Chun-Shun Tseng

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
⎯This paper presents an improved multi-object segmentation algorithm based on probabilistic labeling. First, a critical look is focused on utilizing vector calculus operator and combinational operator to rewrite Dirichlet integral into a matrix form, and boundary condition is defined to obtain the needed harmonic function. The only unique parameter β that(More)
This paper presents an eavesdropper-proof algorithm that is capable of fast generating symmetric (secret) keys. Instead of literally exchanging secret keys, both the sender and receiver adopt a mirroring process based on an improved Hebbian rule that uses identical random inputs to separately train on their reciprocal outputs to generate a pair of exactly(More)
This paper presents a statistical approach to the formation of a complete set of “meaningful contours” conformal to human visual perception, characterized by preserving both illusory edge pixels and their corresponding physical edge pixels through alignment interpretation. The method mainly consists of two stages: (i) learning alignment(More)
This paper presents a self-organizing fusion neural network (SOFNN) which is effective in performing fast image segmentation. Based on a counteracting learning strategy, SOFNN employs two parameters that together control the learning rate in a counteracting manner to achieve free of over-segmentation and under-segmentation. Regions comprising an object are(More)
This paper presents a novel approach called PEPA (Perceptual Edges Preservation Algorithm) which enables computing machines to mimic the human vision capability in perceiving meaningful objects in an input scene, characterized in that the preserved edges are conformal to human vision perception. The approach mainly comprises three stages: (1) applying(More)
A novel method for fast reading barcodes commonly encountered in industrial applications is presented. The method mainly consists of two stages: (1) a process characterizing in cross scanning an overly downscaled image to extract candidate barcode skeletons is used to locate barcodes in an image, wherein at least one skeleton is extracted from the(More)
  • 1