decrypted only by gathering the distributed shares. This paper proposes an efficient secret sharing scheme using Largranges interpolation for generalized access structures. Furthermore, the generated shared data for each qualified set is 1/(r-1) smaller than the original secret image if the corresponding qualified set has r participants. In our sharing process, a sharing circle is constructed first and the shared data is generated from the secret images according to this sharing circle. The properties of the sharing circle not only reduce the size of generated data between two qualified sets but also maintain the security. Thus the actual ratio of the shared data to the original secret images is reduced further. The proposed scheme offers a more efficient and effective way to share multiple secrets.


IEICE Transactions on Information and Systems | 2006

Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows*This research was partially supported by the National Science Council, Taiwan, R.O.C., under contract no.: NSC91-2213-E-324-003.

Min-Shiang Hwang; Jung-Wen Lo; Shu-Yin Hsiao; Yen-Ping Chu

An authenticated encryption scheme provides a mechanism of signing and encrypting simultaneously, and furthermore, the receiver can verify and decrypt the signature at the same time. Tseng et al. proposed two efficiently authenticated encryption schemes which can check the validity of the sent data before message recovery, but in fact their schemes cannot achieve completely the function. In this article, we point out the flaw and propose an improved scheme of revision.


computer supported cooperative work in design | 2006

A Generic Application Sharing Architecture Based on Message-Oriented Middleware Platform

Hui-Chieh Lu; Yen-Ping Chu; Ruey-Kai Sheu; Win-Tsung Lo

Previous application sharing systems have no unified communication protocols. The well known application sharing protocols include RFB (Remote FrameBuffer), RDP (Remote Desktop Protocol) and ITU-T T.128. A generic application sharing architecture is proposed for providing the capability of connecting various application sharing servers with the same application sharing client. A communication standard for application sharing systems is defined based on the Message-Oriented Middleware (MOM). To compare with previous application sharing systems, there are many advantages including easy to use, easy to connect, easy to integrate, higher scalability and less bandwidth consumption.


Computer Standards & Interfaces | 2008

A generic application sharing architecture based on message-oriented middleware platform

Hui-Chieh Lu; Yen-Ping Chu; Ruey-Kai Sheu; Win-Tsung Lo

Previous application sharing systems have no unified communication protocols. The well known application sharing protocols include RFB (remote framebuffer), RDP (remote desktop protocol) and ITU-T T.128. A generic application sharing architecture is proposed for providing the capability of connecting various application sharing servers with the same application sharing client. A communication standard for application sharing systems is defined based on the message-oriented middleware (MOM). To compare with previous application sharing systems, there are many advantages including easy to use, easy to connect, easy to integrate, higher scalability and less bandwidth consumption


asia-pacific web conference | 2006

Object finding system based on RFID technology

Lun-Chi Chen; Ruey-Kai Sheu; Hui-Chieh Lu; Win-Tsung Lo; Yen-Ping Chu

Locations of moving or missing objects are getting important information for context-aware applications which try to get the locality of an object, and then provide services pertaining to the object. To position an object, most systems use a predefined coordinate to compute object location while sensing the appearance of the target object. Usually, it is troublesome and costs much to define the base coordinate in advance for most object positioning systems, especially when the target object is locating in an unknown environment. To reduce the cost and complexity of object locating system and improve the accuracy of location, this paper proposed an Object Finding System based on RFID technology to identify the localities of target objects in buildings. In this paper, we introduce the design concepts of the proposed system as well as the algorithms used to calculate the object locations. In addition, the experimental results show that it is a feasibility study.


Intervirology | 2005

SARS-CoV infection was from at least two origins in the Taiwan area

Mu-Chin Shih; Konan Peck; Wen-Ling Chan; Yen-Ping Chu; Jui-Chang Chen; Chang Hai Tsai; Jan-Gowth Chang

Objective: Severe acute respiratory syndrome (SARS) is caused by a new coronavirus. Genomic sequence analysis will provide the molecular epidemiology and help to develop vaccines. Methods: We developed a rapid method to amplify and sequence the whole SARS-CoV genome from clinical specimens. The technique employed one-step multiplex RT-PCR to amplify the whole SARS-CoV genome, and then nested PCR was performed to amplify a 2-kb region separately. The PCR products were sequenced. Results: We sequenced the genomes of SARS-CoV from 3 clinical specimens obtained in Taiwan. The sequences were similar to those reported by other groups, except that 17 single nucleotide variations and two 2-nucleotide deletions, and a 1-nucleotide deletion were found. All the variations in the clinical specimens did not alter the amino acid sequence. Of these 17 sequenced variants, two loci (positions 26203 and 27812) were segregated together as a specific genotype – T:T or C:C. Phylogenetic analysis showed two major clusters of SARS patients in Taiwan. Conclusion: We developed a very economical and rapid method to sequence the whole genome of SARS-CoV, which can avoid cultural influence. From our results, SARS patients in Taiwan may be infected from two different origins.


International Journal of Electronics | 1993

A neural-based boolean function generator

Yen-Ping Chu

Abstract A neural technique is used to implement a positive logic boolean function. The neural technique is a modified perceptron learning algorithm by which a boolean function can be generated. The connected weight values in the neural network represents the sum of product terms of a boolean function. The paper is divided into four parts. First, a neural network technique to generate functional-link cells for successful learning is provided. Second, an improved method is described to decrease the required number of functional-link cells for successful learning. Third, the algorithm is described and proved. Finally, a functional hardware diagram is proposed to illustrate the overall structure and an example is taken to validate its effectiveness.


encyclopedia of information science and technology | 2009

A Duplicate Chinese Document Image Retrieval System

Yung-Kuan Chan; Yu-An Ho; Hsien-Chu Wu; Yen-Ping Chu


Computers in Biology and Medicine | 2006

Identification of mouse mslp2 gene from EST databases by repeated searching, comparison, and assembling

Wen-Ling Chan; Jan-Gowth Chang; Yung-Fu Chen; Yung-Kuan Chan; Yen-Ping Chu


METMBS | 2004

Identification of Mouse mslp2 from EST Databases by Repeated Searching, Comparison, and Assembling.

Wen-Ling Chan; Yen-Ping Chu; Yung-Fu Chen; Chwei-Shyong Tsai; Jan-Gowth Chang

Collaboration


Dive into the Yen-Ping Chu's collaboration.

Top Co-Authors

Avatar

Hui-Chieh Lu

National Chung Hsing University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chwei-Shyong Tsai

National Chung Hsing University

View shared research outputs
Top Co-Authors

Avatar

Yung-Fu Chen

Central Taiwan University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Yung-Kuan Chan

National Chung Hsing University

View shared research outputs
Top Co-Authors

Avatar

Jen-Bang Feng

National Chung Hsing University

View shared research outputs
Top Co-Authors

Avatar

Jui-Chang Chen

National Chiayi University

View shared research outputs
Top Co-Authors

Avatar

Jung-Wen Lo

National Chung Hsing University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge