Search For:

Displaying 1-50 out of 129 total
Synthesis of gold nanoparticles using a vortex-type micro-mixing system
Found in: International Conference on Nano/Micro Engineered and Molecular Systems
By Sung-Yi Yang, Fong-Yu Cheng, Chen-Sheng Yeh, Huan-Yao Lei, Gwo-Bin Lee
Issue Date:January 2009
pp. 227-230
A new microfluidic reaction chip capable of mixing, transporting and reacting is developed for synthesis of gold nanoparticles with tunable sizes. It allows for a rapid and a cost-effective approach to accelerate the synthesis of gold nanoparticles. The mi...
Radio Resource Management for QoS Guarantees in Cyber-Physical Systems
Found in: IEEE Transactions on Parallel and Distributed Systems
By Shao-Yu Lien,Shin-Ming Cheng,Sung-Yin Shih,Kwang-Cheng Chen
Issue Date:September 2012
pp. 1752-1761
The recent deployment of Cyber-Physical Systems (CPS) has emerged as a promising approach to provide extensive interaction between computational and physical worlds. For a large-scale distributed CPS comprising of numerous machines, sharing radio resource ...
Topology control in multi-channel cognitive radio networks with non-uniform node arrangements
Found in: Computers and Communications, IEEE Symposium on
By Pin-Yu Chen,V. Karyotis,S. Papavassiliou, Kwang-Cheng Chen
Issue Date:July 2011
pp. 1033-1037
Cognitive Radio (CR) techniques have been developed to allow ad hoc users to communicate with each other by exploiting the licensed bands of primary systems without disturbing the entrenched users. In this work, we take current approaches one step ahead an...
Identifying the Critical Features That Affect the Job Performance of Survey Interviewers
Found in: Technologies and Applications of Artificial Intelligence, International Conference on
By Fu Chang,Jeng-Cheng Chen,Chan-Cheng Liu,Chia-Hsiung Liu,Meng-Li Yang,Ruoh-Rong Yu
Issue Date:November 2011
pp. 149-154
In an attempt to build a good predictor of the performance of survey interviewers, we propose a feature selection method that derives the features¡¦ strength (i.e., degree of usefulness) from various feature subsets drawn from a pool of all the features....
A Performance Study of Virtual Machine Migration vs. Thread Migration for Grid Systems
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Po-Cheng Chen, Cheng-I Lin, Sheng-Wei Huang, Jyh-Biau Chang, Ce-Kuen Shieh, Tyng-Yeu Liang
Issue Date:March 2008
pp. 86-91
Grid computing integrates abundant distributed resources into a single large-scale problem solving environment for parallel applications. However, the grid is a non-dedicated and dynamic computing environment. Grid applications consequently compete with ea...
Evolving Intelligent Mario Controller by Reinforcement Learning
Found in: Technologies and Applications of Artificial Intelligence, International Conference on
By Jyh-Jong Tsay,Chao-Cheng Chen,Jyh-Jung Hsu
Issue Date:November 2011
pp. 266-272
Artificial Intelligence for computer games is an interesting topic which attracts intensive attention recently. In this context, Mario AI Competition modifies a Super Mario Bros game to be a benchmark software for people who program AI controller to direct...
Built-in fine resolution clipping with calibration technique for high-speed testing by using wireless testers
Found in: Dependable Systems and Networks Workshops
By Ching-Hwa Cheng,Chen-I Chung
Issue Date:June 2011
pp. 81-84
There are many test challenges generated from at-speed delay testing requirements. BIST circuit can help to solve traditionally slower AT E tester problems. In this paper, a double edge clipping technique is proposed for at-speed BIST testing. It differs f...
Agent Recommendation for Agent-Based Urban-Transportation Systems
Found in: IEEE Intelligent Systems
By Cheng Chen,Shuang Shuang Li,Bo Chen,Ding Wen
Issue Date:November 2011
pp. 77-81
Mobile-agent technology has been adopted in many transportation fields to take advantages of different agents to deal with dynamic changes and uncertainty in traffic environments. However, few research studies have been conducted in urban-transportation sy...
Cutting Force Test of Bush Stalk
Found in: Asia-Pacific Power and Energy Engineering Conference
By Zhongjia Chen, Cheng Chen, Guosheng Yu
Issue Date:March 2011
pp. 1-5
Cryptanalysis of a Secure Dynamic Identity Based Authentication Protocol for Multi-server Architecture
Found in: Computer, Consumer and Control, International Symposium on
By Chin-Ling Chen,Chien-Hung Chen,Chih-Cheng Chen
Issue Date:June 2012
pp. 934-937
The dynamic identity based authentication was a worth researching issue in the mutual authentication. In 2011, Sood et al. proposed a secure dynamic identity based authentication protocol for multi-server architecture to improve Hsiang and Shih's protocol....
Lossless Coding of Multiband Images Using Interband Data Correlation and Error Feedback Prediction Scheme
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Cheng-Chen Lin, Yin-Tsung Hwang, Yi-Chen Chang, Jiun-Jiang Chen, Ming-Wei Liu
Issue Date:October 2010
pp. 280-283
In this paper, a multiband loss less compression system exploiting inter-band data correlation is presented. We develop an adaptive prediction scheme that can dynamically switch among smooth, intra and intra-band prediction modes subject to the data correl...
A Wide-VDD Embedded SRAM for Dynamic Voltage Asynchronous Systems
Found in: Memory Technology, Design and Testin, IEEE International Workshop on
By Shu-Meng Yang, Meng-Fan Chang, Kung-Ting Chen, Wen-Chin Wu, Yuan-Hua Chu, Ting-Sheng Chao, Ming-Bin Chen, Ping-Cheng Chen
Issue Date:September 2009
pp. 20-24
Voltage-dependent timing skews in precharge and sensing activities cause functional failure and reduce the speed of asynchronous SRAM. Data-dependent bitline leakage current further increases the timing skews and reduces the yield of asynchronous SRAM. A d...
Maximizing Unavailability Interval for Energy Saving in IEEE 802.16e Wireless MANs
Found in: IEEE Transactions on Mobile Computing
By Tuan-Che Chen, Jyh-Cheng Chen, Ying-Yu Chen
Issue Date:April 2009
pp. 475-487
This paper presents an energy conservation scheme, Maximum Unavailability Interval (MUI), to improve the energy efficiency for the Power Saving Class of Type II in IEEE 802.16e. By applying the Chinese Remainder Theorem, the proposed MUI is guaranteed to f...
Fast Handoff in Mobile Virtual Private Networks
Found in: A World of Wireless, Mobile and Multimedia Networks, International Symposium on
By Jyh-Cheng Chen, Jui-Chi Liang, Siao-Ting Wang, Shin-Ying Pan, Yin-Shin Chen, Ying-Yu Chen
Issue Date:June 2006
pp. 548-552
This paper presents the dynamic external Home Agent (x-HA) assignment, fast authentication, and preauthentication in mobile Virtual Private Networks (VPNs). The proposed architecture is based on the mobile VPN proposed by the IETF, which adopts Mobile IP a...
Spigot: Fragment-Level File Sharing and Consistency on Grids
Found in: Advanced Information Networking and Applications, International Conference on
By Po-Cheng Chen, Jyh-Biau Chang, Jia-Hao Yang, Yi-Chang Zhuang, Ce-Kuen Shieh
Issue Date:May 2009
pp. 884-891
Conventional data grid systems require the application to access remote data through explicit APIs, consequently sacrificing user transparency. Thus, some systems enable the application to transparently access remote data by copying the entire file to a us...
Memory-Mapped File Approach for On-Demand Data Co-allocation on Grids
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Po-Cheng Chen, Jyh-Biau Chang, Yi-Chang Zhuang, Ce-Kuen Shieh, Tyng-Yeu Liang
Issue Date:May 2009
pp. 300-307
Grid data sharing systems usually provide a data-intensive application with either a pre-staging mechanism or an on-demand access mechanism to access shared data. Pre-staging systems simultaneously download an entire shared file from multiple data sources ...
A Distributed Environment for Hypercube Computing
Found in: Parallel Algorithms / Architecture Synthesis, AIZU International Symposium on
By Jung-Sing Jwo, Shi-Sen Chang, Yi-Cheng Chen, D. Frank Hsu
Issue Date:March 1997
pp. 256
In this paper we propose a distributed computing environment, namely, Virtual-Cube (VC), to support arbitrarily large binary hypercube computing on a cluster of homogeneous workstations that are interconnected by ethernet LAN. The embedding concept between...
A Predicting Model of TV Audience Rating Based on the Facebook
Found in: 2013 International Conference on Social Computing (SocialCom)
By Yu-Hsuan Cheng,Chen-Ming Wu,Tsun Ku,Gwo-Dong Chen
Issue Date:September 2013
pp. 1034-1037
TV audience rating is an important indicator regarding the popularity of programs and it is also a factor to influence the revenue of broadcast stations via advertisements. Presently, the only way for assessing audience rating is the Nielsen TV rating, whi...
Design of Artificial Neural Network-Based Virtual Power Meter
Found in: Computer, Consumer and Control, International Symposium on
By Cheng-I Chen,Yeong-Chin Chen
Issue Date:June 2012
pp. 520-523
An artificial neural network (ANN)-based method for the design of virtual power meter, which is able to evaluate the power quantities for the single-phase system, is introduced in this paper. The solution procedure contains two stages. In the first stage, ...
On Auxiliary Information Presentation Sequence Applied to Mobile Devices
Found in: IEEE International Conference on Wireless, Mobile, and Ubiquitous Technology in Education
By Yu-Hsiang Wang,Chorng-Shiuh Koong,Chun-Cheng Chen,Deng-Jyi Chen
Issue Date:March 2012
pp. 272-276
Most mobile devices can only present limited amount of information owing to their small screen size, which can result in impact and constraint eventually hinders learners from knowledge acquisition. However, with the aid of auxiliary information, learning ...
Study and Implementation of RFID Eseals for Power Meters
Found in: Innovations in Bio-inspired Computing and Applications, International Conference on
By Jun-Chao Lu,Yu-Yi Chen,Jing-Min Wang,Jinn-Ke Jan,Chih-Cheng Chen,Yeong-Lin Lai
Issue Date:December 2011
pp. 352-355
The common solution is using the plastic-type sealsto protect the power meter. The purpose of sealing is toguarantee the identity and integrity of the power meter.However, the seals are easy to reach. Once the seals werebroken, it is simple to tamper the e...
A Private Escrow Protocol for Internet Will System Design
Found in: Innovations in Bio-inspired Computing and Applications, International Conference on
By Chin-Ling Chen,Teng-Tai Chou,Yeong-Lin Lai,Chih-Cheng Chen
Issue Date:December 2011
pp. 361-366
The design of an escrow will system would signify the beginning of a pre-built living will,open possibilities of escrowing a will to a courtroom via Internet.A prefect escrow will system considers the inherent security issues.Based on RSA probabilistic sig...
Innovative Application of Grey System Power Model and the Forecasting of Chinese Real Effective Exchange Rate under Information Fluctuation with Saturated Mode
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Fuzhong Chen,Cheng Chen
Issue Date:November 2011
pp. 432-435
Taking the data of Chinese real effective exchange rate (REER) as sample, the grey system Verhulst model is employed to investigate the changing tendencies innovatively. The forecasting result indicates that Chinese REER will depreciate with the improved a...
The Calibration Algorithm of Energy Detection and Site Meter
Found in: Digital Manufacturing and Automation, International Conference on
By Qiong Chen,Li Tang,Cheng Chen
Issue Date:August 2011
pp. 1225-1227
This chapter proposes a kind of caLibration algorithm to capture the number of pulses which aims to the caLibration of the meter field so as to achieve the accurate detection of power. In order to avoid the leakage of spectrum, it samples three-phase AC sy...
Hardware/software co-designed accelerator for vector graphics applications
Found in: Application Specific Processors, Symposium on
By Shuo-Hung Chen,Hsiao-Mei Lin,Hsin-Wen Wei,Yi-Cheng Chen,Chih-Tsun Huang,Yeh-Ching Chung
Issue Date:June 2011
pp. 108-114
This paper proposes a new hardware accelerator to speed up the performance of vector graphics applications on complex embedded systems. The resulting hardware accelerator is synthesized on a field-programmable gate array (FPGA) and integrated with software...
A Wide-Area Measurement Concept with Low-Cost Terminal Acquisition Units for Power System Quality Analysis
Found in: Asia-Pacific Power and Energy Engineering Conference
By Cheng-I Chen, Yeong-Chin Chen, Menq-Jion Wu, Yi-Chun Chiu
Issue Date:March 2011
pp. 1-4
Secure Network Mobility (SeNEMO) for Real-Time Applications
Found in: IEEE Transactions on Mobile Computing
By Tuan-Che Chen, Jyh-Cheng Chen, Zong-Hua Liu
Issue Date:August 2011
pp. 1113-1130
The IETF NEtwork MObility (NEMO) working group has considered how to enable an entire network to move from one location to another. Mobile Virtual Private Network (VPN) has been developed to secure mobile user's communication between untrusted external net...
An Observer-Based Method for Secure Communication
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Long-Chang Chen, Tsair-Fwu Lee, Pei-Ju Chao, Wen-Cheng Chen
Issue Date:September 2009
pp. 222-225
In this paper, Chua’s circuit is adopted to be the chaotic system in both of transmitter and receiver. According to the Pecore-Carroll’s synchronous chaos theory, an n-dimensional chaotic system can be separated as a drive and response subsystem. The drive...
A Temporal UID Matrix Strategy for Indexing Video Databases
Found in: Multimedia, International Symposium on
By Ye-In Chang, Wei-Horng Yeh, Jiun-Rung Chen, You-Cheng Chen
Issue Date:December 2007
pp. 187-194
In video databases, each video contains temporal and spatial relationships between content objects. One of the well-known video indexing strategies is the 3D C-string strategy. However, it cannot deal with the condition that an object appears and then disa...
Scalable Lossless Video Coding Based on Adaptive Motion Compensated Temporal Filtering
Found in: Multimedia Workshops, International Symposium on
By Yin-Tsung Hwang, Cheng-Chen Lin, Kuan-Hsun Tseng, Yi-Chen Chang
Issue Date:December 2007
pp. 421-426
In this paper, we propose a lossless video coding system with temporal scalability support for preview purpose. The backbone of the compression consists of an adaptive MCTF scheme and a spatial lossless predictive coding scheme. The former aims at both int...
An MAC Protocol for Wireless Ad-hoc Networks Using Smart Antennas
Found in: Parallel and Distributed Systems, International Conference on
By Wen-Tsuen Chen, Yen-Cheng Chen
Issue Date:July 2005
pp. 446-452
<p>Directional antennas can be used to increase the spatial reuse of wireless channels in multi-hop wireless ad-hoc networks. However, the use of directional antennas may lead to hidden terminal problems due to unheard RTS/CTS and asymmetry in gain. ...
A CMOS SoC for 56/18/16 CD/DVD-dual/RAM applications
Found in: Proceedings of the 43rd annual conference on Design automation (DAC '06)
By Alex Ho, Benjamin Chiu, Bing-Yu Hsieh, Chang-Long Wu, Chang-Po Ma, Ching-Ho Chu, Chuan Liu, Chun-Yiu Lin, Hao-Cheng Chen, Hong-Ching Chen, Hsiu-Chen Peng, Jenn-Ning Yang, Jyh-Shin Pan, Lily Huang, Meng-Hsueh Lin, Peng-Chuan Huang, Roger Lee, Shang-Nien Tsai, Shu-Hung Chou, Yuan-Chin Liu, Yung Cheng
Issue Date:July 2006
pp. 290-291
A SoC, integrating RF/AFE and 1.5 Gb/s SATA PHY, is presented. It supports 471 Mb/s bit-rate at 18xS DVD. A partial parity mode reduces SDRAM bandwidth. A power control mode minimizes system clock rate. The SoC has 10M transistors, occupies 5.4 x 5.1 mm2 i...
Co-Evolution of Multi-Typed Objects in Dynamic Star Networks
Found in: IEEE Transactions on Knowledge and Data Engineering
By Yizhou Sun,Jie Tang,Jiawei Han,Cheng Chen,Manish Gupta
Issue Date:December 2014
pp. 1-1
Mining network evolution has emerged as an intriguing research topic in many domains such as data mining, social networks, and machine learning. While a bulk of research has focused on mining evolutionary patterns of homogeneous networks (e.g., networks of...
A Novel System for Extracting Useful Correlation in Smart Home Environment
Found in: 2013 IEEE 13th International Conference on Data Mining Workshops (ICDMW)
By Yi-Cheng Chen,Wen-Chih Peng,Wang-Chien Lee
Issue Date:December 2013
pp. 357-364
Owing to the great advent of sensor technology, the usage data of appliances in a house can be logged and collected easily today. However, it is a challenge for the residents to visualize how these appliances are used. Thus, mining algorithms are much need...
We are not contortionists: Coupled adaptive learning for head and body orientation estimation in surveillance video
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Cheng Chen,J. Odobez
Issue Date:June 2012
pp. 1544-1551
In this paper, we deal with the estimation of body and head poses (i.e orientations) in surveillance videos, and we make three main contributions. First, we address this issue as a joint model adaptation problem in a semi-supervised framework. Second, we p...
Three-Dimensional Location Measurement System Constructed by Dual Cameras
Found in: Computer, Consumer and Control, International Symposium on
By Chih-Yu Hsu,Yeong-Lin Lai,Chih-Cheng Chen,Huai-Cian Jheng
Issue Date:June 2012
pp. 642-645
This paper presents a three-dimensional (3-D) location measurement system constructed by dual cameras. An artificial neural network (ANN) model is used to analyze the 3-D location measurement system implemented with twin pinhole cameras. Evaluation by simu...
Estimation of Synchrophasor with Two-Stage ADALINE
Found in: Computer, Consumer and Control, International Symposium on
By Cheng-I Chen
Issue Date:June 2012
pp. 524-527
The estimation of synchrophasor is of great concern for power quality and protection in power system. Once the power frequency deviation is present, the phasor would undergo a rotation in the complex plane. This phenomenon will introduce difficulty for the...
Enhanced Huffman Coding with Encryption for Wireless Data Broadcasting System
Found in: Computer, Consumer and Control, International Symposium on
By Kuo-Kun Tseng,Jun Min Jiang,Jeng-Shyang Pan,Ling Ling Tang,Chih-Yu Hsu,Chih-Cheng Chen
Issue Date:June 2012
pp. 622-625
Data compression has been playing an important role in the areas of data transmission. Many great contributions have been made in this area, such as Huffman coding, LZW algorithm, run length coding, and so on. These methods only focus on the data compressi...
Reliability Tests of a RFID-based Lock for Power Meter Applications
Found in: Computer, Consumer and Control, International Symposium on
By Kuan-Jung Chung,Chian-Wei Jan,Chih-Cheng Chen,Sen-Chou Tsai
Issue Date:June 2012
pp. 945-948
A novel lock (seal), combined Radio Frequency Identification (RFID) techniques with a smart mechanism, has been developed to improve the anti-thief ability of the traditional mechanical lock (seal) and RFID-based one that we developed in previous work. The...
The Chunk-Locality Index: An Efficient Query Method for Climate Datasets
Found in: 2012 26th IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)
By Cheng Chen,Xiaomeng Huang,Haohuan Fu,Guangwen Yang
Issue Date:May 2012
pp. 2104-2110
Geoscientists have a constant need to query into large-scale multidimensional array-based datasets. The most efficient way to accelerate queries is indexing. We focus on the climate datasets and propose a novel and efficient indexing method called the chun...
Fractal Features-Based Partial Discharge Pattern Recognition Using Extension Method
Found in: Intelligent System Design and Engineering Application, International Conference on
By Hung-Cheng Chen
Issue Date:January 2012
pp. 274-277
Partial discharge (PD) may cause the insulation deterioration in power equipments and impact the reliability. Therefore, the PD detection with pattern recognition is an important tool in high-voltage insulation diagnosis of power systems. A PD recognition ...
Image Segmentation Method with Positron Emission Tomography Time Sequence Images
Found in: Innovations in Bio-inspired Computing and Applications, International Conference on
By Chih-Yu Hsu,Yeong-Lin Lai,Chih-Cheng Chen,Yu-Tzu Lee
Issue Date:December 2011
pp. 367-370
Positron emission tomography(PET)images are often used to detect physiology function.However, PET images have more blurs than anatomic images,such as magnetic resonance imaging(MRI)and computed tomography(CT).With the graylevel of PET images,Doctors need t...
CEMiner -- An Efficient Algorithm for Mining Closed Patterns from Time Interval-Based Data
Found in: Data Mining, IEEE International Conference on
By Yi-Cheng Chen,Wen-Chih Peng,Suh-Yin Lee
Issue Date:December 2011
pp. 121-130
The mining of closed sequential patterns has attracted researchers for its capability of using compact results to preserve the same expressive power as conventional mining. However, existing studies only focus on time point-based data. Few research efforts...
Incremental Maintenance of Topological Patterns in Spatial-Temporal Database
Found in: Data Mining Workshops, International Conference on
By Yi-Cheng Chen,Chao-Ying Wu,Suh-Yin Lee
Issue Date:December 2011
pp. 853-860
Spatial temporal mining is an important research area with many interesting topics. Most spatial temporal databases are updating incrementally with time. Some discovered topological patterns may be invalidated and some new topological patterns may be intro...
Grey Markov Model Forecast in Economic System under Incomplete Information and its Application on Foreign Direct Investment
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Yaxing Wang,Cheng Chen
Issue Date:November 2011
pp. 117-120
Foreign direct investment (FDI) plays an extraordinary role in developing countries and its fluctuations reflect the changes of influencing factors during time, and therefore the models to simulate and forecast the trends are of great significance. Model G...
An Adaptive Diagnostic Algorithm for a Distributed System Modeled by Dual-cubes
Found in: Computational Science and Engineering, IEEE International Conference on
By Jheng-Cheng Chen,Chia-Jui Lai,Chang-Hsiung Tsai
Issue Date:August 2011
pp. 366-370
Problem diagnosis in large distributed computer systems and networks is a challenging task that requires fast and accurate inferences from huge data volumes. In this paper, the PMC diagnostic model are considered and the diagnosis approach in this model is...
Design of the Control System for a Hexapod Walking Robot
Found in: Digital Manufacturing and Automation, International Conference on
By Bo Jin,Li-jun Zhao,Jia-Lin Zhang,Cheng Chen,Sha Hu
Issue Date:August 2011
pp. 401-404
In this paper, the structure of a mammal-Like hexapod walking robot is presented and the joint trajectory planning method of tripod gait is analyzed. The motions with 12 degrees of freedom (DOF) for the robot are reaLized by 12 rudder servos. The control p...
Thoughts on Application of Multimedia in Education
Found in: International Conference on Future Computer Science and Education
By Xuhua Jiao,Cheng Chen
Issue Date:August 2011
pp. 591-594
Introduction of information technology in teaching and learning becomes more and more popular and is one of the major concerns of education reforms nowadays. This paper focuses on the application of multimedia in education, analyzes the definition of multi...
Combined estimation of location and body pose in surveillance video
Found in: Advanced Video and Signal Based Surveillance, IEEE Conference on
By Cheng Chen,A. Heili,J. Odobez
Issue Date:September 2011
pp. 5-10
In surveillance videos, cues such as head or body pose provide important information for analyzing people's behavior and interactions. In this paper we propose an approach that jointly estimates body location and body pose in monocular surveillance video. ...
Simulating human saccadic scanpaths on natural images
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Wei Wang, Cheng Chen, Yizhou Wang, Tingting Jiang, Fang Fang, Yuan Yao
Issue Date:June 2011
pp. 441-448
Human saccade is a dynamic process of information pursuit. Based on the principle of information maximization, we propose a computational model to simulate human saccadic scanpaths on natural images. The model integrates three related factors as driven for...
 1  2 Next >>