Time filter

Source Type

Lai C.-H.,Smart Network System Institute
Proceedings - 2011 Conference on Technologies and Applications of Artificial Intelligence, TAAI 2011 | Year: 2011

In recent years, the gesture control technique has become a new developmental trend for many human-based electronics products. This technique let people can control these products more naturally, intuitively and conveniently. In this paper, a fast gesture recognition scheme is proposed to be an interface for the human-machine interaction (HMI) of systems. This paper presents some low-complexity algorithms and gestures to reduce the gesture recognition complexity and be more suitable for controlling real-time computer systems. Besides, this paper also implements a HMI interface for a telematic service system to valid the performance of the proposed scheme and to confirm the proposed is suitable to be used to develop a HMI of telematic service systems for the in-vehicle environment. The experimental results show that the proposed scheme can work well in a real-time service system. © 2011 IEEE. Source

Lee C.-H.,National Taipei University of Technology | Lai Y.H.,Smart Network System Institute
2016 IEEE International Conference on Consumer Electronics, ICCE 2016 | Year: 2016

Energy management has become one urgent research issue. Regarding the home environment, an energy management cloud can collect home consumption usage and then supports remote control and schedule the status of home appliances. In order to increase the interoperability, this paper proposes a universal smart energy management gateway based on an open-source Internet of Things (IoT) platform called Iotivity. Therefore, the energy management cloud can be extended to monitor and manage Iotivity-compatible devices. © 2016 IEEE. Source

Ma C.,Smart Network System Institute
Proceedings - 3rd International Conference on Information Security and Intelligent Control, ISIC 2012 | Year: 2012

A matrix algebra is presented for the linear complexity of periodic sequences over finite fields. An algorithm is developed to compute the rank of the circulant matrices and it can be viewed as a matrix formulation of Blackburn's algorithm. The rank-nullity property is shown precisely between the pseudocirculant matrices and the Hasse matrices. © 2012 IEEE. Source

Chang C.-H.,National Cheng Kung University | Yang C.-W.,Smart Network System Institute | Hwang T.,National Cheng Kung University
International Journal of Theoretical Physics | Year: 2016

Recently, Yang and Hwang (Quantum Inf. Process. 13(3): 781–794, 19) proposed two fault-tolerant QKD protocols based on their proposed coding functions for resisting the collective noise, and their QKD protocols are free from Trojan horse attack without employing any specific detecting devices (e.g., photon number splitter (PNS) and wavelength filter). By using four-particle Greenberger-Horne-Zeilinger (GHZ) state and four-particle GHZ-like state in their proposed coding functions, Yang and Hwang’s QKD protocols can resist each kind of the collective noise–collective-dephasing noise, collective-rotation noise. However, their proposed coding function can be improved by the utilization of three-particle GHZ state (three-particle GHZ-like state) instead of four-particle GHZ state (four-particle GHZ-like state) that will eventually reduce the consumption of the qubits. As a result, this study proposed the improved version of Yang and Hwang’s coding functions to enhance the qubit efficiency of their schemes from 20 % to 22 %. © 2016 Springer Science+Business Media New York Source

Lin J.,National Cheng Kung University | Yang C.-W.,National Cheng Kung University | Tsai C.-W.,Smart Network System Institute | Hwang T.,National Cheng Kung University
International Journal of Theoretical Physics | Year: 2013

Recently, Li et al. [Phys. Rev. A 82(2):022303, 2010] presented two semi-quantum secret sharing (SQSS) protocols using Greenberger-Horne-Zeilinger-like states. The proposed schemes are quite practical because only the secret dealer needs to be equipped with advanced quantum devices such as quantum memory, whereas the other agents can merely perform classical operations to complete the secret sharing. However, the present study demonstrates the existence of a security pitfall in the eavesdropping check phase of both the schemes, which can lead to an intercept-resend attack and a Trojan horse attack on the two schemes by a dishonest agent, to determine the other agent's shadow and consequently derive the master key of the SQSS. This contradicts the security requirement of QSS. Fortunately, two possible solutions are proposed herein to eliminate this security pitfall. © 2012 Springer Science+Business Media, LLC. Source

Discover hidden collaborations