Search For:

Displaying 1-50 out of 125 total
Research on the influence of computer network supported cooperative learning on sentence construction skills of elementary school students
Found in: Frontiers in Education, Annual
By Tzu-Hua Huang, Yuan-Chen Liu, Wei-Ti Hsiao
Issue Date:October 2008
pp. F4E-21-F4E-26
This study concentrates on the improvement of studentspsila sentence construction skills from using the sentence construction learning Web site, which is based on computer network, supported cooperative learning. Nonequivalent pretest-posttest control grou...
 
A study on the influence of Online Office Instructions on motivation and effects of information learning in elementary school students
Found in: Frontiers in Education, Annual
By Tzu-Hua Huang, Yuan-Chen Liu, Chir-Neng Hung, Chih-Chang Chang, Wan-Ting Yen
Issue Date:October 2008
pp. S1A-17-S1A-20
Computer courses in Taiwanpsilas elementary schools are limited to learning Microsoft Office on a single machine. Therefore, the main purpose of this study is to identify the influence of online Office instructions on motivation and effects of information ...
 
Prediction of Outer Membrane Proteins by Support Vector Machines Using Combinations of Gapped Amino Acid Pair Compositions
Found in: Bioinformatic and Bioengineering, IEEE International Symposium on
By Ssu-Hua Huang, Ru-Sheng Liu, Chien-Yu Chen, Ya-Ting Chao, Shu-Yuan Chen
Issue Date:October 2005
pp. 113-120
Discriminating outer membrane proteins from proteins with other subcellular localizations and with other folding classes are both important to predict further their functions and structures. In this paper, we propose a method for discriminating outer membr...
 
Continuous Mandarin speech recognition using hierarchical recurrent neural networks
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Yuan-Fu Liao, Wen-Yuan Chen, Wen-Yuan Chen
Issue Date:May 1996
pp. 3370-3373
An ANN-based continuous Mandarin base-syllable recognition system is proposed. It adopts a hybrid approach to combine an HRNN with a Viterbi search. The HRNN is taken at a front-end processor and responsible for calculating discrimination scores for all 41...
 
Towards Service-Oriented Cognitive Networks over IP Multimedia Subsystems
Found in: Parallel and Distributed Systems, International Conference on
By Shih-Wen Hsu,Chi-Yuan Chen,Kai-Di Chang,Han-Chieh Chao,Jiann-Liang Chen
Issue Date:December 2011
pp. 541-548
Cognitive Radio (CR) is an innovative wireless sensing technology which can improve efficiency of spectrum usage. Based on CR, Cognitive network (CN) further focus on end-to-end communications for the global optimization and policy enforcement. However, th...
 
An online system using Dynamic Assessment and adaptive material
Found in: Frontiers in Education, Annual
By Yuan-Chen Liu, Ming-Chung Chiang, Sue-Chun Chen,V. Istanda, Tzu-Hua Huang
Issue Date:October 2007
pp. T3D-6-T3D-10
Two-tier testing questions are gradually becoming commonly-used conception diagnostic tools, and the application domain of Dynamic Assessment (DA) is extending from special education to general education. This study adopts the Computerized Two-tier Testing...
 
Application of a generalized probabilistic descent method to recurrent neural network based speech recognition
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Sin-Horng Chen, Yuan-Fu Liao, Wen-Yuan Chen
Issue Date:April 1994
pp. 653-656
A new method is proposed to train recurrent neural networks (RNNs) for speech recognition such that the difficulty of selecting appropriate target functions can be avoided. A novel architecture of the RNN-based speech recognition system is also introduced ...
 
Mobile learning activities design based on conceptual learning
Found in: Frontiers in Education, Annual
By Yuan-Chen Liu, Kuo-Tai Tang, Tzu-Hua Huang, Te-Yu Wang,V. Istanda
Issue Date:October 2007
pp. F4J-1-F4J-5
The study aims to examine how digital learning activities based on conceptual learning would affect the fifth grader's learning yield to the
 
Hot-carrier-Induced Circuit Degradation for 0.18 μm CMOS Technology
Found in: Quality Electronic Design, International Symposium on
By Wei Li, Qiang Li, J.S. Yuan, Joshua McConkey, Yuan Chen, Sundar Chetlur, Jonathan Zhou, A.S. Oates
Issue Date:March 2001
pp. 284
Because the supply voltage is not proportional scaled with the device size, the further scaling down of CMOS devices is in turn accompanied with more and more severe hot-carrier reliability problems. Hot-carriers, the high energy carriers due to high elect...
 
Multiple-representation online learning system that incorporates the game of monopoly
Found in: Frontiers in Education, Annual
By Yuan-Chen Liu, Kuo-Tai Tang, Tzu-Hua Huang, Yi-Chun Chien, Sue-Chun Chen
Issue Date:October 2007
pp. F2G-5-F2G-9
Representation refers to
 
Application to GA-Based Fuzzy Control for Nonlinear Systems with Uncertainty
Found in: Intelligent Information and Database Systems, Asian Conference on
By Po-Chen Chen, Ken Yeh, Cheng-Wu Chen, Chen-Yuan Chen
Issue Date:April 2009
pp. 249-252
In this study, we strive to combine the advantages of fuzzy theory, genetic algorithms (GA), H-infinite tracking control schemes, smooth control and adaptive laws to design an adaptive fuzzy sliding model controller for the rapid and efficient stabilizatio...
 
Robust Light Objects Recognition Based on Computer Vision
Found in: Parallel Architectures, Algorithms, and Networks, International Symposium on
By Yi-Yuan Chen, Kuen-Ming Lan, Hung-I Pai, Jen-Hui Chuang, Chii-Yah Yuan
Issue Date:December 2009
pp. 508-514
This paper proposes a recognition method for light objects in a video for real-time application and the movement of the surrounding objects. The method extracts the objects by considering known geometric arrangements and blinking frequency, while the latte...
 
Mining Opinion Holders and Opinion Patterns in US Financial Statements
Found in: Technologies and Applications of Artificial Intelligence, International Conference on
By Chien-Liang Chen,Chao-Lin Liu,Yuan-Chen Chang,Hsiang-Ping Tsai
Issue Date:November 2011
pp. 62-68
Subjective statements provide qualitative evaluation of the financial status of the reporting corporations, in addition to the quantitative information released in US 10-K filings. Both qualitative and quantitative appraisals are crucial for quality financ...
 
Exploring the Relationships between Annual Earnings and Subjective Expressions in US Financial Statements
Found in: E-Business Engineering, IEEE International Conference on
By Chien-Liang Chen,Chao-Lin Liu,Yuan-Chen Chang,Hsiang-Ping Tsai
Issue Date:October 2011
pp. 1-8
Subjective assertions in financial statements influence the judgments of market participants when they assess the value and profitability of the reporting corporations. Hence, the managements of corporations may attempt to conceal the negative and to accen...
 
Incorporating Signature-Monitoring Technique in VLIW Processors
Found in: Defect and Fault-Tolerance in VLSI Systems, IEEE International Symposium on
By Yung-Yuan Chen, Kun-Feng Chen
Issue Date:October 2004
pp. 395-402
This paper presents the architecture of watchdog processor using hybrid signature-monitoring technique to detect the control-flow errors occurring in the VLIW processor. The hybrid signature-monitoring technique combines the vertical signature scheme with ...
 
LocalSense: An Infrastructure-Mediated Sensing Method for Locating Appliance Usage Events in Homes
Found in: 2013 International Conference on Parallel and Distributed Systems (ICPADS)
By Hung-Yuan Chen,Chien-Liang Lai,Huan Chen,Lun-Chia Kuo,Hsi-Chuan Chen,Jyh-Shyan Lin,Yao-Chung Fan
Issue Date:December 2013
pp. 587-592
In this paper, we introduce a novel technique called Local Sense for detecting appliance usage events in a household by leveraging existing home power infrastructure. Specifically, the Local Sense technique works by purely analyzing the records taken from ...
 
A memory yield improvement scheme combining built-in self-repair and error correction codes
Found in: 2012 IEEE International Test Conference (ITC)
By Tze-Hsin Wu,Po-Yuan Chen,Mincent Lee,Bin-Yen Lin,Cheng-Wen Wu,Chen-Hung Tien,Hung-Chih Lin,Hao Chen,Ching-Nen Peng,Min-Jer Wang
Issue Date:November 2012
pp. 1-9
Error correction code (ECC) and built-in self-repair (BISR) schemes have been wildly used for improving the yield and reliability of memories. Many built-in redundancy-analysis (BIRA) algorithms and ECC schemes have been reported before. However, most of t...
 
