An effective scheduling in data centres for efficient CPU usage and service level agreement fulfilment using machine learning

R Daid, Y Kumar, YC Hu, WL Chen - Connection Science, 2021 - Taylor & Francis
Energy efficiency is one of the important parameters in cloud computing which is managed
by the data centres. Data centres are computer warehouses that are responsible for storing …

[HTML][HTML] Hiding and extracting important information in encrypted images by using the transformation of all possible permutations and VQ codebook

HX Chi, CC Chang, X Wang, CC Lin - Electronics, 2022 - mdpi.com
Due to its applications in cloud computing, research on reversible data hiding in encrypted
images (RDHEI) is becoming more and more important. This paper proposes a reversible …

A novel reversible data hiding scheme for VQ codebooks

X Wang, JC Liu, CC Chang - Security and Privacy, 2023 - Wiley Online Library
Vector quantization (VQ) technique is widely used in digital image compression. Some
reversible data hiding schemes have been proposed to embed secret data (eg, password …

[Retracted] Construction of College Chinese Writing Practice Teaching Platform under the Background of Information Technology

J Wu - Mobile Information Systems, 2022 - Wiley Online Library
Writing has always been one of the difficulties in teaching Chinese as a foreign language.
With the advent of the information society, modern information technology, represented by …

[HTML][HTML] Reversible data hiding based on pixel-value-ordering and prediction-error triplet expansion

HX Chi, JH Horng, CC Chang - Mathematics, 2021 - mdpi.com
Pixel value ordering and prediction error expansion (PVO+ PEE) is a very successful
reversible data hiding (RDH) scheme. A series of studies were proposed to improve the …

[HTML][HTML] Two-Layer Reversible Data Hiding for VQ-Compressed Images Based on De-Clustering and Indicator-Free Search-Order Coding

CC Chang, JF Chang, WJ Kao, JH Horng - Future Internet, 2021 - mdpi.com
During transmission of digital images, secret messages can be embedded using data hiding
techniques. Such techniques can transfer private secrets without drawing the attention of …

A secure extended LBP data hiding scheme based on octagon-shaped shell

CC Chang, JH Horng, WJ Kao - International Journal of …, 2021 - inderscienceonline.com
Data hiding is an important technique in the research area of information security. A lot of
methods have been proposed to embed secret data into different formats of compressed …

[HTML][HTML] Embedding Biometric Information in Interpolated Medical Images with a Reversible and Adaptive Strategy

HX Chi, JH Horng, CC Chang, YH Li - Sensors, 2022 - mdpi.com
How to hide messages in digital images so that messages cannot be discovered and
tampered with is a compelling topic in the research area of cybersecurity. The interpolation …

PENERAPAN REGRESI LINEAR BERGANDA DAN BACKPROPAGATION NEURAL NETWORK UNTUK PEMODELAN PERSEDIAAN STOK OBAT

M WIDYASTUTI - 2023 - repository.uin-suska.ac.id
Puskesmas adalah fasilitas pelayanan kesehatan yang menyelenggarakan upaya
kesehatan masyarakat dan perseorangan tingkat pertama. Salah satu komponen utama …