Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Articles by Hao Luo
Total Records ( 11 ) for Hao Luo
  Zhenfei Zhao , Hao Luo and Zhe-Ming Lu
  This study proposes an improved image secret sharing scheme based on the discrete fractional random transform. In this (r, n)-threshold prototype, the shadow size is reduced to 1/r of the secret image. In contrast, all shadows are of the same size as that of the secret image in the original scheme. Consequently, much storage space and transmission time is saved. Besides, our scheme can be naturally extended to multi-image secret sharing, i.e., r secret images can be encrypted in n shadows at a time. Meanwhile, the security is perfectly preserved due to the randomness of the discrete fractional random transform. Experimental results demonstrate the effectiveness of our scheme.
  Hua Chen , Hao Luo , Fa-Xin Yu , Zheng-Liang Huang and Ji-Xin Liu
  This study proposes a progressive transmission method for satellite images based on the integer discrete cosine transform. It has two characteristics, low-complexity and lossless reconstruction ability. Besides, high quality intermediate image can be obtained at the early stage with a low bit rate. The reconstructed images visual quality at stage 4 is acceptable and the associated bit rate is approximately 0.2. In addition, when all stages transmission completed, the reconstructed image is accurately recovered. Experimental results demonstrate the effectiveness of the proposed method and show it outperforms the classical low-complexity progressive transmission method based on BPM. Our method can be used in many practical applications of satellite image transmission.
  Hao Luo , Fa-Xin Yu , Hui Li and Zheng-Liang Huang
  This study proposes a novel simple scheme for color image encryption. The RGB color components of the input image are permuted and transformed into the YCbCr color space. Then three simultaneous equations are constructed for secret sharing of the luminance and two chrominance components. After several iterations, the output of this equation set is the encrypted content. These encrypted channels are recomposed to the encrypted image. In image decryption, we merely need to solve the simultaneous equation set based on Largrange’s interpolation with several inverse iterations. The decrypted image is of very high quality for only slight degradation is introduced due to the color space mapping. Security of our scheme is well preserved as long as the permutation key kept secret. Experimental results validate the effectiveness of the proposed method.
  Fa-Xin Yu , Jia-Rui Liu , Zheng-Liang Huang , Hao Luo and Zhe-Ming Lu
  With the development of astronautic techniques, the radiation effects on Integrated Circuits (ICs) have been cognized by people. Environments with high levels of ionizing radiation create special design challenges for ICs. To ensure the proper operation of such systems, manufacturers of integrated circuits and sensors intended for the military aerospace markets adopt various methods of radiation hardening. An overview of radiation hardening techniques for IC design is given in this study. First, seven major radiation damage sources, two fundamental damage mechanisms, five sorts of end-user effects and six types of single-event effects are introduced, followed by the brief introduction of radiation hardening techniques. Secondly, typical physical radiation hardening techniques are introduced. Thirdly, typical logical radiation hardening techniques are introduced. Fourthly, we propose our radiation hardening scheme for microwave power amplifier chip design. Here, a Radio-Frequency (RF) Power Amplifier (PA) is a sort of electronic amplifier employed to convert a low-power radio-frequency signal into a larger signal of significant power, typically for driving the antenna of a transmitter. Finally, we concluded the whole study.
  Hui Li , Fa-Xin Yu , Xiao-lin Zhou and Hao Luo
  In delay tolerant mobile networks, there are always no end-to-end paths due to sparse nodes and their irregular movement, so the forwarding of messages from source nodes to the destinations is a crucial task, which results in low probability of successful messages delivery and buffer occupancy for a long time. Routing in these networks is affected by some metrics, but the number of new connections especially is the crucial factor in delivering messages. Under this detection, we proposed every connection routing, which pay more attention to new connections between nodes but not the older ones. Further together with countdown timer and a fast buffer-released mechanism, every connection routing, are influenced by nodes’ speed, communication range and number, expiration time and simulation area. Buffer-release-enhanced weighted every connection routing may only increase processing time by the introducing of messages releasing time, but the benefit is lighter loaded buffers and higher efficiency of networks. The performance of buffer-release-enhanced weighted every connection routing is able to guarantees the validity of message delivery and improve the efficiency of the networks.
  Hao Luo , Zhenfei Zhao and Zhe-Ming Lu
  This study proposed a scheme that incorporates secret sharing and data hiding techniques for block truncation coding compressed image transmission. The bitmap of each compressed block is encrypted and meanwhile two quantization levels are hidden in two share images. The secure transmission system still preserves the properties such as low complexity and acceptable reconstruction image quality of the standard block truncation coding compression. In addition, each share image is half size of the compressed version such that no extra burden is laid on available transmission resources. Experimental results demonstrate the effectiveness of our scheme.