Fighting Phishing with Discriminative Keypoint Features
Found in: IEEE Internet Computing
By Kuan-Ta Chen, Jau-Yuan Chen, Chun-Rong Huang, Chu-Song Chen
Issue Date:May 2009
pp. 56-63
Phishing is a form of online identity theft associated with both social engineering and technical subterfuge and is a major threat to information security and personal privacy. Here, the authors present an effective image-based antiphishing scheme based on...
 
Stability Analysis of Time-Delay Fuzzy Systems Using Fuzzy Lyapunov Method
Found in: Intelligent Information and Database Systems, Asian Conference on
By Ken Yeh, Cheng-Wu Chen, Shu-Hao Lin, Chen-Yuan Chen
Issue Date:April 2009
pp. 243-248
This study presents an H-infinite controller design for time-delay Takagi-Sugeno (T-S) fuzzy systems based on the fuzzy Lyapunov method, which is defined in terms of fuzzy blending quadratic Lyapunov functions. The delay-dependent robust stability criterio...
 
A Watermarking Method for Still Images Using Modified Code Division Multiple Access
Found in: Intelligent Systems Design and Applications, International Conference on
By Ji-Hong Chen, Chin-Hsing Chen, Wen-Yuan Chen
Issue Date:November 2008
pp. 352-357
Watermarking is a potential method for copyright protection and multimedia data authentication in the internet. The watermarking process can be considered as a communication task. In this paper, a novel watermarking scheme using code division multiple acce...
 
A Neural-Network Approach to Modeling and Analysis
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Chen-Yuan Chen, Cheng-Wu Chen, Wei-Ling Chiang, Jing-Dong Hwang
Issue Date:November 2002
pp. 489
It is known that backpropagation network is always used to modeling. This study is concerned with the stability problem of a neural network (NN) system which consists of a few subsystems represented by NN models. In this paper, the dynamics of each NN mode...
 
Graphics/Image Retrieval Method
Found in: Technologies and Applications of Artificial Intelligence, International Conference on
By Shang-An Li,Shu-Yuan Chen,Songzhi Su,Der-Jyh Duh,Shaozi Li
Issue Date:November 2011
pp. 19-24
New computing technologies, media acquisition/storage devices, and multimedia compression standards have increased the amount of digital data generated and stored by computer users. Nowadays, it is easy to access electronic books, electronic journals, and ...
 
Predication the Suppressing Human Oral Cancer Cell Line by Curcumin through the Research of Fas Receptor
Found in: Bioinformatic and Bioengineering, IEEE International Symposium on
By Po-Yuan Chen,Yu-Chi Wu,Tzu-Hurng Cheng,Tzu-Ching Shih,Cing-Tsan Tsai,Chieh-Hsi Wu,Tzu-Yu Hua,Yen-Yu Huang,Chia-Hsing Cheng,Ming-Jen Fan
Issue Date:October 2011
pp. 209-212
No summary available.
 
CpG-discover: A machine learning approach for CpG islands identification from human DNA sequence
Found in: Neural Networks, IEEE - INNS - ENNS International Joint Conference on
By Man Lan, Yu Xu, Lin Li, Fei Wang, Ying Zuo, Yuan Chen, Chew Lim Tan, Jian Su
Issue Date:June 2009
pp. 1702-1707
CpG islands (CGIs) play a fundamental role in genome analysis as genomic markers and tumor markers. Identification of potential CGIs has contributed not only to the prediction of promoters of most house-keeping genes and many tissue-specific genes but also...
 
An Online Control Flow Check for VLIW Processor
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Hung-Chuan Lai, Shi-Jinn Horng, Yung-Yuan Chen
Issue Date:December 2008
pp. 256-264
In this paper, we base on data computing blocks (DCBs) and DCT watchdog technology to implement VLIW watchdog processor. 32-bit final DCT signature (F-DCT-S) and several 5-bit relay DCT signatures (R-DCT-S) will be computed by DCT watchdog scheme. These ge...
 
Generalization of an Enhanced ECC Methodology for Low Power PSRAM
Found in: IEEE Transactions on Computers
By Po-Yuan Chen, Chin-Lung Su, Chao-Hsun Chen, Cheng-Wen Wu
Issue Date:July 2013
pp. 1318-1331
Error control codes (ECCs) have been widely used to maintain the reliability of memories, but ordinary ECC codes are not suitable for memories with long codewords. For portable products, power reduction in memories with DRAM-like cells can be done by reduc...
 
SyncChecker: Detecting Synchronization Errors between MPI Applications and Libraries
Found in: 2012 IEEE International Symposium on Parallel & Distributed Processing (IPDPS)
By Zhezhe Chen,Xinyu Li,Jau-Yuan Chen,Hua Zhong,Feng Qin
Issue Date:May 2012
pp. 342-353
While improving the performance, nonblocking communication is prone to synchronization errors between MPI applications and the underlying MPI libraries. Such synchronization error occurs in the following way. After initiating nonblocking communication and ...
 
An Energy-Efficient Dynamic Duty-Cycle and Dynamic Schedule Assignment Scheme for WSNs
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Hsin-Hung Cho,Jian-Ming Chang,Chi-Yuan Chen,Shin-Yun Huang,Han-Chieh Chao,Jiann-Liang Chen
Issue Date:December 2011
pp. 384-388
Wireless Sensor Network (WSN) is still a hottest research topic which can be applied to a lot of new research field such as robotic and smart grid. Its not only used for detecting the new environment but also monitoring any situation which has dynamic vari...
 
A 2D-3D Hybrid Approach to Video Stabilization
Found in: Computer-Aided Design and Computer Graphics, International Conference on
By Zhiyong Huang,Fazhi He,Xiantao Cai,Yuan Chen,Xiao Chen
Issue Date:September 2011
pp. 146-150
In this paper, we introduce a novel 2D-3D hybrid video stabilization method which combines virtues of 2D and 3D video stabilization methods in one routine. It attempts to achieve high-quality camera motions and to retain full frame coherence in each frame,...
 
Service Selection Based on Fuzzy TOPSIS Method
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Chi-Chun Lo, Ding-Yuan Chen, Chen-Fang Tsai, Kuo-Ming Chao
Issue Date:April 2010
pp. 367-372
With rapid development of service-oriented architecture and cloud computing, web services have been widely adopted for developing various kinds of applications. A set of non-functional requirements such as QoS has become important criteria for service sele...
 
Object Tracking Using an Improved Kernel Method
Found in: Embedded Software and Systems, Second International Conference on
By Yuan Chen, Shengsheng Yu, Weiping Sun, Xiaoping Chen
Issue Date:July 2008
pp. 511-515
An improved object tracking scheme is presented based on the Kalman filter and mean-shift approach. And this scheme is robust to disturbance and occlusion of both the object and the scene. The object is selected by using FG/BG detection and represented by ...
 
The study of cognitive-style-oriented online game learning system
Found in: Frontiers in Education, Annual
By Tzu-Hua Huang, Ta-Ting Yu, Chung-Hsiao Yang, Kuo-Tai Tang, Sue-Chun Chen, Yuan-Chen Liu
Issue Date:October 2007
pp. F2G-10-F2G-14
This study attempts to develop a learning system that incorporates cognitive styles and online games. Based on the learning strategies appropriate for the two types of cognitive styles (field-independent and field-dependent type) an online-game is structur...
 
A Conference Key Distribution Scheme Using Interpolating Polynomials
Found in: Multimedia and Ubiquitous Engineering, International Conference on
By Chin-Chen Chang, Chu-Hsing Lin, Chien-Yuan Chen
Issue Date:April 2007
pp. 963-967
Conference keys are secret keys used by a group of users commonly with which they can encipher (or decipher) messages such that communications are secure. Based on Diffie and Hellman?s PKDS, a conference key distribution scheme is presented in this paper. ...
 
Performance of Runtime Optimization on BLAST
Found in: Code Generation and Optimization, IEEE/ACM International Symposium on
By Abhinav Das, Jiwei Lu, Howard Chen, Jinpyo Kim, Pen-Chung Yew, Wei-Chung Hsu, Dong-Yuan Chen
Issue Date:March 2005
pp. 86-96
Optimization of a real world application BLAST is used to demonstrate the limitations of static and profile-guided optimizations and to highlight the potential of runtime optimization systems. We analyze the performance profile of this application to deter...
 
Shannon Information in Complete Genomes
Found in: Computational Systems Bioinformatics Conference, International IEEE Computer Society
By Chang-Heng Chang, Li-Ching Hsieh, Ta-Yuan Chen, Hong-Da Chen, Liaofu Luo, Hoong-Chien Lee
Issue Date:August 2004
pp. 20-30
Shannon information in the genomes of all completely sequenced prokaryotes and eukaryotes are measured in word lengths of two to ten letters. It is found that in a scale-dependent way, the Shannon information in complete genomes are much greater than that ...
 
The Performance of Runtime Data Cache Prefetching in a Dynamic Optimization System
Found in: Microarchitecture, IEEE/ACM International Symposium on
By Jiwei Lu, Howard Chen, Rao Fu, Wei-Chung Hsu, Bobbie Othmer, Pen-Chung Yew, Dong-Yuan Chen
Issue Date:December 2003
pp. 180
Traditional software controlled data cache prefetching is often ineffective due to the lack of runtime cache miss and miss address information. To overcome this limitation, we implement runtime data cache prefetching in the dynamic optimization system ADOR...
 
Efficient Resource Management during Instruction Scheduling for the EPIC Architecture
Found in: Parallel Architectures and Compilation Techniques, International Conference on
By Dong-Yuan Chen, Lixia Liu, Chen Fu, Shuxin Yang, Chengyong Wu, Roy Ju
Issue Date:October 2003
pp. 36
Effective and efficient modeling and management of hardware resources have always been critical toward generating highly efficient code in optimizing compilers. The instruction templates and dispersal rules of the EPIC architecture add new complexity in ma...
 
On the Predictability of Program Behavior Using Different Input Data Sets
Found in: Interaction between Compilers and Computer Architecture, Annual Workshop on
By Wei Chung Hsu, Howard Chen, Pen Chung Yew, Dong-Yuan Chen
Issue Date:February 2002
pp. 45
Smaller input data sets such as the test and the train input sets are commonly used in simulation to estimate the impact of architecture/micro-architecture features on the performance of SPEC benchmarks. They are also used for profile feedback compiler opt...
 
An efficient switching network fault diagnosis for reconfigurable VLSI/WSI array processors
Found in: VLSI Design, International Conference on
By Yung-Yuan Chen, Ching-Hwa Cheng, Jwu-E Chen
Issue Date:January 1995
pp. 349
In this paper, we propose a new diagnosis scheme to detect and locate the switching network defects faults in fault-tolerant VLSI/WSI array processors. Error in testing that causes a good PE, switch and link to be considered as a bad one is called
 
Naive Bayes Classifier Applied in Droplet Fingerprint Recognition
Found in: 2012 Third Global Congress on Intelligent Systems (GCIS)
By Qing Song,Xisheng Liu,Hui Yuan,Chen Qiu
Issue Date:November 2012
pp. 152-155
Droplet analysis technology developed rapidly, the recognition of droplet fingerprint become more and more important. In this paper, we introduce the waveform analysis method which used for feature extraction, and the principle of Naive Bayes classifier. T...
 
Modeling the Locality in Graph Traversals
Found in: 2012 41st International Conference on Parallel Processing (ICPP)
By Liang Yuan,Chen Ding,Daniel tefankovic,Yunquan Zhang
Issue Date:September 2012
pp. 138-147
An increasing number of applications in physical and social sciences require the analysis of large graphs. The efficiency of these programs strongly depends on their memory usage especially the locality of graph data access. Intuitively, the locality in co...
 
The Background Generation Scheme Using Image Frame Statistical Comparison Method
Found in: Computer, Consumer and Control, International Symposium on
By Wen-Yuan Chen,Chang-Sheng Lin,Chih-Nan Yu
Issue Date:June 2012
pp. 870-873
This paper develops a background generation scheme for a color video sequence. We use a temperate background in grayscale for training and a formal background in color for object extraction. Besides, we use current frame, previous frame and previous twenti...
 
Dice Image Recognition Scheme Using Pattern Comparison Technique
Found in: Computer, Consumer and Control, International Symposium on
By Wen-Yuan Chen,Pei-Jung Lin,Dong-Yi Kuo
Issue Date:June 2012
pp. 128-131
In dice recognition, there are several situations which may cause dice image identification problems including that camera zooming in, zooming out, the pip sizes become irregular. In this paper, we adopt a pattern comparison method to develop an intelligen...
 
Locating Optimal Electrodes Placement via Microelectrode Recording in General Anesthetic Patients During Deep Brain Stimulation
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Wei-Yi Chuang,Kuu-Young Young,Paul C.P. Chao,Sheng-Tzung Tsai,Shin-Yuan Chen
Issue Date:May 2012
pp. 1048-1051
Deep brain stimulation (DBS) is one of promising therapy to treat advanced Parkinson's disease. During DBS operation, general anesthetic induction has been shown an alternative procedure to avoid patient's discomfort under local anesthesia. Meanwhile, micr...
 
A Study on Coverage Problem of Network Planning in LTE-Advanced Relay Networks
Found in: Advanced Information Networking and Applications, International Conference on
By Fan-Hsun Tseng,Chi-Yuan Chen,Li-Der Chou,Tin-Yu Wu,Han-Chieh Chao
Issue Date:March 2012
pp. 944-950
In recent years new research studies have appeared that concern the issue of network planning in LTE-Advanced. In this paper, the coverage problem in LTE-Advanced relay networks is formulated based on integer linear programming (ILP). We propose the Enhanc...
 
Crowd Density Estimation Using Wireless Sensor Networks
Found in: Mobile Ad-hoc and Sensor Networks, International Conference on
By Yaoxuan Yuan,Chen Qiu,Wei Xi,Jizhong Zhao
Issue Date:December 2011
pp. 138-145
Estimation of crowd distribution is critical to various applications. Although most researches have provided solutions based on images and videos technologies, the high costs for deploying and an over-dependence on the bright light restrict its scope of ap...
 
An Energy-Efficient Scheduling Algorithm for Sporadic Real-Time Tasks in Multiprocessor Systems
Found in: High Performance Computing and Communications, 10th IEEE International Conference on
By Dong-Song Zhang,Fang-Yuan Chen,Hong-Hua Li,Shi-Yao Jin,De-Ke Guo
Issue Date:September 2011
pp. 187-194
As the energy consumption of embedded multiprocessor systems becomes increasingly prominent, the real-time energy-efficient scheduling in multiprocessor systems becomes an urgent problem to reduce the system energy consumption while meeting real-time const...
 
Low Bit Rate Compression for SAR Image Based on Blocks Reordering and 3D Wavelet Transform
Found in: Image and Graphics, International Conference on
By Yuan Chen,Rong Zhang
Issue Date:August 2011
pp. 56-60
Due to that there are a large number of similar characteristics in surface structure of the SAR image, a novel SAR image compression algorithm was proposed based on 3D wavelet transform after block reordering. This proposed algorithm consists of four succe...
 
Minimizing data center SLA violations and power consumption via hybrid resource provisioning
Found in: International Green Computing Conference and Workshops
By A. Gandhi, Yuan Chen,D. Gmach,M. Arlitt,M. Marwah
Issue Date:July 2011
pp. 1-8
This paper presents a novel approach to correctly allocate resources in data centers, such that SLA violations and energy consumption are minimized. Our approach first analyzes historical workload traces to identify long-term patterns that establish a
 
Using Quantum Search to Solve Dynamic Maximum Network Flow Problem
Found in: Parallel and Distributed Processing with Applications, International Symposium on
By Chi-Yuan Chen, Yu-Chuan Lin, Yao-Hsin Chou, Han-Chieh Chao
Issue Date:May 2011
pp. 13-18
This paper proposes a quantum search based algorithm to improve the dynamic maximum network flow problem. First, we convert the time-dependent process into time-independent process. Second, we use the draining algorithm to find out the maximum flow and com...
 
 1  2 Next >>