  Zhenfei Zhao and Hao Luo
  As an effective technique, reversible data hiding played an important role in multimedia security. Its key advantage lies in not only the cover image but also the secret hidden data can be recovered accurately in decoder. In recent years, many reversible data hiding schemes for images were developed, aiming to enhance the hiding capacity and stego-image visual quality. Fractal curves have been successfully applied in digital image processing. In this study, the Hilbert curve, one of the popular used Fractal curves, was applied for reversible data hiding in natural images incorporated with histogram modification. Extensive experimental results demonstrated the effectiveness of the proposed scheme. Moreover, the superior performance of higher capacity and better stego-image quality is illustrated in comparison with several available methods of the same kind.
  Wei Chen , Hao Luo , Min Zhou , Zhe-Ming Lu , Yong-Heng Shang and Fa-Xin Yu
  In this study a level converter based on GaAs pHEMT technology for a MFC (Multifunctional Chip) is designed, simulated and tested for the application of T/R (Transmit/Receive) module for an X band phase array radar system. It has the advantages of smaller chip size, lower power consumption, higher efficiency, lower cost and high stability. The circuit design is based on a feedback and feed-forward network which compensates the chip process variations during the wafer fabrication and operation temperature changing. It results the designed chip has a high stability. Its supply voltage is -5 v with a shared bias generator, this allows reducing the power consumption compared with the other design at -7.5 v in the literature. The testing results have shown that the proposed novel design has met all the specifications given in this project.
  Yi-Qun Hu , Hao Luo , Yong-Heng Shang and Fa-Xin Yu
  A novel highly integrated front-end TR (Transmit-Receive) module with four RF (Radio Frequency) channels for the application of a K-Band transceiver is introduced. The housing cavity of the proposed TR module is based on the LTCC (Low Temperature Co-Fired Ceramics) technology with embedded passive RF circuit, control signal circuit and bias power supply circuit. Due to the employing of the LTCC technology, it allows to reduce the overall size and weight of the designed TR module. Furthermore, such design improves the overall performance of the TR module with a lower cost and high efficiency.
  Hao Luo , Fa-Xin Yu , Jeng-Shyang Pan , Shu-Chuan Chu and Pei-Wei Tsai
  Biometric technology is an efficient personal authentication and identification technique. As one of the main-stream branches, vein recognition has drawn much attention among researchers and diverse users. This study proposes a survey of vein recognition techniques. The basic principle, key techniques, performance evaluation metrics, application fields and future trends are extensively analyzed. In particular, in the key techniques, most previous work is systematically described and compared in three parts, i.e., vein image acquisition and preprocessing, feature extraction and feature matching. According to the available work in theoretical analysis reports in literatures and commercial utilization experiences, vein recognition has been proved to be an effective, secure and reliable choice of high precision among biometrics techniques. It maintains an excellent promise in various applications.
  Hao Luo , Yehua Li , Jung- Jung Mu , Jinglan Zhang , Toru Tonaka , Yasuo Hamamori , Sung Yun Jung , Yi Wang and Jun Qin
  Structure maintenance of chromosome 1 (SMC1) is phosphorylated by ataxia telangiectasia-mutated (ATM) in response to ionizing radiation (IR) to activate intra-S phase checkpoint. A role of CK2 in DNA damage response has been implicated in many previous works, but the molecular mechanism for its activation is not clear. In the present work, we report that SMC3 is phosphorylated at Ser-1067 and Ser-1083 in vivo. Ser-1083 phosphorylation is IR-inducible, depends on ATM and Nijmegen breakage syndrome 1 (NBS1), and is required for intra-S phase checkpoint. Interestingly, Ser-1067 phosphorylation is constitutive and is not induced by IR but also affects intra-S phase checkpoint. Phosphorylation of Ser-1083 is weakened in cells expressing S1067A mutant, suggesting interplay between Ser-1067 and Ser-1083 phosphorylation in DNA damage response. Consistently, small interfering RNA knockdown of CK2 leads to attenuated phosphorylation of Ser-1067 as well as intra-S phase checkpoint defect. Our data provide evidence that phosphorylation of a core cohesin subunit SMC3 by ATM plays an important role in DNA damage response and suggest that a constitutive phosphorylation by CK2 may affect intra-S phase checkpoint by modulating SMC3 phosphorylation by ATM.
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility